Subprocessor Security Sample Clauses

The Subprocessor Security clause establishes requirements for ensuring that any third-party service providers (subprocessors) engaged to process data on behalf of the primary service provider maintain adequate security standards. Typically, this clause obligates the primary service provider to vet subprocessors for compliance with relevant data protection laws and to impose contractual obligations that mirror the security commitments made to the client. Its core function is to mitigate risks associated with outsourcing data processing by ensuring that all parties handling sensitive information uphold consistent security measures.
POPULAR SAMPLE Copied 2 times
Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor then, subject always to the requirements set out in Section 11.3 (Requirements for Subprocessor Engagement), the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.
Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement), the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms. Appendix 3: Speci c Privacy Laws The terms in each subsection of this Appendix 3 apply only where the corresponding law applies to the processing of Customer Personal Data. European Data Protection Law
Subprocessor Security. Prior to onboarding Subprocessors, the Data Importer conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once the Data Importer has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.
Subprocessor Security. Prior to onboarding subprocessors, Airship conducts a selection process to evaluate the subprocessors’ security, privacy, data protection, and confidentiality practices and to assess that subprocessors provide a level of security, data protection, and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Where applicable, Airship enters into data protection agreements providing equivalent obligations as those required from Airship as set forth in the Airship Data Processing Addendum. Subprocessors are re-authorized upon contract renewal or on an annual basis.
Subprocessor Security. Before onboarding Subprocessors, Bitrix24 conducts an audit of the security and privacy practices of Sub-processors to ensure Sub-processors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Bitrix24 has assessed the risks presented by the Sub-processor then, subject always to the requirements set out in Section 7 the Sub-processor is required to enter into appropriate security, confidentiality and privacy contract terms.
Subprocessor Security. Before using a Subprocessor, 4me conducts an audit of the security and privacy practices of the Subprocessor to ensure the Subprocessor provides a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once 4me has assessed the risks presented by the Subprocessor, then subject always to the requirements set out in Section 5 (Subprocessing) of this Data Processing Addendum, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.
Subprocessor Security. Before onboarding Subprocessors, IT Farm conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once IT Farm has assessed the risks presented by the Subprocessor, then subject to the requirements set out in Section 11.3 (Requirements for Subprocessor Engagement) of these Terms, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.
Subprocessor Security. Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Addendum, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms. June 30, 2022 (/terms/data-processing-addendum/index-20220630) September 24, 2021 (/terms/data-processing-terms/index-20210924) August 19, 2020 (/terms/data-processing-terms/index-20200819) Digital Millennium Copyright Act The Digital Millennium Copyright Act It's Googlc's policQ to ícspo⭲d to clcaí ⭲oticcs or allcgcd copQíigkt i⭲ríi⭲gcmc⭲t. O"í ícspo⭲sc to tkcsc ⭲oticcs maQ i⭲cl"dc ícmo:i⭲g oí disabli⭲g acccss to matcíial claimcd to bc tkc s"bjcct or i⭲ríi⭲gi⭲g acti:itQ a⭲d/oí tcími⭲ati⭲g s"bscíibcís. Ir wc takc actio⭲ i⭲ ícspo⭲sc to a ⭲oticc, wc maQ tíQ to ⭲otirQ tkc allcgcd i⭲ríi⭲gcí oí tkc opcíatoí or tkc arrcctcd sitc. Wc maQ also doc"mc⭲t ⭲oticcs or allcgcd i⭲ríi⭲gcmc⭲t o⭲ wkick wc act. Wc maQ roíwaíd tkc co⭲tc⭲t i⭲ Qo"í ⭲oticc to tkc ⭲o⭲píorit oíga⭲izatio⭲ Ḻ"mc⭲, wkick p"bliskcs tkcsc ⭲oticcs artcí ícmo:i⭲g ccítai⭲ pcíso⭲al i⭲roímatio⭲. Yo" ca⭲ scc a⭲ cxamplc or s"ck a p"blicatio⭲ kcíc. Ioí píod"cts likc Googlc Wcb Scaíck, ▇▇ ▇▇▇:idc a li⭲k to tkc ⭲oticc as p"bliskcd bQ Ḻ"mc⭲ i⭲ placc or tkc ícmo:cd co⭲tc⭲t. ľkis pagc pío:idcs i⭲stí"ctio⭲s roí rili⭲g tkc rollowi⭲g tQpcs or complai⭲ts: I⭲ríi⭲gcmc⭲t Notiricatio⭲ Co"⭲tcí ⭲otiricatio⭲ Infringement Notification ľo rilc a ⭲oticc or i⭲ríi⭲gcmc⭲t witk "s, plcasc rilc a complai⭲t "si⭲g tkc stcps a:ailablc at o"í lcgal tío"blcskootcí. BQ sclccti⭲g tkc appíopíiatc píod"ct, tkc roím will píompt Qo" to pío:idc all tkc i⭲roímatio⭲ listcd bclow tkat is ícq"iícd to s"bmit a :alid KMCA complai⭲t. Plcasc ⭲otc tkat Qo" will bc liablc roí damagcs (i⭲cl"di⭲g costs a⭲d attoí⭲cQs' rccs) ir Qo" matcíiallQ misícpícsc⭲t tkat a píod"ct oí acti:itQ is i⭲ríi⭲gi⭲g Qo"í copQíigkts. I⭲dccd, i⭲ a past casc (plcasc scc kttp://www.o⭲li⭲cpolicQ.oíg/actio⭲/lcgpolicQ/opg_:_dicbold/ roí moíc i⭲roímatio⭲), a compa⭲Q tkat sc⭲t a⭲ i⭲ríi⭲gcmc⭲t ⭲otiricatio⭲ sccki⭲g ícmo:al or o⭲li⭲c matcíials tkat wcíc píotcctcd bQ tkc raií "sc doctíi⭲c was oídcícd to paQ s"ck costs a⭲d attoí⭲cQs rccs....
Subprocessor Security. Prior to onboarding Subprocessors, GlobalSign conducts security self-check questionnaires of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged. Once GlobalSign has assessed the risks presented by the Subprocessor, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms, as described in the addendum of GlobalSign to ensure compliance with the obligations of article 28 of the General Data Privacy Regulation.
Subprocessor Security. LogicMonitor shall conduct security assessments of its subprocessors that process Customer Data to ensure effectiveness of their security operational practices. LogicMonitor’s current subprocessors are listed at ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/terms/data_handling_supplement.