Security Practices Datasheet definition
Examples of Security Practices Datasheet in a sentence
Red Guava has access to the third-party certifications and audits set forth in the Security Practices Datasheet.
AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA See the Security Practices Datasheet.
Upon Customer’s request, and subject to the confidentiality obligations set forth in the Agreement, Red Guava shall make available to Customer (or Customer’s independent, third-party auditor) information regarding the Red Guava’s compliance with the obligations set forth in this DPA in the form of the third-party certifications and audits set forth in the Security Practices Datasheet.
Red Guava shall maintain appropriate technical and organisational measures for protection of the security (including protection against unauthorised or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorised disclosure of, or access to, Customer Data), confidentiality and integrity of Customer Data, as set forth in the Security Practices Datasheet.
Lunch Roulette shall maintain appropriate technical and organizational measures for protection of the security (including protection against unauthorized or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorized disclosure of, or access to, Personal Data), confidentiality and integrity of Personal Data, as set forth in the Security Practices Datasheet.
Upon Customer’s request, and subject to the confidentiality obligations set forth in the Customer Terms of Service, Productive shall make available to Customer (or Customer’s independent, third-party auditor) information regarding the Productive Group’s compliance with the obligations set forth in this DPA in the form of the security policies set forth in the Security Practices Datasheet.
Massive Bionics LLC has access to the third-party certifications and audits set forth in the Security Practices Datasheet.
Red Guava shall maintain appropriate technical and organizational measures for protection of the security (including protection against unauthorized or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorized disclosure of, or access to, Personal Data), confidentiality and integrity of Personal Data, as set forth in the Security Practices Datasheet.
Upon Customer’s request, and subject to the confidentiality obligations set forth in the Agreement, Massive Bionics LLC shall make available to Customer (or Customer’s independent, third-party auditor) information regarding the Massive Bionics LLC ’s compliance with the obligations set forth in this DPA in the form of the third-party certifications and audits set forth in the Security Practices Datasheet.
Productive shall maintain appropriate technical and organizational measures for protection of the security (including protection against unauthorized or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorized disclosure of, or access to, Personal Data), confidentiality and integrity of Personal Data, as set forth in the Security Practices Datasheet.