Security of Personal Data Sample Clauses
The 'Security of Personal Data' clause establishes the obligation of parties to protect personal information from unauthorized access, loss, or misuse. It typically requires implementing appropriate technical and organizational measures, such as encryption, access controls, and regular security assessments, to safeguard data handled under the agreement. This clause is essential for ensuring compliance with data protection laws and minimizing the risk of data breaches, thereby protecting the privacy and rights of individuals whose data is processed.
POPULAR SAMPLE Copied 1 times
Security of Personal Data. Zoho agrees to implement appropriate technical and organisational security measures as specified under Appendix 2 prior to and during Processing of any Personal Data to protect the security, confidentiality and integrity of the Personal Data and to protect the Personal Data against any form of accidental, unlawful or unauthorized Processing.
Security of Personal Data a. Adobe has implemented and maintains reasonable and appropriate Technical and Organizational Measures for Cloud Services regarding the protection of Personal Data Processed under these terms, assessable via this link: ▇▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/go/CloudSvcsTOSM.
b. Adobe has obtained the third-party certifications and audits evaluating these Technical and Organizational Measures and which are listed on Adobe´s Trust Center website (also accessible via ▇▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/security/compliance.html).
c. Adobe´s Technical and Organizational Measures are subject to technical progress and further development. Accordingly, Adobe reserves the right to modify the Technical and Organizational Measures provided that the functionality and security of the Cloud Services are not degraded.
Security of Personal Data. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Company shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of processing Personal Data. Exhibit C sets forth additional information about Company’s technical and organizational security measures.
Security of Personal Data. 5.1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Processor shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of Processing Personal Data.
Security of Personal Data a. The Processor shall at a minimum implement the technical and organizational measures specified in Appendix 2 to ensure the security of the Personal Data. This includes protecting the Personal Data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure or access to the Personal Data. In assessing the appropriate level of security, the parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the Data Subjects.
b. The Processor shall grant access to the Personal Data undergoing processing to members of its personnel only to the extent necessary for implementing, managing and monitoring of the Services Agreement. The Processor shall ensure that persons authorized to process the Personal Data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.
Security of Personal Data. 6.1 Zoom may not update the Services in a way that would remove Customer's choice to apply end to end encryption to Meetings, introduce any functionality that would purposefully allow anyone not authorized by the Customer to gain access to Customer encryption keys or Customer content, or remove the ability to store recordings locally.
6.2 Zoom certifies that it has not purposefully created any “back doors” or similar programming in the Services that could be used by third parties to access the system and/or personal data. Zoom has not purposefully created or changed its business processes in a manner that facilitates such third party access to personal data or systems. Zoom certifies there is no applicable law or government policy that requires Zoom as importer to create or maintain back doors or to facilitate access to personal data or systems or for the importer to be in possession of or to hand over the encryption key.
6.3 Taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Zoom shall maintain appropriate technical and organizational measures with regard to Customer Personal Data and to ensure a level of security appropriate to the risk, including, but not limited to, the “Security Measures” set out in Annex II to the Standard Contractual Clauses (attached here as EXHIBIT B). Customer acknowledges that the Security Measures are subject to technical progress and development and that Zoom may update or modify the Security Measures from time to time, provided that such updates and modifications do not degrade or diminish the overall security of the Services.
Security of Personal Data. 6.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Zoom shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of Processing Personal Data, including, but not limited to, the security measures set out in Exhibit B.
6.2 The Zoom shall implement such measures to ensure a level of security appropriate to the risk involved, including as appropriate:
6.2.1 the pseudonymisation and encryption of personal data;
6.2.2 the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
6.2.3 the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; and
6.2.4 a process for regularly testing, assessing and evaluating the effectiveness of security measures.
Security of Personal Data. 5.1. Processor shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of Processing Personal Data.
Security of Personal Data. The Contractor shall implement appropriate technical and organisational measures to safeguard the Personal Data from unauthorised or unlawful processing or accidental loss, destruction or damage in compliance with best industry standards, having regard to the state of technological development and the cost of implementing any measures, such measures shall ensure a level of security appropriate to the harm that might result from unauthorised or unlawful processing or accidental loss, destruction or damage and to the nature of the Personal Data to be protected. Without limiting the foregoing, the Contractor shall:
(a) implement technical and organisational measures to procure the confidentiality, privacy, integrity, availability, accuracy and security of the Personal Data including to ensure that any disclosure to an employee, agent or subcontractor is subject to a binding legal obligation to comply with the obligations of the Contractor under this Supplementary Agreement including compliance with relevant technical and organisational measures for the confidentiality, privacy, integrity, availability, accuracy and security of the Personal Data. For the avoidance of doubt, any agreement, contract or other arrangement with an employee, agent or subcontractor shall not relieve the Contractor of its obligation to comply fully with this Supplementary Agreement, and the Contractor shall remain fully responsible and liable for ensuring full compliance with this Supplementary Agreement;
(b) ensure that the Personal Data are stored in a secure (encrypted) digital and physical environment;
(c) ensure that all data sharing is executed by secure (end-to-end encrypted) means;
(d) implement technical measures including (i) restricting access to data to authorized personnel and devices only, (ii) the use of multi-factor authentication where possible, and passwords to prevent unauthorized access to data and (iii) backing-up data in case of loss or damage;
(e) implement organizational measures including (i) securing premises where hard-copy files or computers are stored, (ii) safely disposing of any obsolete hard copy files and (iii) ensuring that portable devices are kept in a secure location at all times when not in use.
(f) implement backup processes as agreed between UNHCR and the Contractor to procure the availability of the Personal Data at all times and ensure that UNHCR will have access to such backup of the Personal Data as is reasonably required by UNHCR;
(g) compl...
Security of Personal Data. We will take appropriate technical, physical and organisational measures to protect the Personal Data collected through the Website from misuse or accidental, unlawful or unauthorised destruction, loss, alteration, disclosure, acquisition or access, that are consistent with applicable privacy and data security laws and regulations. However, no internet-based site can be 100% secure and we cannot be held responsible for unauthorised or unintended access that is beyond our control. Our Website may contain links to other websites. We are not responsible for the privacy practices, content or security used by such other websites, which shall not be governed by this Privacy Policy. We advise you to always carefully read the privacy policies on these other websites.