Processing Details and Security Clause Samples

Processing Details and Security. For details regarding the processing for the Silverline SaaS Offerings please refer to the DPA and Schedule A below. For a description of the technical and organizational security measures for the Silverline SaaS Offerings, please refer to Schedule B below.
Processing Details and Security. For details regarding the processing for the SaaS Offerings please refer to the DPA and Schedule A below. For a description of the technical and organizational security measures for the SaaS Offerings, please refer to Schedule B below.
Processing Details and Security. For details regarding the processing please refer to the DPA and Schedule A below. For a description of the technical and organizational security measures for the Distributed Cloud Bot Defense (Self Service) Service, please refer to Schedule B below.
Processing Details and Security. For details regarding the processing for the SaaS Offerings please refer to the DPA and Schedule A below. For a description of the technical and organizational security measures for the SaaS Offerings, please refer to Schedule B below. Applied safeguards and restrictions specific to any special categories of data: Not applicable. The frequency of the transfer (e.g., whether the data is transferred on a one-off or continuous basis): Continuous The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period: Personal data is retained during the subscription term. The data will be removed after termination, subject to a reasonable period of retention of copies made for backup and business continuity purposes. * you may tailor the categories of personal data for the applicable SaaS Offering and change it over time, so the listed data elements may not reflect a comprehensive list of categories of data at all times. A comprehensive listing of categories of data will be provided via the dashboard accessible within your Account through the Portal, or otherwise made available to you by us upon request.
Processing Details and Security. For details regarding the processing for NGINX on Azure please refer to the DPA and Schedule A below. For a description of the technical and organizational security measures for NGINX on Azure, please refer to Schedule B below.
Processing Details and Security. For details regarding the processing for the F5 Cloud Services please refer to the DPA and Schedule A below. For a description of the technical and organizational security measures for the F5 Cloud Services, please refer to Schedule B below. Details relevant to Appendix 1 of the 2010 Standard Contractual Clauses and Annex I(B) of the 2021 Standard Contractual Clauses Beacon DNS DNS Load Balancer Subject Matter, Nature and Purpose of Processing and Details of Processing Operations: Providing visibility and actionable insights into the health and performance of your applications as described above Secondary authoritative DNS service as described above DNS / load balancing as described above Categories of Personal Data: DNS / load balancing as described above monitoring and/or telemetry from devices, hosts, applications and/or services that constitutes personal data. IP addresses and other packet header information. IP addresses and other packet header information. Special Categories of Data (if any): Not applicable Not applicable. Not applicable
Processing Details and Security. For details regarding the processing for the F5 Cloud Services please refer to the DPA and Schedule A below. For a description of the technical and organizational security measures for the F5 Cloud Services, please refer to Schedule B below. Details relevant to Annex I(B) of the 2021 Standard Contractual Clauses Beacon DNS DNS Load Balancer Subject Matter, Nature and Purpose of Processing and Details of Processing Operations: Providing visibility and actionable insights into the health and performance of your applications as described above Secondary authoritative DNS service as described above DNS / load balancing as described above Categories of Personal Data: DNS / load balancing as described above monitoring and/or telemetry from devices, hosts, applications and/or services that constitutes personal data. IP addresses and other packet header information. IP addresses and other packet header information. Special Categories of Data (if any): Not applicable Not applicable. Not applicable

Related to Processing Details and Security

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Background Screening and Security All Contractor employees, Subcontractors and agents of the Contractor performing work under the Contract must comply with all background screening and security requirements of the Department, as detailed below.

  • Safety and Security Contractor is responsible for maintaining safety in the performance of this Agreement. Contractor shall be responsible to ascertain from the District the rules and regulations pertaining to safety, security, and driving on school grounds, particularly when children are present.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.