Measures for allowing data portability and ensuring erasure Clause Samples

POPULAR SAMPLE Copied 21 times
Measures for allowing data portability and ensuring erasure. Encryption of Subscriber Data in transit across external untrusted networks when using Domo APIs and services utilizing industry standard cryptography and key management practices; • Where technically enforced, encryption of Subscriber Data and back-ups of Subscriber Data at rest utilizing industry standard cryptography and key management practices; • Encryption of authentication credentials at rest utilizing industry standard cryptography and key management practices. For transfers to Sub-processors, Domo, as processor, requires that its Sub-processors take appropriate technical and organizational measures to assist the controller and data exporter in protecting the security, confidentiality and integrity of Personal Data uploaded to the Services as follows: 1. Relevant agreements with sub-processors include requirements for appropriate technical and organizational measures relevant to the sub-processor services provided to Domo. 2. Technical and organizational measures used to mitigate any risks associated with sub-processor access to Subscriber Data in its provision of relevant sub-processor services to Domo are agreed upon with the sub-processor and documented. 3. All relevant technical and organizational measures are established and agreed upon with each sub-processor that may access, process, or store Subscriber Data. 4. A Domo security and risk review is performed for each Sub-processor that may access, process or store Subscriber Data. 1. the information required for Table 1 is contained in Annex I of Schedule 1 of this DPA and the start date shall be deemed dated the same date as the EU Standard Contractual Clauses; 2. in relation to Table 2, the version of the EU Standard Contractual Clauses to which the UK Approved Addendum applies is Module Two for Controller to Processor; 3. the terms of clause 8.2.1 of this DPA shall also apply to the version of the EU Standard Contractual Clauses to which the UK Approved Addendum applies; 4. in relation to Table 3, the list of parties and description of the transfer are as set out in Annex 1 of Schedule 1 of this DPA, Domo's technical and organisational measures are set in Annex II of Schedule 1 of this DPA, and the list of Domo's current sub-processors are provided at ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/company/subprocessors ; and 5. in relation to Table 4, neither party will be entitled to terminate the UK Approved Addendum in accordance with clause 19 of the UK Mandatory Clauses.
Measures for allowing data portability and ensuring erasure. As part of the ordered processing, personal data is processed. The generated information after processing does not involve personal data and will be aggregated. Once aggregation is complete, the detailed, underlying data is anonymised or erased. Thus, data portability is not applicable.
Measures for allowing data portability and ensuring erasure. Microsoft’s SOC2 applies here. When a data store/base is (re)moved, the cloud provider ensures that the
Measures for allowing data portability and ensuring erasure. Encryption of Subscriber Personal Data in transit across external untrusted networks when using Domo APIs and services utilizing industry standard cryptography and key management practices; • Where technically enforced, encryption of Subscriber Personal Data and back-ups of Subscriber Personal Data at rest utilizing industry standard cryptography and key management practices; • Encryption of authentication credentials at rest utilizing industry standard cryptography and key management practices.
Measures for allowing data portability and ensuring erasure. The Processor must be able to support Controller to fulfil its obligations about data portability as described in GDPR. The Processor shall have documented and implemented procedures to ensure that all Processor storage media devices are securely erased or physically destroyed by using generally accepted methods (e.g. NIST SP 800-88 guidelines for Media Sanitization) for secure information removal. The Processor has been authorised by Controller to use the followingsubprocessors. Additions and/or changes to this list are regulated in the DPA including Annex 1 clause 7.7 (a): 1. Name: [All subprocessors used by Processor are listed in the matrix below] Address: [Please see the matrix below] Contact person’s name, position and contact details: [Could be provided on request] Description of the processing (including a clear delimitation of responsibilities in case several sub-processors are authorised): [Please see the matrix below] 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Postnord Strålfors AB, Terminalvägen 24, 171 73 Solna Printing of invoices*, claims and letters *Applies only to the service "Invoice service" Controllers customers Authentication information, contact information, transaction information 90 days Sweden Daily, when invoices, claims and letters are created/printed. Edi solutions AB, Box 9169, 400 94 Göteborg (Not valid for service Ledger Service with invoice discounting PxR) Integration and restructuring of data files sent by Controller Controllers customers Authentication information, contact information, transaction information Incoming/outgoing files/API, database, backups: 6 months Email with installation instructions/setup instructions (including PayEx contact information): deleted immediately after installation/setup is complete. Email from PayEx customers: Microsoft 365 GDPR standard Sweden, cloud storage on servers located within the EU (Azure) Daily, when integration is used by Controller for invoicing or reporting back to the customer's ERP/business system.
Measures for allowing data portability and ensuring erasure. Pleo will provide assistance to the Customer as may reasonably be required under Applicable Data Protection Laws to respond to requests from individuals to exercise their rights under Applicable Data Protection Laws (e.g., rights of data access, rectification, erasure, restriction, portability and objection).
Measures for allowing data portability and ensuring erasure. ○ L▇▇▇▇ does not have procedures to facilitate data portability requests from data subjects. Lixte does not have this level of data.

Related to Measures for allowing data portability and ensuring erasure

  • Data Portability Operator shall, at the request of the LEA, make Data available including Pupil Generated Content in a readily accessible format.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇▇▇.▇▇▇▇▇.▇▇.▇▇/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at ▇▇▇▇@▇▇▇▇▇.▇▇▇▇▇.▇▇.▇▇ and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (▇▇▇) ▇▇▇-▇▇▇▇. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees