Webex Data Processing Agreement

3. Cisco`s terms and conditions indicate that they may add additional information about privacy practices in applications or at the data collection location. This can make it virtually impossible to understand the co-risks or data protection rules associated with using a service prior to the use of the service, as the full range of risks or safeguards is not disclosed in advance. 2.3. The customer and MZ acknowledge that the customer is, within the meaning of data protection legislation, the data manager and MZ responsible for all the customer`s data. All communications on the Webex meetings platform are via encrypted channels. After setting up a session, all media streams (audio, VOIP, video, screen sharing and document sharing) are encrypted. The service then encrypts the media feed again before it is sent to other users. Note that if a client allows participants to participate in their meetings via third-party video end points, these participants can send their meeting data over the Internet without encryption. Media streams that flow from a user to Cisco Webex meeting servers are deciphered after passing through the Cisco firewalls.

This allows Cisco to provide network-based recording and SIP-based call support for video end points. Why and how we process your data in Cisco`s WebEx system and your rights. (a) a request for access to the personal data of the person concerned (since this concept is understood by reference to data protection legislation); or Cisco`s terms define data that is collected as assets and can be released or transferred in various transactions or reorganizations. In the language regarding data transfers, it is not mentioned that end-users should be informed or informed. Each data protection assessment contains an overall assessment. Higher scores (up to 100%) means that the product offers more transparent privacy policies, with better procedures for protecting users` data. The score is best used as an indicator of the amount of extra work a person needs to do to make an informed decision about a product. 5. Cisco`s terms and conditions provide that Cisco uses third parties to collect end-user data, and key privacy policies are not explicitly clear on the limits, if any, to how third parties can use the data they collect for Cisco. 8. Cisco`s key privacy policies do not define a clear end to data.

Their terms contain a general language that could be interpreted as allowing data to be kept indefinitely. Their secondary policy defines sunsets that can last up to 7 years. This long period, combined with the general rights claimed for the transmission of data to third parties and the processing of data by Cisco as an asset that can be transferred as part of a free sale in sales law, creates a significant risk of data protection. `standard clauses`, the standard contractual clauses for the transfer of personal data to a subcontractor outside the European Economic Area, in the form adopted from time to time by the European Commission; If you need additional help or need help accessing, correcting, deleting or deleting your personal data, please contact us directly. We strive, in good faith, to respond to reasonable requests to access, delete, update, delete or correct your data. We will respond to your request within 30 days. If we can`t respond to your request, we`ll explain. 2.10.MZ inform the customer as soon as possible as soon as they become aware of their obligations to process customer data in accordance with this Agreement or data protection legislation.

Comments are closed.