Operations Security. ● Processor maintains policies describing its security measures and the relevant procedures and responsibilities of its personnel who have access to Customer Data and to its systems and networks. ● Processor maintains multiple copies of Customer Data from which Customer Data can be recovered in case of a breach. ● Processor maintains logs and monitors access to administrator and operator activity and data recovery events.
Appears in 4 contracts
Sources: Data Processing Addendum, Master Service Agreement, Data Processing Addendum