Pseudonymization & Encryption. Administrative access to server systems is always via encrypted connections. In addition, data on server and client systems is stored on encrypted data carriers. Corresponding hard disk encryption systems are in use.
Appears in 5 contracts
Samples: Data Processing Agreement Whistleblowing System, Data Processing Agreement Whistleblowing System, Data Processing Agreement Whistleblowing System