Input Controls Clause Samples

The Input Controls clause establishes requirements and procedures for managing and verifying the data or information provided by one party to another within a contractual relationship. Typically, this clause outlines the standards for data accuracy, the methods for submitting information, and the responsibilities for correcting errors or omissions. By setting clear expectations for data handling, the clause helps prevent misunderstandings, ensures data integrity, and reduces the risk of disputes arising from incorrect or incomplete information.
POPULAR SAMPLE Copied 5 times
Input Controls. Data Processor shall take reasonable measures to provide that it is possible to check and establish whether and by whom Personal Data has been entered into data processing systems, modified or removed; and, any transfer of Personal Data to a third-party service provider is made via a secure transmission.
Input Controls. Detection: We designed our infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate personnel of malicious, unintended, or anomalous activities. Our personnel, including security, operations, and support personnel, are responsive to known incidents. Response and tracking: We maintain a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, and/or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, we will take appropriate steps to minimize product and customer damage or unauthorized disclosure. Notifications will be in accordance with the terms of the Agreement.
Input Controls the data importer shall take reasonable measures to provide that it is possible to check and establish whether and by whom personal data has been entered into data processing systems, modified or removed. Data importer shall take reasonable measures to ensure that (i) the personal data source is under the control of data exporter; and (ii) personal data integrated into data importer’s systems is managed by secured file transfer from the data importer and data subject.
Input Controls. Our Sub-processors will take reasonable measures to ensure that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Service Data to a third-party service provider is made via a secure transmission.
Input Controls. Zendesk takes reasonable measures to provide that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed, and that any transfer of Service Data to a third-party service provider is made via a secure transmission.
Input Controls. The Contractor shall warrant that it can be subsequently verified and established whether and by whom personal data have been input, modified or removed in data processing systems. This shall be done by: ● central logging and log evaluation systems ● each employee having only the necessary access to the data required within the scope of his or her function/role (principle of minimum rights) ● application-level firewalls and intrusion detection systems being used to prevent and detect attacks
Input Controls. Aircall shall take reasonable measures to provide that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed. Aircall shall take reasonable measures to ensure that (i) the Personal Data source is under the control of the Customer; and (ii) Personal Data is integrated into the Service is managed by secured file transfer from the Customer.
Input Controls. Third-party service providers shall take reasonable measures designed to ensure that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any of transfer of Service Data to a third-party service provider is made via a secure transmission.
Input Controls. Data Process shall take reasonable measures to provide that it is possible to check and establish whether and by whom Service Data has been entered into data processing systems, modified or removed; and, any transfer of Personal Data to a third-party service provider is made via a secure transmission.
Input Controls. Provider shall monitor whether and by whom Personal Data has been entered into data processing systems, modified or removed. Provider shall take reasonable measures to ensure that (i) the Personal Data source is under the control of Customer and accessible to Customer, and (ii) Personal Data integrated into the service is managed by secured transmission from Customer.