영어에서 Seagate data 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Procedures for proper destruction and disposal of Seagate Data.
Supplier warrants that Seagate Data will not be commingled with data from other companies.
Supplier will regularly test and validate the integrity of the Seagate Data.
To protect Seagate Data during electronic transmission, Supplier will use Transport Layer Security(TLS) standards.
Supplier will notify Seagate of each location for storing or Processing Seagate Data.
If the original Seagate Data is lost or corrupted, Supplier will reconstruct the Seagate Data from the backup data within 2 hours.
In addition, Supplier will maintain at a minimum the following security measures when encrypting Seagate Data: HTTP with SSL 256-bit encryption(HTTPS);
Supplier shall ensure that the Processing of Seagate Data complies with all applicable laws, self-regulatory frameworks, and contract requirements applicable to Supplier.
Supplier shall certify in writing that the drive has been shredded or destroyed and that that the Seagate Data cannot be read, retrieved, or otherwise reconstructed.
A"Subcontractor" means any third party engaged by Supplier or by any other subcontractor who will have access to, receive, or otherwise Process any Seagate Data.
Every SkyHawk AI hard drive includes two years of Seagate Data Recovery Plan service to protect against problems that can cause data loss.
Upon written request, Supplier will provide Seagate with the hardening documentation used to secure Servers hosting the Seagate application and Seagate Data.
Supplier shall maintain a list of the Subcontractors to which it discloses Seagate Data, and will provide this list to Seagate upon Seagate's request.
Supplier shall not disclose Seagate Data in any manner for any purpose to any third party without obtaining prior written authorization from Seagate. .
Supplier shall implement appropriate technical, organizational, and physical security measures to protect Seagate Data, as specified in the Security Requirements set forth below.
Supplier will provide the Services using no less than industry standard physical and environmental security measures to prevent unauthorized access to, theft of, or unlawful disclosure of the Seagate Data.
Supplier will ensure that backup and disaster-recovery planning processes protect Seagate Data from unauthorized use, access, disclosure, alteration, or destruction. Backups and Archives.
A requirement that users, management, and third parties confirm(initially and annually) their understanding of an agreement to comply with the applicable privacy policies and procedures related to the security of Seagate Data.
Supplier is responsible for preventing physical access to any areas hosting the Seagate Data, except for Supplier's employees who have a need to access the physical area.
If Supplier has a legal obligation to retain Seagate Data beyond the period otherwise permitted by this Exhibit, Supplier shall notify Seagate in writing of its obligation, and shall return or destroy the Seagate Data as soon as possible after the retention period ends.
Supplier's information security program must reasonably address the confidentiality, integrity, and availability of all Seagate Data, including the below matters and any other requirements specified in this Exhibit.
Within 90 days after Seagate confirms that Seagate Data was received and migrated correctly, Supplier shall securely destroy all Seagate Data, delink Seagate's workspace identifiers, and overwrite with new data or otherwise destroy the Seagate Data through an approved sanitization method.
A"Security Breach" means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, access to, acquisition of Seagate Data, or any other unauthorized Processing of Seagate Data, including Personal Information.
Limitations on Processing. Supplier shall only Process Seagate Data to provide the applicable services and/or deliverables to Seagate in accordance with the Agreement.
Take all commercially reasonable steps to mitigate the effects of the Security Breach, or assist Seagate in doing so; and implement a remediation plan and monitor the resolution of breaches and vulnerabilities related to Seagate Data to ensure that appropriate corrective action is taken on a timely basis.
Upon Seagate's request, Supplier shall provide a written certification that Seagate Data has been returned or securely destroyed in accordance with this Exhibit. MISCELLANEOUS Order of Precedence.
Supplier shall limit access to Seagate Data to persons or Subcontractors, who require access for Supplier to perform its obligations under the Agreement, who have been trained on data protection and security requirements, and who have agreed to comply with data confidentiality requirements during and after their activities for Seagate. .
If Supplier decommissions or otherwise retires a drive that contains a copy of Seagate Data then Supplier shall securely shred or destroy the drive rendering the Seagate Data unreadable and destroyed.
Supplier will establish, implement, and maintain an information security program that includes technical and organizational security and physical measures as well as policies and procedures to protect Seagate Data Processed by Supplier accidental, unauthorized, or unlawful destruction or loss, alteration, unauthorized disclosure or access, or other unauthorized Processing.
Supplier will comply with Seagate requests to produce the Seagate Data in response to Seagate or third party audits, incident or investigation requests by Seagate, or as required by law.