Security of Data Processing. MicroStrategy has implemented and will maintain appropriate technical and organizational measures, including, as appropriate, a) security of the MicroStrategy network; b) physical security of the facilities; c) measures to control access rights for MicroStrategy employees and contractors in relation to the MicroStrategy network; and d) processes for regularly testing, assessing and evaluating the effectiveness of the technical and organizational measures implemented by MicroStrategy. You may elect to implement appropriate technical and organizational measures in relation to Customer Data, directly from our Sub- Processor. Such appropriate technical and organizational measures include: a) pseudonymisation and encryption to ensure an appropriate level of security; b) measures to ensure the ongoing confidentiality, integrity, availability, and resilience of the processing systems and services provided by you to third parties; c) measures to allow you to backup and archive appropriately to restore availability and access to Customer Data in a timely manner in the event of a physical or technical incident; and d) processes for regularly testing, assessing, and evaluating the effectiveness of the technical and organizational measures implemented by you.
Appears in 5 contracts
Samples: Data Processing Addendum, Data Processing Addendum, Data Processing Addendum
Security of Data Processing. MicroStrategy has implemented and will maintain appropriate technical and organizational measures, including, as appropriate,
a) security of the MicroStrategy network;
b) physical security of the facilities;
c) measures to control access rights for MicroStrategy employees and contractors in relation to the MicroStrategy network; and
d) processes for regularly testing, assessing and evaluating the effectiveness of the technical and organizational measures implemented by MicroStrategy. You may elect to implement appropriate technical and organizational measures in relation to Customer Data, directly from our Sub- Processor. Such appropriate technical and organizational measures include:
a) pseudonymisation pseudonymization and encryption to ensure an appropriate level of security;
b) measures to ensure the ongoing confidentiality, integrity, availability, and resilience of the processing systems and services provided by you to third parties;
c) measures to allow you to backup and archive appropriately to restore availability and access to Customer Data in a timely manner in the event of a physical or technical incident; and
d) processes for regularly testing, assessing, and evaluating the effectiveness of the technical and organizational measures implemented by you.
Appears in 1 contract
Samples: Data Processing Addendum