Syncron Data Processing Addendum

The below Data Processing Addendum (DPA) constitutes an integral part of customer Master Subscription Agreement and is hereby incorporated to it by reference, unless a customer has signed a separate written data processing agreement with Syncron.
Notably, the DPA includes the list of authorized subprocessors and EU Standard Contractual Clauses.

Although the DPA is incorporated to your Master Subscription Agreement and valid without the necessity to put your written signatures in the body of the DPA, your company may require signing a written DPA for evidence or internal compliance purposes. To support our Customers’ needs, Syncron provides a pre-signed version of the DPA. If you intend to execute it for the above reasons, please (i) download a pre-signed copy of the DPA here, (ii) countersign it where instructed, and (iii) send back a countersigned copy to Syncron by using the contact form here.

In case of any questions, please use the contact form here.

WHEREAS

 

This Data Processing Addendum (“DPA”) forms part of the Master Subscription Agreement or other written or electronic agreement between Syncron and Customer for the purchase of cloud Services (including associated offline or mobile components) from Syncron (the “Agreement”), identified either as Services or otherwise in the applicable agreement, and hereinafter defined as “Services”. This DPA is intended to reflect the parties’ agreement regarding the processing of personal data that Customer or its Users may, from time to time, transfer to Syncron.

The Customer entity that is a party to the Agreement should be a party to this DPA. The Syncron entity that is a party to the Agreement should be a party to this DPA.

This DPA is hereby incorporated to the Master Subscription Agreement and constitutes its integral part, without the necessity for exchanging written signatures. Either Party’s (Customer and Syncron) acceptance of the Order Form/Master Subscription Agreement (or other underlying agreement incorporating the DPA) shall constitute such Party’s agreement to this DPA, its Schedules and Appendices.

In relation to signing of the Agreement, Customer enters into this DPA on behalf of itself and, to the extent required under applicable Data Protection Laws and Regulations, in the name and on behalf of its Authorized Affiliates, if and to the extent Syncron processes Personal Data for which such Authorized Affiliates qualify as the Controller. For the purposes of this DPA only, and except where indicated otherwise, the term “Customer” shall include Customer and Authorized Affiliates.

All capitalized terms not defined herein shall have the meaning set forth in the Agreement.

In the course of providing the Services to Customer pursuant to the Agreement, Syncron may Process Personal Data on behalf of Customer and the Parties agree to comply with the following provisions with respect to any Personal Data, each acting reasonably and in good faith.

This DPA shall not replace any comparable or additional rights relating to Processing of Customer Data contained in the Agreement.

 

  1. DEFINITIONS

Affiliate” means contracting party’s (i.e., either Syncron or Customer) affiliated company that is: (a) controlled, directly or indirectly, by contracting party; (b) controls, directly or indirectly, the contracting party; or (c) is under common control with the contracting party, whereby “control” means the possession by virtue of ownership, directly or indirectly, of more than fifty percent (50%) of the shares of voting rights.

Authorized Affiliate” means any of Customer’s Affiliate(s) that (a) is permitted to use the Services pursuant to the Agreement between Customer and Syncron, but has not signed its own Agreement or purchase order with Syncron and is not a “Customer” as defined under the Agreement, and (b) is subject to the data protection laws and regulations of the European Union, the European Economic Area and/or their member states and/or the United Kingdom.

Controller” means the entity that determines the purposes and means of the Processing of Personal Data. “Customer” as defined in the Agreement.

Customer Data” means what is defined in the Agreement as “Customer Data”, which may include Personal Data.

Data Protection Laws and Regulations” means the Directive, as transposed into domestic legislation of each member state of the European Union and as amended, replaced or superseded from time to time, including by the GDPR and laws implementing or supplementing the GDPR and, to the extent applicable, the data protection or privacy laws of any other country including laws and regulations of the European Economic Area and their member states and the United Kingdom, applicable to the Processing of Personal Data under the Agreement.

Data Subject” means the identified or identifiable person to whom Personal Data relates.

Directive” means Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995, as amended, on the protection of individuals with regard to the Processing of Personal Data and on the free movement of such data.

GDPR” means Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27, 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).

Services” as defined in the Agreement.

 

Standard Contractual Clauses” means the standard contractual clauses (processors) annexed to EU Commission Decision 2010/87/EU of February 5, 2010 for the transfer of personal data to processors established in third countries under the Directive; or any document that replaces these clauses; the Standard Contractual Clauses are deemed to be amended from time to time to reflect any change made in accordance with Data Protection Laws and Regulations as applicable by (i) the EU Commission to or of the equivalent contractual clauses approved by the EU Commission under EU Directive 95/46/EC or the GDPR (in the case of the Data Protection Laws and Regulations of the European Union or a member state); or (ii) by an equivalent competent authority to or of any equivalent contractual clauses approved by it or by another competent authority under another jurisdiction.

Personal Data” means any information relating to (i) an identified or identifiable natural person and, (ii) an identified or identifiable legal entity (where such information is protected similarly as personal data or personally identifiable information under applicable Data Protection Laws and Regulations); categories of Customer’s Personal Data, which may be processed by Syncron, are specified in sec. 3.1. below.

Processing” means any operation or set of operations that are performed upon Personal Data, whether or not by automatic means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.

Processor” means the entity that Processes Personal Data on behalf of the Controller.

Syncron” means the Syncron entity that is a party to this DPA, being Syncron AB, a company registered in Sweden, Syncron UK Ltd, a company registered in England and Wales, Syncron Germany GmbH, a company registered in Germany, Syncron Services India Private Limited, a company registered in Karnataka, India; Syncron Italy s. a r.l., a company registered in Italy, Syncron Poland sp. z o.o., a company registered in Poland, Syncron Japan Corp., a company incorporated in Japan, or Syncron Inc., a company incorporated in Illinois, as applicable.

Third-Party Sub-processor” means a third-party subcontractor, other than a Syncron Affiliate, engaged by Syncron that, as part of the subcontractor’s role of delivering the Services, may Process Personal Data of the Customer.

Supervisory Authority” means an independent public authority that is established by an EU Member State pursuant to the GDPR.

 

  1. CONTROLLER AND PROCESSOR OF PERSONAL DATA AND PURPOSE OF THE PERSONAL DATA PROCESSING

 

  • Customer will at all times remain the Controller for the purposes of provision of Services by Syncron. Customer is responsible for compliance with its obligations as a Controller under Data Protection Laws and Regulations, in particular for justification of any transmission of Personal Data to Syncron (including providing any required notices and obtaining any required consents and authorizations), and for its decisions and actions concerning the Processing and use of the Personal Data. Customer shall, in its use of the Services, Process Personal Data in accordance with the requirements of Data Protection Laws and Regulations. Customer may provide instructions in writing to Syncron with regard to Processing of Personal Data. Syncron will comply with all such instructions without additional charge to the extent necessary for Syncron to comply with its obligations as a Processor in the performance of the Services. For the avoidance of doubt, Customer’s instructions for the Processing of Personal Data shall comply with Data Protection Laws and Regulations. Customer shall have sole responsibility for the accuracy, quality, and legality of Personal Data and the means by which Customer acquired Personal Data. Customer, on behalf of itself and of any Authorized Affiliate, instructs Syncron (and authorizes Syncron to instruct each Third-Party Sub-processor) to process Personal Data and transfer Personal Data to any country or territory as reasonably necessary for the provision of the Services set forth in the Agreement and warrants and represents that it is and will at all relevant times remain duly and effectively authorized to give the instruction set out above on behalf of each Authorized
  • For the purposes of provision of the Services set forth in the Agreement, Syncron is a Processor, and Syncron or Syncron Affiliates may engage Third-Party Sub-processors in accordance with this DPA. Syncron will Process Personal Data as necessary for the provision of the Services set forth in the Agreement, and will not otherwise (i) Process or use Personal Data for purposes other than those set forth in the Agreement or as instructed by Customer in good faith, or (ii) disclose such Personal Data to third parties other than Syncron Affiliates or Third- Party Sub-processors for the aforementioned purposes or as required as required by Data Protection Laws and Regulations.
  • Syncron shall treat Personal Data as confidential information and shall only Process Personal Data on behalf of and in accordance with Customer’s documented instructions for the following purposes: (i) Processing in accordance with the DPA and the Agreement to fulfil Syncron’s obligations arising therefrom, in particular to ensure secure access to and usage of the Services by authorized Users and to provide support; (ii) Processing initiated by Users in their use of the Services; and (iii) Processing to comply with other documented reasonable instructions provided by Customer (e.g., via email) where such instructions are consistent with the terms of the Agreement.
  • Syncron will comply with applicable Data Protection Laws and Regulations to the extent that such laws by their terms impose obligations directly upon Syncron as a Processor in connection with the Services provided to the Customer.
  • With effect from May 25, 2018, Syncron will Process Personal Data in accordance with the GDPR requirements directly applicable to Syncron’s provision of its With effect from May 25, 2018, upon Customer’s request, Syncron shall provide Customer with reasonable cooperation and assistance needed to fulfil Customer’s obligations and tasks under the GDPR to carry out a data protection impact assessment related to Customer’s use of the Services, to the extent Customer does not otherwise have access to the relevant information, and to the extent such information is available to Syncron.
  • The parties acknowledge and agree that, by executing the Agreement, the Customer enters into the DPA on behalf of itself and, as applicable, in the name and on behalf of its Authorized Affiliates, thereby establishing a separate DPA between Syncron and each such Authorized Affiliate subject to the provisions of the Agreement and this DPA. Customer warrants that Customer’s entry into this DPA as an agent for each Authorized Affiliate will have been duly authorized by each Authorized Affiliate and that each Authorized Affiliate agrees to be bound by the obligations under this DPA and, to the extent applicable, the Agreement. For the avoidance of doubt, an Authorized Affiliate is not and does not become a party to the Agreement and will be only deemed as a party to the All access to and use of the Services and its content by Authorized Affiliates must comply with the terms and conditions of the Agreement and any violation of the terms and conditions of the Agreement by an Authorized Affiliate shall be deemed a violation by Customer.

 

  1. CATEGORIES OF PERSONAL DATA AND DATA SUBJECTS

 

  • In order to execute the Agreement, and in particular to perform the Services, Customer authorizes and requests that Syncron Processes the following:

 

Categories of Personal Data: Personal Data may include, among other information, personal contact information such as name, company address, telephone or mobile number, fax number, email address; employment details including employer’s name, job title, identification numbers; user ID, location data; connection data; device specific information, IP addresses, and online behavior data (as applicable).

 

Categories of Data Subjects: Data subjects may include administrators and users of Services, such as employees, contractors of Customer and its Authorized Affiliates; collaborators, partners, dealers, suppliers and their respective employees and contractors, and other users of the Customer (as applicable).

 

  • Syncron will Process Personal Data for the duration of the Agreement, unless otherwise agreed between the Parties.

 

  1. RIGHTS OF DATASUBJECTS

As further set out in Chapter III of the GDPR, a Data Subject has certain rights (e.g. information and access to personal data, rectification and erasure, restriction of processing, data portability, right to object and automated individual decision-making). The Controller is obliged to facilitate the exercise of these data subject rights under articles 15 to 22 of the GDPR. The Processor shall assist the Controller by appropriate technical and organizational measures, for the fulfilment of the controller’s obligation to respond to requests for exercising the data subject’s rights laid down in Chapter III of the GDPR. In consequence, Syncron shall, to the extent legally permitted, notify Customer if Syncron or any Third-Party Sub-processor receives a request from a Data Subject to exercise the Data Subject’s right of access, right to rectification, restriction of Processing, erasure (“right to be forgotten”), data portability, object to the Processing, etc. (“Request”). Taking into account the nature of the Processing, Syncron shall assist Customer, insofar as this is possible, for the fulfilment of Customer’s obligation to respond to a Request under Data Protection Laws and Regulations. Syncron shall not respond to such request except on the documented instructions of the Customer or as required by Data Protection Laws and Regulations (Syncron shall to the extent permitted by Data Protection Laws and Regulations inform Customer of that legal requirement before responding to the request).

 

  1. PERSONNEL
    • Syncron shall ensure that its personnel engaged in the Processing of Personal Data are informed of the confidential nature of the Personal Data, have received appropriate training on their responsibilities and have executed confidentiality undertakings. Syncron shall ensure that such confidentiality obligations survive the termination of the personnel
    • Syncron shall take commercially reasonable steps to ensure the reliability of any Syncron personnel engaged in the Processing of Personal
    • Syncron shall ensure that Syncron’s access to Personal Data is limited to those personnel performing services in accordance with the
    • Syncron and its Affiliates have appointed a data protection officer. The appointed person may be reached here.

 

  1. SYNCRON AFFILIATES AND THIRD-PARTY SUB-PROCESSORS

 

  • Some or all of Syncron’s obligations under the Agreement may be performed by Syncron’s Affiliates and Third- Party Sub-processors. Syncron maintains a list of Syncron’s Affiliates and Third-Party Sub-processors that may Process Personal Data, which is part of Syncron Privacy Policy available here. Customer agrees to the processing of Personal Data by sub-processors presented in Syncron Privacy Policy as of the date of entering into the underlying master subscription agreement.
  • Customer acknowledges and authorizes Syncron to (a) retain Syncron’s Affiliates as sub-processors; and to (b) appoint (and permit each Syncron Affiliate and any Third-Party Sub-processor to appoint) Third-Party Sub- processors in connection with the provision of the Services (in accordance with this DPA).
  • The Syncron Affiliates and Third-Party Sub-processors are required to abide by substantially the same obligations as Syncron under this DPA as applicable to their Processing of Personal Data. Syncron or a Syncron Affiliate should enter into a written agreement with each Third-Party Sub-processor containing data protection obligations, which offer at least the same level of protection for Personal Data as those set out in this DPA and meet the requirements of article 28(3) of the GDPR to the extent applicable to the nature of the Services provided by such Third-Party Sub-processor.
  • Syncron shall notify the Customer about appointment of any new Third-Party Sub-processor, including about the purpose of the Processing to be undertaken by the Third-Party Sub-processor, by sending a notification to Customer’s primary contact or, on Customer request, to here. Customer may object to Syncron’s use of a given Third-Party Sub-processor by sending the objection in writing within 14 days’ from receiving the notification from Syncron. Objection shall be provided to Syncron here and shall include reasonable grounds for objection. In the event Customer objects to a Third-Party Sub-processor, the parties will come together in good faith to discuss a resolution. Syncron will use reasonable efforts to recommend a commercially reasonable change to Customer’s configuration or use of the Services to avoid Processing of Personal Data by the objected-to Third-Party Sub-processor without unreasonably burdening
  • Syncron remains responsible at all times for compliance with the terms of this DPA by Syncron’s Affiliates and Third-Party Sub-processors to the same extent Syncron would be liable if performing the services of each sub- processor directly under the terms of this

 

  1. INTERNATIONAL DATA TRANSFERS TO THIRD COUNTRIES

 

  • Syncron treats all Personal Data in a manner consistent with the requirements of the Agreement and this DPA in all locations globally. Syncron’s information, privacy and security policies, standards and governance practices are managed on a global
  • Transfers of Personal Data originating from the EEA or Switzerland to Syncron’s Affiliates or Third-Party Sub- processors located in countries outside the EEA or Switzerland that have not received a binding adequacy decision by the European Commission or by a competent national data protection authority (i.e., third countries that does not ensure an adequate level of protection for the rights and freedoms of data subjects), are subject to the following provisions:
    • Transfer of Personal Data from Customer to Syncron and/or Syncron Affiliates is made subject to this DPA and (i) Standard Contractual Clauses with Customer acting as the “data exporter” and Syncron and/or Syncron Affiliate(s) acting as the “data importers”, incorporated here by reference; or (ii) other appropriate transfer mechanisms that provide an adequate level of protection in compliance with the GDPR, whereas the terms of this DPA shall be read in conjunction with the Standard Contractual Clauses or other appropriate transfer
    • For transfers from Syncron to Syncron Affiliates located in third countries, Syncron represents that such transfers are subject to (i) the terms of Syncron Intracompany Data Processing Agreement (with Intracompany Confidentiality Undertaking) entered into between Syncron AB and its Affiliates, which requires all transfers of Personal Data to be made in compliance with Standard Contractual Clauses and all applicable Syncron security and data privacy policies and standards (without prejudice to 7.3 below in relation to Syncron Inc.), or (ii) other appropriate transfer mechanisms that provide an adequate level of protection in compliance with the GDPR.
    • For transfer from Syncron and/or Syncron Affiliates to Third-Party Sub-processors, in addition to the agreement referred to in sec. 6.3 above, Syncron or Syncron Affiliate has entered or will enter into the unchanged version of the Standard Contractual Clauses prior to the Third-Party Sub-processor’s Processing of Personal Data (unless other appropriate transfer mechanism is established, e.g., EU-U.S. Privacy Shield certification). Customer hereby (itself as well as on behalf of each data controller) accedes to the Standard Contractual Clauses between Syncron and the Third-Party Sub-processors located outside of the EEA or
  • Syncron self-certifies to and commits to comply with the EU-U.S. Privacy Shield Frameworks, as administered by the US Department of Commerce, with respect to the Processing of Personal Data that is transferred from the European Economic Area to the United States (http://www.syncron.com/privacy/).
  • Starting from May 25, 2018, Syncron is committed to Process Personal Data in accordance with the GDPR requirements for international data

 

  1. SECURITY

Syncron has, taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the assessment of risks to the rights and freedoms of natural persons, implemented and maintains appropriate technical and organizational measures for protection, security (including protection against unauthorized or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorized disclosure of, or access to, Customer Data), confidentiality and integrity of Customer Data. Technical and organizational security measures (controls) applied to processing of Customer Data, including Processing of Personal Data, are set forth in Schedule 2 hereto. Syncron regularly monitors compliance with these measures. Syncron will not materially decrease the overall security of the Services during a subscription term. Syncron information security management system achieved the certification with the ISO 27001 standard.

 

  1. CUSTOMER DATA MANAGEMENT AND NOTIFICATION
    • Syncron maintains security management policies and procedures in place, including Information security policy and security incident management policy. Syncron shall notify Customer, without undue delay, after becoming aware of the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Data, including Personal Data, transmitted, stored or otherwise Processed by Syncron or its sub-processors. Syncron shall make reasonable efforts to identify the cause of such incident and take those steps as Syncron deems necessary and reasonable in order to remediate the cause of such incident to the extent the remediation is within Syncron’s reasonable control. Syncron shall provide Customer with sufficient information to allow Customer to meet any obligations to report or inform data subjects (as defined in GDPR) of the personal data breach under applicable Data Protection Laws and Regulations. Syncron shall co-operate with Customer and take such reasonable commercial steps as directed by Customer to assist in the investigation, mitigation and remediation of each such personal data The obligations herein shall not apply to incidents or breaches that are caused by Customer or Customer’s Users.
    • Syncron shall provide reasonable assistance to Customer with any data protection impact assessments, and prior consultations with any Supervisory Authority or other competent data privacy authorities, which Customer reasonably considers to be required by article 35 or 36 of the GDPR or equivalent provisions of any other applicable Data Protection Laws and Regulations, in each case solely in relation to the Processing of Personal Data by, and taking into account the nature of the Processing and information available to Syncron, its Affiliates or any Third-Party Sub-processor.

 

  1. LIMITATION OF LIABILITY

Each party’s and all of its Affiliates’ liability, taken together in the aggregate, arising out of or related to this DPA, and all DPAs between Authorized Affiliates and Syncron, whether in contract, tort or under any other theory of liability, is subject to the ‘Limitation of Liability’ section of the Agreement, and any reference in such section to the liability of a party means the aggregate liability of that party and all of its Affiliates under the Agreement and all DPAs together.

For the avoidance of doubt, Syncron’s and its Affiliates’ total liability for all claims from Customer and all of its Authorized Affiliates arising out of or related to the Agreement and each DPA shall apply in the aggregate for all claims under both the Agreement and all DPAs established hereunder, including by Customer and all Authorized Affiliates, and, in particular, shall not be understood to apply individually and severally to Customer and/or to any Authorized Affiliate that is a contractual party to any such DPA.

 

  1. DELETION OR RETURN OF PERSONAL DATA
    • Subject to sections 11.2 and 11.3 Syncron and Syncron Affiliates shall promptly and in any event within 30 days of the date of cessation of any Services involving the Processing of Personal Data (the “Cessation Date”), delete all copies of those Personal Data of
    • Subject to section 11.3, Customer may in its absolute discretion by a written notice to Syncron within 30 days of the Cessation Date require Syncron and each Syncron Affiliate to (a) return a complete copy of all Customer Personal Data to Customer; and (b) delete and procure the deletion of all other copies of Personal Data Processed by Syncron, any Syncron Affiliate or any Third-Party Sub-processor. Syncron and each Syncron Affiliate shall comply with any such written request within 60 days of the Cessation
    • Syncron and Syncron Affiliates may retain Personal Data to the extent required by Data Protection Laws and Regulations and only to the extent and for such period as required by Data Protection Laws and Regulations and always provided that Syncron and each Syncron Affiliate shall ensure the confidentiality of all such Personal Data and shall ensure that such Personal Data is only Processed as necessary for the purpose(s) specified in the Data Protection Laws and Regulations requiring its storage and for no other
    • Syncron shall upon request provide written certification to Customer that it and each Syncron Affiliate has fully complied with this section 11 within 60 days of the Cessation

 

  1. AUDIT RIGHTS
    • Subject to sections 12.2 to 12.3, Syncron and each Syncron Affiliate shall make available to each Customer on request all information necessary to demonstrate compliance with this DPA, and shall allow for and contribute to audits, including inspections, by Customer or an auditor mandated by Customer in relation to the Processing of the Personal Data by Syncron, any Syncron Affiliate or any Third-Party Sub-processor.
    • Information and audit rights of the Customer only arise under section 1 to the extent that the Agreement does not otherwise give them information meeting the relevant requirements of Data Protection Laws and Regulations (including, where applicable, article 28(3)(h) of the GDPR).
    • Customer undertaking an audit shall give Syncron or the relevant Syncron Affiliate a reasonable notice (at least 30 days) of any audit or inspection to be conducted under section 12.1 and shall make (and ensure that each of its mandated auditors makes) reasonable endeavors to avoid causing any damage, injury or disruption to Syncron, any Syncron Affiliate or any Third-Party Sub-processor’ premises, equipment, personnel and business while its personnel are on those premises in the course of such an audit or inspection. Syncron, any Syncron Affiliate or any Third-Party Sub-processor needs not give access to its premises for the purposes of such an audit or inspection to any individual unless he or she produces a reasonable evidence of identity and authority; outside normal business hours at those premises; or for the purposes of more than one audit or inspection, in respect of Syncron, any Syncron Affiliate or any Third-Party Sub-processor each, in any calendar year, except for any additional audits or inspections, which: (i) Customer undertaking an audit reasonably considers necessary because of genuine concerns as to Syncron’s or the relevant Syncron Affiliate’s compliance with this DPA; or (ii) Customer is required or requested to carry out by a Supervisory Authority or any similar regulatory authority responsible for the enforcement of Data Protection Laws and Regulations in any country or

 

  1. GENERAL TERMS, GOVERNING LAW AND DISPUTE RESOLUTION

 

  • The governing law and dispute resolution clauses set out in the Agreement shall also be applicable to this DPA. For the avoidance of doubt, each reference to the DPA in this DPA means this DPA including its Schedules and Appendices.
  • This DPA shall come into effect upon its signing by both Parties. Without prejudice to Section 11, this DPA shall automatically expire upon any termination or expiration of the
  • In the event of any conflict or inconsistency between this DPA and the Standard Contractual Clauses, the Standard Contractual Clauses shall prevail. In the event of inconsistencies between the provisions of this DPA and the Agreement, the provisions of this DPA shall prevail.

 

***

 

On behalf of CUSTOMER

Customer’s acceptance of the Order Form/Master Subscription Agreement (or other underlying agreement incorporating the DPA) shall constitute its agreement to this DPA, its Schedules and Appendices.

 

On behalf of SYNCRON

Syncron’s acceptance of the Order Form/Master Subscription Agreement (or other underlying agreement incorporating the DPA) shall constitute its agreement to this DPA, its Schedules and Appendices.

 

 

List of Schedules

Schedule 1: Standard Contractual Clauses with Appendix 1
Schedule 2: Technical and organizational security measures
Schedule 3: List of sub-processors

 

 

SCHEDULE 1

 

Standard Contractual Clauses and Description of Data Processing

EU STANDARD CONTRACTUAL CLAUSES (Processors)

[These Clauses are deemed to be amended from time to time, to the extent that they relate to a Restricted Data Transfer which is subject to the Data Protection Laws of a given country or territory, to reflect (to the extent possible without material uncertainty as to the result) any change (including any replacement) made in accordance with those Data Protection Laws (i) by the Commission to or of the equivalent contractual clauses approved by the Commission under EU Directive 95/46/EC or the GDPR (in the case of the Data Protection Laws of the European Union or a Member State); or (ii) by an equivalent competent authority to or of any equivalent contractual clauses approved by it or by another competent authority under another Data Protection Law (otherwise).

Standard Contractual Clauses (processors)

For the purposes of Article 26(2) of Directive 95/46/EC for the transfer of personal data to processors established in third countries which do not ensure an adequate level of data protection

Name of the data exporting organization:

Customer name and contact details indicated in a respective Order Form/Master Subscription Agreement

(the data exporter)

 

And

Syncron AB and its affiliates

Contact details: indicated in a respective Order Form/Master Subscription Agreement

e-mail: privacy@syncron.com

(the data importer)

each a “party”; together “the parties”,

HAVE AGREED on the following Contractual Clauses (the Clauses) in order to adduce adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of individuals for the transfer by the data exporter to the data importer of the personal data specified in Appendix 1.

Background

The data exporter has entered into a data processing addendum (“DPA”) with the data importer. Pursuant to the terms of the DPA, it is contemplated that services provided by the data importer which are subject to the DPA (‘the services’) will involve the transfer of personal data to data importer. Data importer is located in a country not ensuring an adequate level of data protection. To ensure compliance with Directive 95/46/EC and applicable data protection law, the controller agrees to the provision of such services, including the processing of personal data incidental thereto, subject to the data importer’s execution of, and compliance with, the terms of these Clauses.

Clause 1

Definitions

For the purposes of the Clauses:

(a)       ‘personal data’, ‘special categories of data’, ‘process/processing’, ‘controller’, ‘processor’, ‘data subject’ and ‘supervisory authority’ shall have the same meaning as in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data; [If these Clauses are governed by a law which extends the protection of data protection laws to corporate persons, the words “except that, if these Clauses govern a transfer of data relating to identified or identifiable corporate (as well as natural) persons, the definition of “personal data” is expanded to include those data” are added.]

(b)       ‘the data exporter’ means the controller who transfers the personal data;

(c)       ‘the data importer’ means the processor who agrees to receive from the data exporter personal data intended for processing on his behalf after the transfer in accordance with his instructions and the terms of the Clauses and who is not subject to a third country’s system ensuring adequate protection within the meaning of Article 25(1) of Directive 95/46/EC;

(d)       ‘the subprocessor’ means any processor engaged by the data importer or by any other subprocessor of the data importer who agrees to receive from the data importer or from any other subprocessor of the data importer personal data exclusively intended for processing activities to be carried out on behalf of the data exporter after the transfer in accordance with his instructions, the terms of the Clauses and the terms of the written subcontract;

(e)       ‘the applicable data protection law means the legislation protecting the fundamental rights and freedoms of individuals and, in particular, their right to privacy with respect to the processing of personal data applicable to a data controller in the Member State in which the data exporter is established;

(f)        ‘technical and organisational security measures’ means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

Clause 2

Details of the transfer

The details of the transfer and in particular the special categories of personal data where applicable are specified in Appendix 1 which forms an integral part of the Clauses.

Clause 3

Third-party beneficiary clause

  1. The data subject can enforce against the data exporter this Clause, Clause 4(b) to (i), Clause 5(a) to (e), and (g) to (j), Clause 6(1) and (2), Clause 7, Clause 8(2), and Clauses 9 to 12 as third-party beneficiary.
  2. The data subject can enforce against the data importer this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where the data exporter has factually disappeared or has ceased to exist in law unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law, as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity.
  3. The data subject can enforce against the subprocessor this Clause, Clause 5(a) to (e) and (g), Clause 6, Clause 7, Clause 8(2), and Clauses 9 to 12, in cases where both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, unless any successor entity has assumed the entire legal obligations of the data exporter by contract or by operation of law as a result of which it takes on the rights and obligations of the data exporter, in which case the data subject can enforce them against such entity. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses.
  4. The parties do not object to a data subject being represented by an association or other body if the data subject so expressly wishes and if permitted by national law.

Clause 4

Obligations of the data exporter

The data exporter agrees and warrants:

(a)       that the processing, including the transfer itself, of the personal data has been and will continue to be carried out in accordance with the relevant provisions of the applicable data protection law (and, where applicable, has been notified to the relevant authorities of the Member State where the data exporter is established) and does not violate the relevant provisions of that State;

(b)       that it has instructed and throughout the duration of the personal data processing services will instruct the data importer to process the personal data transferred only on the data exporter’s behalf and in accordance with the applicable data protection law and the Clauses;

(c)       that the data importer will provide sufficient guarantees in respect of the technical and organisational security measures specified in Appendix (Schedule) 2 to this contract;

(d)       that after assessment of the requirements of the applicable data protection law, the security measures are appropriate to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing, and that these measures ensure a level of security appropriate to the risks presented by the processing and the nature of the data to be protected having regard to the state of the art and the cost of their implementation;

(e)       that it will ensure compliance with the security measures;

(f)        that, if the transfer involves special categories of data, the data subject has been informed or will be informed before, or as soon as possible after, the transfer that its data could be transmitted to a third country not providing adequate protection within the meaning of Directive 95/46/EC;

(g)       to forward any notification received from the data importer or any subprocessor pursuant to Clause 5(b) and Clause 8(3) to the data protection supervisory authority if the data exporter decides to continue the transfer or to lift the suspension;

(h)       to make available to the data subjects upon request a copy of the Clauses, with the exception of Appendix (Schedule) 2, and a summary description of the security measures, as well as a copy of any contract for subprocessing services which has to be made in accordance with the Clauses, unless the Clauses or the contract contain commercial information, in which case it may remove such commercial information;

(i)        that, in the event of subprocessing, the processing activity is carried out in accordance with Clause 11 by a subprocessor providing at least the same level of protection for the personal data and the rights of data subject as the data importer under the Clauses; and

(j)        that it will ensure compliance with Clause 4(a) to (i).

Clause 5

Obligations of the data importer

The data importer agrees and warrants:

(a)       to process the personal data only on behalf of the data exporter and in compliance with its instructions and the Clauses; if it cannot provide such compliance for whatever reasons, it agrees to inform promptly the data exporter of its inability to comply, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract;

(b)       that it has no reason to believe that the legislation applicable to it prevents it from fulfilling the instructions received from the data exporter and its obligations under the contract and that in the event of a change in this legislation which is likely to have a substantial adverse effect on the warranties and obligations provided by the Clauses, it will promptly notify the change to the data exporter as soon as it is aware, in which case the data exporter is entitled to suspend the transfer of data and/or terminate the contract;

(c)       that it has implemented the technical and organisational security measures specified in Appendix (Schedule) 2 before processing the personal data transferred;

(d)       that it will promptly notify the data exporter about:

(i)        any legally binding request for disclosure of the personal data by a law enforcement authority unless otherwise prohibited, such as a prohibition under criminal law to preserve the confidentiality of a law enforcement investigation,

(ii)       any accidental or unauthorised access, and

(iii)       any request received directly from the data subjects without responding to that request, unless it has been otherwise authorised to do so;

(e)       to deal promptly and properly with all inquiries from the data exporter relating to its processing of the personal data subject to the transfer and to abide by the advice of the supervisory authority with regard to the processing of the data transferred;

(f)        at the request of the data exporter to submit its data processing facilities for audit of the processing activities covered by the Clauses which shall be carried out by the data exporter or an inspection body composed of independent members and in possession of the required professional qualifications bound by a duty of confidentiality, selected by the data exporter, where applicable, in agreement with the supervisory authority;

(g)       to make available to the data subject upon request a copy of the Clauses, or any existing contract for subprocessing, unless the Clauses or contract contain commercial information, in which case it may remove such commercial information, with the exception of Appendix (Schedule) 2 which shall be replaced by a summary description of the security measures in those cases where the data subject is unable to obtain a copy from the data exporter;

(h)       that, in the event of subprocessing, it has previously informed the data exporter and obtained its prior written consent;

(i)        that the processing services by the subprocessor will be carried out in accordance with Clause 11;

(j)        to send promptly a copy of any subprocessor agreement it concludes under the Clauses to the data exporter.

Clause 6

Liability

  1. The parties agree that any data subject, who has suffered damage as a result of any breach of the obligations referred to in Clause 3 or in Clause 11 by any party or subprocessor is entitled to receive compensation from the data exporter for the damage suffered.
  2. If a data subject is not able to bring a claim for compensation in accordance with paragraph 1 against the data exporter, arising out of a breach by the data importer or his subprocessor of any of their obligations referred to in Clause 3 or in Clause 11, because the data exporter has factually disappeared or ceased to exist in law or has become insolvent, the data importer agrees that the data subject may issue a claim against the data importer as if it were the data exporter, unless any successor entity has assumed the entire legal obligations of the data exporter by contract of by operation of law, in which case the data subject can enforce its rights against such entity.

The data importer may not rely on a breach by a subprocessor of its obligations in order to avoid its own liabilities.

  1. If a data subject is not able to bring a claim against the data exporter or the data importer referred to in paragraphs 1 and 2, arising out of a breach by the subprocessor of any of their obligations referred to in Clause 3 or in Clause 11 because both the data exporter and the data importer have factually disappeared or ceased to exist in law or have become insolvent, the subprocessor agrees that the data subject may issue a claim against the data subprocessor with regard to its own processing operations under the Clauses as if it were the data exporter or the data importer, unless any successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law, in which case the data subject can enforce its rights against such entity. The liability of the subprocessor shall be limited to its own processing operations under the Clauses.

Clause 7

Mediation and jurisdiction

  1. The data importer agrees that if the data subject invokes against it third-party beneficiary rights and/or claims compensation for damages under the Clauses, the data importer will accept the decision of the data subject:

(a)       to refer the dispute to mediation, by an independent person or, where applicable, by the supervisory authority;

(b)       to refer the dispute to the courts in the Member State in which the data exporter is established.

  1. The parties agree that the choice made by the data subject will not prejudice its substantive or procedural rights to seek remedies in accordance with other provisions of national or international law.

Clause 8

Cooperation with supervisory authorities

  1. The data exporter agrees to deposit a copy of this contract with the supervisory authority if it so requests or if such deposit is required under the applicable data protection law.
  2. The parties agree that the supervisory authority has the right to conduct an audit of the data importer, and of any subprocessor, which has the same scope and is subject to the same conditions as would apply to an audit of the data exporter under the applicable data protection law.
  3. The data importer shall promptly inform the data exporter about the existence of legislation applicable to it or any subprocessor preventing the conduct of an audit of the data importer, or any subprocessor, pursuant to paragraph 2. In such a case the data exporter shall be entitled to take the measures foreseen in Clause 5 (b).

Clause 9

Governing Law

The Clauses shall be governed by the law of the Member State in which the data exporter is established.

Clause 10

Variation of the contract

The parties undertake not to vary or modify the Clauses. This does not preclude the parties from adding clauses on business related issues where required as long as they do not contradict the Clause.

Clause 11

Subprocessing

  1. The data importer shall not subcontract any of its processing operations performed on behalf of the data exporter under the Clauses without the prior written consent of the data exporter. Where the data importer subcontracts its obligations under the Clauses, with the consent of the data exporter, it shall do so only by way of a written agreement with the subprocessor which imposes the same obligations on the subprocessor as are imposed on the data importer under the Clauses. Where the subprocessor fails to fulfil its data protection obligations under such written agreement the data importer shall remain fully liable to the data exporter for the performance of the subprocessor’s obligations under such agreement.
  2. The prior written contract between the data importer and the subprocessor shall also provide for a third-party beneficiary clause as laid down in Clause 3 for cases where the data subject is not able to bring the claim for compensation referred to in paragraph 1 of Clause 6 against the data exporter or the data importer because they have factually disappeared or have ceased to exist in law or have become insolvent and no successor entity has assumed the entire legal obligations of the data exporter or data importer by contract or by operation of law. Such third-party liability of the subprocessor shall be limited to its own processing operations under the Clauses.
  3. The provisions relating to data protection aspects for subprocessing of the contract referred to in paragraph 1 shall be governed by the law of the Member State in which the data exporter is established.
  4. The data exporter shall keep a list of subprocessing agreements concluded under the Clauses and notified by the data importer pursuant to Clause 5 (j), which shall be updated at least once a year. The list shall be available to the data exporter’s data protection supervisory authority.

Clause 12

Obligation after the termination of personal data processing services

  1. The parties agree that on the termination of the provision of data processing services, the data importer and the subprocessor shall, at the choice of the data exporter, return all the personal data transferred and the copies thereof to the data exporter or shall destroy all the personal data and certify to the data exporter that it has done so, unless legislation imposed upon the data importer prevents it from returning or destroying all or part of the personal data transferred. In that case, the data importer warrants that it will guarantee the confidentiality of the personal data transferred and will not actively process the personal data transferred anymore.
  2. The data importer and the subprocessor warrant that upon request of the data exporter and/or of the supervisory authority, it will submit its data processing facilities for an audit of the measures referred to in paragraph 1.

***

On behalf of CUSTOMER

Customer’s acceptance of the Order Form/Master Subscription Agreement (or other underlying agreement incorporating the DPA) shall constitute its agreement to this DPA, its Schedules and Appendices.

 

On behalf of SYNCRON

Syncron’s acceptance of the Order Form/Master Subscription Agreement (or other underlying agreement incorporating the DPA) shall constitute its agreement to this DPA, its Schedules and Appendices.

 

APPENDIX 1 TO THE DPA AND STANDARD CONTRACTUAL CLAUSES

This Appendix forms part of the Clauses. The Parties agree that the signature on the underlying agreement (including Order Form) constitutes an agreement to the Standard Contractual Clauses and this appendix.

 

Data exporter

The data exporter is the Customer referred in the Agreement and its Authorized Affiliates (if applicable) who subscribed to the Services delivered by Syncron.

 

Data importer

The data importer is: Syncron Affiliate(s) located in a third country, as applicable. Syncron Affiliates may take part in provision of Services, which may include support, development, expert services and software maintenance. Syncron is a software-as-a-service provider who offers applications for optimizing its customers after-sales performance, which involves processing personal data provided by users of Services. The data importer will have access to any data provided by the data exporter and will use it exclusively and solely for purposes related to provision of Services.

 

Data subjects

The personal data transferred concern the following categories of data subjects:

 

The categories of data subjects whose personal data may be transferred in connection with the Services are determined and controlled by the data exporter in its sole discretion and may include but are not limited to: administrators and users of Services, such as employees, contractors, collaborators, partners, suppliers and other users of Customer (as applicable), who have access to Services and who may store user account information in the Services.

 

Categories of data

The personal data transferred concern the following categories of data:

 

The categories of personal data are determined by the data exporter in its sole discretion and may include but are not limited to: personal contact information such as name, company address, telephone or mobile number, fax number, email address; employment details including employer name, job title, identification numbers; user ID, location data; connection data; device specific information, IP addresses, and online behavior data (as applicable).

 

Special categories of data (if appropriate)

 

The personal data transferred concern the following special categories of data:

 

The special categories of personal data, if any, are determined by the data exporter. Special categories of personal data are not requested by Syncron and are not necessary for provision of Services.

 

Processing operations

The personal data transferred will be subject to the following basic processing activities:

 

Processing activities may include but are not limited to: creation and administration of accounts in the Services, authorization of access to the Services, verification of User’s rights, data hosting, provision of support to the Customer, creation of accounts in tools used in provision of expert and support services; back-up, and other activities that may be necessary to provide Services in acoordance with the Agreement.

 

***

On behalf of CUSTOMER (DATA EXPORTER)

The Data Exporter’s acceptance of the Order Form/Master Subscription Agreement (or other underlying agreement incorporating the DPA) shall constitute its agreement to these Standard Contractual Clauses


On behalf of SYNCRON (DATA IMPORTER)

The Data Importer’s acceptance of the Order Form/Master Subscription Agreement (or other underlying agreement incorporating the DPA) shall constitute its agreement to these Standard Contractual Clauses

 

 

 

SCHEDULE 2: TECHNICAL AND ORGANIZATIONAL SECURITY MEASURES

Technical and organizational security measures described herein define the controls implemented by Syncron for the development, acquisition, maintenance and operation of Syncron cloud solutions supplied in a Software-as-a-service model.

 

  1. Internal Organization
    1. All Syncron employees have an inherent responsibility to protect the company’s information assets, confidential data, intellectual capital owned by the company, and any data created within Syncron cloud services by its

To coordinate Information Security at Syncron and to ensure co-operation between different business units, a Security Steering Committee is organized with representatives across the organization. Security Steering Committee’s role is to help facilitate integration of information security into the lines of business as information security is an issue for Syncron that reaches across boundaries and departments. The Security Steering Committee is the governing body for all information security and assurance activities in the company.

  1. Syncron has appointed the Chief Security Officer to develop, implement and manage Syncron’s corporate security vision, strategy and programs and ensure security of information assets, maintain trust of Syncron customers and obtain third party assurance for the Syncron cloud services. The Chief Security Officer is in charge of identifying and developing policies and processes across the organization to reduce risks, respond to incidents and limit exposure to liability in areas of physical security, reputational damage, information security and information technology The Chief Security Officer has been also appointed as the Data Protection Officer at Syncron.
  2. Conflicting duties and areas of responsibility are segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the Syncron No single person should be able to access, modify or use Syncron information assets without authorization or detection.

Syncron security function maintains organizational independence from the operational teams that implement security policies.

  1. The Chief Security Officer maintains contact with appropriate authorities (including but not limited to the law enforcement authorities, incident response centers and information commissioners) to report identified security incidents (if it is suspected that laws may have been broken) in a timely
  2. To improve knowledge about best practices and staying up to date with relevant security information, the company Chief Security Officer maintains contacts with specialist security forums and cloud computing security
  3. Chief Security Officer is involved in project management to define security objectives and conduct security risk assessment regardless the type of the project.
  4. When hiring external consultants for temporary assignments and projects, information security aspects are considered, and non-disclosure agreements are executed (or confidentiality clauses are included in agreements) between such parties and Syncron prior to granting external parties access to the company information and information processing facilities or sharing sensitive data.

 

  1. Mobile Devices and Teleworking
    1. When using mobile devices, Syncron employees take special care to ensure that customer data or sensitive corporate information is not The risks of working with mobile devices in unprotected environments are addressed by the measures in the Acceptable Use Terms which is acknowledged by all employees.
    2. Teleworking activities are allowed at Syncron per the guidelines and protective measures defined in the Acceptable Use Terms. All users must show great care to protect customer data and Syncron corporate information accessed, processed or stored at teleworking

 

  • Human Resources Security
    1. All candidates for employment, contractors, and third-party users of Syncron information assets require the successful completion of a background check prior to beginning work at Syncron. Background checks are performed in accordance with the Human Resources Security Procedure and do not violate the relevant jurisdiction or an individual’s

 

  1. All Syncron employees (and contractors) are responsible for protecting Syncron information assets per confidentiality clauses stated in the Employment Agreement.
  2. All Syncron employees, contractors and third-party users must be properly briefed on their information security responsibilities prior to being granted access to sensitive information or
  3. All Syncron employees and where relevant, contractors and third-party users should attend training to receive information security awareness education per the Syncron Security Awareness
  4. Employees, contractors and third-party users who have committed a serious information security breach and failed to comply with this policy through malicious or negligent behavior may be subject to a disciplinary process including the termination of employment /
  5. All People Managers (anyone who has at least one person reporting to them) within Syncron are responsible of following the Change of Employment Procedures and associated onboarding and off-boarding processes to ensure that employees, contractors and third-party users exit the organization or change employment in an orderly and timely
  6. People Managers must ensure that all employees, contractors and third-party users return all of the organization’s assets in their possession upon termination of their employment, contract or
  7. People Managers must inform the Internal IT team to ensure that the access rights of all employees, contractors and third- party users to Syncron information and information processing facilities should be removed upon termination of their employment, contract or agreement, or adjusted upon

 

  1. Asset Management
    1. All information assets used for processing, transmitting and storing data relating to our customers and the operation of Syncron product and services are inventoried and controlled per the Asset Management Standard Operating
    2. All major information assets are accounted for and have a nominated owner to ensure that appropriate protection is maintained.
    3. Rules for the acceptable use of information and assets associated with Syncron information processing facilities are defined in the Acceptable Use Terms. All employees, contractors and third-party users should acknowledge these rules prior to the start of employment or
    4. All information created and processed by Syncron employees should be classified in terms of its value, legal requirements, sensitivity, and criticality to the
    5. Syncron does not require labeling of all information assets for data classification; however,
      • All customer data is classified as “confidential” by default and is protected
      • All corporate and development data is classified “internal” by default and is restricted
      • Employees who have been authorized to view information at a particular classification level will only be permitted to access information at that level or at a lower
    6. No “confidential” data is stored on removable media unless explicitly authorized by the Chief Security Officer. Data on removable media is always be
    7. When no longer required, storage media containing Syncron data should be disposed of or deleted securely to prevent recovery where the containing media will be re-used.
    8. If physical media containing Syncron corporate or customer data to be transferred, appropriate protection measures including encryption and recorded delivery via authorized courier service is

 

  1. Access Control
    1. Role based access control mechanisms are implemented at all Syncron information processing facilities (all systems and facilities that store, process and transmit company data); employees are only granted access to information and facilities on a need to know and need to use basis per their job

To prevent unauthorized access to Syncron information systems, each user’s access privileges are authorized following a formal access request, according to business need.

 

The use of non-authenticated (i.e., no password) User-IDs or IDs not associated with a user is prohibited. Shared or group user IDs are never permitted for user-level access.

Every user must have a unique user ID and a personal secret password for access to Syncron computers and computer networks and third-party systems storing corporate data (i.e. cloud applications). Systems and applications must authenticate using a password or token entry.

  1. Syncron employees and contractors are only provided with access to the network and network services that they have been specifically authorized to use. No default access is
  2. Syncron user registration and deregistration process (new hire and employee termination tickets) is used to enable assignment and removal of access
  3. Syncron user access provisioning process and associated forms is followed to assign or revoke access rights for all user types to all systems and services, including cloud services and
  4. Privileged access rights (such as administrator accounts) to business-critical applications and customer production environments are allocated upon approval by the Chief Security Officer, the Chief Technology Officer or the approved delegator.
  5. All Syncron employees should be made aware of their responsibilities for maintaining effective access controls, particularly regarding the use of passwords and the security of user These responsibilities are documented in the Acceptable Use Terms which must be read and acknowledged by all users prior to being granted access to Syncron systems.
  6. Syncron information asset owners shall review users’ access rights to Syncron systems at six-month
  7. The access rights of all employees and external party users to information and information processing facilities are removed immediately upon termination of their employment, contract or agreement, or adjusted upon
  8. All users follow the Syncron password protection practices to keep their passwords and other authentication information confidential and avoid keeping a record unless it can be stored securely using a password vault software approved by the Chief Technology
  9. Access to Syncron systems and applications is controlled by a secure log-on procedure which involves two-step verification (2 factor authentication) for remote access by administrators.

Remote access to Syncron corporate networks is granted with a legitimate business need and approval from the Chief Technology Officer. Remote access users are reviewed annually by the Chief Security Officer or duly appointed IT staff.

  1. All critical Syncron systems are protected with interactive password management systems (Active Directory) and enforce the use of quality
  2. The use of utility programs that can override Syncron system and application controls is restricted to system administrators who are explicitly authorized by the Head of
  3. Access rights to read, write and modify Syncron generic products source code is restricted to Products department members and other employees who are explicitly authorized by the Head of Research & Development. All Customer Success and EazyStock employees are by default granted read-only access to Syncron generic products source code unless decided otherwise by the Head of Customer

 

  1. Cryptography
    1. All confidential Syncron corporate information, customer data and user credentials shall always be encrypted when transferred over public, open networks (such as the Internet or wireless LANs) or physically moved by mobile or removable media devices.

If deemed to be at risk, cryptography is used to protect ‘confidential’ classified Syncron corporate information, customer data and user credentials stored in Syncron systems.

  1. The Syncron Head of Operations is responsible for ensuring the secure key management; including the generation, protection and revocation of encryption keys and

All encryption keys are assigned to key holders authorized by the Chief Technology Officer who is responsible to ensure that the use, protection and lifetime of cryptographic keys managed in accordance with industry best practices.

Syncron encryption requirements are reviewed annually and upgraded according to current industry best practices by reviewing industry best practices (such as the guidelines from the National Institute of Standards and Technology).

 

  • Physical and Environmental Security
    1. Perimeters of a building or site containing Syncron information processing facilities are physically sound to prevent break-ins. Physical security measures implemented to protect Syncron offices and data centers follow the Syncron Physical and Environmental Security Standard Operating
    2. Secure areas used for storing or processing Syncron information assets are protected by appropriate entry controls to ensure that only personnel explicitly authorized by the Head of Operations are allowed access. Access to secure areas is reviewed annually by the Chief Security Officer or duly appointed IT
    3. Measures are designed and applied to Syncron offices to ensure physical security and safety of Syncron personnel. Access to Syncron offices are performed via access controlled gates or manned reception

All visitors to Syncron offices must be reported to the Reception and recorded in the visitor log.

  1. If critical information is stored or processed in Syncron owned facilities, physical protection against natural disasters, malicious attack or accidents is designed and applied based on specialist advice obtained on how to avoid damage from fire, flood, earthquake, explosion, civil unrest and other forms of natural or man-made
  2. Where third party co-location facilities or Infrastructure-as-a-Service models are used, appropriate certifications and industry accreditations (such as ISO27001, ISO20000 or SAS70) is
  3. All Syncron employees must take caution to prevent unauthorized physical access, loss, damage, theft, interference and interruption to Syncron premises and information Contractors or third parties shall always be supervised by personnel when working in secure areas.

Syncron office alarm codes and associated documentation are confidential and are treated appropriately to prevent unauthorized disclosure.

  1. Syncron equipment used for processing, transmitting and storing confidential or operationally critical data is protected from environmental hazards and power failures in accordance with the Syncron Equipment Protection
  2. Except normal usage of end user systems by company employees in accordance with the Acceptable Use Terms, Syncron equipment (except personal computing devices), information or software shall not be taken off-site without prior authorization by the Chief Technology Officer.
  3. Syncron employees shall apply physical security measures and consider different risks to protect their devices when working outside the organization’s Employee laptops shall not be left unattended or unlocked in publicly accessible places.
  4. All printed and electronic media containing confidential Syncron media is disposed of securely using confidential waste bins or secure data disposal
  5. Confidential papers and removable storage media shall never be left unattended or unlocked on employee

 

  • Operations Security
    1. To ensure the correct and secure operation of Syncron information processing facilities, standard operating procedures are documented and approved by the Head of Operations and made available to all users who need
    2. All changes to Syncron critical information processing facilities and systems must follow the Syncron Change Management, Deployment and Upgrades Standard Operating Procedures to enable tracking, testing and Changes to the Syncron organization, business processes, information processing facilities and systems that affect information security are documented and approved by the Head of Operations or delegated authority.

The responsible party that will be implementing the change must complete and submit a new item to the Syncron change management system (Jira).

Major changes are required to be submitted for review by the Chief Technology Officer. Changes that may have an impact on the availability of Syncron products and services are applied during a pre-defined maintenance window.

After implementation, testing is conducted to determine if a given change was successful, or if rolling implemented changes back is necessary. Change implementers shall notify all parties identified as needing communication of both start and finish times of a change.

  1. The Chief Technology Officer shall monitor and tune the use of Syncron information resources and the capacity of Syncron cloud

 

  1. Future capacity requirements are projected and planned for by the Chief Technology Officer to ensure the required system performance.
  2. Syncron development, test, and production facilities are separated to reduce the risks of unauthorized access or changes to the production systems. The Chief Technology Officer has the ultimate responsibility to maintain separation of these environments while Head of Operations, Head of Customer Success and Head of Research and Development must ensure no customer or confidential data is used in the respective test and development environments utilized by their departments (unless explicitly requested and approved by the customer).
  3. Anti-malware solutions are deployed on all Syncron systems commonly affected by malicious software (particularly personal computers and servers). Anti-malware is configured to update virus definitions regularly and scan for malware in real-time.
  4. Backup copies of critical Syncron information, software and customer data are taken daily and tested every six months as part of the Business Continuity Plan
  5. All customer data held on Syncron cloud products is backed up, encrypted and stored off-site utilizing an appropriate disk- based, online backup and recovery

Under no circumstances shall Syncron customer data be stored on removable physical media, mobile devices or non- corporate personal computers.

  1. All event logs recording user activities, exceptions, faults and information security events from critical Syncron infrastructure and applications are produced and the audit trail is retained for at least one
  2. Logging configuration is only be accessible by the authorized system administrators and log information is protected against tampering and unauthorized

Where possible, logs from critical systems are correlated for analysis and review.

  1. All administrative access and activities on Syncron systems and products is logged and the audit trail is protected and made available for review.
  2. Clocks of all relevant Syncron information processing systems and product components are synchronized to a single reference time
  3. Installation of software on operational production systems (i.e. customer instances) and the components of Syncron product infrastructure can only be performed by system administrators authorized by the Chief Technology
  4. Syncron Chief Security Officer shall ensure to receive information about technical vulnerabilities of systems being used in a timely fashion. Chief Security Officer is responsible to establish and run a vulnerability management program that evaluates Syncron’s exposure to such vulnerabilities.

Syncron’s publicly accessible systems and external infrastructure are scanned for vulnerabilities by the Chief Security Officer at least quarterly or after any significant changes. Any identified critical or high severity issues are remediated in a timely manner or the risk is treated in accordance with the risk management processes. Vulnerability scans are repeated until clean results are obtained. Syncron products and the supporting infrastructure are penetration tested at least annually by an independent third party.

 

  1. Communications Security
    1. All Syncron networks are managed and controlled by the Head of Operations and the authorized system administrators to protect information systems and

Anonymous or un-authenticated access to Syncron corporate networks is not allowed.

Syncron guests and contractors are given access to guest networks which are segregated from office infrastructure.

  1. Security mechanisms, service levels and management requirements of all network services are identified by the Head of Operations and reviewed by the Chief Security Officer before included in network services agreements, whether these services are provided in-house or outsourced.
  2. Syncron office networks are segregated from Syncron cloud services infrastructure where customer data is
  3. Sensitive Syncron corporate information and customer data involved in electronic messaging shall always be protected by means of encryption and/or digital

 

  1. Prior to sharing sensitive information with third parties, contractors, potential or existing customers, partners or consultants, Syncron employees shall have the third party sign a Non-Disclosure

Requirements for confidentiality or non-disclosure agreements reflecting Syncron’s needs for the protection of information is identified, regularly reviewed and documented by the Chief Security Officer.

 

  1. System Acquisition, Development and Maintenance
    1. The information security related requirements defined by the Chief Security Officer are included in the requirements for new information systems or enhancements to existing information

All operating systems, infrastructure, business applications, off-the-shelf products, services, and in-house developed applications used by Syncron must meet the minimum security requirements set forth in Syncron procedures and standards.

  1. Information involved in cloud business applications (such as TeamSupport) used by Syncron is protected from fraudulent activity, contract dispute and unauthorized disclosure and modification by using secure authentication methods and authorization
  2. Rules for the development of software and systems are defined by the Software Architects and approved by the Head of Research and Development before being established and applied to development of Syncron’s cloud solutions. These rules are documented in Syncron Software Development Security

All Syncron product developers are trained on secure coding methods and Syncron’s own development guidelines.

  1. Changes to Syncron products within the development lifecycle is controlled using formal change control procedures and supporting technical solutions (i.e. Jira) that allow approval, tracking, testing and roll back of
  2. When operating platforms are changed, business critical applications and Syncron products are reviewed and tested to ensure there is no adverse impact on organizational operations or the security of Syncron customers’
  3. As far as possible and practicable, vendor-supplied software packages are used without modification. Necessary changes are performed upon approval by the Head of Operations or the Chief Technology
  4. Syncron software development environments (including people, processes and technology associated with system development) are secured by network segregation, access control and monitoring of
  5. All new information systems, business applications and hardware are subject to acceptance testing programs according to the criteria established by the Chief Technology

Upgrades and new versions of Syncron products are subject to acceptance testing according to the criteria established by the Head of Research and Development before being released to customers.

Any product customizations made by the Customer Success department are subject to acceptance testing to the criteria established by the Head Customer Success before being deployed to production.

  1. The use of operational data containing personally identifiable information or any other confidential information for testing purposes are avoided (unless customer requires exception with explicit, written approval).

 

  1. Supplier Relationships
    1. When engaging with third parties for infrastructure services or systems which are critical for the operations of Syncron, Service Level Agreements are signed to ensure that the security controls, service definitions and delivery levels are defined in the third-party service delivery agreement and implemented, operated, and maintained by the third
    2. Service Level Agreements with Syncron suppliers shall include requirements to address the information security risks associated with information and communications technology services and product supply
    3. The services, reports and records provided by the third parties are regularly monitored and Audits should be carried out at least annually for critical service providers and third parties (such as AWS data centers).
    4. Any changes to the provision of third party services should be managed and assessed by the Syncron Security Steering Committee taking account of the criticality of business information, systems and processes involved and re-assessment of risks.

 

  • Information Security Incident Management
    1. The Syncron Incident Response Team ensures that the management responsibilities are allocated, and procedures are documented to ensure a quick, effective and orderly response to information security Information security incidents affecting Syncron products or customer data shall always be regarded high priority and escalated accordingly.
    2. The Syncron Incident Response Team (incident@syncron.com) or the corporate IT are notified immediately of any event in which there is reason to believe there are security implications involving a Syncron computing asset, corporate information or customer
    3. All employees, contractors and third-party users of Syncron information systems and products are required to note and report any observed or suspected security weaknesses to the Syncron Security Team (security@syncron.com).
    4. The Syncron Incident Response Team shall assess each information security event and decide whether the event should be classified as an information security
    5. Information security incidents are responded to by the Chief Security Officer and the Syncron Incident Response Team in accordance with the documented Incident Response

The Syncron Chief Security Officer and the Global Legal Counsel are the only people who shall contact authorities and law enforcement agencies in the event that a security incident is believed to have breached laws and regulations.

  1. Not more than one week following the incident, members of the Incident Response Team and all affected parties shall meet to determine the effectiveness of the Incident Response Plan. Any areas will be identified in which the plan can be more effective or efficient and the plan/policy will be updated

Types, volumes and costs of information security incidents are quantified and monitored by the Chief Security Officer to identify recurring or high impact incidents and is reported to the Security Steering Committee.

  1. Syncron shall maintain contact with IT forensics experts to apply procedures for the identification, collection, acquisition and preservation of information, which can serve as evidence in court in the event of high impact security

 

  • Information Security Aspects of Business Continuity Management
    1. Syncron has determined its requirements for information security and the continuity of information security management in adverse situations, g. during a crisis or disaster. The continuity of Syncron products’ security is captured within the business continuity management process and a business impact analysis is conducted for product security.
    2. The Syncron Head of Operations and the IT organization shall establish, document, implement and maintain processes, procedures and controls to ensure the required level of continuity for product security during an adverse

The Business Continuity Plan detailing how Syncron will manage a disruptive event and will maintain the security of its products and customer data to a predetermined level is reviewed and approved by the Chief Technology Officer annually.

  1. Organizational, technical, procedural and process changes, whether in an operational or continuity context, can lead to changes in information security continuity In such cases, the continuity of processes, procedures and controls for Syncron products’ security is reviewed by the Chief Security Officer against these changed requirements.
  2. All Syncron Information processing facilities and product infrastructure are implemented with redundancy sufficient to meet 99,5% minimum annual uptime

 

  • Compliance
    1. All Syncron employees shall use best endeavors to ensure data protection and privacy of individuals per applicable laws and regulations.
    2. For each Syncron product offering and the organization itself, the Global Legal Counsel shall explicitly identify, document and keep up to date all relevant legislative, statutory, regulatory and contractual requirements and the organization’s approach to meet these
    3. All Syncron employees must adhere to intellectual property rights when using proprietary software products. Software products are installed in accordance with the Syncron Acceptable Use
    4. Syncron’s approach to managing information security and its implementation (i.e. control objectives, controls, policies, processes and procedures for information security) should be reviewed annually as part of the internal audit

 

  1. All Syncron employees shall ensure that the Syncron security procedures within their area of responsibility are carried out correctly to achieve compliance with the information security
  2. The Chief Security Officer has the overall responsibility and the right to perform technical compliance checks on all Syncron information systems and products to ensure compliance with this

 

SCHEDULE 3 – LIST OF SUB-PROCESSORS AUTHORIZED TO PROCESS PERSONAL DATA OF SYNCRON CUSTOMER

 

 

Sub-processors engaged and authorized to process personal data of Customer in the course of provision of the Services by Syncron

 

 

 

  • Provision of Services may include support, development, expert services and software

Last updated: October 25, 2019