DATA PROCESSING AGREEMENT

1 INTRODUCTION

  • This Data Processing agreement (”DPA”) is an inseparable part of the agreement signed between the Provider and the Company concerning the products and services offered by the Provider (”Agreement”). This DPA applies when the Provider Processes Personal Data in providing the Services under the Agreement to the Company and its Group Companies. If the Provider Processes Personal Data on behalf of the Company’s Group Company, the Company is entering this DPA on behalf of itself and such Group Company to the extent required under the Data Protection Legislation.
  • If the terms concerning the Processing of Personal Data of the DPA and the Agreement are in conflict, the terms of this DPA shall prevail.

2 DEFINITIONS

  • The following definitions shall be applied to this DPA. Any terms used but not defined herein shall be given the meaning allocated to them in the Data Protection Legislation.
  • Allshares Group” means any entity within the group of companies having Allshares Oy as the ultimate parent company. 
  • Data Protection Legislation” means all applicable legislation and regulations, including regulations issued by relevant supervisory authorities, protecting the fundamental rights and freedoms of individuals and, in particular, their right to privacy with respect to the processing of personal data that from time to time apply to the Controller and the Provider, including without limitation the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (the “GDPR”);
  • Controller” means the one that determines the purposes and means of the Processing of Personal Data.
  • Data Breach” means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Personal Data transmitted, stored or otherwise Processed.
  • Personal Data” means any information relating to an identified or identifiable natural person, hereinafter ”Data Subject”; an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
  • Processing” means any operation or set of operation which is performed on Personal Data or sets of Personal Data using automated means or manually, such as data collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.
  • Processor” means the legal entity within Allshares Group indicated in the Agreement, who will Process Personal Data on behalf of the Controller based on the Agreement.
  • Sub-processor” means a subcontractor or another Processor of Personal Data engaged by the Processor for carrying out specific processing activities on behalf of the Controller.

3 GENERAL RIGHTS AND OBLIGATIONS OF THE PARTIES

  • The Provider shall Process the Personal Data of the Company on behalf of, and per instructions issued by the Company, on the grounds of the Agreement. The Company shall be the Controller and the Provider shall be the Processor of the Personal Data Processed when the Provider provides the Services to the Company under the Agreement. The Parties undertake to Process Personal Data in compliance with the Data Protection Legislation.
  • The Company, acting as a Controller, is responsible for ensuring that the Processing of Personal Data is undertaken in compliance with Data Protection Legislation.  Information regarding e.g. the purpose and nature of the Processing, types of Personal Data Processed and categories of Data Subjects whose Personal Data is Processed when providing the Services are listed in the Processing specification form (Annex 1 of this DPA).
  • The Provider is entitled to Process the Personal Data of the Company only on the grounds of the Agreement, this DPA and according to the written instructions of the Company and only to the extent and in a manner it is necessary in order to provide the Services. The Provider shall immediately inform the Company if, in its opinion, an instruction of the Company infringes Data Protection Legislation and in such event, the Provider may immediately decline and stop the application of such instruction.
  • The Provider may collect anonymous and statistical data of the use of the Services pursuant to the Agreement, that does not specify the Company nor Data Subjects and use it for analyzing and developing Allshares Group’s services. The Provider has also the right to anonymize the Personal Data Processed by it under this DPA and use that anonymized data within the Allshares Group a) as part of benchmark material used in the production of similar products and/or services, and/or b) in test environment of IT systems, provided that such anonymization is irreversible and renders the Data Subjects no longer identifiable. Such anonymized information is not Personal Data and is not subject to Data Protection Legislation.

4 SUB-PROCESSORS

  • The Provider is entitled to engage Sub-processors for the Processing the Company’s Personal Data and is hereby given a general authorization by the Company to do so. 
  • With respect to each Sub-processor, the Provider ensures that the Sub-processor is capable of providing the level of protection for the Personal Data required under this DPA, and the arrangement between the Provider and the Sub-processor is governed by a written contract including terms which offer at least the same level of protection for the Personal Data as those set out in this DPA and impose materially the same obligations on the Sub-processor as this DPA. 
  • The Provider remains fully liable to the Company for the performance of the Sub-processor’s obligations and for any acts or omissions of the Sub-processor in relation to the Processing of Personal Data.
  • The currently authorized and engaged Sub-processors are listed in Allshares’ Sub-processor list (https://www.allshares.com/allshares-subprocessors). The Provider shall inform the Company in advance of any changes concerning the addition or replacement of Sub-processors with thirty (30) days prior written notice by e-mail to the contact person of the Company. The Company may object to such engagement of a Sub-processor by written notice to the Provider within twenty (20) days of the Company’s receipt of the notice from the Provider. The Provider may satisfy the objection by not using the Sub-processor to Process the Company’s Personal Data, taking corrective steps requested by the Company, or ceasing to provide the part of the Services that involve the Sub-processor, Subject to a mutual agreement of the Parties to adjust the fees for the Services considering their reduced scope. If none of these options are reasonably available, either Party may terminate the Agreement for the Services that cannot be reasonably provided without the Sub-processor. In the absence of any written objection from the Company, the Company shall be deemed to have consented to such change.

5 PROVIDER’S OBLIGATION TO PROVIDE ASSISTANCE

  • The Provider shall immediately forward all requests to inspect, rectify, erase or object to the Processing of Personal Data or other requests received from the Data Subjects under GDPR to the Company. If requested by the Company, the Provider shall support the Company in fulfilling the requests of the Data Subjects.
  • The Provider is obligated, taking into account the nature of the Processing of Personal Data and the information available to the Provider, to assist the Company in ensuring that the Company complies with Articles 32–36 of the GDPR, including assisting the Company in data protection impact assessments and prior consultations related to the Services. The Provider is obligated to assist the Company only in relation to Processing of the Company’s Personal Data by the Provider. The Provider has the right to invoice the Company for such assistance if the Company’s requests are exceptionally extensive or frequently repeated.
  • The Provider shall forward all inquiries made by the data protection authorities or other authorities directly to the Company and await further guidance from the Company. Unless otherwise agreed, the Provider is not authorized to represent the Company or act on behalf of the Company in relation to any authorities.

6 TRANSFERS OF PERSONAL DATA OUTSIDE THE EU/EEA

7 AUDIT RIGHTS

8 TECHNICAL AND ORGANIZATIONAL MEASURES

9 DATA BREACHES

10 LIABILITY

11 OTHER PROVISIONS

12 ANNEXES

ANNEX 2: TECHNICAL AND ORGANIZATIONAL SECURITY MEASURES

The purpose of this annex is to describe the principles of the technical and organizational data security measures that the Provider has implemented, in accordance with the GDPR. 

The Provider implements appropriate technical and organizational data security measures which are designed to meet the data protection principles in an effective manner and ensures that appropriate safeguards are integrated into the personal data processing in order to meet the requirements of the GDPR and to protect the rights of data subjects as described below.

1 DATA PROTECTION RISK ASSESSMENT

The Provider executes a risk assessment for each product or service. The Provider executes the data protection risk assessment in order to decide which data security measures are implemented. The aim is to define the appropriate level of data security measures for each product or service. In all cases, the Provider has implemented at least the security measures described in chapters below.

2 SECURITY MEASURES

The Provider maintains security and privacy policies. The policies comply with applicable rules on data protection and information security. Said policies are subject to regular internal review process and may be reviewed by third parties, in accordance with applicable laws and regulations.

The published ISO2700 standards related to information security, cybersecurity and privacy protection are used internally as a guiding framework, however, the Provider is not ISO certified. The cloud hosting service providers are ISO certified and undergo regular independent third-party audits for ISO compliance.

3 SECURITY OF PERSONAL DATA

The Provider is implementing the following measures based on article 32 of the General Data Protection Regulation (Security of processing).

3.1 Pseudonymizing and Encryption of Personal Data

Provider is utilizing encryption and/or pseudonymizing in its operations to mitigate data protection risks where appropriate. Encryption and pseudonymizing techniques may vary between services upon the service requirements and data protection risk assessment. Details of the used measures are available upon request by adequate authority.

3.2 Ability to Ensure the Ongoing Confidentiality, Integrity, Availability and Resilience of Processing Systems and Services

Protection of personal data requires implementation of multiple security controls. Operational processes follow good industry practice and help to secure quality of service and safeguards personal data processing.

The Provider has a centralized system to manage administrative access to customer environments. To access a customer system, the employee must have a valid reason and access is only approved by utilizing a jointly agreed process with the customer. At minimum all access to customer environments requires an encrypted tunnel within Provider’s network. Connections to customer environments are logged to provide full audit trail on administrative operations in customer environments. All remote access to the Provider’s services requires an encrypted connection and other possible measures (e.g. MFA, strong authentication, or IP-verification) as required by the data protection risk assessment.

Unauthorized persons are prevented from gaining physical access to data processing facilities. Datacenters are designed, built and operated in a way that strictly controls physical access to the areas where the personal data is stored. Datacenter service providers conduct periodical security reviews of facilities. Personal data is protected against accidental and unlawful destruction utilizing physical and environmental controls.

The Provider controls, monitors and audits all administrative connections, third party access and file transfers which are deployed within the Provider’s infrastructure.

The Provider executes a framework for planning, executing and controlling customer business related operations. The organizational structure assigns roles and responsibilities to provide for adequate staffing and efficiency of operative capabilities. The Provider management establishes authority and appropriate lines of reporting for key personnel. As a part of the hiring processes education verification and background checks are conducted based on the employee's position and level of access to the Provider’s processing facilities and systems.The Provider maintains and controls the execution of the Provider’s security policy, provides security training to employees, and performs application security reviews. These reviews assess the confidentiality, integrity, and availability of data, as well as conformance to the Provider information security policy.

3.3 Ability to Restore the Availability and Access to Personal Data in a Timely Manner in the Event of a Physical or Technical Incident

To restore the availability and access to personal data in a timely manner in the event of a physical or technical incident, the Provider has backup and business continuity management processes and strategies which ensure rapid restoration of business-critical systems as and when necessary.

The Provider has defined continuity and disaster recovery plans for the Provider infrastructure supporting service delivery to customers. These plans are regularly updated and tested and are subject to auditing.

3.4 A Process for Regularly Testing, Assessing and Evaluating the Effectiveness of Technical and Organizational Measures for Ensuring the Security of the Process

The Provider emergency processes, plans and systems are regularly tested to assess and evaluate the effectiveness of technical and organizational measures for ensuring the security of personal data processing. Customer specific disaster recovery testing is agreed separately.

The Provider conducts internal security testing and vulnerability scanning.