Authentication Method. Systems and applications are accessed by means of a suitable authentication procedure. The authentication procedure must be appropriate for the protection level applicable to the personal data that can be accessed after authentication was successful. If the protection level is high, login procedures that are based on possession and knowledge (two-factor authentication) are used. A high protection level is to be assumed if access to data is enabled that falls, for example, within Art. 9
Appears in 2 contracts
Sources: Supplementary Terms and Conditions for Data Processing, Supplementary Terms and Conditions for Data Processing