[{"id":"ci_aa0e365c96651ea446e249b3148523ef8076fb3a6f316c2ad76eea95bb6854eb","title":"Documents","path":"/en/security-and-compliance/Current/documents","children":[{"id":"ci_942c9b05bf3ed9812b2f8ca6a1d5fd2dfdb92fec5df2a7938887acb99eb6978e","title":"Security in Microsoft Azure","path":"/en/security-and-compliance/Current/security-in-microsoft-azure","children":[]},{"id":"ci_8c18332649397f317d87c40f632e8aa3f087e2ffb22288934589cced7e47d7b6","title":"Security in NDD cloud","path":"/en/security-and-compliance/Current/security-in-ndd-cloud","children":[]},{"id":"ci_c7605fa57bd129e70b88b8be64050ad74d8fd3e38d87d99f16c7f495d4a09abb","title":"Verification and validation (V&V)","path":"/en/security-and-compliance/Current/verification-and-validation-v-v","children":[]},{"id":"ci_e5e5e01fa8a743aea40c85fbab2a5bf28a34e8da04b106f52a1528eb277c8d09","title":"Data collection and transmission protocols","path":"/en/security-and-compliance/Current/data-collection-and-transmission-protocols","children":[]},{"id":"ci_98b7d5f02bc206ab29e33d6620c0a62415bdab3eafc2fb466b7ac0108b430e60","title":"Employee trainings","path":"/en/security-and-compliance/Current/employee-trainings","children":[]}]},{"id":"ci_ec7af29de9dc84160bcf77be5b9ab9305ddd2bd4c7388b802ac40c62bb2bcaa8","title":"Certifications","path":"/en/security-and-compliance/Current/certifications","children":[]},{"id":"ci_7158e890556ecf14bac3f103f84259f4748b38954b33423d7c6c49308379b946","title":"Personal data privacy","path":"/en/security-and-compliance/Current/personal-data-privacy","children":[{"id":"ci_d92bda0dafbe6a4e7b29e74e4072c4f374c55d20cb1e02a9b2cefb527ccc4e78","title":"Personal data processed","path":"/en/security-and-compliance/Current/personal-data-processed","children":[]},{"id":"ci_882318d8ccc85887b4868cea702240aa7a0ccf9126fb00934df1294346cfeef3","title":"Purposes of processing","path":"/en/security-and-compliance/Current/purposes-of-processing","children":[]},{"id":"ci_56751e73de7e8e2bbe2dbd4da880614294fe566a18acb39bd53dc7a9f6ad4b70","title":"Storage","path":"/en/security-and-compliance/Current/storage","children":[]},{"id":"ci_914d5230c2d5f46971b253aa36cbc951e147f5fed6f801830f7d1a1594a1c97f","title":"Sharing with authorized third parties","path":"/en/security-and-compliance/Current/sharing-with-authorized-third-parties","children":[]}]}]