Measures of pseudonymisation and encryption of personal data Sample Clauses

Measures of pseudonymisation and encryption of personal data. Airship Security Measures included in Sections 6(b), 6(c), 7(c), and 7(f). ▫ Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services: Airship Security Measures included in Sections 4(b), 5(a), 5(c), and 6(b). ▫ Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident: Airship Security Measures included in Sections 6(a), 6(c), and 7(g). ▫ Processes for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures in order to ensure the security of the processing: Airship Security Measures included in Sections 2, and 5(b). ▫ Measures for user identification and authorisation: Airship Security Measures included in Section 3(b). ▫ Measures for the protection of data during transmission: Airship Security Measures included in Section 4(a). ▫ Measures for the protection of data during storage: Airship Security Measures included in Sections 3(a), and 7(a). ▫ Measures for ensuring physical security of locations at which personal data are processed: Airship Security Measures included in Sections 3(a), 3(b), and 9. ▫ Measures for ensuring events logging: Airship Security Measures included in Section 3(b). ▫ Measures for ensuring system configuration, including default configuration: Airship Security Measures included in Section 5. ▫ Measures for internal IT and IT security governance and management: Airship Security Measures included in Section 2. ▫ Measures for certification/assurance of processes and products: Airship Security Measures included in Sections 2, and 5(b). ▫ Measures for ensuring data minimisation: Airship Security Measures included in Sections 7(b) and 10. ▫ Measures for ensuring data quality: Airship Security Measures included in Sections 2, 5, and 7. ▫ Measures for ensuring limited data retention: Airship Security Measures included in Section 7(c)
AutoNDA by SimpleDocs
Measures of pseudonymisation and encryption of personal data. As described in Section 1(c) of the DPA. Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services. As described in Section 1(c) of the DPA.
Measures of pseudonymisation and encryption of personal data. 1. Opatření pseudonymizace a šifrování osobních údajů: Study Subject Data is only processed in a key- coded, pseudonymized manner i.e. in such a method/way, that the personal data cannot be associated with a specific data subject without the assistance of additional information, and this additional information is stored separately, and is subject to appropriate technical and organisational measures. Data exporter is responsible for the pseudonymization/key- coding of this data prior to it being transferred to data importer and data exporter is responsible for maintenance of the pseudonymization key. The encryption standard applied to data in transit is Transport Layer Security (TLS) and the standard applied to data at rest is Advanced Encryption Standard (AES). Údaje subjektů studie jsou zpracovávány pouze pseudonymizovaným způsobem s kódovým klíčem, tj. takovým způsobem, že osobní údaje nelze bez pomoci dodatečných informací přiřadit ke konkrétnímu subjektu údajů, přičemž tyto dodatečné informace jsou uchovávány odděleně a podléhají příslušným technickým a organizačním opatřením. Vývozce údajů odpovídá za pseudonymizaci/kódování těchto údajů před jejich předáním dovozci údajů a vývozce údajů je odpovědný za udržování pseudonymizačního klíče. Šifrovací standard používaný pro údaje při jejich přenosu je Transport Layer Security (TLS) a standard používaný pro údaje v klidu je Advanced Encryption Standard (AES). Study Personnel Data is mainly limited to contact detail data, and is not pseudonymized. Data exporter is responsible for encrypting this data prior whilst in transit to data importer. Data importer encrypts this data at rest using AES. Údaje personálu studie jsou omezeny především na kontaktní údaje a nejsou pseudonymizovány. Vývozce údajů je odpovědný za šifrování těchto údajů před jejich přenosem k dovozci údajů. Dovozce údajů šifruje tyto neaktivní údaje pomocí AES.

Related to Measures of pseudonymisation and encryption of personal data

  • Protection of Personal Data 25.1 The Parties agree that they may obtain and have access to personal data for the duration of the Agreement for the fulfilment of the rights and obligations contained herein. In performing the obligations as set out in this Agreement, the Parties shall at all times ensure that:

  • Types of Personal Data Contact Information, the extent of which is determined and controlled by the Customer in its sole discretion, and other Personal Data such as navigational data (including website usage information), email data, system usage data, application integration data, and other electronic data submitted, stored, sent, or received by end users via the Subscription Service.

  • Processing of Personal Data (a) SORACOM collects and processes personal data about the Subscriber, including name, e-mail, IP-address as well as data on data uses and billing data in order to provide SORACOM’s service and other purposes such as billing.

  • Customer’s Processing of Personal Data Customer shall, in its use of the Services, Process Personal Data in accordance with the requirements of Data Protection Laws and Regulations. For the avoidance of doubt, Customer’s instructions for the Processing of Personal Data shall comply with Data Protection Laws and Regulations. Customer shall have sole responsibility for the means by which Customer acquired Personal Data.

  • Notification of personal data breach 1. In case of any personal data breach, the data processor shall, without undue delay after having become aware of it, notify the data controller of the personal data breach.

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • RETURN AND DELETION OF PERSONAL DATA 7.1 We shall return to You and, to the extent allowed by applicable law, delete Your Personal Data as set out in the Agreement. We are obliged to ensure that any Sub-processors adhere to the same obligation

  • Categories of Personal Data Data Controller may submit Personal Data to the Subscription Service, the extent of which is solely determined by Data Controller, and may include the following categories: • communication data (e.g. telephone, email); • business and personal contact details; and • other Personal Data submitted to the Subscription Service.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!