Transfer control. Transfer control requires that only authorized individuals can inspect the personal data. For transmission by email, appropriate protective measures (e.g., encryption of communication between the email servers) are required. Mobile devices or mobile storage media must be encrypted if personal data are stored on them.
Transfer control. Measures to ensure that personal data cannot be read, copied, altered, or removed by unauthorized persons during electronic transmission or during their transport or storage on data media, and that it is possible to verify and establish the bodies to which personal data are intended to be transmitted by data transmission equipment.
Transfer control. Personal data may only be disclosed on behalf of Xxxxxxxxxx.Xxx's clients to the extent agreed with the client or to the extent necessary to provide the contractual services to the client. All employees working on a customer project are instructed with regard to the permissible use of data and the modalities of data disclosure. As far as possible, data is transmitted to recipients in encrypted form. The use of private data carriers is prohibited for Xxxxxxxxxx.Xxx employees. Employees at Xxxxxxxxxx.Xxx are regularly trained on data protection topics. All employees are ob- ligated to handle personal data confidentially.
Transfer control. The aim of the transfer control is to ensure that personal data cannot be read, copied, altered or removed during electronic transmission or during its transport or storage on data carriers, and that it is possible to check and determine to which places personal data is provided by means of data transmission.
Transfer control. It is ensured that personal data cannot be read, copied, changed or removed without authorization during transmission or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures have been implemented to ensure this: ● WLAN encryption (WPA2 with strong password) ● E-mail encryption ● Provision of data via encrypted connections such as SFTP or HTTPS ● Logging of accesses and retrievals
Transfer control. All transfers of Personal Data between the client, the Company’s service providers and the Company’s servers are protected by the use of encryption safeguards, including the encryption of the Personal Data prior to the transfer of any Personal Data. In addition, to the extent applicable, the Company’s business partners execute an applicable Data Processing Agreement, all in accordance with applicable laws.
Transfer control. INSTITUTION and INVESTIGATOR shall ensure that during any transfer of the Personal Data it cannot be read, copied, modified or deleted without authorisation.
Transfer control. Personal data should not leave the aws Cloud as a matter of principle. Even for analysis purposes, the data is evaluated in the cloud environment or completely anonymized before transfer. If a transfer is necessary, any transfer must be agreed in advance with the data protection officer, appropriate encryption measures must be taken and the transfer must be logged and documented.
Transfer control. If personal data must be exchanged, this happens within the systems of doo or its subprocessors. The data thus lies on the systems and does not leave the network to which all systems are connected. This also ensures that only persons who have access to the machines can obtain this data. All connections between the systems are either local or SSL encrypted. Personal data is not changed in the course of transmission and processing and remains intact, complete and up-to-date. The Contractor shall do everything necessary to prevent data from being falsified or incorrect data from being processed. At the same time, it is guaranteed that changes to data can be traced. The technical service provider of doo is certified according to ISO 27001, so that through backup systems and similar mechanisms the probability of an integrity endangering data decoherence is very low.
Transfer control. 1.6.1 The transfer of data to third parties (e.g. in the case of databases or data sets with restricted access), is only implemented with appropriate data minimisation measures.
1.6.2 The communication links must be adequately encrypted. It must be ensured that the confi- dentiality, integrity and authenticity of the transmitted data is guaranteed. The authenticity of the communication partners must be guaranteed.
1.6.3 When passing on data, the company makes use of the possibilities of anonymisation and pseudonymisation.