Technical Measures Clause Samples

The Technical Measures clause defines the specific technological safeguards and procedures that must be implemented to protect data or systems. This may include requirements such as encryption, access controls, regular security audits, or secure data transmission protocols. By outlining these measures, the clause ensures that both parties understand and agree on the minimum standards for technical security, thereby reducing the risk of data breaches and ensuring compliance with relevant regulations.
Technical Measures. Vessels shall comply with the measures and recommendations adopted by ICCAT in the region regarding fishing gear and the technical specifications thereof and all other technical measures applicable to their fishing activities.
Technical Measures. In accordance with GDPR Article 28(1), Processor represents that it has implemented appropriate technical and organizational measures in such a manner that its Processing of Personal Data will meet the requirements of GDPR and ensure the protection of the rights of the data subjects. In accordance with GDPR Article 28(2), the Processor shall not engage any Sub-processor without prior specific or general written authorization of Client. In the case of general written authorization, the Processor shall inform Client of any intended changes concerning the addition or replacement of other Sub-processors and give Client the opportunity to object to such changes. The Processor shall also comply with the requirements for sub- processing as set forth in Article 28(4), namely that the data protection obligations set forth herein (and as may otherwise be agreed by the Processor in the Agreement) such be imposed upon the Sub-processor, so that the Processor’s contract with the Sub-processor contains sufficient guarantees that the Processing will meet the requirements of GDPR. In accordance with GDPR Article 28(3), the following terms are incorporated by reference into the Agreement:
Technical Measures such encryption techniques as Secure Socket Layer Encryption may be used to convey your personal data.
Technical Measures. Please describe any technical measures which will help to provide protection for DuPont’s EEA Personal Identifier Information (“PII”), for example, including but not limited to: a) forms of encryption (in transit and at rest); b) limited access to encryption keys; c) if encryption keys are kept beyond the reach of relevant public authorities; d) pseudonymization that does not permit re- identification of data; e) limit to read only (no downloading, printing, editing etc.); and/or f) any other technical measures.
Technical Measures. Prosperoware will take appropriate technical and organizational measures against the unauthorized or unlawful processing of Customer Personal Data, and against the accidental loss or destruction of, or damage to Customer Personal Data while processed by Prosperoware’s Products and Services (“Security Measures”), such Security Measures may include where appropriate: 3.14.1. the pseudonymization and encryption of Customer Personal Data; 3.14.2. requiring that all individuals, parties, employees or other entities with access to Customer Personal Data are bound by industry standard confidentiality obligations; 3.14.3. the ability to restore the availability and access to Customer Personal Data in a timely manner in the event of a physical or technical incident; and 3.14.4. a process to regularly evaluate the effectiveness of the Security Measures.
Technical Measures. Encryption technology can be used to transmit and store your personal data. We use the various security technologies and controls currently available to minimize the risk that your personal data may be disclosed, corrupted, misused, obtained without authorization, disclosed without authorization, or altered. Our technical security team actively monitors abnormal and malicious activity on our servers and Services.
Technical Measures. Requirement Reply 15 Is there a business continuity and an emergency procedure to be followed in the event of a personal data breach ? [in case of a positive response, describe or attach it] 17 Are antivirus and firewall systems updated at least once a month ? 18 Are penetration test and vulnerability assessment of computer systems which process Relevant Personal Data performed at least once a year? 20 Is the aaccess to premises in which the Relevant Personal Data are kept controlled through badge identification or other form of control? Signature of the legal representative of the Processor Date: Role: Name: Signature:
Technical Measures a. Number of alternative fuel vehicles purchased; b. Number of conventional vehicles converted to alternative fuel use; c. Number of new alternative refueling stations emplaced; d. Number of new carpools and vanpools formed; e. Number of energy-efficient traffic signals installed; and f. Number of street lane-miles for which synchronized traffic signals were installed.
Technical Measures. The description of the technical security measures applied to the company scope follows. These measures, unless otherwise specified, are to be considered applicable to all tools and applications within the company scope.
Technical Measures. The main technical measures are servers within the EU and SSL certificates (aka: TLS certificates). All Prindustry servers are located within EU borders and comply with GDPR legislation. All web shops and