Common use of ENCRYPTION AND PSEUDONYMIZATION Clause in Contracts

ENCRYPTION AND PSEUDONYMIZATION. ▪ The electric transmission of data is encrypted ▪ The storage of personal data is encrypted ▪ All personal data on mobile devices and mobile storage media is encrypted ▪ All encryption technologies used correspond to the state of the art ▪ The administration of the key material has been defined and documented for the relevant IT systems ▪ Transport layer encryption is exclusively implemented on an end-to-end basis ▪ A set of rules with requirements for encryption strength, algorithm and key management is implemented ▪ Pseudonymization of personal data by means of disposable functions ▪ Pseudonymization by assignment tables, these are separated from the rest of the data processing If you have implemented other or additional measures, or would like to provide more details of the measures mentioned above, particularly if transmission using state-of-the-art encryption cannot be guaranteed, please provide details below: If encryption is not relevant to the services subject to the present agreement, please briefly state the reasons below:

Appears in 2 contracts

Sources: Data Processing Agreement, Agreement on Processing on Behalf