Laserfiche WebLink
ANNEX II <br /> TECHNICAL AND ORGANIZATIONAL MEASURES INCLUDING TECHNICAL AND <br /> ORGANIZATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA <br /> Measures of pseudonymization and encryption of personal data <br /> Where technically feasible and when not impacting services provided: <br /> • We minimize the data we collect to information we believe is necessary to communicate, <br /> provide, and support products and services and information necessary to comply with legal <br /> obligations. <br /> • We encrypt in transit and at rest. <br /> • We pseudonymize and limit administrative accounts that have access to reverse <br /> pseudo nymization. <br /> Measures for ensuring ongoing confidentiality, integrity, availability and resilience of <br /> processing systems and services <br /> In order to ensure ongoing confidentiality, integrity, availability and resilience of processing systems <br /> and services, Motorola Solutions Information Protection policy mandates the institutionalization of <br /> information protection throughout solution development and operational lifecycles. Motorola <br /> Solutions maintains dedicated security teams for its internal information security and its products and <br /> services. Its security practices and policies are integral to its business and mandatory for all Motorola <br /> Solutions employees and contractors The Motorola Chief Information Security Officer maintains <br /> responsibility and executive oversight for such policies, including formal governance, revision <br /> management, personnel education and compliance. Motorola Solutions generally aligns to the NIST <br /> Cybersecurity Framework as well as ISO 27001. <br /> Measures for ensuring the ability to restore the availability and access to personal data in a <br /> timely manner in the event of a physical or technical incident <br /> Security Incident Procedures Motorola Solutions maintains a global incident response plan to <br /> address any physical or technical incident in an expeditious manner. Motorola maintains a record <br /> of security breaches with a description of the breach, the time period, the consequences of the <br /> breach, the name of the reporter, and to whom the breach was reported, and the procedure for <br /> recovering data. For each security breach that is a Security Incident, notification will be made in <br /> accordance with the Security Incident Notification section of this DPA. <br /> Business Continuity and Disaster Preparedness Motorola maintains business continuity and disaster <br /> preparedness plans for critical functions and systems within Motorola's control that support the <br /> Products and Services purchased under the Agreement in order to avoid services disruptions and <br /> minimize recovery risks. <br /> Processes for regularly testing, assessing and evaluating the effectiveness of technical and <br /> organizational measures in order to ensure the security of the processing <br /> Data Processing Addendum V.2022.12 5 <br />