Data Processing Agreement
We understand that trust is an ongoing commitment from both sides. Learn how we manage your data responsibly and ethically.
Data Processing AgreementLast Updated: 2023-01-26 08:00 UTC
Click [u][url]here to download a signed copy of this document including the full text of the SSCs, UK Addendum, and Sub-Processors.
For your convenience, we have provided links to the definition of terms used in this document. Additional definitions are included within this document when the definition may be specific to its use in this document.
This Data Processing Agreement and its annexes ("DPA") reflect the parties' agreement with respect to the Processing of Personal Data by us on behalf of you in connection with our Services under our Terms of Service available at https://makanal.eu/terms between you and us (also referred to in this DPA as the "Agreement").
This DPA is supplemental to, and forms, an integral part of, the Agreement and is effective upon its incorporation into the Agreement, which may be specified in the Agreement, an Order, or an executed amendment to the Agreement. In case of any conflict or inconsistency with the terms of the Agreement, this DPA will take precedence over the terms of the Agreement to the extent of such conflict or inconsistency.
We update these terms from time to time. If you have an active Subscription, we will let you know via e-mail when changes are made (if you have subscribed to receive e-mail notifications via the link in our Terms of Service) or via an in-app notification. You can find archived versions of the DPA in our archives at https://makanal.eu/archive/legal.
The term of this DPA will follow the term of the Agreement. Terms not otherwise defined in this DPA will have the meaning as set forth in the Agreement.
"California Personal Information" means Personal Data that is subject to the protection of the CCPA.
"CCPA" means California Civil Code Sec. 1798.100 et seq. (also known as the California Consumer Privacy Act of 2018).
"Consumer", "Business", "Sell", and "Service Provider" will have the meanings given to them in the CCPA.
"Controller" means the natural or legal person, public authority, agency, or other body, that, alone or jointly with others, determines the purposes and means of the Processing of Personal Data.
"Data Protection Laws" means all applicable worldwide legislation relating to data protection and privacy which applies to the respective party in the role of Processing Personal Data in question under the Agreement, including without limitation European Data Protection Laws, the CCPA, and the data protection and privacy laws of Australia and Singapore; in each case, as amended, repealed, consolidated, or replaced from time to time.
"Data Subject" means the individual to whom Personal Data relates.
"Europe" means the European Union, the European Economic Area and/or their member states, Switzerland, and the United Kingdom.
"European Data" means Personal Data that is subject to the protection of European Data Protection Laws.
"European Data Protection Laws" means data protection laws applicable in Europe, including (i) Regulation 2016/679 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)("GDPR"); (ii) Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector; and (iii) applicable national implementations of (i) and (ii); or (iii) GDPR as it forms part of the United Kingdom domestic law by virtue of Section 3 of the European Union (Withdrawal) Act 2018 ("UK GDPR"); and (iv) Swiss Federal Data Protection Act on 19 June 1992 and its Ordinance ("Swiss DPA"); in each case, as may be amended, superseded, or replaced.
"Instructions" means the written, documented instructions issued by a Controller to a Processor, and directing the same to perform a specific or general action with regard to Personal Data (including without limitation depersonalising, blocking, deletion, making available).
"Permitted Affiliates" means any of your Affiliates that (i) are permitted to use our Services pursuant to the Agreement, but have not signed their own separate agreement with us and are not a Customer, (ii) qualify as a Controller of Personal Data Processed by us, and (iii) are subject to European Data Protection Laws.
"Personal Data" means any information relating to an identified or identifiable individual where (i) such information is contained within Customer Data; and (ii) is protected similarly as personal data, personal information, or personally identifiable information under applicable Data Protection Laws.
"Personal Data Breach" means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data transmitted, stored, or otherwise Processed by us and/or our Sub-Processors in connection with the provision of our Services. "Personal Data Breach" will not include unsuccessful attempts or activities that do not compromise the security of Personal Data, including unsuccessful sign-in attempts, pings, port scans, denial of service attacks, and other network attacks on firewalls or networked systems.
"Privacy Sheild" means the EU-US and Swiss-US Privacy Shield self-certification program operated by the US Department of Commerce and approved by the European Commission pursuant to its Decision of July 12, 2016, and by the Swiss Federal Council on January 11, 2017, respectively; as may be amended, superseded, or replaced.
"Privacy Shield Principles" means the Privacy Shield Principles (as supplemented by the Supplemental Principles) contained in Annexe II to the European Commission Decision of July 12, 2016; as may be amended, superseded, or replaced.
"Processing" means any operation or set of operations which is performed on Personal Data, encompassing the collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction or erasure of Personal Data. The terms "Process", "Processes", and "Processed" will be construed accordingly.
"Processor" means a natural or legal person, public authority, agency, or other body which Processes Personal Data on behalf of the Controller.
"Standard Contractual Clauses" means the standard contractual clauses annexed to the European Commission's Decision (EU) 2021/914 of June 4, 2021, currently found at 🌐https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection/standard-contractual-clauses-scc/standard-contractual-clauses-international-transfers_en, as may be amended, superseded, or replaced.
"Sub-Processor" means any Processor engaged by us or our affiliates to assist in fulfilling our obligations with respect to the provision of our Services under the Agreement. Sub-Processors may include third parties or our affiliates but will exclude any of our employees or consultants.
"UK Addendum" means the International Data Transfer Addendum issued by the UK Information Commissioner under section 119A(1) of the Data Protection Act 2018 currently found at 🌐https://ico.org.uk/media/for-organisations/documents/4019539/international-data-transfer-addendum.pdf, as may be amended, superseded, or replaced.
2. Customer Responsibilities
a. Compliance with Laws
Within the scope of the Agreement and in its use of our Services, you will be responsible for complying with all requirements that apply to it under applicable Data Protection Laws with respect to its Processing of Personal Data and the Instructions it issues to us.
In particular but without prejudice to the generality of the foregoing, you acknowledge and agree that you will be solely responsible for: (i) the accuracy, quality, and legality of Customer Data and the means by which you acquired Personal Data; (ii) complying with all necessary transparency and lawfulness requirements under applicable Data Protection Laws for the collection and use of the Personal Data, including obtaining any necessary consents and authorizations (particularly for use by Customer for marketing purposes); (iii) ensuring you have the right to transfer, or provide access to, the Personal Data to us for Processing in accordance with the terms of the Agreement (including this DPA); (iv) ensuring that your Instructions to us regarding the Processing of Personal Data comply with applicable laws, including Data Protection Laws; and (v) complying with all laws (including Data Protection Laws) applicable to any e-mails or other content created, sent, or managed through our Services, including those relating to obtaining consents (where required) to send e-mails, the content of the e-mails, and its e-mail deployment practices. You will inform us without undue delay if you are not able to comply with your responsibilities under this "Compliance with Laws" section or applicable Data Protection Laws.
b. Controller Instructions
The parties agree that the Agreement (including this DPA), together with your use of our Services in accordance with this Agreement, constitutes your complete Instructions to us in relation to the Processing of Personal Data, so long as you may provide additional instructions during the subscription term that are consistent with the Agreement and the nature and lawful use of our Services.
You are responsible for independently determining whether the data security provided for our Services adequately meets your obligations under applicable Data Protection Laws. You are also responsible for your secure use of our Services, including protecting the security of Personal Data in transit to and from our Services (including securely backing up or encrypting any such Personal Data).
3. Our Obligations
a. Compliance with Instructions
We will only Process Personal Data for the purposes described in this DPA or as otherwise agreed within the scope of your lawful Instructions, except where and to the extent otherwise required by applicable law. We are not responsible for compliance with any Data Protection Laws applicable to you or your industry that are not generally applicable to us.
b. Conflict of Laws
If we become aware that we cannot Process Personal Data in accordance with your Instructions due to a legal requirement under any applicable law, we will (i) promptly notify you of that legal requirement to the extent permitted by the applicable law; and (ii) where necessary, cease all Processing (other than storing and maintaining the security of the affected Personal Data) until such time as you issue new Instructions with which we are able to comply. If this provision is invoked, we will not be liable to you under the Agreement for any failure to perform or provide the applicable Services until such time as you issue new lawful instructions with regard to the Processing.
We will implement and maintain appropriate technical and organizational measures to protect Personal Data from Personal Data Breaches, as described under Annexe 2 to this DPA ("Security Measures"). Notwithstanding any provision to the contrary, we may modify or update the Security Measures at our discretion provided that such modification or update does not result in a material degradation in the protection offered by the Security Measures.
We will ensure that any person who we authorize to Process Personal Data on our behalf is subject to appropriate confidentiality obligations (whether a contractual or statutory duty) with respect to that Personal Data.
e. Personal Data Breaches
We will notify you without undue delay after we become aware of any Personal Data Breach as it becomes known or reasonably requested by you. At your request, we will promptly provide you with such reasonable assistance as necessary to enable you to notify relevant Personal Data Breaches to competent authorities and/or affected Data Subjects, if you are required to do so under Data Protection Laws.
f. Deletion or Return of Personal Data
We will delete or return all Customer Data, including Personal Data (including copies thereof) Processed pursuant to this DPA, on termination or expiration of your Subscription in accordance with the procedures set out in our Terms of Service. This term will apply except where we are required by applicable law to retain some or all of the Customer data, or where we have archived Customer data on backup systems, which data we will securely isolate and protect from any further Processing and delete in accordance with our deletion practices. You may request the deletion of your Account after the expiration or termination of all Subscriptions associated with the Account by sending a request using our Privacy Request Form at https://makanal.eu/privacy-request. You may retrieve your Customer Data from your Account in accordance with our "Retrieval of Customer Data" section in our Terms of Service.
4. Data Subject Requests
Our Services provide you with a number of controls that you can use to retrieve, correct, delete, or restrict Personal Data, which you can use to manage them in connection with obligations under Data Protection Laws, including your obligations relating to responding to requests from Data Subjects to exercise their rights under applicable Data Protection Laws ("Data Subject Requests").
To the extent that you are unable to independently address a Data Subject Request through our Services, then upon your written request, we will provide reasonable assistance to you to respond to any Data Subject Requests or requests from data protection authorities relating to the Processing of Personal Data under the Agreement. You will reimburse us for the commercially reasonable costs arising from this assistance.
If a Data Subject Request or other communication regarding the Processing of Personal Data under the Agreement is made directly to us, we will promptly inform you and will advise that Data Subject to submit their request to you. You will be solely responsible for responding substantively to any such Data Subject Requests or communications involving Personal Data.
You agree we may engage Sub-Processors to Process Personal Data on your behalf, and we do so in three ways. First, we may engage Sub-Processors to assist us with hosting and infrastructure. Second, we may engage Sub-Processors to support product features and integrations. Third, we may engage affiliates as Sub-Processors for service and support. Some Sub-Processors will apply to you as a default, and some Sub-Processors will apply only if you opt in.
We have currently appointed, as Sub-Processors, the third parties and affiliates listed in Annexe 3 to this DPA. You may subscribe to receive notifications by e-mail if we add or replace any Sub-Processors by selecting the "Sub-Processor Updates" subscription type in your Account. If you opt-in to receive such e-mails, we will notify you at least 30 days prior to any such change.
Where we engage Sub-Processors, we will impose data protection terms on the Sub-Processors that provide at least the same level of protection for Personal Data as those in this DPA (including, where appropriate, the Standard Contractual Clauses), to the extent applicable to the nature of the services provided by such Sub-Processors. We will remain responsible for each Sub-Processor's compliance with the obligations of this DPA and for any acts or omissions of such Sub-Processor that cause us to breach any of its obligations under this DPA.
6. Data Transfers
You acknowledge and agree that we may access and Process Personal Data on a global basis as necessary to provide our Services in accordance with this Agreement, and in particular that Personal Data may be transferred to and Processed by us in the United States and Europe and to other jurisdictions where our affiliates and Sub-Processors have operations. Wherever Personal Data is transferred outside its country of origin, each party will ensure such transfers are made in compliance with the requirements of Data Protection Laws.
7. Additional Provisions for European Data
This "Additional Provisions for European Data" section will apply only with respect to European Data.
b. Roles of the Parties
When Processing European Data in accordance with your Instructions, the parties acknowledge and agree that you are the Controller of European Data and we are the Processor.
If we believe that your Instruction infringes European Data Protection Laws (where applicable), we will inform you without delay.
d. Objection to New Sub-Processors
We will give you the opportunity to object to the engagement of new Sub-Processors on reasonable grounds relating to the protection of Personal Data within 30 days of notifying you in accordance with the "Sub-Processors" section. If you do notify us of such an objection, the parties will discuss your concerns in good faith with a view to achieving a commercially reasonable resolution. If no such resolution can be reached, we will, at our sole discretion, either not appoint the new Sub-Processor, or permit you to suspend or terminate the affected Subscription in accordance with the termination provisions of the Agreement without liability to either party (but without prejudice to any fees incurred by you prior to suspension or termination). The parties agree that by complying with this subsection (d), we fulfil our obligations under Section 9 of the Standard Contractual Clauses.
e. Sub-Processor Agreements
For the purposes of Clause 9(c) of the Standard Contractual Clauses, you acknowledge that we may be restricted from disclosing Sub-Processor agreements but we will use reasonable efforts to require any Sub-Processor we appoint to permit it to disclose the Sub-Processor agreement to you and will provide (on a confidential basis) all information we reasonably can.
f. Data Protection Impact Assessments and Consultation with Supervisory Authorities
To the extent that the required information is reasonably available to us, and you do not otherwise have access to the required information, we will provide reasonable assistance to you with any data protection impact assessments, and prior consultations with supervisory authorities (for example, the French Data Protection Agency (CNIL), the Berlin Data Protection Authority (BlnBDI), and the UK Information Commissioner's Office (ICO)) or other competent data privacy authorities to the extent required by European Data Protection Laws.
g. Transfer Mechanisms for Data Transfers
(A) We will not transfer European Data to any country or recipient not recognized as providing an adequate level of protection for Personal Data (within the meaning of applicable European Data Protection Laws) unless it first takes all such measures as are necessary to ensure the transfer is in compliance with applicable European Data Protection Laws. Such measure may include (without limitation) transferring such data to a recipient that is covered by a suitable framework or other legally adequate transfer mechanism recognized by the relevant authorities or courts as providing an adequate level of protection for Personal Data, to a recipient that has achieved binding corporate rules authorization in accordance with European Data Protection Laws, or to a recipient that has executed appropriate standard contractual clauses in each case as adopted or approved in accordance with applicable European Data Protection Laws.
(B) You acknowledge that in connection with the provision of our Services, we are a recipient of European Data in the United States. Subject to subsections (C) and (D), the parties agree that the Standard Contractual Clauses will be incorporated by reference and form part of the Agreement as follows:
- (a) EEA Transfers. In relation to European Data that is subject to the GDPR (i) "Customer is the "data exporter" and we are the "data importer"; (ii) the Module Two terms apply to the extent the Customer is a Controller of European Data and the Module Three terms apply to the extent the Customer is a Processor of European Data; (iii) in Clause 7, the optional docking clause applies; (iv) in Clause 9, Option 2 applies and changes to Sub-Processors will be notified in accordance with the "Sub-Processors" section of this DPA; (v) in Clause 11, the optional language is deleted; (vi) in Clauses 17 and 18, the parties agree that the governing law and forum for disputes for the Standard Contractual Clauses will be determined in accordance with the Services under our Terms of Service or, if such terms do not specify an EU Member State, the Hungary (without reference to conflicts of law principles); (vii) the Annexes of the Standard Contractual Clauses will be deemed completed with the information set out in the Annexes of this DPA; and (viii) if and to the extent the Standard Contractual Clauses conflict with any provision of this DPA, the Standard Contractual Clauses will prevail to the extent of such conflict.
- (b) UK Transfers. In relation to European Data that is subject to the UK GDPR, the Standard Contractual Clauses will apply in accordance with subsection (a) and the following modifications (i) the Standard Contractual Clauses will be modified and interpreted in accordance with the UK Addendum, which will be incorporated by reference and form an integral part of the Agreement; (ii) Tables 1, 2, and 3 of the UK Addendum will be deemed completed with the information set out in the Annexes of this DPA and Table 4 will be deemed completed by selecting "neither party"; and (iii) any conflict between the terms of this Standard Contractual Clauses and the UK Addendum will be resolved in accordance with Section 10 and Section 11 of the UK Addendum.
- (c) Swiss Transfers. In relation to European Data that is subject to the Swiss DPA, the Standard Contractual Clauses will apply in accordance with subsection (a) and the following modifications: (i) references to "Regulation (EU) 2016/679" will be interpreted as references to the Swiss DAP; (ii) references to "EU", "Union", and "Member State Law" will be interpreted as references to Swiss law; and (iii) references to the "competent" supervisory authority" and "competent courts" will be replaced with "the Swiss Federal Data Protection and Information Commissioner" and the "relevant courts of Switzerland".
(C) If we cannot comply with the obligations under the Standard Contractual Clauses or are in breach of any warranties under the Standard Contractual Clauses or UK Addendum (as applicable) for any reason, and you intend to suspend the transfer of European Data to us or terminate the Standard Contractual Clauses or UK Addendum, you agree to provide us with reasonable notice to enable us to cure such non-compliance and reasonably cooperate with us to identify what additional safeguards, if any, may be implemented to remedy such non-compliance. If we have not or cannot cure the non-compliance, you may suspend or terminate the affected Subscription in accordance with the Agreement without liability to either party (but without prejudice to any fees you have incurred prior to such suspension or termination).
(D) Although we do not currently rely on the EU-US Privacy Shield as a legal basis for transfers of European Data in light of the judgement of the Court of Justice of the EU in Case C-311/18, we will process European Data in compliance with the Privacy Shield Principles and let you know if we are unable to comply with this requirement. In the event that we adopt an alternative transfer mechanism (including any new or successor version of the EU-US Privacy Shield) for transfers of European Data to us, such alternative transfer mechanism will apply automatically instead of the Standard Contractual Clauses described in this DPA (but only to the extent such alternative transfer mechanism complies with European Data Protection Laws), and you agree to execute such other documents or take such action as may be reasonably necessary to give legal effect for such alternative transfer mechanism.
h. Demonstration of Compliance
We will make all information reasonably necessary to demonstrate compliance with this DPA available to you and allow for and contribute to audits, including inspections conducted by our or your auditor in order to assess compliance with this DPA. You acknowledge and agree that you will exercise your audit rights under this DPA and Clause 8.9 of the Standard Contractual Clauses by instructing us to comply with the audit measures described in this "Demonstration of Compliance" section. You acknowledge that the Services are hosted by our Sub-Processors who maintain independently validated security programs (including SOC 2 and IOS 27001) and that our systems are audited annually as part of SOC 2 compliance and regularly tested by independent third-party penetration testing firms. Upon request, we will supply (on a confidential basis) our SOC 2 report and summary copies of our penetration testing report(s) to you so that you can verify our compliance with this DPA. You may download copies of these documents from our website at https://makanal.eu/security-reports. Further, at your written request, we will provide written responses (on a confidential basis) to all reasonable requests for information made by you necessary to confirm our compliance with this DPA, provided that you will not exercise this right more than once per calendar year unless you have reasonable grounds to suspect non-compliance with the DPA.
8. Additional Provisions for California Personal Information
The "Additional Provisions for California Personal Information" section of this DPA will apply only with respect to California Personal Information.
b. Roles of the Parties
When processing California Personal Information in accordance with your Instructions, the parties acknowledge and agree that you are a Business and we are a Service Provider for the purposes of the CCPA.
9. General Provisions
Notwithstanding anything else to the contrary in the Agreement and without prejudice to the "Compliance with Instructions" or "Security" sections of this DPA, we reserve the right to make any updates and changes to this DPA, and the terms that apply in the "Amendment; No Waiver" section of the Terms of Service will apply.
If any individual provisions of this DPA are determined to be invalid or unenforceable, the validity and enforceability of the other provisions of this DPA will not be affected.
c. Limitation of Liability
Each party and each of their affiliates' liability, taken in aggregate, arising out of or related to this DPA (and any other DPAs between the parties) and the Standard Contractual Clauses (where applicable), whether in contract, tort, or under any other theory of liability, will be subject to the limitations and exclusions of liability set out in the "Limitation of Liability" section of the Terms of Service, and any reference in such section to the liability of a party means the aggregate liability of that party and all of its affiliates under the Agreement (including this DPA). In no event will either party's liability be limited with respect to any individual's data protection rights under this DPA (including the Standard Contractual Clauses) or otherwise.
d. Governing Law
This DPA will be governed by and construed in accordance with the "Contracting Entity; Applicable Law; Notice" sections of the Terms of Service unless required otherwise by Data Protection Laws.
10. Parties to this DPA
a. Permitted Affiliates
By signing the Agreement, you enter into this DPA (including, where applicable, the Standaard Contractual Clauses) on behalf of yourself and in the name and on behalf of your Permitted Affiliates. For the purpose of this DPA only, and except where indicated otherwise, the terms "Customer", "you", and "your" will include you and such Permitted Affiliates.
The legal entity agreeing to this DPA as Customer represents that it is authorized to agree to and enter into this DPA for and on behalf of itself and, as applicable, each of its Permitted Affiliates.
The parties agree that (i) solely the Customer entity that is the contracting party to the Agreement will exercise any right or seek any remedy any Permitted Affiliate may have under this DPA on behalf of its Affiliates, and (ii) the Customer entity that is the contracting party to the Agreement will exercise any such rights under this DPA not separately for each Permitted Affiliate individually but in a combined manner for itself and all of its Permitted Affiliates together. The Customer entity that is the contracting entity is responsible for coordinating all Instructions, authorizations, and communications with us under the DPA and will be entitled to make and receive any communications related to this DPA on behalf of its Permitted Affiliates.
d. Other Rights
The parties agree that you will, when reviewing our compliance with this DPA pursuant to the "Demonstration of Compliance" section, take all reasonable measures to limit any impact on us and our affiliates by combining several audit requests carried out on behalf of the Customer entity that is the contracting party to the Agreement and all of its Permitted Affiliates in one single audit.
Annexe 1 - Details of Processing
A. List of Parties
Role (controller/processor): Controller
Name: Makánal Tech
Address: 1078 Budapest, Cserhát utca 5, Hungary
Contact person's name, position, and contact details: Heather Davidson, Data Protection Officer, Makánal Tech, 1078 Budapest, Cserhát utca 5, Hungary
Role (controller/processor): Processor
B. Description of Transfer
Categories of Data Subjects whose Personal Data is Transferred
You may submit Personal Data in the course of using our Services, the extent of which is determined and controlled by you in your sole discretion, and which may include, but is not limited to Personal Data relating to the following categories of Data Subjects:
Your Contacts and other end users including your employees, contractors, collaborators, customers, prospects, suppliers, and subcontractors. Data Subjects may also include individuals attempting to communicate with or transfer Personal Data to your end users.
Categories of Personal Data Transferred
You may submit Personal Data to our Services, the extent of which is determined and controlled by you in your sole discretion, and which may include but is not limited to the following categories of Personal Data:
1. Contact Information (as defined in our Terms of Service).
2. Any other Personal Data submitted by, sent to, or received by you, or your end users, via the Services.
Sensitive Data Transferred and Applied Restrictions or Safeguards
The parties do not anticipate the transfer of sensitive data.
Frequency of the Transfer
Nature of the Processing
Personal Data will be Processed in accordance with the Agreement (including this DPA) and may be subject to the following Processing activities:
1. Storage and other Processing necessary to provide, maintain, and improve the Services provided to you; and/or
2. Disclosure in accordance with the Agreement (including this DPA) and/or as compelled by applicable laws.
Purpose of the Transfer and Further Processing
Period for which Personal Data will be Retained
Subject to the "Deletion or Return of Personal Data" section of this DPA, we will Process Personal Data for the duration of the Agreement, unless otherwise agreed in writing.
C. Competent Supervisory Authority
For the purposes of the Standard Contractual Clauses, the supervisory authority that will act as the competent supervisory authority will be determined in accordance with GDPR.
Annexe 2 - Security Measures
We currently observe the Security Measures described in this Annexe 2. All capitalised terms not otherwise defined herein will have the meanings as set forth in the Terms of Service. For more information on these security measures, please refer to the reports available at https://makanal.eu/security-reports.
a) Access Control
(i) Preventing Unauthorized Product Access
Outsourced processing: We host our Services with outsourced service providers. Additionally, we maintain contractual relationships with vendors in order to provide the Services in accordance with this DPA. We rely on contractual agreements, privacy policies, and vendor compliance programs in order to protect data processed or stored by these vendors.
Physical and environmental security: We host our product infrastructure, directly and indirectly, with multi-tenant, outsourced infrastructure providers. We do not own or maintain hardware located at the outsourced infrastructure providers' data centres. Production servers and client-facing applications are logically and physically secured separately from our internal corporate information systems. The physical and environmental security controls are audited for SOC2 Type II and ISO 27001 compliance, among other certifications.
Authentication: We implement a uniform password policy for our customer products. Customers who interact with the products via the user interface must authenticate before accessing non-public Customer Data.
Authorization: Customer Data is stored in multi-tenant storage systems accessible to Customers only via application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of our products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed by validating the User's permissions against the attributes associated with each data set.
Application Programming Interface (API) Access: Public product APIs may be accessed using an API key or through OAuth authorization.
(ii) Preventing Unauthorized Product Use
We implement industry-standard access controls and detection capabilities for the internal networks that support our Services.
Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include virtual private network implementations, network and application security group assignments, and traditional firewall rules.
Intrusion detection and prevention: We implement virtual firewall and gateway solutions to protect hosted websites and other Internet-facing applications. These solutions are designed to identify and prevent attacks against publicly available network services.
Static code analysis: Code stored in our source code repositories is checked for best practices and identifiable software flaws using automated tooling.
Penetration testing: We maintain relationships with industry-recognized penetration testing service providers for four annual penetration tests. The intent of penetration testing is to identify and resolve foreseeable attack vectors and potential abuse scenarios. Penetration tests are performed against the application layers and infrastructure layers of the Sarana technology stack.
Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. We implement a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve defences against sophisticated attacks.
(iii) Limitations of Privilege & Authorization Requirements
Product access: A subset of our employees have access to the products and to customer data via controlled interfaces. The intent of providing access to a subset of employees is to provide effective customer support, product development and research, troubleshoot potential problems, detect and respond to security incidents, and implement data security. Access is enabled through "just in time" (JITA) requests for access and/or restricted administrative application user interfaces which enforce two-factor authorization, including biometric security mechanisms. Administrative or high-risk access permissions are reviewed at least once every six months.
Background checks: Where permitted by applicable law, our employees undergo third-party background or reference checks. All employees are required to conduct themselves in a manner consistent with company guidelines, non-disclosure requirements, and ethical standards.
b) Transmission Control
In-transit: We require HTTPS encryption (also referred to as SSL or TLS) on all sign-in interfaces and every website we operate. Our HTTPS implementation uses industry-standard algorithms and certificates.
At-rest: We store user passwords following industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.
c) Input Control
Detection: We designed our infrastructure to log extensive information about the system behaviour, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate employees of malicious, unintended, or anomalous activities. Our personnel, including security, operations, and support personnel, are responsive to known incidents.
Response and tracking: We maintain a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, we will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Notification to you will be in accordance with the terms of the Agreement.
d) Availability Control
Infrastructure availability: The infrastructure providers use commercially reasonable efforts to ensure a minimum of 99.95% uptime. The providers maintain a minimum of N+1 redundancy to power, network, heating, ventilation, and air conditioning (HVAC) services.
Fault tolerance: Backup and replication strategies are designed to ensure redundancy and fail-over protections during a significant processing failure. Customer data is backed up to multiple durable data stores and replicated across multiple availability zones.
Online replicas and backups: Where feasible, production databases are designed to replicate data between no less than 1 primary and 1 secondary database. All databases are backed up and maintained using at least industry-standard methods.
Disaster recovery plans: We maintain and regularly test disaster recovery plans to help ensure the availability of information following an interruption to, or failure of, critical business processes.
Our Services are designed to ensure redundancy and seamless failover. The server instances that support the Services are also architected with the goal to prevent single points of failure. This design assists our operations in maintaining and updating the Services while limiting downtime.
Annexe 3 - Sub-Processors
We engage Sub-Processors to assist us with delivering the Services and performing our Processing activities. A list of our Sub-Processors and our purpose for engaging them is located in our Sub-Processors page available at https://makanal.eu/subprocessors, which is incorporated into this DPA.