These Data Processing Agreement (“Agreement”) is an Agreement between you as Controller (hereinafter āControllerā) and aqua cloud GmbH as Data Processor (hereinafter “Data Processor”, Controller and Data Processor jointly the “Parties”).
Printable version of this Agreement can be found here.
The Controller has commissioned the Data Processor in a contract already concluded (hereinafter referred to as the “Main Contract”) for the services specified therein. Part of the execution of the contract is the processing of personal data. In particular, Art. 28 GDPR imposes specific requirements on such commissioned processing. To comply with these requirements, the Parties enter into the following Data Processing Agreement (hereinafter referred to as the āAgreementā), the performance of which shall not be remunerated separately unless expressly agreed.
(1) Pursuant to Art. 4 (7) GDPR, the Controller is the entity that alone or jointly with other Controllers determines the purposes and means of the processing of personal data.
(2) Pursuant to Art. 4 (8) GDPR, a Data Processor is a natural or legal person, authority, institution, or other body that processes personal data on behalf of the Controller.
(3) Pursuant to Art. 4 (1) GDPR, personal data means any information relating to an identified or identifiable natural person (hereinafter “Data Subject”); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
(4) Personal data requiring special protection are personal data pursuant to Art. 9 GDPR revealing racial or ethnic origin, political opinions, religious or philosophical beliefs or trade union membership of Data Subjects, personal data pursuant to Art. 10 GDPR on criminal convictions and criminal offenses or related security measures, as well as genetic data pursuant to Art. 4 (13) GDPR, biometric data pursuant to Art. 4 (14) GDPR, health data pursuant to Art. 4 (15) GDPR, and data on the sex life or sexual orientation of a natural person.
(5) According to Article 4 (2) GDPR, the processing is any operation or set of operations that is performed upon personal data, whether or not by automatic means, such as collection, recording, organization, filing, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.
(6) Pursuant to Article 4 (21) GDPR, the supervisory authority is an independent state body established by a Member State pursuant to Article 51 GDPR.
(1) The Data Processor provides the services specified in the Main Contract for the Controller. In doing so, the Data Processor obtains access to personal data, which the Data Processor processes for the Controller exclusively on behalf of and in accordance with the Controller’s instructions. The scope and purpose of the data processing by the Data Processor are set out in the Main Contract and any associated service descriptions. The Controller shall be responsible for assessing the admissibility of the data processing.
(2) The Parties conclude the present Agreement to specify the mutual rights and obligations under data protection law. In case of doubt, the provisions of this Agreement shall take precedence over the provisions of the Main Contract.
(3) The provisions of this contract shall apply to all activities related to the Main Contract in which the Data Processor and its employees or persons authorized by the Data Processor come into contact with personal data originating from the Controller or collected for the Controller.
(4) The term of this Agreement shall be governed by the term of the Main Contract unless the following provisions give rise to further obligations or termination rights.
(1) The Data Processor may only collect, process or use data within the scope of the Main Contract and in accordance with the instructions of the Controller. If the Data Processor is required to carry out further processing by the law of the European Union or the Member States to which it is subject, it shall notify the Controller of these legal requirements prior to the processing.
(2) The instructions of the Controller shall initially be determined by this Agreement. Thereafter, they may be amended, supplemented, or replaced by the Controller in writing or text form by individual instructions (Individual Instructions). The Controller shall be entitled to issue such instructions at any time. This includes instructions with regard to the correction, deletion, and blocking of data.
(3) All instructions issued shall be documented by the Controller. Instructions that go beyond the service agreed in the Main Contract shall be treated as a request for a change in service.
(4) If the Data Processor is of the opinion that an instruction of the Controller violates data protection provisions, it shall notify the Controller thereof without undue delay. The Data Processor shall be entitled to suspend the implementation of the relevant instruction until it is confirmed or amended by the Controller. The Data Processor may refuse to carry out an obviously unlawful instruction.
(1) Within the scope of the implementation of the Main Contract, the Data Processor shall have access to the personal data specified in more detail in Annex 1.
(2) The group of Data Subjects affected by the data processing is listed in Annex 2.
(3) A transfer of personal data to a third country may only take place under the conditions of Art. 44 et seq. GDPR.
(1) The Data Processor shall be obliged to observe the statutory provisions on data protection and not to disclose information obtained from the Controller’s domain to third parties or expose it to their access. Documents and data shall be secured against disclosure to unauthorized persons, taking into account the state of the art.
(2) The Data Processor shall organize the internal organization within its field of responsibility in such a way that it meets the special requirements of data protection. It shall have taken the technical and organizational measures specified in Annex 3 to adequately protect the Controller’s data pursuant to Art. 32 GDPR, which the Controller acknowledges as adequate. The Data Processor reserves the right to change the security measures taken while ensuring that the contractually agreed level of protection is not undercut.
(3) The persons employed in the data processing by the Data Processor are prohibited from collecting, processing or using personal data without authorization. The Data Processor shall oblige all persons entrusted by it with the processing and performance of this contract (hereinafter “Employees”) accordingly (obligation of confidentiality, Art. 28 (3) lit. b GDPR) and shall ensure compliance with this obligation with due care.
(4) The Data Processor has appointed a data protection officer. The Data Processorās data protection officer is heyData GmbH, Kantstr. 99, 10627 Berlin, datenschutz@heydata.eu, www.heydata.eu.
(1) In the event of disruptions, suspected data protection violations or breaches of contractual obligations of the Data Processor, suspected security-related incidents or other irregularities in the processing of personal data by the Data Processor, by persons employed by it within the scope of the contract or by third parties, the Data Processor shall inform the Controller without undue delay. The same shall apply to audits of the Data Processor by the data protection supervisory authority. The notification of a personal data breach shall contain at least the following information:
(a) a description of the nature of the personal data breach, including, to the extent possible, the categories and the number of Data Subjects affected, the categories affected and the number of personal data records affected;
(b) a description of the measures taken or proposed by the Data Processor to address the breach and, where applicable, measures to mitigate its possible adverse effects;
(c) a description of the likely consequences of the personal data breach.
(2) The Data Processor shall immediately take the necessary measures to secure the data and to mitigate any possible adverse consequences for the Data Subjects, inform the Controller thereof and request further instructions.
(3) In addition, the Data Processor shall be obliged to provide the Controller with information at any time insofar as the Controller’s data are affected by a breach pursuant to paragraph 1.
(4) The Data Processor shall inform the Controller of any significant changes to the security measures pursuant to Section 5 (2).
(1) The Controller may satisfy itself of the technical and organizational measures of the Data Processor prior to the commencement of data processing and thereafter regularly on a yearly basis. For this purpose, the Controller may, for example, obtain information from the Data Processor, obtain existing certificates from experts, certifications or internal audits or, after timely coordination, personally inspect the technical and organizational measures of the Data Processor during normal business hours or have them inspected by a competent third party, provided that the third party is not in a competitive relationship with the Data Processor. The Controller shall carry out checks only to the extent necessary and shall not disproportionately disrupt the operations of the Data Processor in the process.
(2) The Data Processor undertakes to provide the Controller, upon the latter’s verbal or written request and within a reasonable period of time, with all information and evidence required to carry out a check of the technical and organizational measures of the Data Processor.
(3) The Controller shall document the results of the inspection and notify the Data Processor thereof. In the event of errors or irregularities which the Controller discovers, in particular during the inspection of the results of the inspection, the Controller shall inform the Data Processor without undue delay. If facts are found during the control, the future avoidance of which requires changes to the ordered procedure, the Controller shall notify the Data Processor of the necessary procedural changes without delay.
(1) The contractually agreed services shall be performed with the involvement of the service providers named in Annex 4 (hereinafter āSub-processorsā). The Controller grants the Data Processor its general authorization within the meaning of Article 28 (2) s. 1 GDPR to engage additional Sub-processors within the scope of its contractual obligations or to replace Sub-processors already engaged.
(2) The Data Processor shall inform the Controller before any intended change in relation to the involvement or replacement of a Sub-processor. The Controller can object to the intended involvement or replacement of a Sub-processor for an important reason under data protection law.
(3) The objection to the intended involvement or replacement of a Sub-processor must be raised within 2 weeks of receiving the information about the change. If no objection is raised, the involvement or replacement shall be deemed approved. If there is an important reason under data protection law and an amicable solution is not possible between the Controller and the Processor, the Controller has a special right of termination at the end of the month following the objection.
(1) The Data Processor shall support the Controller with suitable technical and organizational measures in fulfilling the Controller’s obligations pursuant to Articles 12-22 and 32 to 36 GDPR.
(2) If a Data Subject asserts rights, such as the right of access, correction or deletion with regard to his or her data, directly against the Data Processor, the latter shall not react independently but shall refer the Data Subject to the Controller and await the Controller’s instructions.
(1) In the internal relationship with the Data Processor, the Controller alone shall be liable to the Data Subject for compensation for damage suffered by a Data Subject due to inadmissible or incorrect data processing under data protection laws or use within the scope of the commissioned processing.
(2) The Data Processor shall have unlimited liability for damage insofar as the cause of the damage is based on an intentional or grossly negligent breach of duty by the Data Processor, its legal representative or vicarious agent.
(3) The Data Processor shall only be liable for negligent conduct in the event of a breach of an obligation, the fulfillment of which is a prerequisite for the proper performance of the contract and the observance of which the Controller regularly relies on and may rely on, but limited to the average damage typical for the contract. In all other respects, the liability of the Processor – including for its vicarious agents – shall be excluded.
(4) The limitation of liability pursuant to Ā§ 10.3 shall not apply to claims for damages arising from injury to life, body, health or from the assumption of a guarantee.
(1) After termination of the Main Contract, the Data Processor shall return to the Controller all documents, data and data carriers provided to it or – at the request of the Controller, unless there is an obligation to store the personal data under Union law or the law of the Federal Republic of Germany – delete them. This shall also apply to any data backups at the Data Processor. The Data Processor shall on request provide documented proof of the proper deletion of any data.
(2) The Controller shall have the right to control the complete and contractual return or deletion of the data at the Data Processor in an appropriate manner.
(3) The Data Processor shall be obligated to keep confidential the data of which it has become aware in connection with the Main Contract even beyond the end of the Main Contract. The present Agreement shall remain valid beyond the end of the Main Contract as long as the Data Processor has personal data at its disposal which have been forwarded to it by the Controller or which it has collected for the Controller.
(1) To the extent that the Data Processor does not expressly perform support actions under this Agreement free of charge, it may charge the Controller a reasonable fee therefore, unless the Data Processor’s own actions or omissions have made such support directly necessary.
(2) Amendments and supplements to this Agreement must be made in writing. This shall also apply to any waiver of this formal requirement. The priority of individual contractual agreements shall remain unaffected.
(3) If individual provisions of this Agreement are or become wholly or partially invalid or unenforceable, this shall not affect the validity of the remaining provisions.
(4) This agreement is subject to German law.
Name, first name, email, project role, (categories such as employee, project worker) IP addresses.
Controller, employees of the controller, if applicable external employees of the controller
1. Introduction
This document summarizes the technical and organizational measures taken by the processor within the meaning of Article 32 (1) of the GDPR. These are measures with which the processor protects personal data. The purpose of the document is to support the processor in fulfilling its accountability obligations under Art. 5 (2) GDPR.
2. Confidentiality (Art. 32 para. 1 lit. b DSGVO)
2.1 Access control
The following implemented measures prevent unauthorized persons from gaining access to the data processing facilities:
ā Alarm system
ā Ā Automatic access control system
ā Ā Video surveillance of the entrances
ā Ā Work in the home office: unauthorized persons have no access to the employee’s residence
2.2 Access control
The following implemented measures prevent unauthorized persons from accessing the data processing systems:
ā Ā Authentication with user and password
ā Ā Use of anti-virus software
ā Ā Firewall deployment
ā Ā User Permissions Management
ā Ā Use of 2-factor authentication
2.3 Access control
The following implemented measures ensure that unauthorized persons do not have access to personal data:
ā Ā Number of administrators is kept as small as possible
ā Ā Instruction to employees that only absolutely necessary data is printed out
2.4 Separation control
The following measures ensure that personal data collected for different purposes are processed separately:
ā Ā Physically separate storage on separate systems or data carriers
ā Ā Separation of productive and test system
ā Ā Encryption of data sets processed for the same purpose
ā Ā Logical client separation (on the software side)
ā Ā Creation of an authorization concept
ā Ā Setting database rights
ā Ā Providing the records with purpose attributes/data fields
ā Ā Internal instruction to anonymize/pseudonymize personal data in the event of disclosure or after expiry of the statutory deletion period, if possible.
3. integrity (Art. 32 para. 1 lit. b DSGVO)
3.1 Passing on control
It is ensured that personal data cannot be read, copied, changed or removed without authorization during transfer or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures are implemented to ensure this:
ā Provision of data via encrypted connections such as SFTP or HTTPS
3.2 Input control
The following measures ensure that it is possible to check who has processed personal data in data processing systems and at what time:
ā Ā Manual or automatic control of the logs
ā Ā Assignment of rights to enter, change and delete data on the basis of an
authorization concept
ā Ā Instruction to employees to delete data only after consultation
4. availability and resilience (Art. 32 para. 1 lit. b DSGVO)
The following measures ensure that personal data is protected against accidental destruction or loss and is always available to the client:
ā Ā Regular backups
ā Ā Creation of a backup & recovery concept
ā Ā Control of the backup process
ā Ā Separation of operating systems and data
ā Ā Hosting (at least of the most important data) with a professional hoster
5. procedures for regular review, assessment and evaluation (Art. 32(1)(d) GDPR; Art. 25(1) GDPR)
5.1 Data protection management
The following measures are intended to ensure that an organization that meets the basic requirements of data protection law is in place:
ā Ā Using the heyData platform for data protection management
ā Ā Appointment of the data protection officer heyData
ā Ā Obligation of employees to data secrecy
ā Ā Regular training of employees in data protection
ā Ā Keeping an overview of processing activities (Art. 30 GDPR)
5.2 Incident response management
The following measures are intended to ensure that notification processes are triggered in the event of data privacy breaches:
ā Ā Data breach notification process pursuant to Art. 4 No. 12 GDPR to the supervisory authorities (Art. 33 GDPR)
ā Ā Data breach notification process pursuant to Art. 4 No. 12 DSGVO vis-aĢ-vis data subjects (Art. 34 DSGVO)
ā Ā Involvement of the data protection officer in security incidents and data breaches
ā Ā Use of anti-virus software
ā Ā Firewall deployment
5.3 Data protection-friendly default settings (Art. 25 (2) GDPR)
The following implemented measures take into account the requirements of the principles “Privacy by design” and “Privacy by default”:
ā Ā Training of employees in “Privacy by design” and “Privacy by default”.
ā Ā No more personal data is collected than is necessary for the respective purpose.
5.4 Order control
The following measures ensure that personal data can only be processed in accordance with the instructions:
ā Ā Written instructions to the contractor or instructions in text form (e.g. by order processing contract)
ā Ā Ensuring the destruction of data after completion of the order, e.g. by requesting appropriate confirmations
ā Ā Confirmation from contractors that they commit their own employees to data secrecy (typically in the order processing contract)
ā Ā Careful selection of contractors (especially with regard to data security)
ā Ā Ongoing review of contractors and their activities
āĀ Ensuring the destruction of data after completion of the order, e.g. by requesting corresponding confirmation
5.5 Control procedure
The following measures ensure that a process is to be implemented to regularly review, assess and evaluate the effectiveness of the data security measures:
āĀ Internal procedure directories are updated at least annually
āĀ Keeping an overview of processing activities (Art. 30 GDPR)
āĀ Security measures taken are subject to regular internal control
āĀ A process is in place to prepare for security breaches (attacks) and system malfunctions and to identify, contain, remediate and recover from the same (incident response process)
āĀ Data protection breach notification process vis-Ć -vis supervisory authorities and data subjects, involvement of the data protection officer in security incidents and data breaches
Name: Microsoft Corporation, One Microsoft Way, Redmond, WA 98052-6399, USAā (Azure)
Function: Database-as-a-Service and storage in the cloud. Only last name, first name, email, position and phone number information may be stored if provided by the customer/user.
Server: EU
Name: Amazon Simple Email Service
Function: Sending of emails for notification (e.g. about changes), welcome message, password reset. Only the recipient email is saved and can be deleted at any time if desired.
Server: Germany
Name: Hotjar Ltd., Dragonara Business Centre, 5th Floor, Dragonara Road, Paceville St Julian’s, STJ 3141, Malta
Function: Analysis. We use Hotjar as a web analytics tool to gain a deeper understanding of product usage, optimize the solution, and improve the user experience. We do not track personal data or user-generated content. Only timestamped IP information is collected with no link to customers or user accounts.
Server: EU
Name: Amplitude, Inc., 631 Howard St. Floor 5. San Francisco, CA 94105, USA
Function: Product Analysis. The goal of using Amplitude analytics is to improve the user experience by better understanding user behavior and preferences, and to identify opportunities to improve the software.
Server: USA
Name: Microsoft Corporation, One Microsoft Way, Redmond, WA 98052-6399, USAā (Azure)
Function: Database-as-a-Service and storage in the cloud. Only last name, first name, email, position and phone number information may be stored if provided by the customer/user.
Server: EU
Name: Amazon Simple Email Service
Function: Sending of emails for notification (e.g. about changes), welcome message, password reset. Only the recipient email is saved and can be deleted at any time if desired.
Server: Germany
Printable version of this Agreement can be found here.