The change management system includes tests and checks before implementing changes, for example. B procedures to deal with urgent changes, procedures for going back after the failure of the changes, protocols that show what has been changed, when and by whom. 9.2. Sinch implements malware protection to ensure that any software used to provide Services by Sinch to the customer is protected from malware. 9.3. Sinch creates backup copies of critical information and tests backup copies to ensure that information can be retrieved as agreed with the customer. 9.4. Sinch records and controls activities such as creating, reading, copying, editing and deleting processed data, as well as exceptions, bugs and information security events. In addition, Sinch protects and stores (at least 6 months or a period of time), established by data protection legislation, protocol information and provides surveillance data to the customer on request.
Anomalies/incidents/compromise indicators must be reported in accordance with data protection rules, as shown in section 13 below. 9.5. Sinch manages vulnerabilities in all relevant technologies, such as operating systems, databases, applications, proactively and in a timely manner. 9.6. Sinch sets security bases (hardening) for all relevant technologies such as operating systems, databases, applications. 9.7. Sinch ensures that development is separated from the testing and production environment. 14.3 Sinch ensures that information security is integrated into business continuity plans. The Gigamon Insight platform includes sensors or virtual machines (“VM”) that are provided in the customer`s network. These sensors or VMs generate metadata via the monitored network traffic provided by the customer via TAP, SPAN or a mechanism similar to that of Vendor. To the extent that these metadata contain personal data, it is treated as such by the provider. 10.
India The following definitions of paragraph 1 of this data protection authority are amended as follows: “Personal data” refers to each piece of information relating to the personal or material circumstances of an identified or identifiable person. Personal data, that is, information about a natural person directly or indirectly available from that person`s entity, either directly or indirectly, in relation to other information available or likely to be available. “special categories of personal data,” sensitive personal data or an individual`s information; This term refers to personal data that consists of password information; (ii) financial information such as bank account, credit card or debit or autr card