Common use of Pseudonymisation and Encryption Clause in Contracts

Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: • Data are stored on the back-end virtualized platform under the name of the cloud host. • All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. • Other.

Appears in 3 contracts

Samples: Privacy Policy, Data Processing User Agreement, Personal Data Processing Agreement

AutoNDA by SimpleDocs

Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: Data are stored on the back-end virtualized platform under the name of the cloud host. All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. Other.

Appears in 2 contracts

Samples: Data Processing User Agreement, onesourcecloud.net

AutoNDA by SimpleDocs

Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: Data are stored on the back-end virtualized platform under the name of the cloud host. All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. Other.

Appears in 1 contract

Samples: Data Processing User Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.