Common use of Pseudonymization and Encryption Clause in Contracts

Pseudonymization and Encryption. The Processor takes the following measures to ensure pseudonymization, if necessary: • Commonly used pseudonymization measures help to replace name and other identification attributes with the aid of identifiers. The purpose of this is to prevent or make it considerably more difficult to identify the person concerned (the Data Subject). • With the aid of various indicators, such as personnel, client or customer codes, pseudonymization is implemented. Accordingly, no real names are used. Controller’s Personal Data is protected with the aid of encryption techniques. Where Personal Data is transmitted within a network, i.e. between user devices and data centers or within the data centers themselves, a minimum TLS version of 1.2 is used. To protect Personal Data in the state of rest, a range of integrated encryption functions are offered. The following methods are used in this connection: • Symmetric encryption: With the aid of a key, information is encrypted and decrypted. • Asymmetric encryption: With the aid of two keys, namely public and private keys, information is encrypted and decrypted.

Appears in 4 contracts

Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!