Data Processing Agreement
Effective Date: 29/03/2022
Version 2024.1
DATA PROCESSING AGREEMENT
Between
This Data Processing Agreement (“Agreement”) is entered into by and between THIRTY-ONE CIRCLES LTD incorporated and registered in England and Wales with company number 13999453 whose registered office is at The Gallery, 14 Upland Road, London, England, SE22 9EE (“Thirty-One Circles” or “Supplier” or the “Data Processor”) and the entity or person placing an Order for or accessing the Services (“Company” or the “Data Controller”)
(hereinafter collectively referred to as the “Parties”).
WHEREAS
ANNEX 2
SECURITY MEASURES
Based on the activities supplied, as applicable to the purpose of the Agreement, the Data Processor and any authorised Sub-Data Processors, shall respect the following security measures.
- the Supplier and the Company entered into on an Agreement (hereinafter: the “Agreement”) concerning the provision, by the Supplier, of the service(s) relating to a Thirty-One Circles platform subscription (hereinafter: the “Services”);
- the provision of the aforementioned services by the Supplier involves the processing by the latter, on behalf of the Company, of data subjects’ Personal Data, of which the Company is the Data Controller (hereinafter: “Personal Data”), better described in Annex 1: Scope of the data processing.
- the Supplier declares that it has the relevant experience, technical skills and resources which enable it to implement adequate technical and organisational measures to ensure compliance with applicable legislation on the protection of personal data and the protection of the interested parties/data subjects;
- with the present Data Processing Agreement, the Parties intend to regulate the processing and protection of Personal Data in compliance with applicable laws and regulations, as applicable in the United Kingdom (“UK”) including EU Regulation 2016/679 of 27 April 2016, on the protection of persons with regard to the processing of personal data – the EU GDPR as it forms part of UK law by virtue of the European Union (Withdrawal) Act 2018, as modified by the Data Protection, Privacy and Electronic Communications (Amendments etc.) (EU Exit) Regulations 2019 (SI 2019/419) (“UK GDPR”); (iii) the Data Protection Act 2018; (iv) the Privacy and Electronic Communications (EC Directive) Regulations 2003 (SI 2003/2426); (v) all other applicable data protection and privacy legislation in force in the UK and European Economic Area (“Data Protection Legislation”).;
- hereinafter, the Company and the Supplier are also qualified as Data Controller and Data Processor respectively;
- for the purposes of this Data Processing Agreement, the terms “Data Controller”, “Data Processor”, “data subject / interested party”, “data processing / processing of personal data” and “Supervisory Authority” shall have the meaning attributed to them, respectively, by the UK GDPR.
- subject
- scope of the data processing
- General obligations of the Data Processor
- shall not be disclosed, even in part, to third parties, without the Company’s written consent;
- may not be transferred, for any reason whatsoever, outside the UK, without the Company’s prior written consent. For all such transfers, the Data Processor will apply Company’s instructions.
- security-related obligations
- persons authorised to process the data
- Personal Data Breaches (so-called “Data Breach”)
- Impact assessment (so-called “Data Protection Impact Assessment”)
- Relations with the Authorities
- Requests from data subjects/interested parties
- additional obligations
- collaborate, if requested by the Company, with other Data Processors, in order to harmonise and coordinate the end-to-end data processing process;
- promptly inform the Data Controller of any issues that are relevant for legal purposes and in particular, by way of example and without limitation, in cases where it becomes aware, in any way, that applicable legislation on personal data protection has been breached, or that the data processing presents specific risks to the rights, the fundamental freedoms and/or the dignity of the data subject, and if, in its opinion, an instruction violates national or UK legislation on data protection.
- Sub-Data Processors
- Responsibility
- return and deletion of personal data
- duration
- data protection officer (so-called “DPO”)
- GOVERNING LAW
- Online identifiers (User-ID and equivalent),
- Behavioral Data linked to the identifiers
- Matching Data – (email, hashed email)
Sub-Processor | Purpose | Types of Personal Data | Location |
Amazon Web Services | Analysis to create audience segments and load these to the Customer’s Onwards Platforms | Online identifiers, Behavioral Data, Matching Data | UK (London) |
Google Cloud Platform | Analysis to create audience segments and load these to the Customer’s Onwards Platforms | Online identifiers, Behavioral Data, Matching Data | UK (London) |
- Asset management: where the service offered by the Supplier provides for the management of IT assets, an inventory of the assets used for the data processing and a list of the types of data processed shall be defined and maintained.
- At the end of the working relationship and in the case of the reuse, disposal or sale of electronic devices or storage media to third parties, procedures for the secure deletion and destruction of data processed on behalf of the Company shall be provided for, in agreement with the Data Controller (e.g. demagnetisation or physical destruction). Secure disposal modes shall also be adopted for paper documentation.
- Physical security: adequate security measures shall be adopted where activities conducted on behalf of the Company are carried out at the Supplier’s premises.
- Logical access control: the processing of unauthorised information shall be prevented through the definition of correct user access methods. If the Supplier requires access to the Company’s resources, within the context of the activities it performs, it shall comply with the authorisation procedures defined by the Company in question. If the Supplier has the power to autonomously manage users, within the scope of the service offered:
- Access to the information shall be restricted through the adoption of appropriate technical and organisational controls.
- Access to the information and resources shall be restricted according to the principles of: “need to know[1]”; “least privilege[2]”; “separation of duties[3]”, where possible.
- A user identification and authentication process must be implemented to access data stored in the various systems and the relevant authorisations must be configured in compliance with the principles of the previous point.
- System administrator users with special privileges must be managed with particular care and in compliance with applicable legal provisions.
- A user management process that includes all stages of the credential life cycle, from creation to deactivation, must be defined and documented.
- Policies for managing passwords, which provide mechanisms for changing passwords and ensuring the complexity thereof must be adopted. Passwords must be stored and transmitted securely.
- Infrastructure systems must be appropriately protected and segregated, whenever possible, so as to minimise the possibility of unauthorised logical access. Particular attention shall be given to systems that have connections with the outside world.
- Operational management of systems, networks and telecommunications: within the context of information systems management carried out on behalf of the Company, where provided under the Agreement, an adequate level of information system security shall be ensured during the operating phase, in order to adequately protect the data processed.
- Appropriate measures shall be taken to ensure the prevention and detection of potentially harmful software (e.g. viruses, malware, etc.).
- Plans and procedures must be defined for managing operating system, software and data backups, where such activities are planned.
- The constant monitoring of patches released for the systems used must be guaranteed; moreover, a process must be defined for evaluating and, if deemed necessary, applying the new security patches.
- The network must be appropriately designed to ensure that data is protected. IT systems used and maintained within the scope of the activities carried out for the Company must be protected at perimeter level, from any unauthorised access.
- Development, maintenance and acquisition of IT systems: IT systems (applications, operating systems, middleware, etc.), must be developed or acquired and maintained over time, in such a way as to preserve the confidentiality, integrity and availability of data.
- Where the services provided by the Supplier concern design and development activities, security requirements shall be appropriately considered, implemented and verified, including in accordance with the principles of Privacy by design/by default.
- Security measures adopted in the case of subcontracting: If authorised by the Company, the subcontracting of activities must be conducted ensuring that the security requirements that govern the relationships are correctly defined and respected.
- Security incident management: In the event of an incident, the prompt detection, communication to the Company and, if applicable, the management of any damage or impact, shall be guaranteed in the shortest time possible, including in agreement with what has been defined in the Data Breach Notification process.