Encryption measures. The aim of the measures for the encryption of personal data is to protect the transmission and storage of personal data from unauthorized access and alteration. Appropriate techniques for encryption are provided and implemented by Unify or subcontractors. The following common encryption technologies, among others, are used in practice by Unify: • Consistently encrypted data transfer between systems • Encryption of data before it is stored on systems or before it is transferred to databases • Encryption of database backups
Appears in 2 contracts
Samples: Protection Agreement, Processing Agreement
Encryption measures. The aim of the measures for the encryption of personal data is to protect the transmission and storage of personal per- xxxxx data from unauthorized access and alteration. Appropriate techniques for encryption are provided and implemented by Unify or subcontractors. The following common encryption technologies, among others, are used in practice by Unify: • Consistently encrypted data transfer between systems • Encryption of data before it is stored on systems or before it is transferred to databases • Encryption of database backups
Appears in 1 contract
Samples: Protection Agreement
Encryption measures. The aim of the measures for the encryption of personal data is to protect the transmission and storage of personal data from unauthorized access and alteration. Appropriate techniques for encryption are provided and implemented by Unify or subcontractors. The following common encryption technologies, among others, are used in practice by Unify: • Consistently encrypted data transfer between systems • Encryption of data before it is stored on systems or before it is transferred to databases • Encryption of database backups
Appears in 1 contract
Samples: Processing Agreement