“Personal Data” means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person;
“Data Protection Law” mean all applicable laws, regulations, and other legal requirements relating to (a) privacy, data security, consumer protection, marketing, promotion, and text messaging, email, and other communications; and (b) the use, collection, retention, storage, security, disclosure, transfer, disposal, and other processing of any Personal Data.;
“the Company Affiliate” means any entity that directly or indirectly controls, is controlled by, or is under common control with the Company. “Control,” for purposes of this definition, means direct or indirect ownership or control of more than 50% of the voting interests of the subject entity;
“Services” means any of the following services provided by the Company: (a) Company-branded product offerings made available via the website of the Company, (b) consulting or training services provided by the Company either remotely via the Internet or in person, and (c) any support services provided by the Company, including access to Company’s help desk; the terms “data controller”, “data processor”, “data subject”, “personal data”, “processing” and “appropriate technical and organisational measures” shall have the meanings given to them under applicable Data Protection Law.
- Subject Matter, Nature and Purpose of Company’s Processing of Personal Data
3.1. The processing of Personal Data will be carried out by the Company while Services Account of the Customer is in existence or as needed for the performance of the obligations and rights between the Company and the Customer unless otherwise agreed upon in writing.
- Type of Personal Data Processed
4.1. The Customer may submit Customer Personal Data to the Services, the extent of which is determined and controlled by the Customer in its sole discretion, and which may include, but is not limited to the following categories of Personal Data:
- Account Information. When the Customer signs up for a Services Account, it is required certain information such as the name and email. The Customer may update or correct its information and email preferences at any time by visiting the Services Account. The Company can provide the Customer with additional support to access, correct, delete, or modify the information the Customer provided to the Company and associated with the Customer’s Services Account. To protect the security, the Company takes reasonable steps (such as requesting any legal information) to verify the identity of the Customer before making corrections. The Customer is responsible for maintaining the secrecy of the password and information of the Customer’s Services Account at all times.
- Additional Profile Information. The Customer may choose to provide additional information as part of its profile. Profile information helps the Customer to get more from the Services. It’s the Customer’s choice whether to include sensitive information on its profile.
- Other Information. The Customer may otherwise choose to provide the Company information when the Customer fills in a form, conducts a search, updates or adds information to its Services Account, responds to surveys, posts to community forums, participates in promotions, or uses other features of the Services platform.
- Company Obligations
3.1. The Company agrees and/or warrants:
(b)that all Personal Data processed on behalf of the Customer remains the property of the Customer and/or the relevant Data subjects;
(d) that it has implemented the technical and organizational security measures specified in Appendix 1 before processing the Personal Data transferred;
(e) that it will promptly notify the Customer about:
- any legally binding request for disclosure of the Personal Data by a law enforcement authority unless otherwise prohibited, such as a prohibition under criminal law to preserve the confidentiality of a law enforcement investigation;
- any accidental or unauthorized access; and
iii. any request received directly from the data subjects without responding to that request, unless it has been otherwise authorized to do so;
(f) to deal promptly and properly with all inquiries from the Customer relating to its processing of the Personal Data subject to the transfer and to abide by the advice of the supervisory authority with regard to the processing of the data transferred;
(h)that, in the event of sub-processing, it has previously informed the Customer and obtained its prior written consent;
(i) that the processing services by the sub-processor will be carried out in accordance with Section 7;
(j) to appoint a data protection officer, who performs his/her duties in compliance with the Data Protection Law. The data protection officers contact details are available at the Company web page.
(l) to monitor periodically the internal processes to ensure that processing within Company area of responsibility is in accordance with the requirements of the Data Protection Law and the protection of the rights of the data subject.
- Customer Obligations
5.1. The Customer agrees and/or warrants:
(a) that the processing, including the transfer itself, of the Personal Data has been and will continue to be carried out in accordance with the relevant provisions of the Data Protection Law and does not violate the relevant provisions;
(d)that after assessment of the requirements of the Data Protection Law, the security measures are appropriate to protect Personal Data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing, and that these measures ensure a level of security appropriate to the risks presented by the processing and the nature of the data to be protected having regard to the state of the art and the cost of their implementation;
(e) that it will ensure compliance with the security measures;
(f) to access and use the Services only for legal, authorized, and acceptable purposes. The Customer will not use (or assist others in using) the Services in ways that: (a) violate, misappropriate, or infringe the rights of the Company, its users, or others, including privacy, publicity, intellectual property, or other proprietary rights; (b) are illegal, obscene, defamatory, threatening, intimidating, harassing, hateful, racially, or ethnically offensive, or instigate or encourage conduct that would be illegal, or otherwise inappropriate;
(c) involve publishing falsehoods, misrepresentations, or misleading statements; (d) impersonate someone;
(g) do not to (or assist others to) access, use, copy, adapt, modify, prepare derivative works based upon, distribute, license, sublicense, transfer, display, perform, or otherwise exploit the Services platform in impermissible or unauthorized manners, or in ways that burden, impair, or harm the Company, the Services platform, systems, other users, or others, including that the Customer will not directly or through automated means: (a) reverse engineer, alter, modify, create derivative works from, decompile, or extract code from the Services platform; (b) send, store, or transmit viruses or other harmful computer code through or onto the Services platform; (c) gain or attempt to gain unauthorized access to the Services platform or systems; (d) interfere with or disrupt the integrity or performance of the Services platform; (e) create accounts for the Services platform through unauthorized or automated means; (f) collect the information of or about other users in any impermissible or unauthorized manner; (g) sell, resell, rent, or charge for the Services platform; or (h) distribute or make the Services platform available over a network where it could be used by multiple devices at the same time;
(h)that the Customer is responsible for keeping the Customer’s Services Account safe and secure, and the Customer will notify the Company promptly of any unauthorized use or security breach of the Customer’s Account or the Services platform;
- Technical and Organizational Measures
6.1. The Company shall take the appropriate technical and organizational measures to adequately protect Personal Data against accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Personal Data, described under Appendix 1. Such measures include but not limited to physical and IT measures, and organizational measures to:
(a) the prevention of unauthorized persons from gaining access to Personal Data processing systems (physical access control),
(b)the prevention of Personal Data processing systems from being used without authorization (logical access control),
(c) ensuring that persons entitled to use a Personal Data processing system gain access only to such Personal Data as they are entitled to accessing in accordance with their access rights, and that, in the course of processing or use and after storage, Personal Data cannot be read, copied, modified or deleted without authorization (data access control),
(d) ensuring that Personal Data cannot be read, copied, modified or deleted without authorization during electronic transmission, transport or storage on storage media, and that the target entities for any transfer of Personal Data by means of data transmission facilities can be established and verified (data transfer control),
(e) ensuring the establishment of an audit trail to document whether and by whom Personal Data have been entered into, modified in, or removed from Personal Data processing systems (entry control),
(f) ensuring that Personal Data is protected against accidental destruction or loss (availability control).
6.2. The technical and organizational measures are subject to technical progress and further development. In this respect the Company may implement alternative adequate measure, however, the security level of the defined measures must never be reduced. Major changes must be documented.
7.2. The current Sub-processors for the Services are set out at website of the Company (“Sub-processor List”) and the Customer agrees and approves that the Company has engaged such Sub-processors to process Personal Data as set out in the list. The Company shall provide notification of a new Sub-processor(s) before authorizing any new Sub-processor(s) to process Personal Data in connection with the provision of the applicable Service.
7.3. The Company shall notify the Customer thirty (30) days’ in advance of any intended changes concerning the addition or replacement of any Sub-processor during which period the Customer may raise objections to the Sub-processor’s appointment. Any objections must be raised promptly (and in any event no later than fourteen (14) days following Company’s notification of the intended changes). Should the Company choose to retain the objected to Sub-processor, the Company will notify the customer at least fourteen (14) days before authorizing the Sub-processor to process Personal Data and then the Customer may immediately discontinue using the relevant portion of the Services and may terminate the relevant portion of the Services.
(b) observe reasonable on-site access and other restrictions reasonably imposed by the Company; (c) comply with Company’s policies and procedures, and (d) not unreasonably interfere with Company’s business activities. The Company reserves the right to restrict or suspend any audit in the event of any breach of the conditions specified in this Section 8.
Such audits shall be carried out at the Customer’s cost and expense.
8.3. The audit may only be undertaken when there are specific grounds for suspecting the misuse of Personal Data, and no earlier than two weeks after the Customer has provided written notice to the Company.
8.4. The findings in respect of the performed audit will be discussed and evaluated by the parties and, where applicable, implemented accordingly as the case may be by one of the parties or jointly by both parties. The costs of the audit will be borne by the Customer.
- Notification of A Data Breach
9.1. In the event of the Company aware of any breach of security that results in the accidental, unauthorized or unlawful destruction or unauthorized disclosure of or access to Personal Data the Company shall to the best of its ability, notify the Customer thereof with undue delay, after which the Customer shall determine whether or not to inform the Data subjects and/or the relevant regulatory authority(ies). This duty to report applies irrespective of the impact of the leak. The Company will endeavour that the furnished information is complete, correct and accurate.
9.2. If required by law and/or regulation, the Company shall cooperate in notifying the relevant authorities and/or Data subjects. The Customer remains the responsible party for any statutory obligations in respect thereof.
9.3. The duty to report includes in any event the duty to report the fact that a leak has occurred, including details regarding: the (suspected) cause of the leak; the (currently known and/or anticipated) consequences thereof; the (proposed) solution; the measures that have already been taken.
- Deletion and Return of Personal Data
10.1. The parties agree that on the termination of the provision of data-processing services, the Company and its subcontractors shall, at the choice of the Customer, return all the Personal Data transferred and the copies thereof to the Customer or shall destroy all the Personal Data and certify to the Customer that it has done so, unless legislation imposed upon the Company prevents it from returning or destroying all or part of the Personal Data transferred. In that case, the Company warrants that it will guarantee the confidentiality of the Personal Data transferred and will not actively process the Personal Data transferred anymore. The Company and its subcontractors warrant that upon request of the Customer and/or of the supervisory authority, it will submit its data-processing facilities for an audit of the measures referred to in
- Governing Law/Forum
11.3. The parties agree to keep all details of the arbitration proceedings and arbitral award strictly confidential and shall use all reasonable efforts to take such action as may be appropriate to prevent the unauthorized disclosure of the proceedings, any information disclosed in connection therewith and the award granted.
Appendix No. 1
Description of the technical and organizational measures implemented by the Company:
the Company shall implement the measures described in this appendix, provided that the measures directly or indirectly contribute or can contribute to the protection of Personal Data during the period of Company’s Services rendering to the Customer. If the Company believes that a measure is not necessary for the respective Service or part thereof, the Company will justify this and come to an agreement with the Customer.
The technical and organizational measures are subject to technical progress and development. In this respect the Company is permitted to implement alternative adequate measures. The level of security must align with industry security best practice and not less than, the measures set forth herein. All major changes are to be agreed with the Customer and documented.
- Risk management
1.1. Security risk management
- The Company shall identify and evaluate security risks related to confidentiality, integrity and availability and based on such evaluation implement appropriate technical and organizational measures to ensure a level of security which is appropriate to the risk.
- The Company shall have documented processes and routines for handling risks within its operations.
- The Company shall periodically assess the risks related to information systems and processing, storing and transmitting information.
1.2. Security risk management for personal data
1.2.1. The Company shall identify and evaluate security risks related to confidentiality, integrity and availability and based on such evaluation implement appropriate technical and organizational measures to ensure a level of security which is appropriate to the risk of the specific Personal Data types and purposes being processed by the Company, including inter alia as appropriate:
- The pseudonymisation and encryption of Personal Data;
- The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
- The ability to restore the availability and access to the Customer’s Data in a timely manner in the event of a physical or technical incident;
- A process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.
1.2.2. The Company shall have documented processes and routines for handling risks when processing Personal Data on behalf of the Customer.
1.2.3. The Company shall periodically assess the risks related to information systems and processing, storing and transmitting Personal Data.
1.3. Information security policies
1.3.1. The Company shall have a defined and documented information security management system including an information security policy and procedures in place, which shall be approved by Company’s management. They shall be published within Company´s organization and communicated to relevant Company personnel.
1.3.2. The Company shall periodically review Company’s security policies and procedures and update them if required to ensure their compliance with this Appendix.
- Organization of information security
- The Company shall have defined and documented security roles and responsibilities within its organization.
- The Company shall appoint at least one data protection officer who has appropriate security competence and who has an overall responsibility for implementing the security measures under this Appendix and who will be the contact person for the Customer’s security staff.
- Human resource security
- The Company shall ensure that any Company personnel performing assignments under the Agreement is trustworthy, meets established security criteria and has been, and during the term of the assignment will continue to be, subject to appropriate screening and background verification.
- The Company shall ensure that Company personnel with security responsibilities is adequately trained to carry out security related duties.
- The Company shall provide or ensure periodical security awareness training to relevant Company personnel. Such Company training shall include, without limitation:
(a) How to handle customer information security (i.e. the protection of the confidentiality, integrity and availability of information);
(b) Why information security is needed to protect customers information and systems;
(c) The common types of security threats (such as identity theft, malware, hacking, information leakage and insider threat);
(d) The importance of complying with information security policies and applying associated standards/procedures;
(e) Personal responsibility for information security (such as protecting customer’s privacy-related information and reporting actual and suspected data breaches).
- Access control
The Company shall have a defined and documented access control policy for facilities, sites, network, system, application and information/data access (including physical, logical and remote access controls), an authorization process for user access and privileges, procedures for revoking access rights and an acceptable use of access privileges for Company personnel in place.
The Company shall have a formal and documented user registration and de-registration process implemented to enable assignment of access rights.
The Company shall assign all access privileges based on the principle of need-to-know and principle of least privilege.
The Company shall use strong authentication (multi-factor) for remote access users and users connecting from an untrusted network.
The Company shall ensure that Company personnel has a personal and unique identifier (user ID), and use an appropriate authentication technique, which confirms and ensures the identity of users.
- Physical and environmental security
The Company shall protect information processing facilities against external and environmental threats and hazards, including power/cabling failures and other disruptions caused by failures in supporting utilities. This includes physical perimeter and access protection.
- Operations security
The Company shall have an established change management system in place for making changes to business processes, information processing facilities and systems. The change management system shall include tests and reviews before changes are implemented, such as procedures to handle urgent changes, roll back procedures to recover from failed changes, logs that show, what has been changed, when and by whom.
The Company shall implement malware protection to ensure that any software used for Company’s provision of the Services to the Customer is protected from malware.
The Company shall make backup copies of critical information and test back-up copies to ensure that the information can be restored as agreed with the Customer.
The Company shall log and monitor activities, such as create, reading, copying, amendment and deletion of processed data, as well as exceptions, faults and information security events and regularly review these.
Furthermore, the Company shall protect and store (for at least 6 months or such period/s set by Data Protection Law) log information, and on request, deliver monitoring data to the Customer. Anomalies / incidents / indicators of compromise shall be reported according to the data breach management requirements as set out in clause 9, below.
The Company shall manage vulnerabilities of all relevant technologies such as operating systems, databases, applications proactively and in a timely manner.
The Company shall establish security baselines (hardening) for all relevant technologies such as operating systems, databases, applications.
The Company shall ensure development is segregated from test and production environment.
- Communications security
The Company shall implement network security controls such as service level, firewalling and segregation to protect information systems.
- Company relationship with sub-suppliers
The Company shall regularly monitor, review and audit Sub-processor’s compliance with this Appendix.
The Company shall, at the request of the Customer, provide the Customer with evidence regarding Subprocessor’s compliance with this Appendix.
- Data breach management
The Company shall have established procedures for data breach management.
The Company shall inform the Customer about any data breach (including but not limited to incidents in relation to the processing of Personal Data) as soon as possible but no later than within 36 hours after the data breach has been identified.
All reporting of security-related incidents shall be treated as confidential information and be encrypted, using industry standard encryption methods.
The data breach report shall contain at least the following information:
(a) The nature of the data breach,
(b) The nature of the Personal Data affected,
(c) The categories and number of data subjects concerned,
(d) The number of Personal Data records concerned,
(e) Measures taken to address the data breach,
(f) The possible consequences and adverse effect of the data breach, and
(g) Any other information the Customer is required to report to the relevant regulator or data subject.
To the extent legally possible, the Company may claim compensation for support services under this clause 9 which are not attributable to failures on the part of the Company.
- Business continuity management
The Company shall identify business continuity risks and take necessary actions to control and mitigate such risks.
The Company shall have documented processes and routines for handling business continuity.
The Company shall ensure that information security is embedded into the business continuity plans
The Company shall periodically assess the efficiency of its business continuity management, and compliance with availability requirements (if any).