Transmission Controls Clause Samples
The Transmission Controls clause establishes the requirements and procedures for managing the transfer of data or information between parties. Typically, it outlines the technical and administrative safeguards that must be in place, such as encryption protocols, access restrictions, or monitoring mechanisms, to ensure secure and authorized data transmission. By specifying these controls, the clause helps prevent unauthorized access, data breaches, or accidental disclosures during the transmission process, thereby protecting sensitive information and ensuring compliance with relevant regulations.
POPULAR SAMPLE Copied 1 times
Transmission Controls. Data Processor shall take reasonable measures to ensure that it is possible to check and establish to which entities the transfer of Personal Data by means of data transmission facilities is envisaged so Personal Data cannot be read, copied, modified or removed without authorization during electronic transmission or transport.
Transmission Controls. Our Sub-processors will take reasonable measures to ensure that it is possible to check and establish to which entities the transfer of Service Data by means of data transmission facilities is envisaged so Service Data cannot be read, copied, modified or removed without authorisation during electronic transmission or transport.
Transmission Controls. Zendesk takes reasonable measures to ensure the ability to check and establish which entities are transferred Service Data by means of data transmission facilities so Service Data cannot be read, copied, modified or removed without authorisation during electronic transmission or transport. Service Data is encrypted in transit over public networks when communicating with Zendesk user interfaces (UIs) and application programming interface (APIs) via industry standard HTTPS/TLS (TLS 1.2 or higher). Exceptions to encryption in transit may include any non-Zendesk Service that does not support encryption, which data controller may link to through the Enterprise Services at its election. Service Data is encrypted at rest by Zendesk’s Sub-processor and managed services provider, Amazon Web Services Inc., via AES-256.
Transmission Controls. Aircall shall take reasonable measures to ensure that it is possible to check and establish to which entities the transfer of Personal Data by means of data transmission facilities is envisaged so Service Data cannot be read, copied, modified or removed without authorization during electronic transmission or transport.
Transmission Controls. Q4 shall take reasonable measures to ensure that it is possible to check and establish as to which entities the transfer of Personal Data by means of data transmission facilities is envisaged, so that data cannot be read, copied or removed without the authorization during electronic transmission or transport.
Transmission Controls. Third-party service providers shall take reasonable measures to ensure that it is possible to check and establish to which entities the transfer of Service Data by means of data transmission facilities is envisaged so Service Data cannot be read, copied, modified or removed without authorization during electronic transmission or transport.
Transmission Controls. Data Processor shall take reasonable measures to ensure that it is possible to check
Transmission Controls the data importer shall take reasonable measures to ensure that it is possible to check and establish to which entities the transfer of personal data by means of data transmission facilities is envisaged so personal data cannot be read, copied, modified or removed without authorization during electronic transmission or transport.
Transmission Controls. Box will implement the following suitable measures to secure Content processed through the use of the Box Service:
Transmission Controls. Couchbase shall take reasonable measures to ensure that Customer Data cannot be read, copied, modified or removed without authorization during electronic transmission or transport. Couchbase uses industry standard firewall and encryption technologies to protect data in transit and at rest.