Transmission Control. XXXXxx.xxx has implemented suitable measures to prevent Personal Data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media. This is accomplished by: ● Use of adequate firewall and encryption technologies to protect the gateways and pipelines through which the data travels; ● Sensitive Personal Data is encrypted during transmission using up to date versions of TLS or other security protocols using strong encryption algorithms and keys; ● Protecting web-based access to account management interfaces by employees through encrypted TLS ● End-to-end encryption of screen sharing for remote access, support, or real time communication.
Appears in 2 contracts
Samples: Data Processing Agreement, Data Processing Agreement
Transmission Control. XXXXxx.xxx Xxxxxxxx.xx has implemented suitable measures to prevent Personal Data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media. This is accomplished by: ● Use of adequate firewall and encryption technologies to protect the gateways and pipelines through which the data travels; ● Sensitive Personal Data is encrypted during transmission using up to date versions of TLS or other security protocols using strong encryption algorithms and keys; ● Protecting web-based access to account management interfaces by employees through encrypted TLS ● End-to-end encryption of screen sharing for remote access, support, or real time communication.
Appears in 1 contract
Samples: Data Processing Agreement
Transmission Control. XXXXxx.xxx Platformly has implemented suitable measures to prevent Personal Data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media. This is accomplished by: ● Use of adequate firewall and encryption technologies to protect the gateways and pipelines through which the data travels; ● Sensitive Personal Data is encrypted during transmission using up to date versions of TLS or other security protocols using strong encryption algorithms and keys; ● Protecting web-based access to account management interfaces by employees through encrypted TLS ● End-to-end encryption of screen sharing for remote access, support, or real time communication.
Appears in 1 contract
Samples: Data Processing Agreement
Transmission Control. XXXXxx.xxx UNIZEN has implemented suitable measures to prevent Personal Data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media. This is accomplished by: ● Use of adequate firewall and encryption technologies to protect the gateways and pipelines through which the data travels; ● Sensitive Personal Data is encrypted during transmission using up to date versions of TLS or other security protocols using strong encryption algorithms and keys; ● Protecting web-based access to account management interfaces by employees through encrypted TLS ● End-to-end encryption of screen sharing for remote access, support, or real time communication.
Appears in 1 contract
Samples: go.teamleader.eu