Access Control of Processing Areas. Processes to prevent unauthorized persons from gaining access to the data processing equipment (namely phones, database and application servers and related hardware) where the data are processed or used, to include:
Access Control of Processing Areas. (Physical) Web applications, communications and database servers of Teamleader are located in secure data centers in Ireland, which are operated by Amazon Web Services, Inc. with whom TEAMLEADER has signed the ‘AWS Data Processing Addendum’ in order to be compliant with the standards and obligations as set forth in the Privacy Legislation.
Access Control of Processing Areas. Web applications, communications and database servers of Xxxxxx.xxx are located in secure data centers in the United States, which are operated by Digital Ocean LLC.
Access Control of Processing Areas. To prevent unauthorized persons from gaining access to data processing systems in which personal data are processed (physical access control), Ayla shall take measures to prevent physical access, such as secured buildings.
Access Control of Processing Areas. (Physical) Web applications, communications and database servers of UNIZEN are located in secure data centers within the European Economic Area, which are operated by Azure. UNIZEN has made the necessary contractual arrangements in order to be compliant with the standards and obligations as set forth in the Privacy Legislation.
Access Control of Processing Areas. Processor/Data Importer shall implement suitable measures to prevent unauthorized persons from gaining access to the data processing equipment where the personal data is processed. This is accomplished through the following measures:
Access Control of Processing Areas. (Physical) Web applications, communications and database servers of Xxxxxxxx.xx are located in secure data centers, which are operated by Amazon AWS servers for managing PLY they are located in US West (Oregon).
Access Control of Processing Areas. Processes to prevent unauthorized persons from gaining access to the TCP data processing equipment (namely telephones, database and application servers and related hardware) where the Client Data are processed or used, to include: