Data Management Controls Clause Samples

Data Management Controls. (i) Data Input Control – Appropriate procedures to enable Seller to check and establish whether, when, and by whom Raytheon Data may have been input into Seller’s Systems, or otherwise viewed, modified, or removed.
Data Management Controls. (i) Data Input Control – Appropriate procedures to enable VMT to check and establish whether, when, and by whom Personal Data may have been input into the Systems, or otherwise modified, or removed.
Data Management Controls. (i) Data Integrity Controls – Implementing and maintaining appropriate security measures and procedures to protect the integrity of the Customer Data, to prevent the unauthorized recording, alteration or erasure of Customer Data, (ii) Data Encryption – Implementing and maintaining appropriate security measures and procedures to ensure that Customer Data is encrypted using, at a minimum, Advanced Encryption Standard (AES) with 256-bit key length, so that it cannot be read, copied, changed or deleted by unauthorized persons while in storage and while it is being transferred electronically or transferred or saved on a data medium. (iii) Data Destruction – Implementing and maintaining appropriate security measures and procedures to destroy Customer Data when appropriate and in accordance with the Agreement. (iv) Data Availability Control – Implementing and maintaining appropriate security measures and procedures in order to ensure data availability, including procedures to ensure that Customer Data is protected from accidental destruction or loss, and against loss of data caused by a power shortage or interruptions in the power supply. (v) Data Segregation – Ensure that Customer Data is segregated from other customer’s data. Newgen will ensure that appropriate controls are in place for data segregation.
Data Management Controls. (i) UBS Assets - UBS Assets must only be used by the Supplier for the purposes specified in this Agreement.
Data Management Controls. (i) Data Input Control – Appropriate procedures to enable MPP to check and establish whether, when, and by whom Personal Data may have been input into the Systems, or otherwise modified, or removed.

Related to Data Management Controls

  • Agreement Controls The terms and conditions of this Master Agreement control over the terms and conditions contained in an Approved Service Order – even if the Approved Service Order expressly states that it is intended to control. Any conflicting terms and conditions in an Approved Service Order are invalid and unenforceable.

  • Data Management Contractor will not use State data, including production data, for testing or development purposes unless authorized in writing by the State Chief Information Security Officer or delegate. Contractor will implement and maintain procedures to physically and logically segregate State data, unless otherwise explicitly authorized by the State Chief Information Security Officer or delegate.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems.

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins