COMPETENT SUPERVISORY AUTHORITY MODULE TWO. Transfer controller to processor MODULE TWO: Transfer controller to processor
COMPETENT SUPERVISORY AUTHORITY MODULE TWO. Transfer controller to processor MODULE TWO: Transfer controller to processor Standard Data Protection Clauses to be issued by the Commissioner under S119A(1) Data Protection Act 2018 UK Addendum to the EU Commission Standard Contractual Clauses Date of this Addendum:
1. The Clauses are dated as of the same date as the Addendum.
COMPETENT SUPERVISORY AUTHORITY MODULE TWO. Transfer controller to processor MODULE TWO: Transfer controller to processor
1. Data Center Security
a. Webflow infrastructure is managed via Amazon Web Services’ ISO 27001 certified data centers, and hosted in multiple regions and availability zones.
b. All database servers are isolated inside virtual private networks, and accessible only by key personnel via multi-factor authentication.
c. All access to production environments is logged, and access can be immediately revoked.
COMPETENT SUPERVISORY AUTHORITY MODULE TWO. Transfer controller to processor TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA MODULE TWO: Transfer controller to processor
COMPETENT SUPERVISORY AUTHORITY MODULE TWO. Transfer controller to processor MODULE THREE: Transfer processor to processor See Section 7(b)(viii) of this DPA.
COMPETENT SUPERVISORY AUTHORITY MODULE TWO. Transfer controller to processor TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA MODULE TWO: Transfer controller to processor LIST OF SUB-PROCESSORS MODULE TWO: Transfer controller to processor
1). The controller has authorised the use of the following sub-processors:
1. Name: Address: Contact person’s name, position and contact details: Description of processing (including a clear delimitation of responsibilities in case several sub-processors are authorised): 2. …
COMPETENT SUPERVISORY AUTHORITY MODULE TWO. Transfer Controller to Processor MODULE THREE: Transfer Processor to Processor Encryption of personal data: Measures that enable one to convert clearly legible information into an illegible string by means of a cryptographic process.
1. Seagate has implemented robust security measures to ensure Company data remains protected, including AES-256-GCM encryption at-rest for Lyve Cloud Services and TCG Enterprise, SED AES-256-bit encryption at rest for Lyve Mobile Services and support for encryption in-transit.
2. A key security feature of the Lyve Services is that Seagate encrypts all data before storing it, regardless of whether it is encrypted at the source. There is no option to dial back the protection. When Company chooses to end its tenancy with Lyve Services, its data will be securely erased.
3. Third-party data centers host Lyve Cloud Services, ensuring the highest class of data center availability and access. By design, data encryption cannot be disabled within Lyve Cloud Services. This means data is always encrypted at rest and in flight. Further, ransomware protection safeguards data from malicious attacks while object immutability protects data from accidental manipulation or deletion.
COMPETENT SUPERVISORY AUTHORITY MODULE TWO. Transfer controller to processor Competent supervisory authority/ies in accordance with Clause 13: Commission nationale de l'informatique et des libertés (CNIL)
COMPETENT SUPERVISORY AUTHORITY MODULE TWO. Transfer controller to processor Irish Data Protection Commissioner TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA MODULE TWO: Transfer controller to processor Upflex Security Plan
COMPETENT SUPERVISORY AUTHORITY MODULE TWO. Transfer controller to processor MODULE THREE: Transfer processor to processor Data Protection Commission 00 Xxxxxxxxxxx Xxxxxx Xxxxx Xxxxxx 0 Part B - United Kingdom Standard Contractual Clauses VERSION B1.0, in force 21 March 2022