The Owner takes appropriate security measures to prevent unauthorized access, disclosure, modification, or unauthorized destruction of the Data.
The Data processing is carried out using computers and/or IT enabled tools, following organizational procedures and modes strictly related to the purposes indicated. In addition to the Owner, in some cases, the Data may be accessible to certain types of persons in charge, involved with the operation of this Application administration, sales, marketing, legal, system administration or external parties such as third-party technical service providers, mail carriers, hosting providers, IT companies, communications agencies appointed, if necessary, as Data Processors by the Owner. The updated list of these parties may be requested from the Owner at any time.