Technical Security Controls. Access Policy R3’s internal access control processes and policies are designed to prevent unauthorized persons and/or systems from gaining access to systems used to process personal data. R3’s information security manager ensures only authorized users have access to personal data and all users are allocated unique user IDs for access to systems processing personal information. Data Production systems containing personal information will be logically segregated from development systems. Appropriate authentication schemes will be maintained for systems processing personal information. Systems processing personal data will adequately protect that information at rest and in transit. Personal Data will be deleted in accordance to Data Retention and Deletion section above. Subprocessor Security
Appears in 4 contracts
Samples: Corda Enterprise Software Evaluation License Agreement, Corda Enterprise Software Evaluation License Agreement, Corda Enterprise Software Evaluation License Agreement