GDPR
GAZ-SYSTEM informs and warrants that all the personal data are kept and processed using adequate security measures, in accordance with Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation, GDPR).
In order to ensure data integrity and confidentiality, the Controller has implemented procedures which allow access to personal data only to authorised persons, and only to the extent necessary for the performance of their tasks.
The Controller uses organisational and technical solutions to ensure that all operations on personal data are recorded and carried out only by authorised persons.
Furthermore, the Controller takes all necessary measures to ensure that also its subcontractors and other cooperating entities guarantee the application of appropriate security measures whenever they process personal data on behalf of the Controller.
The Controller conducts risk analysis on an ongoing basis and monitors the adequacy of applied data security measures with respect to any identified threats. When necessary, the Controller implements additional measures to improve data security.
In order to ensure data integrity and confidentiality, the Controller has implemented procedures which allow access to personal data only to authorised persons, and only to the extent necessary for the performance of their tasks.
The Controller uses organisational and technical solutions to ensure that all operations on personal data are recorded and carried out only by authorised persons.
Furthermore, the Controller takes all necessary measures to ensure that also its subcontractors and other cooperating entities guarantee the application of appropriate security measures whenever they process personal data on behalf of the Controller.
The Controller conducts risk analysis on an ongoing basis and monitors the adequacy of applied data security measures with respect to any identified threats. When necessary, the Controller implements additional measures to improve data security.