IDrive will implement the controls listed below or their equivalent during the term of this DPA:
1. Access Controls. Data Processor will implement suitable measures in order to prevent unauthorized persons from gaining access to the data processing equipment. This will be accomplished by:
2. Access Control to Data. Data Processors commits that persons entitled to use the data processing systems will only access Customer Personal Data within the scope and to the extent covered by the respective access permissions/authorization.
3. User Controls. Data Processor will implement suitable measures to prevent its data processing systems from being used by unauthorized persons including unauthorized reading, copying, alteration, or removal of the stored data and data media. This will be accomplished by: