Common use of Transfer control Clause in Contracts

Transfer control. It is ensured that personal data cannot be read, copied, changed or removed without authorization during transmission or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures have been implemented to ensure this: ● WLAN encryption (WPA2 with strong password) ● E-mail encryption ● Provision of data via encrypted connections such as SFTP or HTTPS ● Logging of accesses and retrievals

Appears in 2 contracts

Sources: Data Processing Agreement, Data Processing Agreement

Transfer control. It is ensured that personal data cannot be read, copied, changed or removed without authorization during transmission or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures have been implemented to ensure this: ● WLAN encryption (WPA2 with strong password) ● E-mail encryption ● Provision of data via encrypted connections such as SFTP or HTTPS ● Logging of accesses and retrievalsHardening the backend systems ● Machine-to-machine authentication ● Data carrier management (procedure) ● Data protection-compliant erasure/destruction procedure

Appears in 2 contracts

Sources: Data Processing Agreement, Data Processing Agreement

Transfer control. It is ensured that personal data cannot be read, copied, changed or removed without authorization during transmission transfer or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures have been are implemented to ensure this: ● VPN tunnel setups ● WLAN encryption (WPA2 with strong password) ● E-mail encryption ● Provision of data via encrypted connections such as SFTP or HTTPS ● Logging Provision of accesses and retrievalsdata in anonymized or pseudonymized form

Appears in 1 contract

Sources: Data Processing Agreement

Transfer control. It is ensured that personal data cannot be read, copied, changed or removed without authorization during transmission or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures have been implemented to ensure this: ● WLAN encryption (WPA2 with strong password) ● E-mail encryption ● Provision of data via encrypted connections such as SFTP or HTTPS ● Logging of accesses and retrievalsretrievals ● Use of signature procedures ● Disclosure of data in anonymized or pseudonymized form

Appears in 1 contract

Sources: Data Processing Agreement