Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best-practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of Customer Data, SAP has put in place physical, electronic, and operational procedures to safeguard and secure the information we collect within the SAP Cloud Services, which include the following: (a) multiple level firewalls to segregate and secure network segments based on system roles; (b) encryption of data transmissions over unsecured networks using TLS technology; (c) use of server-side and client-side digital certificates; (d) role-based administrative access policies and procedures; (e) data center co-location facilities using access cards, biometric authentication, and 24-hour surveillance cameras, and guards, to control physical access; (f) comprehensive in-house performance and security monitoring and auditing; (g) intrusion detection and analysis; (h) detailed security policy, processes and procedures; (i) security integration into the SAP Software Development Lifecycle; and (j) security auditing performed on a recurring basis by outside consulting agencies. To provide for the availability of service and information within Cloud Services, SAP has implemented the SAP Service Level Agreement, as set forth in the Order Form. The SAP Technical Overview Rahasia Pelanggan. Contoh analisis termasuk: mengoptimalkan sistem, sumber daya teknis, ▇▇▇ dukungan, riset ▇▇▇ pengembangan Layanan Cloud ▇▇▇ Layanan Konsultasi, verifikasi integritas data ▇▇▇ keamanan, perencanaan permintaan internal, statistik industri ▇▇▇ makroekonomi, serta penentuan tolok ukur anonim dengan Pelanggan lain. SAP dapat mengumpulkan statistik anonim ▇▇▇ terkumpul tentang penggunaan Layanan Cloud secara umum.
Appears in 1 contract
Sources: Supplemental Terms and Conditions
Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best-practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of Customer Data, SAP has put in place physical, electronic, and operational procedures to safeguard and secure the information we collect within the SAP Cloud Services, which include the following: (a) multiple level firewalls to segregate and secure network segments based on system roles; (b) encryption of data transmissions over unsecured networks using TLS technology; (c) use of server-side and client-side digital certificates; (d) role-role- based administrative access policies and procedures; (e) data center co-location facilities using access cards, biometric authentication, and 24-hour surveillance cameras, and guards, to control physical access; (f) comprehensive in-house performance and security monitoring and auditing; (g) intrusion detection and analysis; (h) detailed security policy, processes and procedures;
(i) security integration into the SAP Software Development Lifecycle; and (j) security auditing performed on a recurring basis by outside consulting agencies. To provide for the availability of service and information within SAP Cloud Services, SAP has implemented the SAP Service Level Agreement, as set forth in the Order Form. The SAP Technical Overview Rahasia Pelanggandocument for the specific SAP Cloud Service to which Customer is subscribed contains detailed information concerning policies, procedures and architecture and is made available by SAP to Customer upon request. Contoh analisis termasuk: mengoptimalkan sistem, sumber daya teknis, ▇▇▇ dukungan, riset ▇▇▇ pengembangan Layanan Cloud ▇▇▇ Layanan Konsultasi, verifikasi integritas data ▇▇▇ keamanan, perencanaan permintaan internal, statistik industri ▇▇▇ makroekonomi, serta penentuan tolok ukur anonim dengan Pelanggan lain. 安全披露。SAP 致力于保证 SAP dapat mengumpulkan statistik anonim ▇▇▇ terkumpul tentang penggunaan Layanan Cloud secara umum.云服务中的客户数据的安全性和完整性。SAP 采用行业最佳实践安全措施保护其所控制的客户数据免遭丢失、滥用或修改。为防止未经授权的访问、维持数据准确性并确保正确使用客户数据,SAP 实施了一系列物理、电子和操作程序来保障和保护我们在执行 SAP 云服务的过程中收集的信息,具体包括以下措施:(a)建立多级防火墙,基于系统角色隔离和保护网段的安全;(b) 使用 TLS 技术对通过没有安全保障的网络进行的数据传输实施加密;(c) 使用服务器端和客户端数字证书;(d) 基于角色的管理访问政策和程序;(e) 数据中心同地办公设施采用门禁卡、生物认证和 24 小时监控摄像头以及门卫来实施物理访问控制;(f) 综合内部绩效和安全监控和审查;(g) 入侵侦测和分析;(h) 详尽的安全政策、流程和程序;(i) 与 SAP 软件开发生命周期的安全集成;以及 (j) 由外部咨询机构定期执行的安全审查。为确保 SAP 云服务中的服务和信息的可用性,SAP 按照订购单中的相关规定实施了 SAP 服务水平协议。适用于客户所租用的特定 SAP 云服务的 SAP 技术概览文档包含与政策、程序和架构有关的详细信息,并由 SAP 根据请求提供给客户。
Appears in 1 contract
Sources: Supplemental Terms and Conditions