Protection for computers. The computers used for the Processing must be secured and protected against unauthorized use. Only authenticated users receive access to computers (e.g. notebooks, workstations) using, for example, the following Measures: data encryption, individualized issuance of passwords (compliant with standard industry practices such as at least 8 characters, normally with automatic expiration), employee identity cards with personal identity encryption, automatic lock-down of inactive systems. The protection of the used computers against attacks as well as accidental or intentional destruction or modification is provided, among other Measures, by intrusion detection systems, firewalls and regularly updated malware filters.
Appears in 4 contracts
Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement