ANNEX II TO THE STANDARD CONTRACTUAL CLAUSES Clause Samples

POPULAR SAMPLE Copied 1 times
ANNEX II TO THE STANDARD CONTRACTUAL CLAUSES. This Annex forms part of the Clauses and must be completed and signed by the parties and sets forth a description of the technical and organizational measures implemented by the data importer(s) (including any relevant certifications) to ensure an appropriate level of security, taking into account the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons. The data importer implements the following measures: • pseudonymization and encryption of personal data • ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services • ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident Processes for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures in order to ensure the security of the processing • user identification and authorization Measures for the protection of data during transmission • protection of data during storage Measures for ensuring physical security of locations at which personal data are processed Measures for ensuring events logging • ensuring system configuration, including default configuration • internal IT and IT security governance and management Measures for certification/assurance of processes and products • ensuring data minimization • ensuring data quality Measures for ensuring limited data retention • ensuring accountability • allowing data portability and ensuring erasure For transfers to (sub-) processors, also describe the specific technical and organizational measures to be taken by the (sub-) processor to be able to provide assistance to the controller and, for transfers from a processor to a sub-processor, to the data exporter The measures set forth above are required of sub-processors to the extent, and based upon, the nature of the processing carried out by the particular sub-processor.
ANNEX II TO THE STANDARD CONTRACTUAL CLAUSES. This Annex forms part of the Clauses and has been agreed by the parties by virtue of their signing the DPA. • ISO 27701 • ISO 9000 • ISO 14000 • PCI CP • PCI SAQ • CAIQ Cloud Security Alliance • Webtrust – CAB Forum • NIST/FISMA • ETSI • Tscheme To ensure that the information security strategy is effective, Entrust enforces information security policies and procedures across its entire organization, as well as all business and technical projects. Governance, Risk and Compliance (GRC), Threat and Vulnerability Management (TVM), Security Architecture, Security Operations Center, Disaster Recovery, Business Continuity and Incident Response are the integral components of this strategy. At an operational level, Entrust has instituted a Security Incident Response Plan to oversee data security events identified or detected by the various technologies used to monitor and alert based on specific thresholds or circumstances. The objectives of the Security Incident Response Plan are to manage and coordinate data security incidents throughout all aspects of the Entrust computing environment regardless of location, product or process, as well as provide opportunities for educating our colleagues on risks and security controls in place. Entrust is committed to protecting the interest of stakeholders by maintaining a robust Security Operation Center (SOC). The SOC is a centralized unit that monitors the confidentiality, integrity, and availability of information technology infrastructure and deals with security on an organizational level. Entrust has a continuous vulnerability discovery and remediation program. This process is built on industry certified tools and procedures and is facilitated by competent and experienced professionals. The Threat and Vulnerability Management (TVM) controls and measures are audited several times a year by qualified auditors to ensure we are compliant with applicable laws and industry standard frameworks.
ANNEX II TO THE STANDARD CONTRACTUAL CLAUSES. Partner shall adhere to Entrust’s Vendor Security Addendum requirements as set forth at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇.▇▇▇/legal-compliance/security.
ANNEX II TO THE STANDARD CONTRACTUAL CLAUSES. This Annex forms part of the Clauses and has been agreed by the parties by virtue of their signing the DPA. • ISO 27701 • ISO 9000 • ISO 14000 • PCI CP • PCI SAQ • CAIQ Cloud Security Alliance • Webtrust – CAB Forum • NIST/FISMA • ETSI • Tscheme To ensure that the information security strategy is effective, Entrust enforces information security policies and procedures across its entire organization, as well as all business and technical projects. Governance, Risk and Compliance (GRC), Threat and Vulnerability Management (TVM), Security Architecture, Security Operations Center, Disaster Recovery, Business Continuity and Incident Response are the integral components of this strategy.
ANNEX II TO THE STANDARD CONTRACTUAL CLAUSES. Technical and Organizational Measures Including Technical and Organizational Measures to Ensure the Security of the Data.

Related to ANNEX II TO THE STANDARD CONTRACTUAL CLAUSES

  • TO THE STANDARD CONTRACTUAL CLAUSES This Appendix forms part of the Clauses and must be completed and signed by the parties.

  • Standard Contractual Clauses Where (i) Personal Data of an EEA or Swiss based Controller is processed in a country outside the EEA, Switzerland and any country, organization or territory acknowledged by the European Union as safe country with an adequate level of data protection under Art. 45 GDPR, or where (ii) Personal Data of another Controller is processed internationally and such international processing requires an adequacy means under the laws of the country of the Controller and the required adequacy means can be met by entering into Standard Contractual Clauses, then: (a) SAP and Customer enter into the Standard Contractual Clauses; (b) Customer enters into the Standard Contractual Clauses with each relevant Subprocessor as follows, either (i) Customer joins the Standard Contractual Clauses entered into by SAP or SAP SE and the Subprocessor as an independent owner of rights and obligations ("Accession Model") or, (ii) the Subprocessor (represented by SAP) enters into the Standard Contractual Clauses with Customer ("Power of Attorney Model"). The Power of Attorney Model shall apply if and when SAP has expressly confirmed that a Subprocessor is eligible for it through the Subprocessor list provided under Section 6.1(c), or a notice to Customer; and/or (c) Other Controllers whose use of the Cloud Services has been authorized by Customer under the Agreement may also enter into Standard Contractual Clauses with SAP and/or the relevant Subprocessors in the same manner as Customer in accordance with Sections 7.2

  • CONTRACT CLAUSES  A SOLICITATION/CONTRACT FORM 1  I CONTRACT CLAUSES 58  B SUPPLIES OR SERVICES AND PRICES/COSTS 2 PART III - LIST OF DOCUMENTS, EXHIBITS & ATTACHMENTS  C DESCRIPTION/SPECS./WORK STATEMENT 25  J LIST OF ATTACHMENTS 74  D PACKAGING AND MARKING 26 PART IV - REPRESENTATIONS AND INSTRUCTIONS  E INSPECTION AND ACCEPTANCE 27 K REPRESENTATIONS, CERTIFICATIONS OTHER STATEMENTS OF OFFERORS  F DELIVERIES OR PERFORMANCE 29  G CONTRACT ADMINISTRATION DATA 32 L INSTRS., CONDS., AND NOTICES TO  H SPECIAL CONTRACT REQUIREMENTS 34 M EVALUATION FACTORS FOR AWARD

  • Final Clauses This Agreement will enter into force upon signature by both Parties and shall remain in force until completion of all obligations of the Parties under this Agreement.

  • General Clauses 29.1 This Deed of Sale constitutes the entire agreement between the Parties as to the subject matter hereof and no agreement, representation or warranty between the Parties other than those set out herein are binding on the Parties. 29.2 No extension of time, waiver, indulgence or suspension of any of the provisions of this agreement, which any Party hereto may have given, shall be binding unless recorded in a written document signed by all Parties. 29.3 No variation or alteration or cancellation of this Deed of Sale or any of the terms hereof, shall be of any force or effect, unless in writing and signed by the Parties hereto. 29.4 The Parties signing this document confirm that they have read and understood all of the terms and conditions contained herein and agree that they are bound hereto. 29.5 The Seller and the Purchaser warrants that they are duly authorised to sign acceptance of the Deed of Sale. 29.6 The agreements and undertaking of parties contained in this agreement shall each be construed as an agreement and undertaking independent of any other provision of this agreement. The parties hereby expressly agree that it is not the intention of any party to violate any public policy, statutory or common law, and that if any sentence, paragraph, clause or combination of the same is in violation of the law of the Republic of South Africa, such sentence, paragraph, clause or combination of the same alone shall be void in the jurisdiction where it is unlawful, and the remainder of such clause and this agreement shall remain binding upon the parties hereto. The parties further acknowledge that it is their intention that the provisions of this agreement be binding only to the extent that they may be lawful under existing applicable law of the Republic of South Africa, and in the event that any provision hereof is determined to be overly broad or unenforceable, the parties hereto agree to the modification of such provisions by their attorneys to the minimum extent required to make them valid and enforceable.