Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best-practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of Customer Data, SAP has put in place physical, electronic, and operational procedures to safeguard and secure the information we collect within the SAP Cloud Services, which include the following: (a) multiple level firewalls to segregate and secure network segments based on system roles; (b) encryption of data transmissions over unsecured networks using TLS technology; (c) use of server-side and client-side digital certificates; (d) role-based administrative access policies and procedures; (e) data center co-location facilities using access cards, biometric authentication, and 24-hour surveillance cameras, and guards, to control physical access; (f) comprehensive in-house performance and security monitoring and auditing; (g) intrusion detection and analysis; (h) detailed security policy, processes and procedures; (i) security integration into the SAP Software Development Lifecycle; and (j) security auditing performed on a recurring basis by outside consulting agencies. To provide for the availability of service and information within Cloud Services, SAP has implemented the SAP Service Level Agreement, as set forth in the Order Form. The SAP Technical Overview document for the specific SAP Cloud Service to which Customer is subscribed contains detailed information concerning policies, procedures and architecture and is made available by SAP to Customer upon request.
Appears in 1 contract
Sources: Supplemental Terms and Conditions
Security Disclosures. SAP is committed to the security and integrity of Customer Data within the SAP Cloud Services. SAP uses industry best-practice security measures to protect against the loss, misuse or alteration of the Customer Data under SAP’s control. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of Customer Data, SAP has put in place physical, electronic, and operational procedures to safeguard and secure the information we collect within the SAP Cloud Services, which include the following: (a) multiple level firewalls to segregate and secure network segments based on system roles; (b) encryption of data transmissions over unsecured networks using TLS technology; (c) use of server-side and client-side digital certificates; (d) role-based administrative access policies and procedures; (e) data center co-location facilities using access cards, biometric authentication, and 24-hour surveillance cameras, and guards, to control physical access; (f) comprehensive in-house performance and security monitoring and auditing; (g) intrusion detection and analysis; (h) detailed security policy, processes and procedures;
(i) security integration into the SAP Software Development Lifecycle; and (j) security auditing performed on a recurring basis by outside consulting agencies. To provide for the availability of service and information within SAP Cloud Services, SAP has implemented the SAP Service Level Agreement, as set forth in the Order Form. The SAP Technical Overview document for the specific SAP Cloud Service to which Customer is subscribed contains detailed information concerning policies, procedures and architecture and is made available by SAP to Customer upon request.
Appears in 1 contract
Sources: Supplemental Terms and Conditions