Transfer control. It is ensured that personal data cannot be read, copied, changed or removed without authorization during transmission or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures have been implemented to ensure this: ● WLAN encryption (WPA2 with strong password) ● E-mail encryption ● Provision of data via encrypted connections such as SFTP or HTTPS ● Logging of accesses and retrievals
Appears in 2 contracts
Sources: Data Processing Agreement, Data Processing Agreement
Transfer control. It is ensured that personal data cannot be read, copied, changed or removed without authorization during transmission or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures have been implemented to ensure this: ● WLAN encryption (WPA2 with strong password) ● E-mail encryption ● Provision of data via encrypted connections such as SFTP or HTTPS ● Logging of accesses and retrievalsHardening the backend systems ● Machine-to-machine authentication ● Data carrier management (procedure) ● Data protection-compliant erasure/destruction procedure
Appears in 2 contracts
Sources: Data Processing Agreement, Data Processing Agreement
Transfer control. It is ensured that personal data cannot be read, copied, changed or removed without authorization during transmission transfer or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures have been are implemented to ensure this: ● VPN tunnel setups ● WLAN encryption (WPA2 with strong password) ● E-mail encryption ● Provision of data via encrypted connections such as SFTP or HTTPS ● Logging Provision of accesses and retrievalsdata in anonymized or pseudonymized form
Appears in 1 contract
Sources: Data Processing Agreement
Transfer control. It is ensured that personal data cannot be read, copied, changed or removed without authorization during transmission or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures have been implemented to ensure this: ● WLAN encryption (WPA2 with strong password) ● E-mail encryption ● Provision of data via encrypted connections such as SFTP or HTTPS ● Logging of accesses and retrievalsretrievals ● Use of signature procedures ● Disclosure of data in anonymized or pseudonymized form
Appears in 1 contract
Sources: Data Processing Agreement