Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: • Data are stored on the back-end virtualized platform under the name of the cloud host. • All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. • Other.
Appears in 3 contracts
Samples: Privacy Policy, Data Processing User Agreement, Personal Data Processing Agreement
Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: • Data are stored on the back-end virtualized platform under the name of the cloud host. • All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. • Other.
Appears in 2 contracts
Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: • Data are stored on the back-end virtualized platform under the name of the cloud host. • All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. • Other.
Appears in 1 contract
Samples: Data Processing User Agreement