The Owner takes appropriate security measures to prevent
unauthorized access, disclosure, modification, or unauthorized
destruction of the Data.
The Data processing is carried out
using computers and/or IT enabled tools, following
organizational procedures and modes strictly related to the
purposes indicated. In addition to the Owner, in some cases, the
Data may be accessible to certain types of persons in charge,
involved with the operation of this Application (administration,
sales, marketing, legal, system administration) or external
parties (such as third-party technical service providers, mail
carriers, hosting providers, IT companies, communications
agencies) appointed, if necessary, as Data Processors by the
Owner. The updated list of these parties may be requested from
the Owner at any time.