Obligation after the termination of personal data processing services
- The parties agree that on the termination of the provision of data processing services, the data importer and the subprocessor shall, at the choice of the data exporter, return all the personal data transferred and the copies thereof to the data exporter or shall destroy all the personal data and certify to the data exporter that it has done so, unless legislation imposed upon the data importer prevents it from returning or destroying all or part of the personal data transferred. In that case, the data importer warrants that it will guarantee the confidentiality of the personal data transferred and will not actively process the personal data transferred anymore.
- The data importer and the subprocessor warrant that upon request of the data exporter and/or of the supervisory authority, it will submit its data processing facilities for an audit of the measures referred to in paragraph 1.
APPENDIX 1 TO THE STANDARD CONTRACTUAL CLAUSES
The Member States may complete or specify, according to their national procedures, any additional necessary information to be contained in this Appendix.
Data exporter
The data exporter is (please specify briefly your activities relevant to the transfer):
Data Exporter uses the Data Importer’s services for the full scope of activities outlined in the Agreement, which are incorporated herein by reference, as if fully set forth at length below. Without limitation, these services include automated functions to support asset, office, and facilities management and support conference room, desk, and visitor management.
Data importer
The data importer is (please specify briefly activities relevant to the transfer):
Data Importer processes user information for the data exporter to provide office and facilities management services, which information can include first, middle, and last name, aliases, employee ID or username, job title, mobile, work, and personal phone numbers, email addresses, mail stop, building, floor, and room location for employees, as well as other, related information, including other forms of personal data, germane to the work environment and office and facilities management.
Processing may also include user information for the data exporter to provide provide conference room and visitor management services, which information can include calender unique identifier, color, name, and access control status (read only, or read-write) of calendars. Event unique identifier, title (or subject), description (or comments), location, recurring (true or false), dates and times of the event, visibility (private or no), and if the meeting is all day (true or false). Name and email address of all attendees.
Data subjects
The personal data transferred concern the following categories of data subjects (please specify):
Data subjects in scope include application users, employees, owners, directors, facility visitors, customers, and vendors.
Categories of data
The personal data transferred concern the following categories of data (please specify):
Data Importer processes user information for the data exporter to provide office and facilities management services, which information can include first, middle, and last name, aliases, employee ID or username, job title, mobile, work, and personal phone numbers, email addresses, mail stop, building, floor, and room location for employees, as well as other, related information, including other forms of personal data, germane to the work environment and office and facilities management.
Processing may also include user information for the data exporter to provide provide conference room and visitor management services, which information can include calendar unique identifier, color, name, and access control status (read only, or read-write) of calendars. Event unique identifier, title (or subject), description (or comments), location, recurring (true or false), dates and times of the event, visibility (private or no), and if the meeting is all day (true or false).Name and email address of all attendees.
Special categories of data (if appropriate)
The personal data transferred concern the following special categories of data (please specify):
None.
Processing operations
The personal data transferred will be subject to the following basic processing activities (please specify):
If AUP is utilized, a directory watcher will consume the file upon receiving. On consumption the file will be parsed into a temp table and compared to our current user set. Data importer will calculate the Delta data and update accordingly. The AUP file is then archived in a secure location where it is kept for 60 days or until space is needed, upon which it time the data is purged. Data is stored in the application is retained for reporting purposes until the end of contract.
Other processing includes, storage, the use of databases, analysis, queries, and the use of automated code to provide the services detailed in the Agreement or which are necessary or helpful to provide the services described in the Agreement.
APPENDIX 2 TO THE STANDARD CONTRACTUAL CLAUSES
Description of the technical and organisational security measures implemented by the data importer in accordance with Clauses 4(c) and 5(c) (or document/legislation attached):
The Data Importer also has mechanisms or processes in place to provide for:
- the pseudonymisation or encryption of data;
- the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
- the ability to restore the availability and access to data in a timely manner in the event of a physical or technical incident;
- a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.
The following specific measures are also in place, based on context:
- Physical access control. Measures to prevent unauthorized persons from gaining access to data processing systems for processing or using data:
a) Definition of persons who are granted physical access;
b) Implementation of policy for external individuals;
c) Alarm device or security service outside service times;
d) Implementation of measures for on-premise security (e.g. intruder alert/notification).
- Logical access control. Measures to prevent that unauthorized persons use data processing equipment and –procedures:
a) Definition of persons who may access data processing equipment;
b) Implementation of policy for external individuals;
c) Password protection of personal computers.
- Data access control. Measures that ensure that persons entitled to use a data Processing system gain access only to such data as they are entitled to accessing in accordance with their access rights:
a) Allocation of access rights using the principle of least privilege and specific to required functions;
b) Implementation of partial access rights for respective data and functions;
c) Requirement of identification vis-à-vis the data processing system (e.g. via ID and authentication);
d) Implementation of policy on access- and user-roles;
e) Evaluation of protocols in case of damaging incidents.
- Data Transfer control. Measures to ensure that personal data cannot be read, copied, modified or deleted without authorization during electronic transmission, transport or storage on storage media, and that the target entities for any transfer of personal data by means of data transmission facilities can be established and verified.
a) Encryption in transit using TLS;
b) Encryption of data at rest.
- Entry control. Measures to ensure that it is possible to check and ascertain whether personal data have been entered into, altered or removed from data processing systems and if so, by whom:
a) Logging of data entry.
- Control of instructions. Measures to ensure that personal data processed on behalf of others are processed strictly in compliance with data exporter’s instructions:
a) Documentation of distinction of competences and obligations between data exporter and data importer;
b) Formal assignment process;
c) Control of work results.
- Availability control. Measures to ensure that personal data is protected against accidental destruction or loss:
a) Realization of a regular backup schedule;
b) Control of condition and respective labeling of data carriers for data backup purposes;
c) Safe storage of data backups in fire- and water-protected security cabinets;
d) Implementation and regular control of emergency power systems and overvoltage protection systems;
e) Implementation of an emergency plan;
f) Protocol on the initiation of crisis- and/or emergency management.
- Control of data separation. Measures to ensure that data collected for different purposes can be processed separately:
a) Logical separation of data of each of data importer’s clients.