Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: Data are stored on the back-end virtualized platform under the name of the cloud host. All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. Other.
Appears in 2 contracts
Samples: Data Processing Agreement, Data Processing Agreement
Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: • Data are stored on the back-end virtualized platform under the name of the cloud host. • All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. • Other.
Appears in 2 contracts
Samples: Data Processing Agreement, Personal Data Processing Agreement
Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: Data are stored on the back-end virtualized platform under the name of the cloud host. All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. Other.
Appears in 1 contract
Samples: Data Processing Agreement