Common use of Authentication Method Clause in Contracts

Authentication Method. Systems and applications are accessed by means of a suitable authentication procedure. The authentication procedure must be appropriate for the protection level applicable to the personal data that can be accessed after authentication was successful. If the protection level is high, login procedures that are based on possession and knowledge (two-factor authentication) are used. A high protection level is to be assumed if access to data is enabled that falls, for example, within Art. 9

Appears in 2 contracts

Sources: Supplementary Terms and Conditions for Data Processing, Supplementary Terms and Conditions for Data Processing