4. Roles; Legal Compliance 5. Data Processing 6. Data Deletion 7. Data Security 8. Impact Assessments and Consultations 9. Access; Data Subject Rights; Data Export 10. Data Processing Locations 11. Subprocessors 12. Cloud Data Protection Team; Processing Records 13. Notices 14. Interpretation General Terms Appendix
Roles; Legal Compliance 5. Data Processing 6. Data Deletion 7. Data Security 8. Impact Assessments and Consultations 9. Access; Data Subject Rights; Data Export 10. Data Processing Locations 11. Subprocessors 12. Cloud Data Protection Team; Processing Records 13. Notices 14. Interpretation General Terms Appendix
Roles; Legal Compliance 5. Data Processing 6. Data Deletion 7. Data Security 8. Impact Assessments and Consultations 9. Access; Data Subject Rights; Data Export 10. Data Processing Locations 11. Subprocessors 12. Cloud Data Protection Team; Processing Records 13. Notices 14. Interpretation General Terms Appendix
2. Notice to Customer ◼ 3. Assistance to Customer ◼ 4. Required Processing ◼ 5. Security ◼ 6. Obligations of Customer ◼ 7. International Data Transfers ◼ 8. Term; Data Return and Deletion ◼ Exhibit A ➢ A. LIST OF PARTIES ➢ B. DESCRIPTION OF TRANSFER ➢ C. COMPETENT SUPERVISORY AUTHORITY ◼ Exhibit B (TECHNICAL AND ORGANIZATIONAL MEASURES) General Terms Exhibit
2. Notice to Customer ◼ 3. Assistance to Customer ◼ 4. Required Processing ◼ 5. Security ◼ 6. Obligations of Customer ◼ 7. International Data Transfers ◼ 8. Term; Data Return and Deletion ◼ Exhibit A ➢ A. LIST OF PARTIES ➢ B. DESCRIPTION OF TRANSFER ➢ C. COMPETENT SUPERVISORY AUTHORITY ◼ Exhibit B (TECHNICAL AND ORGANIZATIONAL MEASURES) General Terms Exhibit
to Customer ◼ 3. Assistance to Customer ◼ 4. Required Processing ◼ 5. Security ◼ 6. Obligations of Customer ◼ 7. International Data Transfers ◼ 8. Term; Data Return and Deletion ◼ Exhibit A ➢ A. LIST OF PARTIES ➢ B. DESCRIPTION OF TRANSFER ➢ C. COMPETENT SUPERVISORY AUTHORITY ◼ Exhibit B (TECHNICAL AND ORGANIZATIONAL MEASURES) General Terms Exhibit
基本方針の策定 物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン 1.Data Center and Network Security (a) Data Centers (b) Networks and Transmission. 2. Access and Site Controls (a) Site Controls (b) Access Control 3. Data (a) Data Storage, Isolation and Logging (b) Decommissioned Disks and Disk Erase Policy 4. Personnel Security 5. Subprocessor Security General Terms Appendix 2
物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン ◼ 1. Processing Requirements ◼ 2. Notice to Customer ◼ 3. Assistance to Customer ◼ 4. Required Processing ◼ 5. Security ◼ 6. Obligations of Customer ◼ 7. International Data Transfers ◼ 8. Term; Data Return and Deletion ◼ Exhibit A ➢ A. LIST OF PARTIES ➢ B. DESCRIPTION OF TRANSFER ➢ C. COMPETENT SUPERVISORY AUTHORITY ◼ Exhibit B (TECHNICAL AND ORGANIZATIONAL MEASURES) General Terms Exhibit
物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン ◼ Corporate Identity, Authentication, and Authorization Controls ◼ Customer Identity, Authentication, and Authorization Controls ◼ System and Workstation Control ◼ Data Access Control ◼ Disclosure Control ◼ Availability control ◼ Segregation control ◼ Risk Management ◼ Personnel ◼ Physical Access Control ◼ Third Party Risk Management ◼ Security Incident Response ◼ Security Evaluations General Terms Exhibit B
4 基本方針の策定 物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン 1.Data Center and Network Security (a) Data Centers (b) Networks and Transmission. 2. Access and Site Controls (a) Site Controls (b) Access Control 3. Data (a) Data Storage, Isolation and Logging (b) Decommissioned Disks and Disk Erase Policy 4. Personnel Security 5. Subprocessor Security General Terms Appendix 2
基本方針の策定 物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン ◼ Corporate Identity, Authentication, and Authorization Controls ◼ Customer Identity, Authentication, and Authorization Controls ◼ System and Workstation Control ◼ Data Access Control ◼ Disclosure Control ◼ Availability control ◼ Segregation control ◼ Risk Management ◼ Personnel ◼ Physical Access Control ◼ Third Party Risk Management ◼ Security Incident Response ◼ Security Evaluations General Terms Exhibit B
7 人的 4 基本方針の策定 物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン 1.Data Center and Network Security (a) Data Centers (b) Networks and Transmission. 2. Access and Site Controls (a) Site Controls (b) Access Control 3. Data (a) Data Storage, Isolation and Logging (b) Decommissioned Disks and Disk Erase Policy 4. Personnel Security 5. Subprocessor Security General Terms Appendix 2
基本方針の策定 物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン ◼ Corporate Identity, Authentication, and Authorization Controls ◼ Customer Identity, Authentication, and Authorization Controls ◼ System and Workstation Control ◼ Data Access Control ◼ Disclosure Control ◼ Availability control ◼ Segregation control ◼ Risk Management ◼ Personnel ◼ Physical Access Control ◼ Third Party Risk Management ◼ Security Incident Response ◼ Security Evaluations General Terms Exhibit B
基本方針の策定 物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン 1.Data Center and Network Security (a) Data Centers (b) Networks and Transmission. 2. Access and Site Controls (a) Site Controls (b) Access Control 3. Data (a) Data Storage, Isolation and Logging (b) Decommissioned Disks and Disk Erase Policy 4. Personnel Security 5. Subprocessor Security General Terms Appendix 2
基本方針の策定 物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン 1.Data Center and Network Security (a) Data Centers (b) Networks and Transmission. 2. Access and Site Controls (a) Site Controls (b) Access Control 3. Data (a) Data Storage, Isolation and Logging (b) Decommissioned Disks and Disk Erase Policy 4. Personnel Security 5. Subprocessor Security General Terms Appendix 2
4 基本方針の策定 物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン 1.Data Center and Network Security (a) Data Centers (b) Networks and Transmission. 2. Access and Site Controls (a) Site Controls (b) Access Control 3. Data (a) Data Storage, Isolation and Logging (b) Decommissioned Disks and Disk Erase Policy 4. Personnel Security 5. Subprocessor Security General Terms Appendix 2
基本方針の策定 物理的 1 5 規律の整備 技術的 2 6 OpenAI Google ガイドライン ◼ Corporate Identity, Authentication, and Authorization Controls ◼ Customer Identity, Authentication, and Authorization Controls ◼ System and Workstation Control ◼ Data Access Control ◼ Disclosure Control ◼ Availability control ◼ Segregation control ◼ Risk Management ◼ Personnel ◼ Physical Access Control ◼ Third Party Risk Management ◼ Security Incident Response ◼ Security Evaluations General Terms Exhibit B
Legal Compliance 5. Data Processing 6. Data Deletion 7. Data Security 8. Impact Assessments and Consultations 9. Access; Data Subject Rights; Data Export 10. Data Processing Locations 11. Subprocessors 12. Cloud Data Protection Team; Processing Records 13. Notices 14. Interpretation General Terms Appendix
17条 25条 利用目的制限 漏えい等報告 18条 26条 従業者の監督 24条 安全管理措置 外国第三者 23条 28条 OpenAI Google ガイドライン 1.Data Center and Network Security (a) Data Centers (b) Networks and Transmission. 2. Access and Site Controls (a) Site Controls (b) Access Control 3. Data (a) Data Storage, Isolation and Logging (b) Decommissioned Disks and Disk Erase Policy 4. Personnel Security 5. Subprocessor Security General Terms Appendix 2
17条 25条 利用目的制限 漏えい等報告 18条 26条 従業者の監督 24条 安全管理措置 外国第三者 23条 28条 OpenAI Google ガイドライン ◼ Corporate Identity, Authentication, and Authorization Controls ◼ Customer Identity, Authentication, and Authorization Controls ◼ System and Workstation Control ◼ Data Access Control ◼ Disclosure Control ◼ Availability control ◼ Segregation control ◼ Risk Management ◼ Personnel ◼ Physical Access Control ◼ Third Party Risk Management ◼ Security Incident Response ◼ Security Evaluations General Terms Exhibit B
利用目的特定 委託先の監督 17条 25条 利用目的制限 漏えい等報告 18条 26条 従業者の監督 24条 安全管理措置 外国第三者 23条 28条 OpenAI Google ガイドライン 1.Data Center and Network Security (a) Data Centers (b) Networks and Transmission. 2. Access and Site Controls (a) Site Controls (b) Access Control 3. Data (a) Data Storage, Isolation and Logging (b) Decommissioned Disks and Disk Erase Policy 4. Personnel Security 5. Subprocessor Security General Terms Appendix 2
利用目的特定 委託先の監督 17条 25条 利用目的制限 漏えい等報告 18条 26条 従業者の監督 24条 安全管理措置 外国第三者 23条 28条 OpenAI Google ガイドライン ◼ Corporate Identity, Authentication, and Authorization Controls ◼ Customer Identity, Authentication, and Authorization Controls ◼ System and Workstation Control ◼ Data Access Control ◼ Disclosure Control ◼ Availability control ◼ Segregation control ◼ Risk Management ◼ Personnel ◼ Physical Access Control ◼ Third Party Risk Management ◼ Security Incident Response ◼ Security Evaluations General Terms Exhibit B
委託先の監督 17条 25条 利用目的制限 漏えい等報告 18条 26条 従業者の監督 24条 安全管理措置 外国第三者 23条 28条 OpenAI Google ガイドライン ◼ Corporate Identity, Authentication, and Authorization Controls ◼ Customer Identity, Authentication, and Authorization Controls ◼ System and Workstation Control ◼ Data Access Control ◼ Disclosure Control ◼ Availability control ◼ Segregation control ◼ Risk Management ◼ Personnel ◼ Physical Access Control ◼ Third Party Risk Management ◼ Security Incident Response ◼ Security Evaluations General Terms Exhibit B