This Data Protection Addendum (including its Exhibits) (“Addendum”) forms part of and is subject to the terms and conditions of the Hosted Services Agreement (the “Agreement”) by and between UpGuard, Inc. (“Company”) and the counterparty to the Agreement (“Customer”), unless an agreement mutually acceptable to both parties has been executed by the authorized representatives of each party.
EXHIBIT A TO THE DATA PROTECTION ADDENDUM
This Exhibit A forms part of the Addendum and supplements the Standard Contractual Clauses. Capitalized terms not defined in this Exhibit A have the meaning set forth in the Addendum.
The parties agree that the following terms shall supplement the Standard Contractual Clauses:
A. List of Parties
Data Exporter: Customer.
Address: As set forth in the Notices section of the Agreement.
Contact person’s name, position, and contact details: As set forth in the Notices section of the Agreement.
Activities relevant to the data transferred under these Clauses: As set forth in the Addendum.
Role: Controller.
Data Importer: Company.
Address: As set forth in the Notices section of the Agreement.
Contact person’s name, position, and contact details: As set forth in the Notices section of the Agreement.
Activities relevant to the data transferred under these Clauses: As set forth in the Addendum.
Role: Controller.
B. Description of the Transfer:
Categories of data subjects whose personal data is transferred: Data subjects whose Personal Data will be Processed pursuant to the Agreement.
Categories of personal data transferred: Customer Personal Data that is Processed pursuant to the Agreement, including user log-in information, contact information of Customer personnel, Customer users, and users of Customer vendors (e.g., name, title, email address, etc).
Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures: To the parties’ knowledge, no sensitive data is transferred.
The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis): Personal data is transferred in accordance with the standard functionality of the technology used by the parties, or as otherwise agreed upon by the parties.Nature of the processing: The nature of the Processing of Customer Personal Data by Service Provider is the performance of the Services.
Purpose(s) of the data transfer and further processing: The nature of the Processing of Customer Personal Data by Service Provider is the performance of the Services.
The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period: Data importer will retain personal data in accordance with its privacy policy.
E. Competent Supervisory Authority: The supervisory authority mandated by Clause 13. If no supervisory authority is mandated by Clause 13, then the Irish Data Protection Commission (DPC), and if this is not possible, then as otherwise agreed by the parties consistent with the conditions set forth in Clause 13.
F. Additional Data Transfer Impact Assessment Questions for Data Importer:
Will data importer process any personal data that is transferred to the United States under the Clauses about a non-United States person that could reasonably be considered “foreign intelligence information” as defined by 50 U.S.C. § 1801(e)?
Not to data importer’s knowledge.
Is data importer subject to any laws in a country outside of the European Economic Area, Switzerland, and/or the United Kingdom where personal data is stored or accessed from that would interfere with data importer fulfilling its obligations under the Clauses? For example, FISA Section 702. If yes, please list these laws:
As of the effective date of the Addendum, no court has found data importer to be eligible to receive process issued under the laws contemplated by this question, including FISA Section 702, and no such court action is pending.
Has data importer ever received a request from public authorities for information pursuant to the laws contemplated by the question above? If yes, please explain:
No.
Has data importer ever received a request from public authorities for personal data of individuals located in European Economic Area, Switzerland, and/or the United Kingdom? If yes, please explain:
G. Data Transfer Impact Assessment Outcome: Taking into account the information and obligations set forth in the Addendum and, as may be the case for a party, such party’s independent research, to the parties’ knowledge, the personal data originating in the European Economic Area, Switzerland, and/or the United Kingdom that is transferred pursuant to the Clauses to a country that has not been found to provide an adequate level of protection under applicable data protection laws is afforded a level of protection that is essentially equivalent to that guaranteed by applicable data protection laws.
Data importer shall implement and maintain technical and organizational measures designed to protect personal data in accordance with Exhibit B to the Addendum.
The UK Information Commissioner’s Office International Data Transfer Addendum to the EU Commission Standard Contractual Clauses (“UK Addendum”) is incorporated herein by reference.
Table 1: The start date in Table 1 is the effective date of the Addendum. All other information required by Table 1 is set forth in Annex I, Section A of the Clauses.
Table 2: The UK Addendum forms part of the version of the Approved EU SCCs which this UK Addendum is appended to including the Appendix Information, effective as of the effective date of the Addendum.
Table 3: The information required by Table 3 is set forth in Annex I and II to the Clauses.
Table 4: The parties agree that Importer may end the UK Addendum as set out in Section 19.
EXHIBIT B TO THE DATA PROTECTION ADDENDUM
Security Requirements
This Exhibit B forms part of the Addendum. Capitalized terms not defined in this Exhibit B have the meaning set forth in the Addendum.
Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Company shall endeavor to implement technical and organizational measures (including as described in Art. 32. of GDPR) designed to maintain a level of security appropriate to the risk to Customer Data, including inter alia, as appropriate:
- the ability to protect the ongoing confidentiality, integrity, availability and resilience of processing systems and Services that process Customer Data;
- the ability to restore the availability and access to Customer Data in a timely manner in the event of a physical or technical incident;
- a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing of Customer Data.
UpGuard Information Technology Architectures
UpGuard’s technology can be considered as two distinct arenas:
- Enterprise technology systems - such as ERP, collaboration and communication, document management, etc.
- Product systems - the technology components that directly support the UpGuard SaaS product and services.
The Enterprise systems technology stack is comprised of:
- SaaS applications and API-enabled integrations
- UpGuard-issued end-user devices
- Network physical appliances for support of office networks and the enterprise VPN service
The Product systems technology stack is comprised of:
- Infrastructure as a Service(“IaaS”) workloads deployed within cloud-native network and security infrastructures
- SaaS applications
The security measures explained in this document will be explicit for each of these arenas where differences exist, otherwise answers will apply generally to both arenas.
Customer Data is processed and stored in Google Cloud Platform (“GCP”) data centers in the US. File storage may be stored in other GCP regions in place of US cloud data center locations on customer request. A summary description of the product system architecture and the workloads that support the product can be provided on request.
A segregated guest wireless internet service is available to visitors.
Access logs for the product systems are retained for one year.