2.1 Methods of processing
The Owner takes appropriate security measures to prevent
unauthorized access, disclosure, modification, or unauthorized
destruction of the Data. The Data processing is carried out using computers and/or IT
enabled tools, following organizational procedures and modes
strictly related to the purposes indicated. In addition to the
Owner, in some cases, the Data may be accessible to certain
types of persons in charge, involved with the operation of
Shoden Limited (administration, sales, marketing, legal, system
administration) or external parties (such as third-party
technical service providers, mail carriers, hosting providers,
IT companies, communications agencies) appointed, if necessary,
as Data Processors by the Owner. The updated list of these
parties may be requested from the Owner at any time.