The nature of the data transactions includes hosting, recording, retention, calculating, determining, extracting, collecting, consulting, erasing and all other transactions mentioned in the contract. The personal data processed is determined by the customer and depends on the customer`s activities. They may contain the last name, first name, email address, telephone number, postal address or any other data that the customer needs in the course of his business activities, but are not limited to this. 6.5 Under-mandate of the subcontractor, the subcontractor is required to ensure that the subcontractor`s data protection obligations arising from the contract and this schedule are valid and binding on the subcontractor. 16.3 The data processor has the right, at any time, to suspend the subcontractor`s processing of data in accordance with this data processing contract. 23 We do the following types of backup: a) Rolling Backup. This method supports the daily backup of all file and data updates and creates a backup of all new data. This creates a story of changes, which increases the ability to recover lost data. b) the backup clone. This backup strategy creates a perfect copy of each device on the network c) Backup offsite. This backup ensures data loss when the backup is stored on the site. All data and files are backed up and stored outside the location.
Data protection by default: (Privacy by Design) Limiting access to certain personal data to authorized persons; 2.9 The subcontractor must correct or delete the data if requested by the processing manager and if it enters the scope of the authorized instructions. If it is not possible to delete in accordance with the data protection provisions or a corresponding limitation of processing, the subcontractor, on the basis of the instructions of the manager and, if otherwise agreed in the contract, destroys all media and other media, in accordance with data protection requirements, or returns the same to the responsible manager. 11 If sensitive personal data or social security numbers are sent by email via the Internet, these emails must be encrypted. If you send us personal data by email, please note that sending is not safe if your emails are not encrypted. 3.2 Section 2.12 applies mutatis mutandis to claims filed by the persons concerned against the subcontractor pursuant to Article 82 of the RGPD. 220.127.116.11 the transfer of personal data from the company by a contract subcontractor to a subcontractor or between two branches of a commercial subcontractor, at least where such transmission would be prohibited by data protection legislation (or by the conditions of data transfer agreements put in place to impose restrictions on data protection); (B) The company wishes to provide the data processor with certain services that involve the processing of personal data. where possible, a general description of technical and organizational security measures, including pseudonymization and encryption of personal data; The ability to ensure the confidentiality, integrity, availability and resilience of processing systems and services; The ability to restore timely availability and access to personal data in the event of a physical or technical incident; a periodic review, evaluation and evaluation of the effectiveness of technical and organisational measures to ensure the safety of treatment. 12.6 The subcontractor is required to inform its subcontractors of the subcontracting projects.