c01.fm
Introduction and Important Notes
Data Protection and Data Security
A31003-C1020-S100-03-7620, 12/2017
OpenScape Cordless IP V2, Service Documentation
11
1.5 Data Protection and Data Security
This system processes and uses personal data for purposes such as call detail
recording, displays, and customer data acquisition.
In Germany, the processing and use of such data is subject to various regulations,
including those of the Federal Data Protection Law (Bundesdatenschutzgesetz,
BDSG). For other countries, please follow the appropriate national laws.
The aim of data protection is to protect the rights of individuals from being
adversely affected by use of their personal data.
In addition, the aim of data protection is to prevent the misuse of data when it is
processed and to ensure that one’s own interests and the interests of other
parties which need to be protected are not affected.
The customer is responsible for ensuring that the system is installed,
operated and maintained in accordance with all applicable labor laws and
regulations and all laws and regulations relating to data protection, privacy
and safe labor environment.
Employees of Unify GmbH & Co. KG are bound to safeguard trade secrets and
personal data under the terms of the company’s work rules.
In order to ensure that the statutory requirements are consistently met during
service
–
whether on-site or remote
–
you should always observe the following
rules. You will not only protect the interests of your and our customers, you will
also avoid personal consequences.
A conscientious and responsible approach helps protect data and ensure
privacy:
•
Ensure that only authorized persons have access to customer data.
•
Take full advantage of password assignment options; Never give passwords
to an unauthorized person orally or in writing.
•
Ensure that no unauthorized person is able to process (store, modify,
transmit, disable, delete) or use customer data in any way.
•
Prevent unauthorized persons from gaining access to storage media, such as
backup CDs or log printouts. This applies to service calls as well as to storage
and transport.
•
Ensure that storage media which are no longer required are completely
destroyed. Ensure that no sensitive documents are left unprotected.
Work closely with your customer contact; this promotes trust and reduces
your workload.