Laserfiche WebLink
ANNEX II <br />TECHNICAL AND ORGANIZATIONAL MEASURES INCLUDING TECHNICAL AND <br />ORGANIZATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA <br />Measures of pseudonymization and encryption of personal data <br />Where technically feasible and when not impacting services provided: <br />• We minimize the data we collect to information we believe is necessary to communicate, <br />provide, and support products and services and information necessary to comply with legal <br />obligations. <br />• We encrypt in transit and at rest. <br />• We pseudonymize and limit administrative accounts that have access to reverse <br />pseudonym ization. <br />Measures for ensuring ongoing confidentiality, integrity, availability and resilience of <br />processing systems and services <br />In order to ensure ongoing confidentiality, integrity, availability and resilience of processing systems <br />and services, Motorola Solutions Information Protection policy mandates the institutionalization of <br />information protection throughout solution development and operational lifecycles. Motorola <br />Solutions maintains dedicated security teams for its internal information security and its products and <br />services. Its security practices and policies are integral to its business and mandatory for all Motorola <br />Solutions employees and contractors The Motorola Chief Information Security Officer maintains <br />responsibility and executive oversight for such policies, including formal governance, revision <br />management, personnel education and compliance. Motorola Solutions generally aligns to the NIST <br />Cybersecurity Framework as well as ISO 27001. <br />Measures for ensuring the ability to restore the availability and access to personal data in a <br />timely manner in the event of a physical or technical incident <br />Security Incident Procedures Motorola Solutions maintains a global incident response plan to <br />address any physical or technical incident in an expeditious manner. Motorola maintains a record <br />of security breaches with a description of the breach, the time period, the consequences of the <br />breach, the name of the reporter, and to whom the breach was reported, and the procedure for <br />recovering data. For each security breach that is a Security Incident, notification will be made in <br />accordance with the Security Incident Notification section of this DPA. <br />Business Continuity and Disaster Preparedness Motorola maintains business continuity and disaster <br />preparedness plans for critical functions and systems within Motorola's control that support the <br />Products and Services purchased under the Agreement in order to avoid services disruptions and <br />minimize recovery risks. <br />Processes for regularly testing, assessing and evaluating the effectiveness of technical and <br />organizational measures in order to ensure the security of the processing <br />Data Processing Addendum V.2022.12 5 <br />