Customer Data Protection Agreement (Processor)
This DATA PROTECTION AGREEMENT (“DPA”) is entered into by and between IVIDEON LLC, whose registered office is at 17595, HARVARD AVE STE C PMB 3328, IRVINE, CA 92614, USA and its Affiliates (“Supplier”), and Customer and its Affiliates (“Customer”).
This DPA is governed by the terms of the applicable agreement entered into by and between the Parties for the supply of Products and/or Services by Supplier to Customer (“the Agreement”). In the event of a conflict between this DPA, including any attachments herein, and the Agreement, the provisions of this DPA will control but only with respect to the subject matter hereof.
In consideration of the mutual promises and covenants hereinafter contained and of other good and valuable consideration, the receipt and sufficiency of which is hereby acknowledged, the Parties agree as follows:
TERMS AND DEFINITIONS
All capitalized terms not defined herein have the meanings set forth elsewhere in the DPA.
“Affiliates” means any entity that directly or indirectly controls, is controlled by, or is under common control with, another entity, for so long as such control exists. In the case of companies and corporations, “control” and “controlled” mean beneficial ownership of more than fifty percent (50%) of the voting stock, shares, interest or equity in an entity. In the case of any other legal entity, “control” and “controlled” mean the ability to directly or indirectly control the management and/or business of the legal entity.
“Approved Jurisdiction” means a member state of the European Economic Area, or other jurisdiction as may be approved as having adequate legal protections for data by the European Commission.
“Cardholder Data” is a category of Sensitive Personal Data and includes a cardholder’s name, full account number, expiration date, and the three-digit or four-digit security number printed on the front or back of a payment card.
“Confidential Information” means any confidential information or materials relating to the business, products, customers or employees of the Customer and includes, without limitation, trade secrets, know-how, inventions, techniques, processes, programs, schematics, software source documents, data, customer lists, financial information, pricing, product development, sales and marketing plans or information that the Supplier knows or has reason to know is confidential, proprietary or trade secret information obtained by Supplier from the Customer or at the request or direction of the Customer: (i) that has been marked as confidential; (ii) whose confidential nature has been made known by the Customer to the Supplier; or (iii) that due to their character and nature, a reasonable person under like circumstances would treat as confidential.
“Data Subject” means the individual to whom Personal Data relates.
“Customer” means the Party making available Personal Data to the other Party.
“EEA” or “European Economic Area” means those countries that are members of The European Free Trade Association (“EFTA”), and the then-current, post-accession member states of the European Union.
“Information Security Incident” means a successful or imminent threat of unauthorized access, use, disclosure, breach, modification, theft, loss, corruption, or destruction of information; interference with information technology operations; or interference with system operations.
“Personal Data” means any information that is about, or can be related to, an identifiable individual including any information that can be linked to an individual or used to directly or indirectly identify an individual, natural person.
“Product” means Supplier hardware and software products.
“Supplier” means the Party receiving Personal Data.
“Representatives” means either Party and its Affiliates’ officers, directors, employees, agents, contractors, temporary personnel, subcontractors and consultants.
“Sensitive Personal Data” or “Special Categories of Data” means personal information that requires an extra level of protection and a higher duty of care. These categories are defined by applicable law and include: information on medical or health conditions, certain financial information, racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, sexual preferences, precise geolocation over time, or information related to offenses or criminal convictions. Sensitive Personal Data and Special Categories of Data are each a category of Personal Data that are particularly sensitive and pose a greater risk. Customer may require additional privacy responsibilities when dealing with such Personal Data, which will be appended to the Agreement or a statement of work, as applicable.
“Service” means a service offering from Supplier described in an applicable service or offer description, statement of work, or purchase order listed selected by Customer.
1. SCOPE OF AGREEMENT
This DPA is comprised of these General Terms and the following Attachments A-C attached herein, which are incorporated by reference:
- Attachment A INFORMATION SECURITY EXHIBIT
- Attachment B DATA PROTECTION EXHIBIT
- Attachment C STANDARD CONTRACTUAL CLAUSES
2. GENERAL TERMS
2.1. Choice of Law. This DPA and the legal relations among the Parties shall be governed by, and construed and enforced in accordance with, the laws of the State of Delaware, without regard to its conflict of laws rules. The Parties hereby irrevocably and unconditionally (i) agree that any action or proceeding arising out of or in connection with this DPA shall be brought only in the Chancery Court of the State of Delaware (the “Delaware Court”), and not in any other state or federal court in the United States of America or any court in any other country, (ii) consent to submit to the exclusive jurisdiction of the Delaware Court for purposes of any action or proceeding arising out of or in connection with this Agreement, (iii) waive any objection to the laying of venue of any such action or proceeding in the Delaware Court, and (iv) waive, and agree not to plead or to make, any claim that any such action or proceeding brought in the Delaware Court has been brought in an improper or inconvenient forum.
2.2 Attorneys’ Fees. In any suit or proceeding relating to this DPA the prevailing Party will have the right to recover from the other its costs and reasonable fees and expenses of attorneys, accountants, and other professionals incurred in connection with the suit or proceeding, including costs, fees and expenses upon appeal, separately from and in addition to any other amount included in such judgment. This provision is intended to be severable from the other provisions of this DPA, and shall survive expiration or termination and shall not be merged into any such judgment.
2.3 No Waiver. The waiver by either Party of any right provided under this DPA shall not constitute a subsequent or continuing waiver of such right or of any other right under this DPA.
2.4 Assignment. Unless otherwise expressly provided under this DPA, neither Party may assign this DPA or assign its rights or delegate its obligations hereunder, either in whole or in part, whether by operation of law or otherwise, without the prior written consent of the other Party. Any attempt at such an assignment or delegation without the other’s Party’s written consent will be void. The rights and liabilities of the parties under this DPA will bind and inure to the benefit of the Parties’ respective successors and permitted assigns. For purposes of this Section 2.4 (Assignment), a twenty percent (20%) change in control of a Party shall constitute an assignment.
2.5 Severability. If one or more terms of this DPA become or are declared to be illegal or otherwise unenforceable by any court of competent jurisdiction, each such part or term shall be null and void and shall be deemed deleted from this DPA. All remaining terms of this DPA shall remain in full force and effect. However, if this paragraph is invoked and, as a result, the value of this DPA is materially impaired for either Party, then the affected Party may terminate this DPA by written notice with immediate effect.
2.6 Notices. All notices required or permitted under this DPA shall be in writing. Notices will be deemed to have been given (i) one day after deposit with a commercial express courier specifying next day delivery; or (ii) two days for international courier packages specifying two-day delivery, with written verification of receipt. All communications shall be sent to the Parties’ addresses shown on the first page of this DPA or to such other address as may be designated from time to time by a Party by giving at least fourteen (14) days’ written notice to the other Party.
2.7 Survival. This Section 2 shall survive the expiration or earlier termination of this DPA. This DPA is the complete agreement between the Parties concerning the subject matter of this DPA and replaces any prior oral or written communications between the Parties. This DPA is subject to the terms and conditions of the Agreement, including, but not limited to any limitations or exclusions of liability set forth in the Agreement. This DPA, together with the Agreement, comprises the complete agreement between the Parties. There are no conditions, understandings, agreements, representations, or warranties expressed or implied, that are not specified herein. This DPA may only be modified by a written document executed by the Parties hereto. The Parties, by signing below, confirm that they have read, understood, and expressly approve of the terms and conditions of this DPA. The Supplier’s obligations under this DPA will terminate when the Supplier no longer holds, processes, or otherwise has access to Personal Data.
ATTACHMENT A
INFORMATION SECURITY EXHIBIT
Scope
This Information Security Exhibit (“Exhibit”) applies to the extent that Supplier processes or has access to Personal Data in the performance of its obligations to the Customer. This Exhibit outlines the information security requirements between Customer and Supplier and describes the technical and organizational security measures that shall be implemented by the Supplier to secure Personal Data prior to the performance of any processing under the Agreement.
Unless otherwise stated, in the event of a conflict between the Agreement and this Exhibit, the terms of this Exhibit will control as it relates to the processing of Personal Data.
General Security Practices
The supplier has implemented and shall maintain appropriate technical and organizational measures designed to protect Personal Data against accidental loss, destruction or alteration, unauthorized disclosure or access, or unlawful destruction, including the policies, procedures, and internal controls set forth in this Exhibit for its personnel, equipment, and facilities at the Supplier’s locations involved in performing any part of the Agreement.
General Compliance
3.1. Compliance. Supplier shall document and implement processes and procedures to avoid breaches of legal, statutory, regulatory, or contractual obligations related to information security or other security requirements. Such processes and procedures shall be designed to provide appropriate security to protect Personal Data given the risk posed by the nature of the data processed by Supplier. The Supplier shall implement and operate information security in accordance with the Supplier’s own policies and procedures, which shall be no less strict than the information security requirements set forth in this Exhibit.
3.2. Protection of records. Supplier shall implement appropriate procedures designed to protect records from loss, destruction, falsification, unauthorized access, and unauthorized release, in accordance with legislative, regulatory, and contractual requirements.
3.3. Review of information security. Supplier’s approach to managing information security and its implementation (i.e., control objectives, controls, policies, processes, and procedures) shall be reviewed at planned intervals or when significant changes occur by appropriate internal or external assessors.
3.4. Compliance with security policies and standards. Supplier’s management shall regularly review the compliance of information processing and procedures with the appropriate applicable security policies and standards.
3.5. Technical compliance review. Supplier shall regularly review information systems for compliance with Supplier’s information security policies and standards.
3.6. Information Risk Management. Supplier shall implement and utilize an appropriate information risk management process to frame, assess, respond and monitor risk, consistent with applicable contractual and legal obligations. Supplier is required to have a risk management framework and conduct periodic (i.e., at least annual) risk assessments of its environment and systems to understand the risks and apply appropriate controls to manage and mitigate such risks. Threat and vulnerability assessment must be periodically reviewed and prompt remediation actions taken where material weaknesses are found. Supplier will provide Customer with relevant summary reports and analysis upon written request, provided the disclosure of which would not violate Supplier’s own information security policies, or applicable law.
Technical and Organizational Measures for Security
4.1. Organization of Information Security
i. Security Ownership. Supplier shall appoint one or more security officers responsible for coordinating and monitoring the security requirements and procedures. Such officers shall have the knowledge, experience, and authority to serve as the owner(s) of, with responsibility and accountability for, information security within the organization.
ii. Security Roles and Responsibilities. Supplier shall define and allocate information security responsibilities in accordance with Supplier’s approved policies for information security. Such policies (or summaries thereof) shall be published and communicated to employees and relevant external parties required to comply with such policies.
iii. Project Management. Supplier shall address information security in project management to identify and appropriately address information security risks.
iv. Risk Management. Supplier shall have a risk management framework and conduct periodic (i.e., at least annual) risk assessment of its environment and systems to understand its risks and apply appropriate controls to manage and mitigate risks before processing Personal Data.
4.2. Human Resources Security
i. General. Supplier shall ensure that its personnel are under a confidentiality agreement that includes the protection of Personal Data and shall provide adequate training about relevant privacy and security policies and procedures. Supplier shall further inform its personnel of possible consequences of breaching Supplier’s security policies and procedures, which must include disciplinary action, including possible termination of employment for Supplier’s employees and termination of contract or assignment for Representatives and temporary personnel.
ii. Training. Supplier personnel with access to Personal Data shall receive appropriate, annual periodic education and training regarding privacy and security procedures for services to aid in the prevention of unauthorized use (or inadvertent disclosure) of Personal Data and training regarding how to effectively respond to security incidents. Training shall be provided before Supplier personnel are granted access to Personal Data or begin providing services. Training shall be regularly reinforced through refresher training courses, emails, posters, notice boards, and other training and awareness materials.
iii. Background Checks. In addition to any other terms in the Agreement related to this subject matter, Supplier shall conduct criminal and other relevant background checks for its personnel in compliance with applicable law and the Supplier’s policies.
4.3. Trusted Device Standards
i. Supplier personnel shall:
A. Only use trusted Devices that are configured with security software (i.e., anti-virus, anti-malware, encryption, etc.);
B. Follow trusted device standards when accessing Personal Data or when having Protected Data in their possession, custody, or control. The trusted device standard specifies the requirements that user devices (“Devices”) must satisfy to be trusted when processing Personal Data.
ii. Trusted device standards include, at a minimum, the following:
A. Each Device must be uniquely associated with a specific, individual user;
B. Devices must be configured for automatic patching. All operating system and application security patches must be installed within the timeframe recommended or required by the issuer of the patch, in any event, no later than four (4) weeks of the general release of such patch by the issuer.
C. Devices must be encrypted (i.e., full disk, endpoint encryption) and secured with a protected (e.g., password, PIN, fingerprint, facial recognition, biometrics, etc.) screen lock with the automatic activation feature set to ten (10) minutes or less. Users must lock the screen or log off when the device is unattended; D. Devices must not be rooted or jailbroken;
E. Devices must be periodically scanned for restricted or prohibited software (e.g., certain prohibited peer-to-peer sharing and social media apps that have been found to exploit/exfiltrate data); and
F. Devices must run an acceptable industry standard anti-malware solution. On-access scan and automatic update functionality must be enabled.
4.4. Personnel Access Controls
i. Access.
A. Limited Use. Supplier understands and acknowledges that Customer may be granting Supplier access to sensitive and proprietary information and computer systems in order for the Supplier to perform its obligations to the Customer. Supplier will not (i) access the Personal Data or computer systems for any purpose other than as necessary to perform its obligations to Customer; or (ii) use any system access information or log-in credentials to gain unauthorized access to Personal Data or Customer’s systems, or to exceed the scope of any authorized access.
B. Authorization. Supplier shall restrict access to Personal Data and systems at all times solely to those Representatives whose access is necessary to performing Supplier’s obligations to the Customer.
C. Suspension or Termination of Access Rights. At Customer’s reasonable request, Supplier shall promptly and without undue delay suspend or terminate the access rights to Personal Data and systems for any Supplier’s personnel or its Representatives reasonably suspected of breaching any of the provisions of this Exhibit; and Supplier shall remove access rights of all employees and external party users upon suspension or termination of their employment, or engagement.
D. Information Classification. Supplier shall classify, categorize, and/or tag Personal Data to help identify it and to allow for access and use to be appropriately restricted.
ii. Access Policy. Supplier shall determine appropriate access control rules, rights, and restrictions for each specific user’s roles towards their assets. Supplier shall maintain a record of security privileges of its personnel that have access to Personal Data, networks, and network services. Supplier shall restrict and tightly control the use of utility programs that might be capable of overriding system and application controls.
4.5. Access Authorization.
i. Supplier shall have user account creation and deletion procedures, with appropriate approvals, for granting and revoking access to Customer’s systems and networks. Supplier shall use an enterprise access control system that requires revalidation of its personnel by managers at regular intervals based on the principle of “least privilege” and need-to-know criteria based on job role.
ii. Supplier shall maintain and update a record of personnel authorized to access systems that contain Personal Data and Supplier shall review users’ access rights at regular intervals.
iii. For systems that process Personal Data, Supplier shall revalidate (or where appropriate, deactivate) access of users who change reporting structure and deactivate authentication credentials that have not been used for a period of time not to exceed six (6) months.
iv. Supplier shall restrict access to program source code and associated items such as software object code, designs, specifications, verification plans, and validation plans, in order to prevent the introduction of unauthorized functionality and to avoid unintentional changes.
4.6. Network Design. For systems that process Personal Data, Supplier shall have controls to avoid personnel assuming access rights beyond those that they have been assigned to gain unauthorized access to Personal Data.
4.7. Least Privilege. Supplier shall limit access to Personal Data to that personnel with performance obligations and, to the extent technical support is needed, its personnel performing such technical support.
4.8. Authentication
i. Supplier shall use industry standard practices to identify and authenticate users who attempt to access information systems. Where authentication mechanisms are based on passwords/PINs, Supplier shall require that the passwords/PINs are renewed and changed regularly, at least every 180 days.
ii. Where authentication mechanisms are based on passwords, Supplier shall require the password to conform to strong password control parameters (e.g., length, character complexity, and/or non-repeatability).
iii. Supplier shall ensure that de-activated or expired identifiers and log-in credentials are not granted to other individuals.
iv. Supplier shall monitor repeated failed attempts to gain access to the information system.
v. Supplier shall maintain industry standard procedures to deactivate log-in credentials that have been corrupted or inadvertently disclosed.
vi. Supplier shall use industry standard log-in credential protection practices, including practices designed to maintain the confidentiality and integrity of log-in credentials when they are assigned and distributed, and during storage (e.g., log-in credentials shall not be stored or shared in plain text).
4.9. Cryptography
i. Cryptographic controls policy A. Supplier shall have a policy on the use of cryptographic controls based on assessed risks.
B. Supplier shall assess and manage the lifecycle of cryptographic algorithms, hashing algorithms, etc. and deprecate and disallow usage of weak cypher suites and insufficient bit and block lengths.
C. Supplier’s cryptographic controls/policy shall address appropriate algorithm selections, key management, and other core features of cryptographic implementations.
ii. Key management. Supplier shall have procedures for distributing, storing, archiving, and changing/updating keys; recovering, revoking/destroying, and dealing with compromised keys; and logging all transactions associated with such keys.
4.10. Physical and Environmental Security
i. Physical Access to Facilities
A. Supplier shall limit access to facilities where systems that process Personal Data are located to authorized individuals.
B. Security perimeters shall be defined and used to protect areas that contain both sensitive or critical information and information processing facilities.
C. Facilities shall be monitored and access-controlled at all times (24×7).
D. Access shall be controlled through key card and/or appropriate sign-in procedures for facilities with systems processing Personal Data. Supplier must register personnel and require them to carry appropriate identification badges.
ii. Physical Access to Equipment. Supplier equipment used to process or store Personal Data shall be protected using industry standard process to limit access to authorized individuals.
iii. Protection from Disruptions. Supplier shall implement appropriate measures designed to protect against loss of data due to power supply failure or line interference.
iv. Clear Desk. Supplier shall have policies requiring a “clean desk/clear screen” to prevent inadvertent disclosure of Personal Data.
4.11. Operations Security
i. Operational Policy. Supplier shall maintain written policies describing its security measures and the relevant procedures and responsibilities of its personnel who have access to Personal Data and to its systems and networks. Supplier shall communicate its policies and requirements to all persons involved in the processing of Personal Data. Supplier shall implement the appropriate management structure and control designed to ensure compliance with such policies and with applicable law concerning the protection and processing of Personal Data.
ii. Security and processing Controls.
A. Areas. Supplier shall maintain, document, and implement standards and procedures to address the configuration, operation, and management of systems and networks and services that store or process Personal Data.
B. Standards and Procedures. Such standards and procedures shall include: security controls, identification and patching of security vulnerabilities, change control process and procedures, and incident prevention, detection, remediation, and management.
iii. Logging and Monitoring. Supplier shall maintain logs of administrator and operator activity and data recovery events related to Personal Data.
4.12. Communications Security and Data Transfer
i. Networks. Supplier shall, at a minimum, use the following controls to secure its networks that access or process Personal Data:
A. Network traffic shall pass through firewalls, which are monitored at all times. Supplier must implement intrusion prevention systems that allow traffic flowing through the firewalls and LAN to be logged and protected at all times.
B. Network devices used for administration must utilize industry standard cryptographic controls when processing Personal Data.
C. Anti-spoofing filters and controls must be enabled on routers.
D. Network, application, and server authentication passwords are required to meet minimum complexity guidelines (at least 7 characters with at least 3 of the following four classes: upper case, lower case, numeral, special character) and be changed at least every 180 days; or utilize other strong log-in credentials (e.g., biometrics).
E. Initial user passwords are required to be changed at first log-on. Supplier shall have a policy prohibiting the sharing of user IDs, passwords, or other log-in credentials.
F. Firewalls must be deployed to protect the perimeter of Supplier’s networks.
ii. Virtual Private Networks (“VPN”). When remote connectivity to the Disclosing or Supplier’s network is required for processing of Personal Data:
A. Connections must be encrypted using industry standard cryptography (i.e., a minimum of 256-bit encryption).
B. Connections shall only be established using VPN servers.
C. The use of multi-factor authentication is required.
iii. Data Transfer. Supplier shall have formal transfer policies in place to protect the transfer of information through the use of all types of communication facilities that adhere to the requirements of this Exhibit. Such policies shall be designed to protect transferred information from unauthorized interception, copying, modification, corruption, routing and destruction.
4.13. System Acquisition, Development, and Maintenance
i. Security Requirements. Supplier shall adopt security requirements for the purchase, use, or development of information systems, including for application services delivered through public networks. ii. Development Requirements. Supplier shall have policies for secure development, system engineering, and support. Supplier shall conduct appropriate tests for system security as part of acceptance testing processes. Supplier shall supervise and monitor the activity of outsourced system development.
4.14. Penetration Testing, Vulnerability Scanning and Audit Reports
i. Testing. Supplier will perform periodic penetration tests on their internet perimeter network. Audits will be conducted by the Supplier’s compliance team using industry recommended network security tools to identify vulnerability information. Upon written request from Customer, Supplier shall provide a Vulnerability and Penetration testing report at the organization level which may include an executive summary of the results and not the details of actual findings.
ii. Audits. Supplier shall respond promptly to and cooperate with reasonable requests by Customer for security audit, scanning, discovery, and testing reports.
iii. Remedial Action. If any audit or penetration testing exercise reveals any deficiencies, weaknesses, or areas of non-compliance, Supplier shall promptly take such steps as may be required, in Supplier’s reasonable discretion, to remedy those deficiencies, weaknesses, and areas of non-compliance as soon as may be practicable given the circumstances and in any case within three (3) months of the findings from the audit and/or test.
iv. Status of Remedial Action. Upon request, Supplier shall keep Customer informed of the status of any remedial action that is required to be carried out, including the estimated timetable for completing the same, and shall certify to Customer as soon as may be practicable given the circumstances that all necessary remedial actions have been completed.
4.15. Contractor Relationships
i. Policies. Supplier shall have information security policies or procedures for its use of Representatives that impose requirements consistent with this Exhibit. Such policies shall be reviewed at planned intervals or if significant changes occur. Agreements with Representatives shall include requirements that are consistent with, or analogous to, this DPA.
ii. Monitoring. Supplier shall monitor and audit service delivery by its Representatives and review its Representatives’ security practices against the security requirements set forth in Supplier’s agreements with such Representatives. Supplier shall manage changes in Representative services that may have an impact on security.
4.16. Management of Information Security Incidents and Improvements
i. Responsibilities and Procedures. Supplier shall establish procedures to ensure a quick, effective, and orderly response to Information Security Incidents.
ii. Reporting Information Security Incident. Supplier shall implement procedures for Information Security Incidents to be reported through appropriate management channels as quickly as reasonably possible. All employees and Representatives should be made aware of their responsibility to report Information Security Incidents as quickly as reasonably possible.
iii. Reporting Information Security Weaknesses. Supplier, employees, and Representatives are required to note and report any observed or suspected information security weaknesses in systems or services.
iv. Assessment of and Decision on Information Security Events. Supplier shall have an incident classification scale in place in order to decide whether a security event should be classified as an Information Security Incident. The classification scale should be based on the impact and extent of an incident.
v. Response Process. Supplier shall maintain a record of Information Security Incidents with a description of the incident, the effect of the incident, the name of the reporter and to whom the incident was reported, the procedure for rectifying the incident, and the remedial action taken to prevent future security incidents.
4.17. Information Security Aspects of Business Continuity Management
i. Planning. Supplier shall maintain emergency and contingency plans for the facilities where Supplier information systems that process Personal Data are located. Supplier shall verify the established and implemented information security continuity controls at regular intervals.
ii. Data Recovery. Supplier shall design redundant storage and procedures for recovering data in a manner sufficient to reconstruct Personal Data in its original state as found on the last recorded backup provided by the Customer.
Notification and Communication Obligations
5.1. Notification.
Supplier shall without undue delay (i.e., within 48 hours from confirmation) notify Customer at: support@ivideon.com
if any of the following events occur:
i. any unmitigated, material security vulnerability, or weakness of which Supplier has actual knowledge in (i) Customer’s systems, or networks, or (ii) Supplier’s systems or networks, that have compromised Personal Data;
ii. an Information Security Incident that compromises or is likely to compromise the security of Personal Data and weaken or impair business operations of Customer;
iii. an Information Security Incident that negatively impacts the confidentiality, integrity, and availability of Personal Data that is processed, stored, and transmitted using a computer; or iv. known and willful failure or inability to maintain material compliance with requirements of this Exhibit and applicable law.
5.2. Cooperation.
Supplier shall: (i) respond promptly to any Customer reasonable requests for information, cooperation, and assistance, including to a Customer designated response center.
5.3. Information Security Communication.
Except as required by applicable law or by existing applicable contractual obligations, Supplier agrees that it will not inform any third party of any of the events described above in this Section referencing, or identifying Customer, without Customer’s prior written consent. Supplier shall fully cooperate with Customer and law enforcement authorities concerning any unauthorized access to Customer’s systems or networks, or Personal Data. Such cooperation shall include the retention of all information and data within Supplier’s possession, custody, or control that is directly related to any Information Security Incident. If disclosure is required by law, Supplier will work with Customer regarding the timing, content, and recipients of such disclosure. To the extent Supplier was at fault, Supplier will bear the cost of reproduction or any other remedial steps necessary to address the incident or compromise.
5.4. Post-Incident
Supplier shall reasonably cooperate with Customer in any post-incident investigation, remediation, and communication efforts.
ATTACHMENT B
DATA PROTECTION EXHIBIT
SCOPE
This Data Protection Exhibit (“Exhibit”) outlines the terms and conditions with which the Parties must comply with respect to processing Personal Data and applies to the extent that Supplier processes or has access to Personal Data in the performance of its obligations to the Customer.
DEFAULT STANDARDS a. To the extent that Supplier processes Special Categories of Data, the security measures referred to in this Exhibit shall also include, at a minimum (i) routine risk assessments of Supplier’s information security program, (ii) regular testing and monitoring to measure and confirm the effectiveness of the information security program’s key controls, systems, and procedures, and (iii) encryption of Special Categories of Data while during transmission (whether sent by e-mail, fax, or otherwise), and storage (including when stored on mobile devices, such as a portable computer, flash drive, PDA, or cellular telephone). If encryption is not feasible, Supplier shall not store Special Categories of Data on any unencrypted devices unless compensating controls are implemented. Further, Supplier shall protect all Special Categories of Data stored on electronic databases, servers, or other forms of non-mobile devices against all reasonably anticipated forms of compromise by use of the safeguards contained in Attachment A (Information Security Exhibit).
b. In addition to the foregoing, to the extent Supplier receives, processes, transmits or stores any Cardholder Data for or on behalf of Customer, Supplier represents and warrants that information security procedures, processes, and systems will at all times meet or exceed all applicable information security laws, standards, rules, and requirements related to the collection, storage, processing, and transmission of payment card information, including those established by applicable governmental regulatory agencies, the Payment Card Industry (the “PCI”), all applicable networks, and any written standards provided by Customer to Supplier from time to time (all the foregoing collectively the “PCI Compliance Standards”).
с. If this Exhibit does not specifically address a particular data security or privacy standard or obligation, Supplier will use appropriate, generally accepted practices to protect the confidentiality, security, privacy, integrity, availability, and accuracy of Personal Data.
d. Supplier agrees that, in the event of a breach of this Exhibit, whether Customer has an adequate remedy in damages, Customer may be entitled to seek injunctive or equitable relief to immediately cease or prevent the use, processing, or disclosure of Personal Data not contemplated by the Supplier’s obligations to the Customer and/or this DPA and to enforce the terms of this Exhibit or enforce compliance with all applicable law.
CERTIFICATIONS
a. Supplier must maintain the certifications listed in an applicable agreement between the Parties, if any, and Supplier shall recertify such certifications as reasonably required. If there is a material change in the requirements of a required certification or the nature of the performance Supplier is providing, such that Supplier no longer wishes to maintain such certifications, the Parties will discuss alternatives and compensating controls in good faith.
b. Prior to processing Personal Data and at Customer’s request, Supplier will provide Customer with copies of any certifications it maintains (along with relevant supporting documentation) that apply to the systems, policies, and procedures that govern the processing of Personal Data. Supplier will notify Customer if Supplier has failed or no longer intends to adhere to such certifications or successor frameworks.
DATA PROTECTION AND PRIVACY
a. The Parties agree that, for the Personal Data, Customer shall be the Data Controller and Supplier shall be the Data Processor.
b. Customer shall:
i. in its use of the Products and/or Services, comply with applicable law, including maintaining all relevant regulatory registrations and notifications as required under applicable law;
ii. ensure all instructions given by it to Supplier in respect of Personal Data shall at all times be in accordance with applicable law;
iii. have sole responsibility for the accuracy, quality, and legality of Personal Data and the means by which Customer acquired Personal Data, including providing any required notices to, and obtaining any necessary consent from, its employees, agents or third parties to whom it extends the benefits of the Products and/or Services; and
iv. keep the amount of Personal Data provided to Supplier to the minimum necessary for the performance of the Products and/or Services.
c. If Supplier has access to or otherwise processes Personal Data, then Supplier shall: i. implement and maintain commercially reasonable and appropriate physical, technical, and organizational security measures described in this Exhibit (including any appendices or attachments or referenced certifications) designed to protect Personal Data against accidental or unlawful destruction; accidental loss, alteration, unauthorized disclosure or access; all other unlawful forms of processing; and any Information Security Incident; ii. take reasonable steps designed to ensure the reliability of its staff and that they are subject to a binding written contractual obligation with Supplier to keep the Personal Data confidential (except where disclosure is required in accordance with applicable law, in which case Supplier shall, where practicable and not prohibited by applicable law, notify Customer of any such requirement before such disclosure) and any other person acting under its supervision who may come into contact with, or otherwise have access to and process Personal Data; and require that such personnel are aware of their responsibilities under this Exhibit and any applicable law (or Supplier’s own written binding policies that are at least as restrictive as this Exhibit); iii. appoint data protection officer(s). Upon request, Supplier will provide the contact details of the appointed person;
iv. assist Customer as reasonably needed to respond to requests from supervisory authorities, data subjects, customers, or others to provide information (including details of the Services provided by Supplier) related to Supplier’s processing of Personal Data;
v. not transfer Personal Data from the EEA or Switzerland to a jurisdiction which is not an Approved Jurisdiction, unless it first provides Customer advance notice and an opportunity to object; if Customer reasonably objects to the proposed cross border transfer the applicable performance that is the subject matter of the objection shall terminate. Where Supplier Processes Personal Data from the EEA or Switzerland on behalf of Customer, Supplier shall perform such processing in a manner consistent with the Privacy Shield Principles (see www. commerce. gov/privacyshield) or its successor framework(s) to the extent the Principles are applicable to Supplier’s processing of such data. If Supplier is unable to provide the same level of protection as required by the Principles, Supplier shall promptly notify Customer and cease processing. In such event, Customer may terminate the applicable performance of such processing by written notice within thirty (30) days.
vi. for jurisdictions other than the EEA or Switzerland, not transfer Personal Data outside of the jurisdiction where the Personal Data is obtained unless permitted under applicable law and it first provides Customer advance notice and an opportunity to object; if Customer reasonably objects to the proposed cross border transfer the applicable performance that is the subject matter of the objection shall terminate.
d. In addition, if Supplier processes Personal Data in the course of performance of its obligations to the Customer, then Supplier shall also:
i. only process the Personal Data in accordance with Customer’s documented instructions, but only to the extent that such instructions are consistent with applicable law. If Supplier reasonably believes that Customer’s instructions are inconsistent with applicable law, Supplier will promptly notify Customer of such;
ii. if required by applicable law, court order, warrant, subpoena, or other legal or judicial process to process Personal Data other than in accordance with Customer’s instructions, notify Customer of any such requirement before processing the Personal Data (unless applicable law prohibit such information on important grounds of public interest);
iii. only process or use Personal Data on its systems or facilities to the extent necessary to perform its obligations solely on behalf of Customer and only for the purposes contemplated by the Parties;
iv. where applicable, act as a subprocessor of such Personal Data;
v. maintain reasonably accurate records of the processing of any Personal Data received from Customer under the Agreement;
vi. make reasonable efforts to ensure that Personal Data are accurate and up to date at all times while in its custody or under its control, to the extent Supplier has the ability to do so;
vii. not lease, sell, distribute, or otherwise encumber Personal Data unless mutually agreed to by separate signed, written agreement;
viii. provide reasonable cooperation and assistance to Customer in allowing the persons to whom Personal Data relate to have access to their data and to delete or correct such Personal Data if they are demonstrably incorrect;
ix. provide such assistance as Customer reasonably requests (either on its own behalf or on behalf of its customers), and Supplier or a Representative is reasonably able to provide, with a view to meeting any applicable filing, approval or similar requirements in relation to applicable law;
x. promptly notify Customer of any investigation, litigation, arbitrated matter, or other dispute relating to Supplier’s information security or privacy practices as it relates to Supplier’s performance of its obligations to Customer;
xi. provide such reasonable information and assistance as Customer reasonably requires (taking into account the nature of processing and the information available to Supplier) to Customer in ensuring compliance with Customer’s obligations under applicable law with respect to:
A. security of processing;
B. data protection impact assessments (as such term is defined by applicable law);
C. prior consultation with a supervisory authority regarding high risk processing; and
D. notifications to the supervisory authority and/or communications to Data Subjects by Customer in response to any Information Security Incident; and,
xii. on termination of the DPA for whatever reason, or upon written request at any time during the Term, Supplier shall cease to process any Personal Data received from Customer, and within a reasonable period will, at the request of Customer: 1) return all Personal Data; or 2) securely and completely destroy or erase all Personal Data in its possession or control unless such return or destruction is not feasible or continued retention and processing is required by applicable law.
STANDARD CONTRACTUAL CLAUSES FOR THE PROCESSING OF PERSONAL DATA
If, and only with Customer’s prior consent, Supplier processes Personal Data from the EEA or Switzerland in a jurisdiction that is not an Approved Jurisdiction, the Parties shall confirm there is a legally approved mechanism in place to allow for the international data transfer.
If Supplier intends to rely on Standard Contractual Clauses (rather than another permissible transfer mechanism), the following additional terms will apply to Supplier and Supplier’s subprocessors and/or Affiliates who may be performing on behalf of the Supplier:
a. The Standard Contractual Clauses set forth in Attachment D will apply. If such Standard Contractual Clauses are superseded by new or modified Standard Contractual Clauses, the Parties shall promptly enter into the new or modified Standard Contractual Clauses, as necessary.
b. If Supplier subcontracts any processing of Personal Data (only as expressly allowed by an applicable agreement between the Parties and applicable law), Supplier will:
i. Notify Customer in advance of such processing and provide Customer an opportunity to object prior to processing; and
ii. Require that Supplier’s subprocessors have entered into written agreements with Supplier in which the subprocessors agree to abide by terms consistent with the applicable portions of the Standard Contractual Clauses with respect to such Personal Data.
c. If necessary to comply with applicable law, and where reasonably requested by Customer on behalf of its customers, Supplier shall enter into the Standard Contractual Clauses directly with Customer’s customers.
SUBPROCESSING
a. Supplier shall have a documented security program and policies that provide (i) guidance to its subprocessors with respect to ensuring the security, confidentiality, integrity, and availability of personal data and systems maintained or processed by Supplier; and (ii) express instructions regarding the steps to take in the event of a compromise or other anomalous event.
b. Supplier shall not subcontract its obligations under this Exhibit to another person or entity, in whole or in part, without providing Customer with advance notice and an opportunity to object; if Customer reasonably objects to the proposed subcontracting the applicable performance that is the subject matter of the objection shall terminate.
c. Supplier will execute a written agreement with such approved subprocessors containing terms at least as protective as this Exhibit and the applicable Exhibits (provided that Supplier shall not be entitled to permit the subprocessor to further subcontract or otherwise delegate all or any part of the subprocessor’s processing without Supplier’s prior notice and opportunity to object) and designating Customer as a third party beneficiary with rights to enforce such terms either by contract or operation of law.
d. Supplier shall be liable and accountable for the acts or omissions of Representatives to the same extent it is liable and accountable for its own actions or omissions under this Exhibit.
e. Customer acknowledges and expressly agrees that Supplier’s Affiliates may be retained as subprocessors, and (b) Receving and Supplier’s Affiliates respectively may engage third-party subprocessors. Supplier shall make available to Customer a current list of subprocessors for the respective Services with the identities of those subprocessors (“Subprocessor List”) upon Customer’s reasonable request.
RIGHTS OF DATA SUBJECTS
a. Data Subject Requests. Supplier shall, to the extent legally permitted, promptly notify Customer if it receives a request from a Data Subject for access to, correction, portability, or deletion of such Data Subject’s Personal Data. Unless required by applicable law, Supplier shall not respond to any such Data Subject request without Customer’s prior written consent except to confirm that the request relates to Customer. In addition Supplier shall provide such information and cooperation and take such action as the Customer reasonably requests in relation to a Data Subject request.
b. Complaints or Notices related to Personal Data. In the event Supplier receives any official complaint, notice, or communication that relates to Supplier’s processing of Personal Data or either Party’s compliance with applicable law in connection with Personal Data, to the extent legally permitted, Supplier shall promptly notify Customer and, to the extent applicable, Supplier shall provide Customer with commercially reasonable cooperation and assistance in relation to any such complaint, notice, or communication. Customer shall be responsible for any reasonable costs arising from Supplier’s provision of such assistance.
ATTACHMENT C
Standard Contractual Clauses
For purposes of this Attachment C:
any reference to “data exporter” means Customer, acting as data exporter on behalf of its EEA or Swiss customer(s) where applicable, and any reference to “data importer” means Supplier.
The Parties have agreed on the following Standard Contractual Clauses (the Clauses) in order to adduce adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of individuals for the transfer by the data exporter to the data importer of the personal data specified in Appendix 1.
Clause 1
Definitions
For the purposes of the Clauses:
(a) ’personal data’, ’special categories of data’, ’process/processing’, ’controller’, ’processor’, ’data subject’ and ’supervisory authority’ shall have the same meaning as in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data;
(b) ’the data exporter’ means the controller who transfers the personal data;
(c) ’the data importer’ means the processor who agrees to receive from the data exporter personal data intended for processing on his behalf after the transfer in accordance with his instructions and the terms of the Clauses and who is not subject to a third country’s system ensuring adequate protection within the meaning of Article 25(1) of Directive 95/46/EC;
(d) ’the subprocessor’ means any processor engaged by the data importer or by any other subprocessor of the data importer who agrees to receive from the data importer or from any other subprocessor of the data importer personal data exclusively intended for processing activities to be carried out on behalf of the data exporter after the transfer in accordance with his instructions, the terms of the Clauses and the terms of the written subcontract;
(e) ’the applicable data protection law’ means the legislation protecting the fundamental rights and freedoms of individuals and, in particular, their right to privacy with respect to the processing of personal data applicable to a data controller in the Member State in which the data exporter is established;
(f) ’technical and organisational security measures’ means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.
Clause 2
Details of the transfer
The details of the transfer and in particular the special categories of personal data where applicable are specified in Appendix 1 which forms an integral part of the Clauses.
Clause 3
Third-party beneficiary clause
The data subject can enforce against the data exporter this Clause, Clause 4(b) to (i), Clause 5(a) to (e), and (g) to (j), Clause 6(1) and (2), Clause 7, Clause 8(2), and Clauses 9 to 12 as third-party beneficiary.
The data subject can enforce against the data importer this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where the data exporter has factually disappeared or has ceased to exist in law unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law, as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity.
The data subject can enforce against the subprocessor this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses.
The parties do not object to a data subject being represented by an association or other body if the data subject so expressly wishes and if permitted by national law.
Clause 4
Obligations of the data exporter
The data exporter agrees and warrants:
(a) that the processing, including the transfer itself, of the personal data has been and will continue to be carried out in accordance with the relevant provisions of the applicable data protection law (and, where applicable, has been notified to the relevant authorities of the Member State where the data exporter is established) and does not violate the relevant provisions of that State;
(b) that it has instructed and throughout the duration of the personal data processing services will instruct the data importer to process the personal data transferred only on the data exporter’s behalf and in accordance with the applicable data protection law and the Clauses;
(c) that the data importer will provide sufficient guarantees in respect of the technical and organisational security measures specified in Appendix 2 to this contract;
(d) that after assessment of the requirements of the applicable data protection law, the security measures are appropriate to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing, and that these measures ensure a level of security appropriate to the risks presented by the processing and the nature of the data to be protected having regard to the state of the art and the cost of their implementation;
(e) that it will ensure compliance with the security measures;
(f) that, if the transfer involves special categories of data, the data subject has been informed or will be informed before, or as soon as possible after, the transfer that its data could be transmitted to a third country not providing adequate protection within the meaning of Directive 95/46/EC;
(g) to forward any notification received from the data importer or any subprocessor pursuant to Clause 5(b) and Clause 8(3) to the data protection supervisory authority if the data exporter decides to continue the transfer or to lift the suspension;
(h) to make available to the data subjects upon request a copy of the Clauses, with the exception of Appendix 2, and a summary description of the security measures, as well as a copy of any contract for subprocessing services which has to be made in accordance with the Clauses, unless the Clauses or the contract contain commercial information, in which case it may remove such commercial information;
(i) that, in the event of subprocessing, the processing activity is carried out in accordance with Clause 11 by a subprocessor providing at least the same level of protection for the personal data and the rights of data subject as the data importer under the Clauses; and
(j) that it will ensure compliance with Clause 4(a) to (i).
Clause 5
Obligations of the data importer
The data importer agrees and warrants:
(a) to process the personal data only on behalf of the data exporter and in compliance with its instructions and the Clauses; if it cannot provide such compliance for whatever reasons, it agrees to inform promptly the data exporter of its inability to comply, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract;
(b) that it has no reason to believe that the legislation applicable to it prevents it from fulfilling the instructions received from the data exporter and its obligations under the contract and that in the event of a change in this legislation which is likely to have a substantial adverse effect on the warranties and obligations provided by the Clauses, it will promptly notify the change to the data exporter as soon as it is aware, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract;
(c) that it has implemented the technical and organisational security measures specified in Appendix 2 before processing the personal data transferred;
(d) that it will promptly notify the data exporter about:
(i) any legally binding request for disclosure of the personal data by a law enforcement authority unless otherwise prohibited, such as a prohibition under criminal law to preserve the confidentiality of a law enforcement investigation,
(ii) any accidental or unauthorised access, and
(iii) any request received directly from the data subjects without responding to that request, unless it has been otherwise authorised to do so;
(e) to deal promptly and properly with all inquiries from the data exporter relating to its processing of the personal data subject to the transfer and to abide by the advice of the supervisory authority with regard to the processing of the data transferred;
(f) at the request of the data exporter to submit its data processing facilities for audit of the processing activities covered by the Clauses which shall be carried out by the data exporter or an inspection body composed of independent members and in possession of the required professional qualifications bound by a duty of confidentiality, selected by the data exporter, where applicable, in agreement with the supervisory authority;
(g) to make available to the data subject upon request a copy of the Clauses, or any existing contract for subprocessing, unless the Clauses or contract contain commercial information, in which case it may remove such commercial information, with the exception of Appendix 2 which shall be replaced by a summary description of the security measures in those cases where the data subject is unable to obtain a copy from the data exporter;
(h) that, in the event of subprocessing, it has previously informed the data exporter and obtained its prior written consent;
(i) that the processing services by the subprocessor will be carried out in accordance with Clause 11;
(j) to send promptly a copy of any subprocessor agreement it concludes under the Clauses to the data exporter.
Clause 6
Liability
The parties agree that any data subject, who has suffered damage as a result of any breach of the obligations referred to in Clause 3 or in Clause 11 by any party or subprocessor is entitled to receive compensation from the data exporter for the damage suffered.
If a data subject is not able to bring a claim for compensation in accordance with paragraph 1 against the data exporter, arising out of a breach by the data importer or his subprocessor of any of their obligations referred to in Clause 3 or in Clause 11, because the data exporter has factually disappeared or ceased to exist in law or has become insolvent, the data importer agrees that the data subject may issue a claim against the data importer as if it were the data exporter, unless any successor entity has assumed the entire legal obligations of the data exporter by contract of by operation of law, in which case the data subject can enforce its rights against such entity.
The data importer may not rely on a breach by a subprocessor of its obligations in order to avoid its own liabilities.
- If a data subject is not able to bring a claim against the data exporter or the data importer referred to in paragraphs 1 and 2, arising out of a breach by the subprocessor of any of their obligations referred to in Clause 3 or in Clause 11 because both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, the subprocessor agrees that the data subject may issue a claim against the data subprocessor with regard to its own processing operations under the Clauses as if it were the data exporter or the data importer, unless any successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law, in which case the data subject can enforce its rights against such entity. The liability of the subprocessor shall be limited to its own processing operations under the Clauses.
Clause 7
Mediation and jurisdiction
- The data importer agrees that if the data subject invokes against it third-party beneficiary rights and/or claims compensation for damages under the Clauses, the data importer will accept the decision of the data subject:
(a) to refer the dispute to mediation, by an independent person or, where applicable, by the supervisory authority;
(b) to refer the dispute to the courts in the Member State in which the data exporter is established.
- The parties agree that the choice made by the data subject will not prejudice its substantive or procedural rights to seek remedies in accordance with other provisions of national or international law.
Clause 8
Cooperation with supervisory authorities
The data exporter agrees to deposit a copy of this contract with the supervisory authority if it so requests or if such deposit is required under the applicable data protection law.
The parties agree that the supervisory authority has the right to conduct an audit of the data importer, and of any subprocessor, which has the same scope and is subject to the same conditions as would apply to an audit of the data exporter under the applicable data protection law.
The data importer shall promptly inform the data exporter about the existence of legislation applicable to it or any subprocessor preventing the conduct of an audit of the data importer, or any subprocessor, pursuant to paragraph 2. In such a case the data exporter shall be entitled to take the measures foreseen in Clause 5 (b).
Clause 9
Governing Law
The Clauses shall be governed by the law of the Member State in which the data controller is established.
Clause 10 Variation of the contract
The parties undertake not to vary or modify the Clauses. This does not preclude the parties from adding clauses on business related issues where required as long as they do not contradict the Clause.
Clause 11
Subprocessing
The data importer shall not subcontract any of its processing operations performed on behalf of the data exporter under the Clauses without the prior written consent of the data exporter. Where the data importer subcontracts its obligations under the Clauses, with the consent of the data exporter, it shall do so only by way of a written agreement with the subprocessor which imposes the same obligations on the subprocessor as are imposed on the data importer under the Clauses. Where the subprocessor fails to fulfil its data protection obligations under such written agreement the data importer shall remain fully liable to the data exporter for the performance of the subprocessor’s obligations under such agreement.
The prior written contract between the data importer and the subprocessor shall also provide for a third- party beneficiary clause as laid down in Clause 3 for cases where the data subject is not able to bring the claim for compensation referred to in paragraph 1 of Clause 6 against the data exporter or the data importer because they have factually disappeared or have ceased to exist in law or have become insolvent and no successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses.
The provisions relating to data protection aspects for subprocessing of the contract referred to in paragraph 1 shall be governed by the law of the Member State in which the data controller is established.
The data exporter shall keep a list of subprocessing agreements concluded under the Clauses and notified by the data importer pursuant to Clause 5 (j), which shall be updated at least once a year. The list shall be available to the data exporter’s data protection supervisory authority.
Clause 12
Obligation after the termination of personal data processing services
The parties agree that on the termination of the provision of data processing services, the data importer and the subprocessor shall, at the choice of the data exporter, return all the personal data transferred and the copies thereof to the data exporter or shall destroy all the personal data and certify to the data exporter that it has done so, unless legislation imposed upon the data importer prevents it from returning or destroying all or part of the personal data transferred. In that case, the data importer warrants that it will guarantee the confidentiality of the personal data transferred and will not actively process the personal data transferred anymore.
The data importer and the subprocessor warrant that upon request of the data exporter and/or of the supervisory authority, it will submit its data processing facilities for an audit of the measures referred to in paragraph 1.
APPENDIX 1 TO ATTACHMENT C
THE STANDARD CONTRACTUAL CLAUSES
This Appendix 1 forms part of the Clauses.
Data exporter
The data exporter is Customer, acting as data exporter on behalf of itself or a customer where applicable. Activities relevant to the transfer include the performance of services for Customer and its customer(s).
Data importer
The data importer is Supplier. Activities relevant to the transfer include the performance of services for Customer and customers.
Data subjects
The personal data transferred may concern the following categories of data subjects: Employees, contractors, video surveillance subjects, business partners, representatives and end customers of customers, and other individuals whose personal data is processed by or on behalf of Customer or Customer’s customers and delivered as part of the Services.
Categories of data
The personal data transferred may concern the following categories of data: Personal Data related directly or indirectly to the delivery of services, including online and offline customer, prospect, partner, and Supplier data, video surveillance data and personal data provided by customers in connection with the resolution of support requests.
Special categories of data
The personal data transferred may concern the following special categories of data: Data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs or trade union memberships, and data concerning health or sex life, and data relating to offenses, criminal convictions or security measures.
Processing operations
The personal data transferred may be subject to the following basic processing activities, as may be further set forth in contractual agreements entered into from time to time between Customer and customers: (a) customer service activities, such as processing orders, providing technical support and improving offerings, (b) sales and marketing activities as permissible under applicable law, (c) consulting, professional, security, storage, hosting and other services delivered to customers, including services offered by means of the products and solutions described by Supplier, and (d) internal business processes and management, fraud detection and prevention, and compliance with governmental, legislative, and regulatory requirements.
APPENDIX 2 TO ATTACHMENT D
THE STANDARD CONTRACTUAL CLAUSES
Appendix 2 to the Standard Contractual Clauses, is the Information Security Exhibit located at Attachment A.