Pseudonymization and Encryption Sample Clauses

Pseudonymization and Encryption. Airship will ensure data is encrypted during transmission to and from the Service. In addition, Airship will keep all data encrypted at rest with Whole Disk Encryption using AES 256 standard. The Service includes additional measures that Customers can configure in order to reduce direct references to persons during processing where it is possible to associate data with a specific person only if additional information is included. Airship has put in place appropriate technical and organizational measures to keep the pseudonymized information separate from the additional information. It is the Customer’s responsibility to elect to use these additional measures for pseudonymization of personal data processed in the Service.
AutoNDA by SimpleDocs
Pseudonymization and Encryption. The Processor takes the following measures to ensure pseudonymization, if necessary: • Commonly used pseudonymization measures help to replace name and other identification attributes with the aid of identifiers. The purpose of this is to prevent or make it considerably more difficult to identify the person concerned (the Data Subject). • With the aid of various indicators, such as personnel, client or customer codes, pseudonymization is implemented. Accordingly, no real names are used. Controller’s Personal Data is protected with the aid of encryption techniques. Where Personal Data is transmitted within a network, i.e. between user devices and data centers or within the data centers themselves, a minimum TLS version of 1.2 is used. To protect Personal Data in the state of rest, a range of integrated encryption functions are offered. The following methods are used in this connection: • Symmetric encryption: With the aid of a key, information is encrypted and decrypted. • Asymmetric encryption: With the aid of two keys, namely public and private keys, information is encrypted and decrypted.
Pseudonymization and Encryption. Netigate’s systems are accessed and administrated exclusively via encrypted connections. • Data is encrypted during transport from the server to the respective terminal device using transport encryption (TLS). Unauthorized access, for example to data entered in online questionnaires, is therefore impossible.
Pseudonymization and Encryption. Pseudonymization contains measures that enable one to process Personal Information in such a manner that the Personal Information can no longer be attributed to a specific data subject without the use of additional information, provided that this additional information is stored separately, and is subject to appropriate technical and organizational measures. Encryption contains measures that enable one to convert clearly legible information into an illegible string by means of a cryptographic process. Stored data is encrypted where appropriate, including any backup copies of the data
Pseudonymization and Encryption. Where applicable, Company shall ensure pseudonymization and encryption of Personal Data. Company shall ensure the ongoing confidentiality, integrity, availability and resilience of Processing systems and services.
Pseudonymization and Encryption. The ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services;
Pseudonymization and Encryption. The processing of personal data in such a method/way, that the data cannot be associated with a specific Data Subject without the assistance of additional Information, provided that this additional information is stored separately, and is subject to appropriate technical and organizational measures. ☒ others: every customer has separate database and Linux user for the file system access
AutoNDA by SimpleDocs
Pseudonymization and Encryption. Where applicable, Company shall ensure pseudonymization and encryption of Personal Data. • Processing Systems. Company shall ensure the ongoing confidentiality, integrity, availability and resilience of Processing systems and services.
Pseudonymization and Encryption. Where feasible and in accordance with the Agreement, use technical and organizational measures to pseudonymize Company Personal Data in accordance with Data Protection Laws. Apply industry standard encryption to Company Personal Data: (a) stored on any medium (i.e., laptops, mobile devices, portable storage devices, file servers and application databases); and (b) transmitted across any public network (such as the Internet) or wirelessly.
Pseudonymization and Encryption.  The access to our database systems (CRM, projects, errors, etc.) outside the company is only allowed via a protected VPN connection. In addition, the user must be enabled by our IT for VPN access before a connection is possible. Our internal database systems are additionally signed by Lotus Notes certificate.  Company notebooks are protected by Bitlocker (encryption of the hard disk) and are not readable in case of loss or theft.  Company mobile phones and tablets can be blocked and deleted remotely in the event of loss or theft.  Emails sent within moveIT are encrypted by default.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!