[{"id":"ci_5cc6ce57b536e949f02f2e1fa19a5b8f087d0a34c6c330c99bde1c6646acab08","title":"Legal","path":"/legal-security/legal-1","children":[{"id":"ci_0c716acea0579b3532e682159096c1d4395674a4b2996976f068e89450ad99c9","title":"Privacy Policy","path":"/legal-security/privacy-policy","children":[]},{"id":"ci_7352db2e5532925f40d9369848efa958b070eef9f07b10a92be39644f8037dab","title":"Support Service Level Agreement (SLA)","path":"/legal-security/support-service-level-agreement-sla","children":[]},{"id":"ci_ca7e8c9260d3f0f540ae45ab183013b66fe49bb7473c65ae734d0471e6781950","title":"Acceptable Use Policy (AUP)","path":"/legal-security/acceptable-use-policy-aup","children":[]},{"id":"ci_0a0c78c4dedbda4d1eebc9f845d8473e9aa50a5c9f6ac1bd610c78a83ad6f2e6","title":"Governing Law","path":"/legal-security/governing-law","children":[]},{"id":"ci_813e1dcc4600c20098d51399ad3a645c42edd0e6be52b7bb8e0e83fde70a5d27","title":"Data Processing Agreement","path":"/legal-security/data-processing-agreement","children":[{"id":"ci_a3f483ce7f19cf73ef153cb46bde26f8c42eaba2c2ed1a375824eed5f5845634","title":"Schedule 1: Subject Matter and Details of Processing","path":"/legal-security/schedule-1-subject-matter-and-details-of-processin","children":[]},{"id":"ci_d5c307a59bc801517511cf415ec732283ecf4b3a19a042b16c97ad184dd17ba7","title":"Schedule 2: Technical and Organizational Measures","path":"/legal-security/schedule-2-technical-and-organizational-measures","children":[]},{"id":"ci_effadb30b35278a125308897a75b7b5c2d954a87f52e43ddb1d0745d5f01775a","title":"Schedule 3: Cross-Border Transfer Mechanisms","path":"/legal-security/schedule-3-cross-border-transfer-mechanisms","children":[]},{"id":"ci_cfc5e302d8f973b960d8125a19c16aac0e57116f365dc6e11b8ed92bdd2a8b93","title":"Schedule 4: Region-Specific Terms","path":"/legal-security/schedule-4-region-specific-terms","children":[]}]}]},{"id":"ci_b3c478a3051fac1b97c7c56b5262cc12978fba44aea20d996933df8ed0f54230","title":"Security","path":"/legal-security/security","children":[{"id":"ci_50a8c2ae301d70760ecae17b6ed0fb91a44fe9208c77d2e3262e2ad5e6f9ad60","title":"Cloud Security Statement","path":"/legal-security/cloud-security-statement","children":[]},{"id":"ci_17e222faf340c119023ae155fb2f0042672468902239e21717acc1908e3b9c88","title":"Revyz Security & Compliance Overview","path":"/legal-security/revyz-security-compliance-overview","children":[]},{"id":"ci_946ddea0e6bb8dabd3b4fa8fc1c7e1212778ddceb14adf9c58e8bcd456c16646","title":"Security Incident Policy","path":"/legal-security/security-incident-policy","children":[]},{"id":"ci_a4f87bec40eaaa2e68f49379e443dfd6466a09a2c3ebe2b3fa0c6489c15688d2","title":"Change Control & Release Management","path":"/legal-security/change-control-release-management","children":[]},{"id":"ci_38338c70aa8738168189f5e2f45a5735f562efb128f43a8e3fcb3b666e888f8f","title":"Data Storage and Residency","path":"/legal-security/data-storage-and-residency","children":[]},{"id":"ci_f82bb8931b43aeedee28db8fd9e6cf4a16d9b914b9085e965bb932ed672e9dee","title":"Security Assessment","path":"/legal-security/security-assessment","children":[]},{"id":"ci_684e10bfb9a5c3a7f38ae06e1bbfa2a4f5e49595e9da867a76e950f9f8d7fd41","title":"Data Residency","path":"/legal-security/data-residency","children":[]},{"id":"ci_95bb0844bf14c3be6303233559715a5341f9bd4d00e77fc2ddcc4fa583262020","title":"Storage Authentication Model","path":"/legal-security/storage-deployment-model","children":[]}]}]