Continued Evaluation Clause Samples
The Continued Evaluation clause establishes the right for one or both parties to periodically assess the ongoing suitability or performance of the agreement or its subject matter. In practice, this may involve scheduled reviews, performance benchmarks, or compliance checks to ensure that obligations are being met and that the arrangement remains beneficial. Its core function is to provide a mechanism for ongoing oversight and adjustment, helping to address issues proactively and maintain alignment with the parties' objectives over time.
Continued Evaluation. AWS will conduct periodic reviews of the security of its AWS Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. AWS will continually evaluate the security of its AWS Network and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
Continued Evaluation. 4me will conduct periodic reviews of the security of its 4me Infrastructure and adequacy of its information security program as measured against industry security standards and its policies and procedures. 4me will continually evaluate the security of its 4me Infrastructure and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
Continued Evaluation. Partner will conduct periodic reviews of the Security of its Partner Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. Partner will continually evaluate the security of its Partner Network to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
Continued Evaluation. AWS will conduct periodic reviews of the security of its AWS Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. AWS will continually evaluate the security of its AWS Network and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews. For the purposes of Article 26(2) of Directive 95/46/EC for the transfer of personal data to processors established in third countries which do not ensure an adequate level of data protection HAVE AGREED on the following Contractual Clauses (the Clauses) in order to adduce adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of individuals for the transfer by the data exporter to the data importer of the personal data specified in Appendix 1.
Continued Evaluation. Vercel will conduct periodic reviews of the security of its Vercel Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. Vercel will continually evaluate the security of its Vercel Network and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by periodic reviews.
Continued Evaluation. 4me will conduct periodic reviews of the security of its 4me Infrastructure and adequacy of its information security program as measured against industry security standards and its policies and procedures. 4me will continually evaluate the security of its 4me Infrastructure and associated Service to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
1. Name: Amazon Web Services Address: ▇▇▇ ▇▇▇▇▇ ▇▇▇ North Seattle, WA 98109-5210 U.S.A. Attention: General Counsel Description of processing: Facilitating the Virtual Private Cloud Infrastructure (local data centers) to enable the Processor to provide the Service. Location of processing in Europe: Ireland and Germany
2. Name: Workato, Inc. Address: ▇▇▇ ▇▇▇▇▇▇ ▇▇▇▇▇▇, Suite 300 Mountain View, CA 94041 U.S.A. Attention: Chief Information Security Officer, ▇▇▇▇▇▇▇@▇▇▇▇▇▇▇.▇▇▇ Description of processing: Workato provides a flexible business integration and automation service which is used by the Processor to provide the 4me Workflow Automator Service. Location of processing in Europe: Germany
1. The parties agree that the terms of the Standard Contractual Clauses are hereby incorporated by reference and shall apply to transfer of Customer Personal Data from the EEA to other countries that are not deemed as Adequate Countries.
2. Module Two (Controller to Processor) of the Standard Contractual Clauses shall apply where the transfer is effectuated by Customer as the data Controller of the Personal Data and 4me is the data Processor of the Personal Data.
3. The Parties agree that for the purpose of transfer of Customer Personal Data between Customer (as Data Exporter) and the 4me (as Data Importer), the following shall apply:
3.1. Clause 7 of the Standard Contractual Clauses shall not be applicable.
3.2. In Clause 9, option 2 (general written authorization) shall apply and the method for appointing and time period for prior notice of subprocessor changes shall be as set forth in the subprocessing Section 5 of the Addendum.
3.3. In Clause 11, the optional language will not apply, and data subjects shall not be able to lodge a complaint with an independent dispute resolution body.
3.4. In Clause 17, option 1 shall apply. The parties agree that the Standard Contractual Clauses shall be governed by the laws of the EU Member State in which the Customer is established (where applicable).
3.5. In Clause 18(b) the parties choo...
Continued Evaluation. Badger Meter will conduct periodic reviews of the security of its Badger Meter Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. Badger Meter will continually evaluate the security of its Badger Meter Network and associated Service to determine whether additional or different security measures are required to respond to new security risks or findings generated by the periodic reviews.
Continued Evaluation. Planon will conduct periodic reviews of the security of its infrastructure and adequacy of its information security program as measured against industry security standards
Continued Evaluation. ZEIT will conduct periodic reviews of the security of its ZEIT Network and adequacy of its information security program as measured against industry security standards and its policies and procedures. ZEIT will continually evaluate the security of its ZEIT Network and associated Services to determine whether additional or different security measures are required to respond to new security risks or findings generated by periodic reviews.
Continued Evaluation. Telstra conducts continuous improvement and conducts periodic reviews of the adequacy of its information Security Governance Framework as measured against industry security standards and its policies and procedures.