Common use of Pseudonymisation and Encryption Clause in Contracts

Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: Data are stored on the back-end virtualized platform under the name of the cloud host. All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. Other.

Appears in 2 contracts

Samples: Data Processing Agreement, Data Processing Agreement

AutoNDA by SimpleDocs

Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: Data are stored on the back-end virtualized platform under the name of the cloud host. All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. Other.

Appears in 2 contracts

Samples: Data Processing Agreement, Personal Data Processing Agreement

AutoNDA by SimpleDocs

Pseudonymisation and Encryption. The following measures should be implemented to perform pseudonymisation of personal data: Data are stored on the back-end virtualized platform under the name of the cloud host. All the files corresponding to the Cloud host are stored in the form of block storage on the back-end. In extreme cases, even if the data are stolen, the customer data cannot be inverted to obtain Customer’s data. Other.

Appears in 1 contract

Samples: Data Processing Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!