ADENDA AO TRATAMENTO DE DADOS DE CLIENTES
ADENDA AO TRATAMENTO DE DADOS DE CLIENTES
Esta Adenda ao Tratamento de Dados ("ATD") e os anexos aplicáveis aplicam-se quando a HP trata os Dados Pessoais do Cliente de forma a prestar os Serviços acordados nos contratos aplicáveis entre a HP e o Cliente ("Contrato de Serviços"). Os termos com maiúscula inicial não definidos especificamente no presente acordo têm o significado estabelecido no Contrato de Serviços. Em caso de conflito entre os termos do Contrato de Serviços, no que diz respeito ao tratamento de Dados Pessoais e este ATD, o ATD prevalecerá.
1 DEFINIÇÕES
1.1 "CCPA" significa California Consumer Privacy Act (Legislação de privacidade do consumidor da Califórnia) de 2018, conforme emendada pela CPRA (California Privacy Rights Act – Legislação dos direitos de privacidade da Califórnia), código civil da Califórnia 1798.100, et seq., e quaisquer regulamentos associados, com a redação que lhes foi dada e completada periodicamente;
1.2 "Cliente" significa o cliente utilizador final dos Serviços HP;
1.3 "Dados Pessoais do Cliente" significa os Dados Pessoais em relação aos quais o Cliente é o Responsável pelo Tratamento e que são tratados pela HP enquanto Subcontratante ou Subcontratante Ulterior no decurso da prestação dos Serviços;
1.4 "Responsável pelo Tratamento" significa a pessoa singular ou coletiva, autoridade pública, agência ou qualquer outro organismo que, sozinho ou em conjunto com outros, determine as finalidades e os meios do tratamento dos Dados Pessoais e inclua uma "empresa" tal como definida no CCPA;
1.5 "Subcontratante" significa qualquer pessoa singular ou coletiva, autoridade pública, agência ou qualquer outro organismo que trate Dados Pessoais em nome de um Responsável pelo Tratamento ou por instrução de outro Subcontratante que atue em nome de um Responsável pelo Tratamento;
1.6 "Legislação de Proteção de Dados e Privacidade" significa todas as leis e regulamentos atuais e futuros aplicáveis relativos ao tratamento, à segurança, à proteção e à conservação de Dados Pessoais e privacidade que possam existir nas jurisdições relevantes, incluindo, mas não se limitando ao CCPA, RGPD/GDPR, PIPL e quaisquer regulamentos e normas nacionais que protegem as informações pessoais dos indivíduos na República Popular da China, Regulamento Geral de Proteção de Dados do Reino Unido, Data Protection Act (legislação de proteção de dados) de 2018 do Reino Unido, Diretiva 2002/58/CE relativa ao tratamento de dados pessoais e à proteção da privacidade no setor das comunicações eletrónicas, quaisquer leis ou regulamentos nacionais que implementem as diretivas anteriores, bem como quaisquer leis de proteção de dados da Noruega, da Islândia, do Liechtenstein e da Suíça e quaisquer alterações ou substituições dessas leis e regulamentos;
1.7 "Titular dos Dados" terá o significado atribuído ao termo "titular dos dados" ao abrigo da Legislação de Proteção de Dados e Privacidade Aplicável e incluirá, no mínimo, todas as pessoas singulares identificadas ou identificáveis a quem os Dados Pessoais se referem;
1.8 "UE" significa a União Europeia e os países membros dessa união coletivamente;
1.9 "País Europeu" significa um Estado-Membro da UE, a Noruega, a Islândia, o Liechtenstein e a Suíça;
1.10 "Mecanismo de Adequação Aprovado Europa-EUA" significa qualquer mecanismo de adequação aprovado ao abrigo da Legislação de Proteção de Dados e Privacidade Aplicável para a transferência de Dados Pessoais de um país europeu para os EUA;
1.11 "Cláusulas Contratuais-Tipo da UE" significa as cláusulas contratuais-tipo da UE para a transferência de Dados Pessoais dos Responsáveis pelo Tratamento para os Subcontratantes e dos Subcontratantes para os Subcontratantes prevista na Decisão de Execução (UE) 2021/914 da Comissão, de 4 de junho de 2021 ou o seu sucessor, com quaisquer alterações necessárias para a Suíça;
1.12 "RGPD" "GDPR" significa Regulamento Geral de Proteção de Dados (UE) 2016/679 relativo à proteção das pessoas singulares no que diz respeito ao tratamento de dados pessoais e à livre circulação desses dados;
1.13 "Grupo HP" significa HP Inc. (1501 Page Mill Road, Palo Alto, CA 94304) e todas as suas filiais detidas e controladas maioritariamente, independentemente da jurisdição de constituição ou operação;
1.14 "Dados Pessoais" significa qualquer informação relativa a um indivíduo identificado ou identificável ou, conforme definido de outra forma pela Legislação de Proteção de Dados e Privacidade Aplicável. É considerada identificável uma pessoa que possa ser identificada, direta ou indiretamente, em especial por referência a um identificador, como por exemplo um nome, um número de identificação, dados de localização, identificadores por via eletrónica ou a um ou mais elementos específicos da sua identidade física, fisiológica, genética, mental, económica, cultural ou social;
1.15 "Incidente de Dados Pessoais" terá o significado atribuído pela Legislação de Proteção de Dados e Privacidade aos termos "incidente de segurança", "violação de segurança" ou "violação de dados pessoais", mas incluirá qualquer situação em que a HP tenha conhecimento de que os Dados Pessoais do Cliente foram ou podem ter sido acedidos, divulgados, alterados, perdidos, destruídos ou utilizados por pessoas não autorizadas, de forma não autorizada;
1.16 "PIPL" significa Personal Information Protection Law (legislação de proteção de informações pessoais) da República Popular da China;
1.17 "tratar", "tratamentos", "tratamento" ou "tratado" significa qualquer operação ou conjunto de operações efetuadas com Dados Pessoais, seja ou não por meios automatizados, incluindo, sem limitação, aceder, recolher, registar, organizar, estruturar, reter, conservar, adaptar ou alterar, recuperar, consultar, utilizar, divulgar por transmissão, difundir ou disponibilizar de outra forma, comparar, interconectar, bloquear, limitar, apagar e destruir Dados Pessoais e quaisquer definições equivalentes presentes na Legislação de Proteção de Dados e Privacidade Aplicável, na medida em que tais definições excedam esta definição;
1.18 "Regras Empresariais Vinculativas do Subcontratante" significa as regras empresariais vinculativas para o Subcontratante aprovadas por certas Autoridades de Privacidade na UE;
1.19 "País Relevante" significa todos os países que não os países europeus e outros países relativamente aos quais existe uma conclusão de adequação nos termos do artigo 45.º do RGPD ou o equivalente nos termos da legislação suíça ou do Reino Unido e inclui os EUA, desde que qualquer tal conclusão de adequação se limite a exigir a utilização de um Mecanismo de Adequação Aprovado Europa-EUA;
1.20 "Vender" e "Venda" terão o significado definido no CCPA;
1.21 "Partilhar" terá o significado definido no CCPA;
1.22 "Serviços" significa serviços, incluindo produtos e apoio, prestados pela HP ao abrigo do Contrato de Serviços;
1.23 "Contrato de Serviços" significa o acordo entre a HP e o Cliente relativo à aquisição de Serviços à HP; e
1.24 "Subcontratante Ulterior" significa qualquer pessoa singular ou coletiva, autoridade pública, agência ou qualquer outro organismo que trate Dados Pessoais em nome de um Subcontratante que atue em nome de um Responsável pelo Tratamento.
2 ÂMBITO E CUMPRIMENTO DA LEGISLAÇÃO
2.1 Este ATD aplica-se ao tratamento de Dados Pessoais do Cliente pela HP no âmbito da prestação dos Serviços pela HP e quando esta atua como Subcontratante em nome do Cliente enquanto Responsável pelo Tratamento. Todas as Partes cumprirão a Legislação de Proteção de Dados e Privacidade Aplicável. Nada na presente Secção 2.1 alterará quaisquer restrições aplicáveis aos direitos das Partes em matéria de utilização ou tratamento de Dados Pessoais ao abrigo do Acordo entre as Partes.
2.2 As categorias Titulares dos Dados, tipos de Dados Pessoais do Cliente tratados e finalidades de tratamento estão definidas no Anexo 1 deste ATD. A HP tratará os Dados Pessoais do Cliente durante a vigência do Contrato de Serviços (ou durante o período exigido pela legislação aplicável, se superior).
2.3 O Cliente, na sua utilização dos Serviços da HP, terá a exclusiva responsabilidade de cumprir toda a Legislação de Proteção de Dados e Privacidade Aplicável relativamente à exatidão, qualidade e legalidade dos Dados Pessoais do Cliente que serão tratados pela HP no âmbito dos Serviços. O Cliente garantirá ainda que as instruções que fornece à HP no âmbito do tratamento de Dados Pessoais do Cliente cumprirão toda a Legislação de Proteção de Dados e Privacidade Aplicável e não levarão a HP a não cumprir as suas obrigações nos termos da Legislação de Proteção de Dados e Privacidade Aplicável.
2.4 Se o Cliente utilizar os Serviços para tratar quaisquer categorias de Dados Pessoais não abrangidas expressamente por este ATD, o Cliente age por sua conta e risco e a HP não será responsável por eventuais incumprimentos relacionados com essa utilização.
2.5 Quando a HP divulgar quaisquer Dados Pessoais do colaborador da HP ao Cliente ou um colaborador da HP fornecer Dados Pessoais diretamente ao Cliente, que o Cliente trata no âmbito da gestão da sua utilização dos Serviços, o Cliente tratará esses Dados Pessoais de acordo com as suas políticas de privacidade e a Legislação de Proteção de Dados e Privacidade Aplicável. Tais divulgações só serão efetuadas pela HP se forem lícitas para efeitos de gestão de contratos, gestão de serviços ou para fins razoáveis de verificação de antecedentes ou de segurança do Cliente.
3 OBRIGAÇÕES DO SUBCONTRATANTE
3.1 Não obstante algo em contrário no Contrato de Serviços, em relação aos Dados Pessoais do Cliente, a HP:
3.1.1 apenas tratará os Dados Pessoais do Cliente de acordo com as instruções documentadas do Cliente (que podem ser de natureza específica ou geral, conforme estabelecido no Contrato de Serviços ou conforme acordado entre as Partes). Sem limitação da generalidade do que precede, na medida em que o CCPA se aplicar aos Dados Pessoais do Cliente, a HP não irá, de forma inconsistente com o CCPA: vender ou partilhar Dados Pessoais do Cliente; conservar, utilizar ou divulgar Dados Pessoais do Cliente para qualquer outra finalidade que não a finalidade comercial específica da prestação dos Serviços ou, de outra forma, para o cumprimento das obrigações ao abrigo do Acordo, cujas finalidades se encontrem no contexto da relação comercial direta entre as Partes; ou combinar os Dados Pessoais do Cliente com Dados Pessoais de qualquer outra origem. Na medida da aplicação do CCPA aos Dados Pessoais do Cliente, a HP notificará o Cliente se não conseguir cumprir as respetivas obrigações ao abrigo do CCPA relativas aos Dados Pessoais do Cliente. Não obstante o que precede, a HP poderá tratar os Dados Pessoais do Cliente conforme exigido pela legislação aplicável. Nesta situação, a HP tomará medidas razoáveis para informar o Cliente de tal exigência antes de tratar os dados, salvo se isso for proibido por lei;
3.1.2 garantirá que apenas o pessoal autorizado que tenha sido submetido a formação adequada em matéria de proteção e tratamento de Dados Pessoais e que esteja obrigado a respeitar a confidencialidade dos Dados Pessoais do Cliente terá acesso aos mesmos;
3.1.3 implementará medidas técnicas e organizativas adequadas para proteger contra a destruição, a perda ou a alteração não autorizadas ou ilícitas ou a divulgação ou o acesso não autorizados aos Dados Pessoais do Cliente. Estas medidas devem ser adequadas aos danos que possam resultar de qualquer tratamento não autorizado ou ilícito, perda acidental, destruição, dano ou roubo de Dados Pessoais do Cliente e devem ter em conta a natureza dos Dados Pessoais do Cliente que devem ser protegidos;
3.1.4 sem demora injustificada e na medida do permitido por lei, notificar o Cliente de quaisquer pedidos de Titulares dos Dados que pretendam exercer os seus direitos ao abrigo da Legislação de Proteção de Dados e Privacidade Aplicável e, mediante pedido por escrito do Cliente e a expensas do mesmo, tendo em conta a natureza do tratamento, ajudar o Cliente através da implementação de medidas técnicas e organizativas adequadas, na medida do possível, para ajudar o Cliente na sua obrigação de responder a tais pedidos;
3.1.5 mediante pedido por escrito do Cliente e a expensas do mesmo, tendo em conta a natureza do tratamento e as informações disponíveis para a HP, ajudar o Cliente com as suas obrigações nos termos dos artigos 32.º a 36.º do RGPD ou disposições equivalentes ao abrigo da Legislação de Proteção de Dados e Privacidade Aplicável, para assistir o Cliente no cumprimento das respetivas obrigações ao abrigo da PIPL; e obrigações ao abrigo da CPRA;
3.1.6 mediante pedido escrito do Cliente, eliminar ou devolver ao Cliente quaisquer Dados Pessoais do Cliente após o fim da prestação dos Serviços, salvo se a legislação aplicável exigir o armazenamento dos Dados Pessoais do Cliente e de acordo com a opção da HP entre a eliminação ou devolução dos Dados Pessoais do Cliente.
4 SUBCONTRATAÇÃO ULTERIOR
4.1 O Cliente autoriza a HP a transferir Dados Pessoais do Cliente ou a dar acesso aos Dados Pessoais do Cliente aos membros do Grupo HP e a terceiros enquanto Subcontratantes Ulteriores (e permite que os Subcontratantes Ulteriores o façam de acordo com a Cláusula 4.1) para efeitos de prestação dos Serviços ou outras finalidades identificadas na secção "Atividades de Tratamento" do Anexo 1. A HP continuará a ser responsável pelo cumprimento das obrigações deste ATD por parte do respetivo Subcontratante Ulterior. A HP deve assegurar que quaisquer Subcontratantes Ulteriores para quem a HP transfira Dados Pessoais do Cliente celebram acordos com a HP a exigir que os Subcontratantes Ulteriores respeitem termos com uma proteção igual ou superior à dos estabelecidos neste ATD. A HP colocará à disposição do Cliente a lista atual de Subcontratantes Ulteriores para os Serviços abrangidos pelo Contrato de Serviço.
4.2 A HP pode, a qualquer momento e sem justificação, nomear um novo Subcontratante Ulterior desde que o Cliente tenha recebido um aviso prévio de dez (10) dias e o Cliente não se oponha legitimamente a tais alterações dentro desse prazo. As objeções legítimas têm de conter motivos razoáveis e documentados relativos ao incumprimento de um Subcontratante Ulterior em matéria de Legislação de Proteção de Dados e Privacidade Aplicável. Se, na opinião razoável da HP, tais objeções forem legítimas, a HP abster-se-á de utilizar esse Subcontratante Ulterior no contexto do tratamento dos Dados Pessoais do Cliente. Nesses casos, a HP envidará esforços razoáveis para (i) disponibilizar ao Cliente uma alteração nos Serviços da HP ou (ii) recomendar uma alteração à configuração ou utilização dos Serviços do Cliente para evitar o tratamento de Dados Pessoais do Cliente pelo Subcontratante Ulterior contestado. Se a HP não conseguir disponibilizar essa alteração num prazo razoável, que não excederá noventa (90) dias, o Cliente pode, mediante aviso por escrito enviado à HP, rescindir o Serviço que não pode ser prestado pela HP sem a utilização do Subcontratante Ulterior contestado. Nos casos em que a PIPL é aplicável, a HP solicitará a autorização prévia do Cliente para nomear um novo Subcontratante Ulterior. O Cliente tem de responder ao pedido da HP num prazo de dez (10) dias. Se o Cliente rejeitar a alteração, a HP não deve utilizar tal Subcontratante Ulterior no contexto do tratamento dos Dados Pessoais do Cliente. Nesses casos, a HP envidará esforços razoáveis para (i) disponibilizar ao Cliente uma alteração nos Serviços da HP ou (ii) recomendar uma alteração à configuração ou utilização dos Serviços do Cliente para evitar o tratamento de Dados Pessoais do Cliente pelo Subcontratante Ulterior contestado. Se a HP não conseguir disponibilizar essa alteração num prazo razoável, que não excederá noventa (90) dias, o Cliente pode, mediante aviso por escrito enviado à HP, rescindir o Serviço que não pode ser prestado pela HP sem a utilização do Subcontratante
Ulterior contestado.
5 INCIDENTES DE DADOS PESSOAIS
5.1 A HP notificará o Cliente, sem demora injustificada, caso tome conhecimento de qualquer Incidente de Dados Pessoais envolvendo Dados Pessoais do Cliente e tomará as medidas que o Cliente possa razoavelmente exigir, dentro de um prazo razoável, para remediar o Incidente de Dados Pessoais e fornecer informações adicionais que o Cliente possa razoavelmente exigir. A HP reserva-se o direito de cobrar uma taxa administrativa pela assistência prestada ao abrigo desta Cláusula 5.1, exceto na medida em que o Cliente demonstre que tal assistência é necessária devido ao não cumprimento deste ATD por parte da HP.
6 TRANSFERÊNCIAS INTERNACIONAIS DE DADOS PESSOAIS DO CLIENTE
6.1 A HP poderá transferir Dados Pessoais do Cliente para fora do país onde foram recolhidos originalmente desde que essa transferência seja necessária no âmbito dos Serviços e que ocorra de acordo com a Legislação de Proteção de Dados e Privacidade Aplicável, incluindo, mas não se limitando à conclusão de quaisquer avaliações prévias exigidas por Legislação de Proteção de Dados e Privacidade.
6.2 Disposições europeias específicas
6.2.1 Na medida em que os Dados Pessoais do Cliente sejam transferidos de um País Europeu para um País Relevante, a HP disponibiliza os mecanismos de transferência enumerados abaixo que serão aplicáveis, por ordem de precedência, conforme estabelecido na Cláusula 6.2.2, a todas as referidas transferências de acordo com a Legislação de Proteção de Dados e Privacidade Aplicável:
6.2.1.1 Regras Empresariais Vinculativas para o Subcontratante da HP, se aplicável: a HP adotou Regras Empresariais Vinculativas para o Subcontratante que abrangem os Dados Pessoais do Cliente que este trata. A HP manterá essas Regras Empresariais Vinculativas para o Subcontratante da HP e notificará imediatamente o Cliente caso as Regras Empresariais Vinculativas para o Subcontratante da HP já não sejam um mecanismo de transferência válido. As Regras Empresariais Vinculativas para o Subcontratante da HP estão disponíveis nesta ligação: xxxxx://xxx.xx.xxx/xx- en/bcr-pages.html?jumpid=in_R11928_/us/en/corp/privacy-central/binding- corporate-rules.
6.2.1.2 Mecanismo de Adequação Aprovado Europa-EUA: qualquer transferência ao abrigo de um Mecanismo de Adequação Aprovado Europa-EUA tem de ser efetuada de acordo com as regras do mecanismo, incluindo, se necessário, o registo ou a certificação dos Afiliados da HP localizados nos Estados Unidos da América, que tratarão os Dados Pessoais do Cliente no âmbito dos Serviços.
6.2.1.3 Cláusulas Contratuais-Tipo da UE, ou dos Responsáveis pelo Tratamento para os Subcontratantes (Anexo 2) ou dos Subcontratantes para os Subcontratantes (Anexo 3), conforme aplicável.
6.2.2 No caso de os Serviços estarem abrangidos por mais de um mecanismo de transferência, a transferência de Dados Pessoais do Cliente estará sujeita a um único mecanismo de transferência, de acordo com a seguinte ordem de precedência: 1) Regras Empresariais Vinculativas para o Subcontratante da HP, 2) Mecanismo de Adequação Aprovado Europa-EUA;
3) Cláusulas Contratuais-Tipo da UE.
6.3 Outros mecanismos de transferência especificados
6.3.1 Sem prejuízo da generalidade da Cláusula 6.1 acima, as Partes concordam que os mecanismos de transferência referidos nos Anexos 4 (Reino Unido) e 5 (Argentina) serão utilizados para transferir Dados Pessoais do país em questão para um País Relevante.
6.4 Disposições específicas da China
6.4.1 Na medida em que quaisquer Dados Pessoais do Cliente recolhidos ou criados na China sejam transferidos pela HP da República Popular da China para um país ou região fora da China, a HP disponibiliza os mecanismos de transferência enumerados abaixo:
6.4.1.1 A avaliação de segurança: nos casos em que a avaliação de segurança realizada pela CAC (Cyberspace Administration of China – Administração do espaço cibernético da China) é aplicável à transferência dos Dados Pessoais do Cliente, o Cliente registar-se-á na avaliação de segurança e cumprirá o requisito relevante, e a HP fornecerá assistência, se solicitada pelo Cliente e considerada necessária por ambas as Partes.
6.4.1.2 Contrato Padrão (Anexo 6): nos casos em que a avaliação de segurança não é aplicável, o Cliente tem de celebrar um contrato padrão publicado pela CAC com o destinatário dos Dados Pessoais do Cliente.
6.4.2 Nos casos em que o Responsável pelo Tratamento transfere Dados Pessoais da República Popular da China para o Subcontratante num país ou região fora da China, o Responsável pelos Dados será responsável por obter o consentimento dos Titulares dos Dados para a transferência.
7 AUDITORIAS
7.1 Mediante pedido por escrito do Cliente, a HP disponibilizará ao Cliente todas as informações necessárias para demonstrar o cumprimento das obrigações estabelecidas ao abrigo da Legislação de Proteção de Dados e Privacidade Aplicável, desde que a HP não tenha qualquer obrigação de fornecer informações comercialmente confidenciais. Com uma frequência anual ou superior e a expensas do Cliente, a HP permitirá e contribuirá ainda para auditorias e inspeções efetuadas pelo Cliente ou pelo respetivo auditor externo autorizado, que não será concorrente da HP. O âmbito destas auditorias, incluindo as condições de confidencialidade, será acordado mutuamente pelas Partes antes do início. Para garantir que o Cliente tem o direito de tomar as medidas razoáveis e adequadas para parar e resolver qualquer utilização não autorizada dos Dados Pessoais do Cliente pela HP, as Partes confirmarão e desenvolverão um plano de resolução aprovado mutuamente conforme necessário para tratar todos os resultados de auditoria que impliquem tal utilização não autorizada dos Dados Pessoais do Cliente.
Lista de Anexos
Anexo 1 – Detalhes do tratamento
Anexo 2 – Cláusulas Contratuais-Tipo da UE (Responsável pelo Tratamento para Subcontratante) Anexo 3 – Cláusulas Contratuais-Tipo da UE (Subcontratante para Subcontratante)
Anexo 4 – Acordo Internacional de Transferência de Dados (AITD) (Reino Unido) Anexo 5 – Cláusulas Contratuais-Tipo (Argentina)
Anexo 6 – Contrato Padrão para Transferência Transfronteiriça de Informações Pessoais (China)
Anexo 1
Detalhes do tratamento
A HP poderá atualizar periodicamente este Anexo 1 para refletir alterações nas atividades de tratamento. Categorias de Titulares dos Dados
• Colaboradores, clientes, agentes e subcontratantes ulteriores do Cliente. Tipos de Dados Pessoais
Os Dados Pessoais do Cliente tratados pela HP no âmbito da prestação dos Serviços por parte da HP são determinados e controlados pelo Cliente enquanto Responsável pelo Tratamento e de acordo com a declaração de serviços aplicável e/ou pedidos de compra/alterações, mas podem incluir como exemplos:
• Dados de contacto – como nome, número de telefone profissional ou pessoal, endereço de e-mail profissional ou pessoal e morada do escritório profissional;
• Dados de credenciais de seguranęa – como identificação de colaborador ou número de distintivo;
• Dados de Utilizaęão do Produto – como páginas impressas, tipos de dispositivos que iniciaram trabalhos de impressão, modo de impressão, suporte utilizado, marca de tinta ou toner, tipo de ficheiro impresso (.pdf, .jpg, etc.), aplicação utilizada para imprimir (Word, Excel, Adobe Photoshop, etc.), tamanho do ficheiro, registo de hora e utilização e estado dos consumíveis para impressoras;
• Dados de Desempenho – eventos de impressão, funcionalidades e alertas utilizados como avisos "nível de tinteiro baixo", uso de cartões de fotografia, fax, digitalização, servidor web integrado e informações técnicas adicionais que variam consoante o produto;
• Dados do Dispositivo – informações sobre computadores, impressoras e/ou dispositivos como sistema operativo, volume de memória, região, idioma, fuso horário, número de modelo, primeira data de início, idade do dispositivo, data de fabrico do dispositivo, versão do navegador, fabricante de computador, porta de ligação, estado de garantia, identificadores únicos do dispositivo, identificadores de publicidade e informações técnicas adicionais que variam consoante o produto;
• Dados da Aplicaęão – informações relacionadas com aplicações HP como localização, idioma, versões de software, escolhas de partilha de dados e detalhes de atualização; e
• Outros Dados Pessoais fornecidos por um Titular de Dados quando interage presencialmente, online ou por telefone, ou por e-mail com centros de atendimento, balcões de apoio ou outros canais de apoio ao cliente para facilitar a prestação de Serviços HP e responder a dúvidas do Cliente e/ou do Titular de Dados; ou (ii) em dispositivos recebidos pela HP.
Atividades de tratamento
Os Dados Pessoais do Cliente tratados no âmbito do Contrato de Serviços serão utilizados pela HP para gerir a relação e prestar Serviços ao Cliente. A HP poderá tratar os Dados Pessoais do Cliente para:
• fornecer serviços de gestão de frota como Serviços de Impressão Geridos e Device as a Service;
• manter dados de contacto e registo corretos para fornecer serviços de suporte e manutenção abrangentes, incluindo care-pack e apoio de garantia alargado e disponibilizar reparações e devoluções;
• disponibilizar o acesso a portais de visualização e gestão de dados, gestão de dispositivos, pedidos e conclusão de pedidos de produtos ou serviços, para efeitos de gestão de contas e organização de envios e entregas;
• melhorar o desempenho e o funcionamento de produtos, soluções, serviços e suporte, incluindo suporte à garantia e atualizações e alertas atempados de firmware e software para garantir a continuidade do funcionamento do dispositivo ou serviço;
• fornecer comunicações administrativas ao Cliente sobre os Serviços. Exemplos de comunicações administrativas poderão incluir respostas a inquéritos ou pedidos dos Clientes, relatórios de utilização ou desempenho do produto, conclusão de serviço ou comunicações relacionadas com a garantia, notificações de recuperação de segurança ou atualizações empresariais aplicáveis relacionadas com fusões, aquisições ou alienações;
• manter a integridade e segurança dos websites, produtos, funcionalidades e serviços da HP e prevenir e detetar ameaças à segurança, fraude ou outra atividade criminosa ou maliciosa que possa comprometer a informação do Cliente;
• verificar a identidade do Cliente, incluindo solicitar o nome do autor da chamada e a identificação do colaborador ou o número de distintivo para a prestação dos serviços de manutenção remota da HP;
• cumprir as leis, regulamentos, ordens judiciais, pedidos governamentais e de autoridades de aplicação da lei aplicáveis e para proteger os colaboradores e outros clientes e resolver litígios; e
• proporcionar uma experiência à medida, personalizar os Serviços e comunicações e criar recomendações; e
• eliminar dados de dispositivos devolvidos à HP.
Attachment 2
EU STANDARD CONTRACTUAL CLAUSES (DATA CONTROLLER TO DATA PROCESSOR)
SECTION I
Clause 1
Purpose and scope
(a) | The purpose of these standard contractual clauses is to ensure compliance with the requirements of Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) for the transfer of personal data to a third country. |
(b) | The Parties: (i) the natural or legal person(s), public authority/ies, agency/ies or other body/ies (hereinafter ‘entity/ies’) transferring the personal data, as listed in Annex I.A (hereinafter each ‘data exporter’), and (ii) the entity/ies in a third country receiving the personal data from the data exporter, directly or indirectly via another entity also Party to these Clauses, as listed in Annex I.A (hereinafter each ‘data importer’) have agreed to these standard contractual clauses (hereinafter: ‘Clauses’). |
(c) | These Clauses apply with respect to the transfer of personal data as specified in Annex I.B. |
(d) | The Appendix to these Clauses containing the Annexes referred to therein forms an integral part of these Clauses. |
Clause 2
Effect and invariability of the Clauses
(a) | These Clauses set out appropriate safeguards, including enforceable data subject rights and effective legal remedies, pursuant to Article 46(1) and Article 46(2)(c) of Regulation (EU) 2016/679 and, with respect to data transfers from controllers to processors and/or processors to processors, standard contractual clauses pursuant to Article 28(7) of Regulation (EU) 2016/679, provided they are not modified, except to select the appropriate Module(s) or to add or update information in the Appendix. This does not prevent the Parties from including the standard contractual clauses laid down in these Clauses in a wider contract and/or to add other clauses or additional safeguards, provided that they do not contradict, directly or indirectly, these Clauses or prejudice the fundamental rights or freedoms of data subjects. |
(b) | These Clauses are without prejudice to obligations to which the data exporter is subject by virtue of Regulation (EU) 2016/679. |
Clause 3
Third-party beneficiaries
(a) Data subjects may invoke and enforce these Clauses, as third-party beneficiaries, against the data exporter and/or data importer, with the following exceptions:
(i) | Clause 1, Xxxxxx 2, Xxxxxx 3, Xxxxxx 6, Xxxxxx 7; |
(ii) | Clause 8 – Clause 8.1(b), 8.9(a), (c), (d) and (e); |
(iii) | Clause 9 – Clause 9(a), (c), (d) and (e); |
(iv) | Clause 12 – Clause 12(a), (d) and (f); |
(v) | Clause 13; |
(vi) | Clause 15.1(c), (d) and (e); |
(vii) | Clause 16(e); |
(viii) | Clause 18 – Clause 18(a) and (b). |
(b) Paragraph (a) is without prejudice to rights of data subjects under Regulation (EU) 2016/679.
Clause 4
Interpretation
(a) | Where these Clauses use terms that are defined in Regulation (EU) 2016/679, those terms shall have the same meaning as in that Regulation. |
(b) | These Clauses shall be read and interpreted in the light of the provisions of Regulation (EU) 2016/679. |
(c) | These Clauses shall not be interpreted in a way that conflicts with rights and obligations provided for in Regulation (EU) 2016/679. |
Clause 5
Hierarchy
In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties, existing at the time these Clauses are agreed or entered into thereafter, these Clauses shall prevail.
Clause 6
Description of the transfer(s)
The details of the transfer(s), and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred, are specified in Annex I.B.
SECTION II – OBLIGATIONS OF THE PARTIES
Clause 8
Data protection safeguards
The data exporter warrants that it has used reasonable efforts to determine that the data importer is able, through the implementation of appropriate technical and organisational measures, to satisfy its obligations under these Clauses.
8.1 Instructions
(a) | The data importer shall process the personal data only on documented instructions from the data exporter. The data exporter may give such instructions throughout the duration of the contract. |
(b) | The data importer shall immediately inform the data exporter if it is unable to follow those instructions. |
8.2 Purpose limitation
The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I.B, unless on further instructions from the data exporter.
8.3 Transparency
On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including the measures described in Annex II and personal data, the data exporter may redact part of the text of the Appendix to these Clauses prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand the its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information. This Clause is without prejudice to the obligations of the data exporter under Articles 13 and 14 of Regulation (EU) 2016/679.
8.4 Accuracy
If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to erase or rectify the data.
8.5 Duration of processing and erasure or return of data
Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the data exporter and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a).
8.6 Security of processing
(a) | The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. |
(b) | The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. |
(c) | In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after |
having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. | |
(d) | The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer. |
8.7 Sensitive data
Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.
8.8 Onward transfers
The data importer shall only disclose the personal data to a third party on documented instructions from the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union (in the same country as the data importer or in another third country, hereinafter ‘onward transfer’) if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if:
(a) | the onward transfer is to a country benefitting from an adequacy decision pursuant to Article 45 of Regulation (EU) 2016/679 that covers the onward transfer; |
(b) | the third party otherwise ensures appropriate safeguards pursuant to Articles 46 or 47 Regulation of (EU) 2016/679 with respect to the processing in question; |
(c) | the onward transfer is necessary for the establishment, exercise or defence of legal claims in the context of specific administrative, regulatory or judicial proceedings; or |
(d) | the onward transfer is necessary in order to protect the vital interests of the data subject or of another natural person. |
Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation.
8.9 Documentation and compliance
(a) | The data importer shall promptly and adequately deal with enquiries from the data exporter that relate to the processing under these Clauses. |
(b) | The Parties shall be able to demonstrate compliance with these Clauses. In particular, the data importer shall keep appropriate documentation on the processing activities carried out on behalf of the data exporter. |
(c) | The data importer shall make available to the data exporter all information necessary to demonstrate compliance with the obligations set out in these Clauses and at the data exporter’s request, allow for and contribute to audits of the processing activities covered by these Clauses, at reasonable intervals or if there are indications of non-compliance. In deciding on a review or audit, the data exporter may take into account relevant certifications held by the data importer. |
(d) | The data exporter may choose to conduct the audit by itself or mandate an independent auditor. Audits may |
include inspections at the premises or physical facilities of the data importer and shall, where appropriate, be carried out with reasonable notice. | |
(e) | The Parties shall make the information referred to in paragraphs (b) and (c), including the results of any audits, available to the competent supervisory authority on request. |
Clause 9
Use of sub-processors
(a) | GENERAL WRITTEN AUTHORISATION The data importer has the data exporter’s general authorisation for the engagement of sub-processor(s) from an agreed list. The data importer shall specifically inform the data exporter in writing of any intended changes to that list through the addition or replacement of sub-processors at least 90 days in advance, thereby giving the data exporter sufficient time to be able to object to such changes prior to the engagement of the sub-processor(s). The data importer shall provide the data exporter with the information necessary to enable the data exporter to exercise its right to object. |
(b) | Where the data importer engages a sub-processor to carry out specific processing activities (on behalf of the data exporter), it shall do so by way of a written contract that provides for, in substance, the same data protection obligations as those binding the data importer under these Clauses, including in terms of third-party beneficiary rights for data subjects. The Parties agree that, by complying with this Clause, the data importer fulfils its obligations under Clause 8.8. The data importer shall ensure that the sub-processor complies with the obligations to which the data importer is subject pursuant to these Clauses. |
(c) | The data importer shall provide, at the data exporter’s request, a copy of such a sub-processor agreement and any subsequent amendments to the data exporter. To the extent necessary to protect business secrets or other confidential information, including personal data, the data importer may redact the text of the agreement prior to sharing a copy. |
(d) | The data importer shall remain fully responsible to the data exporter for the performance of the sub- processor’s obligations under its contract with the data importer. The data importer shall notify the data exporter of any failure by the sub-processor to fulfil its obligations under that contract. |
(e) | The data importer shall agree a third-party beneficiary clause with the sub-processor whereby – in the event the data importer has factually disappeared, ceased to exist in law or has become insolvent – the data exporter shall have the right to terminate the sub-processor contract and to instruct the sub-processor to erase or return the personal data. |
Clause 10
Data subject rights
(a) | The data importer shall promptly notify the data exporter of any request it has received from a data subject. It shall not respond to that request itself unless it has been authorised to do so by the data exporter. |
(b) | The data importer shall assist the data exporter in fulfilling its obligations to respond to data subjects’ requests for the exercise of their rights under Regulation (EU) 2016/679. In this regard, the Parties shall set out in Annex II the appropriate technical and organisational measures, taking into account the nature of the processing, by which the assistance shall be provided, as well as the scope and the extent of the assistance required. |
(c) | In fulfilling its obligations under paragraphs (a) and (b), the data importer shall comply with the instructions from the data exporter. |
Clause 11
Redress
(a) | The data importer shall inform data subjects in a transparent and easily accessible format, through individual notice or on its website, of a contact point authorised to handle complaints. It shall deal promptly with any complaints it receives from a data subject. |
(b) | In case of a dispute between a data subject and one of the Parties as regards compliance with these Clauses, that Party shall use its best efforts to resolve the issue amicably in a timely fashion. The Parties shall keep each other informed about such disputes and, where appropriate, cooperate in resolving them. |
(c) | Where the data subject invokes a third-party beneficiary right pursuant to Clause 3, the data importer shall accept the decision of the data subject to: (i) lodge a complaint with the supervisory authority in the Member State of his/her habitual residence or place of work, or the competent supervisory authority pursuant to Clause 13; (ii) refer the dispute to the competent courts within the meaning of Clause 18. |
(d) | The Parties accept that the data subject may be represented by a not-for-profit body, organisation or association under the conditions set out in Article 80(1) of Regulation (EU) 2016/679. |
(e) | The data importer shall abide by a decision that is binding under the applicable EU or Member State law. |
(f) | The data importer agrees that the choice made by the data subject will not prejudice his/her substantive and procedural rights to seek remedies in accordance with applicable laws. |
Clause 12
Liability
(a) | Each Party shall be liable to the other Party/ies for any damages it causes the other Party/ies by any breach of these Clauses. |
(b) | The data importer shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data importer or its sub-processor causes the data subject by breaching the third-party beneficiary rights under these Clauses. |
(c) | Notwithstanding paragraph (b), the data exporter shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data exporter or the data importer (or its sub-processor) causes the data subject by breaching the third-party beneficiary rights under these Clauses. This is without prejudice to the liability of the data exporter and, where the data exporter is a processor acting on behalf of a controller, to the liability of the controller under Regulation (EU) 2016/679 or Regulation (EU) 2018/1725, as applicable. |
(d) | The Parties agree that if the data exporter is held liable under paragraph (c) for damages caused by the data importer (or its sub-processor), it shall be entitled to claim back from the data importer that part of the compensation corresponding to the data importer’s responsibility for the damage. |
(e) | Where more than one Party is responsible for any damage caused to the data subject as a result of a breach of these Clauses, all responsible Parties shall be jointly and severally liable and the data subject is entitled to bring an action in court against any of these Parties. |
(f) | The Parties agree that if one Party is held liable under paragraph (e), it shall be entitled to claim back from the other Party/ies that part of the compensation corresponding to its/their responsibility for the damage. |
(g) | The data importer may not invoke the conduct of a sub-processor to avoid its own liability. |
Clause 13
Supervision
(a) | Where the data exporter is established in an EU Member State: The supervisory authority with responsibility for ensuring compliance by the data exporter with Regulation (EU) 2016/679 as regards the data transfer, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) and has appointed a representative pursuant to Article 27(1) of Regulation (EU) 2016/679: The supervisory authority of the Member State in which the representative within the meaning of Article 27(1) of Regulation (EU) 2016/679 is established, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) without however having to appoint a representative pursuant to Article 27(2) of Regulation (EU) 2016/679: The supervisory authority of one of the Member States in which the data subjects whose personal data is transferred under these Clauses in relation to the offering of goods or services to them, or whose behaviour is monitored, are located, as indicated in Annex I.C, shall act as competent supervisory authority. |
(b) | The data importer agrees to submit itself to the jurisdiction of and cooperate with the competent supervisory authority in any procedures aimed at ensuring compliance with these Clauses. In particular, the data importer agrees to respond to enquiries, submit to audits and comply with the measures adopted by the supervisory authority, including remedial and compensatory measures. It shall provide the supervisory authority with written confirmation that the necessary actions have been taken. |
SECTION III – LOCAL LAWS AND OBLIGATIONS IN CASE OF ACCESS BY PUBLIC AUTHORITIES
Clause 14
Local laws and practices affecting compliance with the Clauses
(a) | The Parties warrant that they have no reason to believe that the laws and practices in the third country of destination applicable to the processing of the personal data by the data importer, including any requirements to disclose personal data or measures authorising access by public authorities, prevent the data importer from fulfilling its obligations under these Clauses. This is based on the understanding that laws and practices that respect the essence of the fundamental rights and freedoms and do not exceed what is necessary and proportionate in a democratic society to safeguard one of the objectives listed in Article 23(1) of Regulation (EU) 2016/679, are not in contradiction with these Clauses. |
(b) | he Parties declare that in providing the warranty in paragraph (a), they have taken due account in particular of he following elements: (i) the specific circumstances of the transfer, including the length of the processing chain, the number of actors involved and the transmission channels used; intended onward transfers; the type of recipient; the purpose of processing; the categories and format of the transferred personal data; the economic sector in which the transfer occurs; the storage location of the data transferred; (ii) the laws and practices of the third country of destination– including those requiring the disclosure of data to public authorities or authorising access by such authorities – relevant in light of the specific circumstances of the transfer, and the applicable limitations and safeguards; (iii) any relevant contractual, technical or organisational safeguards put in place to supplement the safeguards under these Clauses, including measures applied during transmission and to the processing of the personal data in the country of destination. |
(c) | The data importer warrants that, in carrying out the assessment under paragraph (b), it has made its best efforts to provide the data exporter with relevant information and agrees that it will continue to cooperate with |
the data exporter in ensuring compliance with these Clauses. | |
(d) | The Parties agree to document the assessment under paragraph (b) and make it available to the competent supervisory authority on request. |
(e) | The data importer agrees to notify the data exporter promptly if, after having agreed to these Clauses and for the duration of the contract, it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under paragraph (a), including following a change in the laws of the third country or a measure (such as a disclosure request) indicating an application of such laws in practice that is not in line with the requirements in paragraph (a). |
(f) | Following a notification pursuant to paragraph (e), or if the data exporter otherwise has reason to believe that the data importer can no longer fulfil its obligations under these Clauses, the data exporter shall promptly identify appropriate measures (e.g. technical or organisational measures to ensure security and confidentiality) to be adopted by the data exporter and/or data importer to address the situation. The data exporter shall suspend the data transfer if it considers that no appropriate safeguards for such transfer can be ensured, or if instructed by the competent supervisory authority to do so. In this case, the data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses. If the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. Where the contract is terminated pursuant to this Clause, Clause 16(d) and (e) shall apply. |
Clause 15
Obligations of the data importer in case of access by public authorities
15.1 Notification
(a) | The data importer agrees to notify the data exporter and, where possible, the data subject promptly (if necessary, with the help of the data exporter) if it: (i) receives a legally binding request from a public authority, including judicial authorities, under the laws of the country of destination for the disclosure of personal data transferred pursuant to these Clauses; such notification shall include information about the personal data requested, the requesting authority, the legal basis for the request and the response provided; or (ii) becomes aware of any direct access by public authorities to personal data transferred pursuant to these Clauses in accordance with the laws of the country of destination; such notification shall include all information available to the importer. |
(b) | If the data importer is prohibited from notifying the data exporter and/or the data subject under the laws of the country of destination, the data importer agrees to use its best efforts to obtain a waiver of the prohibition, with a view to communicating as much information as possible, as soon as possible. The data importer agrees to document its best efforts in order to be able to demonstrate them on request of the data exporter. |
(c) | Where permissible under the laws of the country of destination, the data importer agrees to provide the data exporter, at regular intervals for the duration of the contract, with as much relevant information as possible on the requests received (in particular, number of requests, type of data requested, requesting authority/ies, whether requests have been challenged and the outcome of such challenges, etc.). |
(d) | The data importer agrees to preserve the information pursuant to paragraphs (a) to (c) for the duration of the contract and make it available to the competent supervisory authority on request. |
(e) | Paragraphs (a) to (c) are without prejudice to the obligation of the data importer pursuant to Clause 14(e) and Clause 16 to inform the data exporter promptly where it is unable to comply with these Clauses. |
15.2 Review of legality and data minimisation
(a) | The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e). |
(b) | The data importer agrees to document its legal assessment and any challenge to the request for disclosure and, to the extent permissible under the laws of the country of destination, make the documentation available to the data exporter. It shall also make it available to the competent supervisory authority on request. |
(c) | The data importer agrees to provide the minimum amount of information permissible when responding to a request for disclosure, based on a reasonable interpretation of the request. |
SECTION IV – FINAL PROVISIONS
Clause 16
Non-compliance with the Clauses and termination
(a) | The data importer shall promptly inform the data exporter if it is unable to comply with these Clauses, for whatever reason. |
(b) | In the event that the data importer is in breach of these Clauses or unable to comply with these Clauses, the data exporter shall suspend the transfer of personal data to the data importer until compliance is again ensured or the contract is terminated. This is without prejudice to Clause 14(f). |
(c) | The data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses, where: (i) the data exporter has suspended the transfer of personal data to the data importer pursuant to paragraph (b) and compliance with these Clauses is not restored within a reasonable time and in any event within one month of suspension; (ii) the data importer is in substantial or persistent breach of these Clauses; or (iii) the data importer fails to comply with a binding decision of a competent court or supervisory authority regarding its obligations under these Clauses. In these cases, it shall inform the competent supervisory authority of such non-compliance. Where the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. |
(d) | Personal data that has been transferred prior to the termination of the contract pursuant to paragraph (c) shall at the choice of the data exporter immediately be returned to the data exporter or deleted in its entirety. The same shall apply to any copies of the data. The data importer shall certify the deletion of the data to the data exporter. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit the return or deletion of the transferred personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process the data to the extent and for as long as required under that local law. |
(e) | Either Party may revoke its agreement to be bound by these Clauses where (i) the European Commission |
adopts a decision pursuant to Article 45(3) of Regulation (EU) 2016/679 that covers the transfer of personal data to which these Clauses apply; or (ii) Regulation (EU) 2016/679 becomes part of the legal framework of the country to which the personal data is transferred. This is without prejudice to other obligations applying to the processing in question under Regulation (EU) 2016/679.
Clause 17
Governing law
These Clauses shall be governed by the law of one of the EU Member States, provided such law allows for third-party beneficiary rights. The Parties agree that this shall be the law of France.
Clause 18
Choice of forum and jurisdiction
(a) | Any dispute arising from these Clauses shall be resolved by the courts of an EU Member State. |
(b) | The Parties agree that those shall be the courts of France. |
(c) | A data subject may also bring legal proceedings against the data exporter and/or data importer before the courts of the Member State in which he/she has his/her habitual residence. |
(d) | The Parties agree to submit themselves to the jurisdiction of such courts. |
APPENDIX ANNEX I
A. LIST OF PARTIES
Data exporter(s): [Identity and contact details of the data exporter(s) and, where applicable, of its/their data protection officer and/or representative in the European Union]
Name: See Customer’s name in the Agreement Address: See Customer’s address in the Agreement
Contact person’s name, position and contact details: See Customer’s contact person’s name, position and
contact details in the Agreement
Activities relevant to the data transferred under these Clauses: Same as the Agreement Signature and date: Same as the Agreement
Role (controller/processor): Controller
Data importer(s): [Identity and contact details of the data importer(s), including any contact person with responsibility for data protection]
Name: See HP’s name in the Agreement
Address: See HP’s address in the Agreement
Contact person’s name, position and contact details: Xxx XxXxxxx, DPO, xxxxx://xxx.xx.xxx/xx- en/privacy/ww-privacy-form.html
Activities relevant to the data transferred under these Clauses: Same as the Agreement Signature and date: Same as the Agreement
Role (controller/processor): Processor
B. DESCRIPTION OF TRANSFER
Categories of data subjects whose personal data is transferred
See Attachment 1.
Categories of personal data transferred
See Attachment 1.
Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.
See attachment 1.
The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis).
See attachment 1.
Nature of the processing
See attachment 1.
Purpose(s) of the data transfer and further processing
See attachment 1.
The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period
See Agreement and DPA.
For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing
Subject matter: See Attachment 1. Nature: See Attachment 1.
Duration of the processing: As long as the contract is in effect.
C. COMPETENT SUPERVISORY AUTHORITY
Commission Nationale de l'informatique et des Libertés (CNIL)
ANNEX II
TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA
To protect Customer data, HP abides by a robust set of information security controls including policies, practices, procedures, and organizational structures to safeguard the confidentiality, integrity, and availability of its own and its customers’ information (including Personal Data as defined in HP’s Customer and Data Processing Addenda). The following sets forth an overview of HP's technical/organizational security measures throughout the company.
1. Security Policy
HP maintains globally applicable policies, standards, and procedures intended to protect HP and Customer data. The detail of HP’s security policies is confidential to protect the integrity of HP’s data and systems. However, summaries of our key policies are included below.
2. Information Security Organization
HP has an Information Security Organization responsible for directing and managing the organization's information security strategy and controls. An Information Security Framework/Management System is put in place to ensure compliance with HP’s security policies and controls and confirm that the security requirements of its customers are complied with. This Framework is structured in alignment with the NIST Cybersecurity Framework and is reviewed annually.
3. Asset Management
HP has a process in place for identifying technical information assets, and through this process, HP identifies all assets under its responsibility and categorizes the critical assets. HP further maintains a set of documented handling procedures for each information classification type, including those assets that contain Personal Data. Handling procedures address storage, transmission, communication, access, logging, retention, destruction, disposal, incident management, and breach notification.
4. Access Control
The principle of least privilege is used for providing logical access control. User access is provided via a unique user ID and password. HP’s password policy has defined complexity, strength, validity, and password-history related controls. Access rights are reviewed periodically and revoked upon personnel departure.
User account creation and deletion procedures, as have been mutually agreed upon, are implemented to grant and revoke access to client systems used during the engagement.
5. Personnel Training
HP employees must complete the Integrity at HP training designed to ensure that employees are familiar with the program, policies, and resources that govern HP’s expectations for ethical behavior, excellence, and compliance. Integrity at HP features modules on security and data privacy, and employees also are required to take an annual “refresher” course. HP employees must also complete an annually refreshed dedicated security awareness training focused on essential security policies and emphasizing the employees’ responsibilities related to incident management, data privacy, and information security.
6. Third Parties and Subcontractors
HP has processes in place to select sub-contractors that are able to comply with comprehensive contractual security requirements.
For applicable suppliers (suppliers that handle/store/transmit HP data and customer owned HP held data or have access to the HP network), HP Cybersecurity performs a risk assessment to verify the existence of an information security program. An adequate program must include physical, technical, and administrative safeguards. This assessment must be done before the supplier has access to HP information.
7. Systems Security
By policy, the development of systems and supporting software within HP follow a secure development methodology to ensure security throughout the system/software lifecycle. The Software Development Lifecycle defines initiation, development/acquisition, implementation, operations, and disposal requirements. All system components, including modules, libraries, services, and discrete components, are evaluated to determine their impact on the overall system security state.
HP has defined controls for the protection of application service transactions. These controls include validating and verifying user credentials, mandating digital signatures and encryption, implementing secure communication protocols, storing online transaction details on servers within the appropriate network security zone.
Internal vulnerability scans are performed regularly.
8. Physical and Environmental Security
HP facilities are secured using various physical and electronic access controls and surveillance capabilities. Depending on the facility, this could include security guards, electronic access control, and closed-circuit television (CCTV).
All HP personnel are registered and are required to carry appropriate identification badges.
Facilities have required infrastructure support with temperature control and power backups where required, using UPS and/or diesel generators to support critical services.
9. Operations Management
HP has defined a minimum set of hardening requirements for technology infrastructure, including workstations, servers, and network equipment. Workstation/servers images contain pre-hardened operating systems. Hardening requirements vary depending on the type of operating system and applicable controls implemented.
HP has deployed Network Intrusion Detection/Prevention Systems (NIDS/ NIPS) within the network and are monitored and managed 24*7.
HP security policies and standards mandate secure disposal of media.
10. Cryptography
HP has defined a set of robust processes for cryptography to ensure the confidentiality, integrity, and availability of information assets. Approved protocols require encryption for certain assets, including those that contain personal data.
11. Information Security Incident Management
HP follows a developed Cyber Incident Management Process that addresses purpose, scope, roles, responsibilities, management commitment, organizational coordination, implementation procedures, and compliance checking. HP reviews and updates this process on an annual basis.
A Cyber Incident Response Team, which includes HP Cybersecurity personnel trained in incident response and crisis management, is assembled for regular table-top reviews of process and any incident or event.
12. Business Continuity Management
HP maintains a global Continuity of Operations program. This program takes a holistic, company-wide approach for end-to-end continuity through a set of collaborative, standardized, and internally documented planning processes.
HP periodically exercises its business continuity plans to ensure their effectiveness. HP currently tests and updates all plans at least yearly and ensures that people with a role in the business continuity plan are trained.
For transfers to (sub-) processors, also describe the specific technical and organisational measures to be taken by the (sub-) processor to be able to provide assistance to the controller and, for transfers from a processor to a sub-processor, to the data exporter
Sub-processors only process: name, business email address, business phone number, business address. The purpose of transferring this data is to complete the contract.
For HP all of the above technical and organizational measures are flowed down to the sub-processors
through the partner code of conduct and contract terms. Sub-processors are required to commit to
following HP’s requirements.
Attachment 3
EU STANDARD CONTRACTUAL CLAUSES (DATA PROCESSOR TO DATA PROCESSORS)
SECTION I
Clause 1
Purpose and scope
(a) | The purpose of these standard contractual clauses is to ensure compliance with the requirements of Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) xxxxx://xxx-xxx.xxxxxx.xx/xxxxx- content/EN/TXT/HTML/?uri=CELEX:32021D0914&from=EN - ntr1-L_2021199EN.01003701-E0001for the transfer of personal data to a third country. |
(b) | The Parties: (i) the natural or legal person(s), public authority/ies, agency/ies or other body/ies (hereinafter ‘entity/ies’) transferring the personal data, as listed in Annex I.A (hereinafter each ‘data exporter’), and (ii) the entity/ies in a third country receiving the personal data from the data exporter, directly or indirectly via another entity also Party to these Clauses, as listed in Annex I.A (hereinafter each ‘data importer’) have agreed to these standard contractual clauses (hereinafter: ‘Clauses’). |
(c) | These Clauses apply with respect to the transfer of personal data as specified in Annex I.B. |
(d) | The Appendix to these Clauses containing the Annexes referred to therein forms an integral part of these Clauses. |
Clause 2
Effect and invariability of the Clauses
(a) | These Clauses set out appropriate safeguards, including enforceable data subject rights and effective legal remedies, pursuant to Article 46(1) and Article 46(2)(c) of Regulation (EU) 2016/679 and, with respect to data transfers from controllers to processors and/or processors to processors, standard contractual clauses pursuant to Article 28(7) of Regulation (EU) 2016/679, provided they are not modified, except to select the appropriate Module(s) or to add or update information in the Appendix. This does not prevent the Parties from including the standard contractual clauses laid down in these Clauses in a wider contract and/or to add other clauses or additional safeguards, provided that they do not contradict, directly or indirectly, these Clauses or prejudice the fundamental rights or freedoms of data subjects. |
(b) | These Clauses are without prejudice to obligations to which the data exporter is subject by virtue of Regulation (EU) 2016/679. |
Clause 3
Third-party beneficiaries
(a) Data subjects may invoke and enforce these Clauses, as third-party beneficiaries, against the data exporter and/or data importer, with the following exceptions:
(i) | Clause 1, Xxxxxx 2, Xxxxxx 3, Xxxxxx 6, Xxxxxx 7; |
(ii) | Clause 8 – Clause 8.1(a), (c) and (d) and Clause 8.9(a), (c), (d), (e), (f) and (g); |
(iii) | Clause 9 – Clause 9(a), (c), (d) and (e); |
(iv) | Clause 12 – Clause 12(a), (d) and (f); |
(v) | Clause 13; |
(vi) | Clause 15.1(c), (d) and (e); |
(vii) | Clause 16(e); |
(viii) | Clause 18 – Clause 18(a) and (b). |
(b) Paragraph (a) is without prejudice to rights of data subjects under Regulation (EU) 2016/679.
Clause 4
Interpretation
(a) | Where these Clauses use terms that are defined in Regulation (EU) 2016/679, those terms shall have the same meaning as in that Regulation. |
(b) | These Clauses shall be read and interpreted in the light of the provisions of Regulation (EU) 2016/679. |
(c) | These Clauses shall not be interpreted in a way that conflicts with rights and obligations provided for in Regulation (EU) 2016/679. |
Clause 5
Hierarchy
In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties, existing at the time these Clauses are agreed or entered into thereafter, these Clauses shall prevail.
Clause 6
Description of the transfer(s)
The details of the transfer(s), and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred, are specified in Annex I.B.
SECTION II – OBLIGATIONS OF THE PARTIES
Clause 8
Data protection safeguards
The data exporter warrants that it has used reasonable efforts to determine that the data importer is able, through the implementation of appropriate technical and organisational measures, to satisfy its obligations under these Clauses.
8.1 Instructions
(a) | The data exporter has informed the data importer that it acts as processor under the instructions of its controller(s), which the data exporter shall make available to the data importer prior to processing. |
(b) | The data importer shall process the personal data only on documented instructions from the controller, as communicated to the data importer by the data exporter, and any additional documented instructions from the data exporter. Such additional instructions shall not conflict with the instructions from the controller. The |
controller or data exporter may give further documented instructions regarding the data processing throughout the duration of the contract. | |
(c) | The data importer shall immediately inform the data exporter if it is unable to follow those instructions. Where the data importer is unable to follow the instructions from the controller, the data exporter shall immediately notify the controller. |
(d) | The data exporter warrants that it has imposed the same data protection obligations on the data importer as set out in the contract or other legal act under Union or Member State law between the controller and the data exporter. |
8.2 Purpose limitation
The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I.B., unless on further instructions from the controller, as communicated to the data importer by the data exporter, or from the data exporter.
8.3 Transparency
On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including personal data, the data exporter may redact part of the text of the Appendix prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information.
8.4 Accuracy
If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to rectify or erase the data.
8.5 Duration of processing and erasure or return of data
Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the controller and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a).
8.6 Security of processing
(a) | The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, they shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subject. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter or the controller. In |
complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. | |
(b) | The data importer shall grant access to the data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. |
(c) | In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify, without undue delay, the data exporter and, where appropriate and feasible, the controller after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the data breach, including measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. |
(d) | The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify its controller so that the latter may in turn notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer. |
8.7 Sensitive data
Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards set out in Annex I.B.
8.8 Onward transfers
The data importer shall only disclose the personal data to a third party on documented instructions from the controller, as communicated to the data importer by the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union xxxxx://xxx-xxx.xxxxxx.xx/xxxxx- content/EN/TXT/HTML/?uri=CELEX:32021D0914&from=EN - ntr6-L_2021199EN.01003701-E0006 (in the same country as the data importer or in another third country, hereinafter ‘onward transfer’) if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if:
(i) | the onward transfer is to a country benefitting from an adequacy decision pursuant to Article 45 of Regulation (EU) 2016/679 that covers the onward transfer; |
(ii) | the third party otherwise ensures appropriate safeguards pursuant to Articles 46 or 47 of Regulation (EU) 2016/679; |
(iii) | the onward transfer is necessary for the establishment, exercise or defence of legal claims in the context of specific administrative, regulatory or judicial proceedings; or |
(iv) | the onward transfer is necessary in order to protect the vital interests of the data subject or of another natural person. |
Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation.
8.9 Documentation and compliance
(a) | The data importer shall promptly and adequately deal with enquiries from the data exporter or the controller that relate to the processing under these Clauses. |
(b) | The Parties shall be able to demonstrate compliance with these Clauses. In particular, the data importer shall keep appropriate documentation on the processing activities carried out on behalf of the controller. |
(c) | The data importer shall make all information necessary to demonstrate compliance with the obligations set out in these Clauses available to the data exporter, which shall provide it to the controller. |
(d) | The data importer shall allow for and contribute to audits by the data exporter of the processing activities covered by these Clauses, at reasonable intervals or if there are indications of non-compliance. The same shall apply where the data exporter requests an audit on instructions of the controller. In deciding on an audit, the data exporter may take into account relevant certifications held by the data importer. |
(e) | Where the audit is carried out on the instructions of the controller, the data exporter shall make the results available to the controller. |
(f) | The data exporter may choose to conduct the audit by itself or mandate an independent auditor. Audits may include inspections at the premises or physical facilities of the data importer and shall, where appropriate, be carried out with reasonable notice. |
(g) | The Parties shall make the information referred to in paragraphs (b) and (c), including the results of any audits, available to the competent supervisory authority on request. |
Clause 9
Use of sub-processors
(a) | GENERAL WRITTEN AUTHORISATION The data importer has the controller’s general authorisation for the engagement of sub-processor(s) from an agreed list. The data importer shall specifically inform the controller in writing of any intended changes to that list through the addition or replacement of sub-processors at least 10 days in advance, thereby giving the controller sufficient time to be able to object to such changes prior to the engagement of the sub-processor(s). The data importer shall provide the controller with the information necessary to enable the controller to exercise its right to object. The data importer shall inform the data exporter of the engagement of the sub-processor(s). |
(b) | Where the data importer engages a sub-processor to carry out specific processing activities (on behalf of the controller), it shall do so by way of a written contract that provides for, in substance, the same data protection obligations as those binding the data importer under these Clauses, including in terms of third-party beneficiary rights for data subjects. The Parties agree that, by complying with this Clause, the data importer fulfils its obligations under Clause 8.8. The data importer shall ensure that the sub-processor complies with the obligations to which the data importer is subject pursuant to these Clauses. |
(c) | The data importer shall provide, at the data exporter’s or controller’s request, a copy of such a sub-processor agreement and any subsequent amendments. To the extent necessary to protect business secrets or other confidential information, including personal data, the data importer may redact the text of the agreement prior to sharing a copy. |
(d) | The data importer shall remain fully responsible to the data exporter for the performance of the sub- processor’s obligations under its contract with the data importer. The data importer shall notify the data exporter of any failure by the sub-processor to fulfil its obligations under that contract. |
(e) | The data importer shall agree a third-party beneficiary clause with the sub-processor whereby – in the event the data importer has factually disappeared, ceased to exist in law or has become insolvent – the data exporter shall have the right to terminate the sub-processor contract and to instruct the sub-processor to erase or return the |
personal data.
Clause 10
Data subject rights
(a) | The data importer shall promptly notify the data exporter and, where appropriate, the controller of any request it has received from a data subject, without responding to that request unless it has been authorised to do so by the controller. |
(b) | The data importer shall assist, where appropriate in cooperation with the data exporter, the controller in fulfilling its obligations to respond to data subjects’ requests for the exercise of their rights under Regulation (EU) 2016/679 or Regulation (EU) 2018/1725, as applicable. In this regard, the Parties shall set out in Annex II the appropriate technical and organisational measures, taking into account the nature of the processing, by which the assistance shall be provided, as well as the scope and the extent of the assistance required. |
(c) | In fulfilling its obligations under paragraphs (a) and (b), the data importer shall comply with the instructions from the controller, as communicated by the data exporter. |
Clause 11
Redress
(a) | The data importer shall inform data subjects in a transparent and easily accessible format, through individual notice or on its website, of a contact point authorised to handle complaints. It shall deal promptly with any complaints it receives from a data subject. |
(b) | In case of a dispute between a data subject and one of the Parties as regards compliance with these Clauses, that Party shall use its best efforts to resolve the issue amicably in a timely fashion. The Parties shall keep each other informed about such disputes and, where appropriate, cooperate in resolving them. |
(c) | Where the data subject invokes a third-party beneficiary right pursuant to Clause 3, the data importer shall accept the decision of the data subject to: (i) lodge a complaint with the supervisory authority in the Member State of his/her habitual residence or place of work, or the competent supervisory authority pursuant to Clause 13; (ii) refer the dispute to the competent courts within the meaning of Clause 18. |
(d) | The Parties accept that the data subject may be represented by a not-for-profit body, organisation or association under the conditions set out in Article 80(1) of Regulation (EU) 2016/679. |
(e) | The data importer shall abide by a decision that is binding under the applicable EU or Member State law. |
(f) | The data importer agrees that the choice made by the data subject will not prejudice his/her substantive and procedural rights to seek remedies in accordance with applicable laws. |
Clause 12
Liability
(a) | Each Party shall be liable to the other Party/ies for any damages it causes the other Party/ies by any breach of these Clauses. |
(b) | The data importer shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data importer or its sub-processor causes the data subject by breaching the third-party beneficiary rights under these Clauses. |
(c) | Notwithstanding paragraph (b), the data exporter shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data exporter or the data importer (or its sub-processor) causes the data subject by breaching the third-party beneficiary rights under these Clauses. This is without prejudice to the liability of the data exporter and, where the data exporter is a processor acting on behalf of a controller, to the liability of the controller under Regulation (EU) 2016/679 or Regulation (EU) 2018/1725, as applicable. |
(d) | The Parties agree that if the data exporter is held liable under paragraph (c) for damages caused by the data importer (or its sub-processor), it shall be entitled to claim back from the data importer that part of the compensation corresponding to the data importer’s responsibility for the damage. |
(e) | Where more than one Party is responsible for any damage caused to the data subject as a result of a breach of these Clauses, all responsible Parties shall be jointly and severally liable and the data subject is entitled to bring an action in court against any of these Parties. |
(f) | The Parties agree that if one Party is held liable under paragraph (e), it shall be entitled to claim back from the other Party/ies that part of the compensation corresponding to its/their responsibility for the damage. |
(g) | The data importer may not invoke the conduct of a sub-processor to avoid its own liability. |
Clause 13
Supervision
(a) | Where the data exporter is established in an EU Member State: The supervisory authority with responsibility for ensuring compliance by the data exporter with Regulation (EU) 2016/679 as regards the data transfer, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) and has appointed a representative pursuant to Article 27(1) of Regulation (EU) 2016/679: The supervisory authority of the Member State in which the representative within the meaning of Article 27(1) of Regulation (EU) 2016/679 is established, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) without however having to appoint a representative pursuant to Article 27(2) of Regulation (EU) 2016/679: The supervisory authority of one of the Member States in which the data subjects whose personal data is transferred under these Clauses in relation to the offering of goods or services to them, or whose behaviour is monitored, are located, as indicated in Annex I.C, shall act as competent supervisory authority. |
(b) | The data importer agrees to submit itself to the jurisdiction of and cooperate with the competent supervisory authority in any procedures aimed at ensuring compliance with these Clauses. In particular, the data importer agrees to respond to enquiries, submit to audits and comply with the measures adopted by the supervisory authority, including remedial and compensatory measures. It shall provide the supervisory authority with written confirmation that the necessary actions have been taken. |
SECTION III – LOCAL LAWS AND OBLIGATIONS IN CASE OF ACCESS BY PUBLIC AUTHORITIES
Clause 14
Local laws and practices affecting compliance with the Clauses
(a) | The Parties warrant that they have no reason to believe that the laws and practices in the third country of destination applicable to the processing of the personal data by the data importer, including any requirements |
to disclose personal data or measures authorising access by public authorities, prevent the data importer from fulfilling its obligations under these Clauses. This is based on the understanding that laws and practices that respect the essence of the fundamental rights and freedoms and do not exceed what is necessary and proportionate in a democratic society to safeguard one of the objectives listed in Article 23(1) of Regulation (EU) 2016/679, are not in contradiction with these Clauses. | |
(b) | The Parties declare that in providing the warranty in paragraph (a), they have taken due account in particular of the following elements: (i) the specific circumstances of the transfer, including the length of the processing chain, the number of actors involved and the transmission channels used; intended onward transfers; the type of recipient; the purpose of processing; the categories and format of the transferred personal data; the economic sector in which the transfer occurs; the storage location of the data transferred; (ii) the laws and practices of the third country of destination– including those requiring the disclosure of data to public authorities or authorising access by such authorities – relevant in light of the specific circumstances of the transfer, and the applicable limitations and safeguards; (iii)any relevant contractual, technical or organisational safeguards put in place to supplement the safeguards under these Clauses, including measures applied during transmission and to the processing of the personal data in the country of destination. |
(c) | The data importer warrants that, in carrying out the assessment under paragraph (b), it has made its best efforts to provide the data exporter with relevant information and agrees that it will continue to cooperate with the data exporter in ensuring compliance with these Clauses. |
(d) | The Parties agree to document the assessment under paragraph (b) and make it available to the competent supervisory authority on request. |
(e) | The data importer agrees to notify the data exporter promptly if, after having agreed to these Clauses and for the duration of the contract, it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under paragraph (a), including following a change in the laws of the third country or a measure (such as a disclosure request) indicating an application of such laws in practice that is not in line with the requirements in paragraph (a). The data exporter shall forward the notification to the controller. |
(f) | Following a notification pursuant to paragraph (e), or if the data exporter otherwise has reason to believe that the data importer can no longer fulfil its obligations under these Clauses, the data exporter shall promptly identify appropriate measures (e.g. technical or organisational measures to ensure security and confidentiality) to be adopted by the data exporter and/or data importer to address the situation, if appropriate in consultation with the controller. The data exporter shall suspend the data transfer if it considers that no appropriate safeguards for such transfer can be ensured, or if instructed by the controller or the competent supervisory authority to do so. In this case, the data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses. If the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. Where the contract is terminated pursuant to this Clause, Clause 16(d) and (e) shall apply. |
Clause 15
Obligations of the data importer in case of access by public authorities
15.1 Notification
(a) | The data importer agrees to notify the data exporter and, where possible, the data subject promptly (if necessary with the help of the data exporter) if it: |
(i) receives a legally binding request from a public authority, including judicial authorities, under the laws of the country of destination for the disclosure of personal data transferred pursuant to these Clauses; such notification shall include information about the personal data requested, the requesting authority, the legal basis for the request and the response provided; or (ii) becomes aware of any direct access by public authorities to personal data transferred pursuant to these Clauses in accordance with the laws of the country of destination; such notification shall include all information available to the importer. The data exporter shall forward the notification to the controller. | |
(b) | If the data importer is prohibited from notifying the data exporter and/or the data subject under the laws of the country of destination, the data importer agrees to use its best efforts to obtain a waiver of the prohibition, with a view to communicating as much information as possible, as soon as possible. The data importer agrees to document its best efforts in order to be able to demonstrate them on request of the data exporter. |
(c) | Where permissible under the laws of the country of destination, the data importer agrees to provide the data exporter, at regular intervals for the duration of the contract, with as much relevant information as possible on the requests received (in particular, number of requests, type of data requested, requesting authority/ies, whether requests have been challenged and the outcome of such challenges, etc.). The data exporter shall forward the information to the controller. |
(d) | The data importer agrees to preserve the information pursuant to paragraphs (a) to (c) for the duration of the contract and make it available to the competent supervisory authority on request. |
(e) | Paragraphs (a) to (c) are without prejudice to the obligation of the data importer pursuant to Clause 14(e) and Clause 16 to inform the data exporter promptly where it is unable to comply with these Clauses. |
15.2 Review of legality and data minimisation
(a) | The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e). |
(b) | The data importer agrees to document its legal assessment and any challenge to the request for disclosure and, to the extent permissible under the laws of the country of destination, make the documentation available to the data exporter. It shall also make it available to the competent supervisory authority on request. The data exporter shall make the assessment available to the controller. |
(c) | The data importer agrees to provide the minimum amount of information permissible when responding to a request for disclosure, based on a reasonable interpretation of the request. |
SECTION IV – FINAL PROVISIONS
Clause 16
Non-compliance with the Clauses and termination
(a) | The data importer shall promptly inform the data exporter if it is unable to comply with these Clauses, for |
whatever reason. | |
(b) | In the event that the data importer is in breach of these Clauses or unable to comply with these Clauses, the data exporter shall suspend the transfer of personal data to the data importer until compliance is again ensured or the contract is terminated. This is without prejudice to Clause 14(f). |
(c) | The data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses, where: (i) the data exporter has suspended the transfer of personal data to the data importer pursuant to paragraph (b) and compliance with these Clauses is not restored within a reasonable time and in any event within one month of suspension; (ii) the data importer is in substantial or persistent breach of these Clauses; or (iii) the data importer fails to comply with a binding decision of a competent court or supervisory authority regarding its obligations under these Clauses. In these cases, it shall inform the competent supervisory authority and the controller of such non-compliance. Where the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. |
(d) | Personal data that has been transferred prior to the termination of the contract pursuant to paragraph (c) shall at the choice of the data exporter immediately be returned to the data exporter or deleted in its entirety. The same shall apply to any copies of the data. The data importer shall certify the deletion of the data to the data exporter. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit the return or deletion of the transferred personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process the data to the extent and for as long as required under that local law. |
(e) | Either Party may revoke its agreement to be bound by these Clauses where (i) the European Commission adopts a decision pursuant to Article 45(3) of Regulation (EU) 2016/679 that covers the transfer of personal data to which these Clauses apply; or (ii) Regulation (EU) 2016/679 becomes part of the legal framework of the country to which the personal data is transferred. This is without prejudice to other obligations applying to the processing in question under Regulation (EU) 2016/679. |
Clause 17
Governing law
These Clauses shall be governed by the law of one of the EU Member States, provided such law allows for third-party beneficiary rights. The Parties agree that this shall be the law of France.
Clause 18
Choice of forum and jurisdiction
(a) | Any dispute arising from these Clauses shall be resolved by the courts of an EU Member State. |
(b) | The Parties agree that those shall be the courts of France. |
(c) | A data subject may also bring legal proceedings against the data exporter and/or data importer before the courts of the Member State in which he/she has his/her habitual residence. |
(d) | The Parties agree to submit themselves to the jurisdiction of such courts. |
APPENDIX
ANNEX I
A. LIST OF PARTIES
Data exporter(s): [Identity and contact details of the data exporter(s) and, where applicable, of its/their data protection officer and/or representative in the European Union]
Name: See Customer’s name in the Agreement Address: See Customer’s address in the Agreement
Contact person’s name, position and contact details: See Customer’s contact person’s name, position and
contact details in the Agreement
Activities relevant to the data transferred under these Clauses: Same as the Agreement Signature and date: Same as the Agreement
Role (controller/processor): Processor
Data importer(s): [Identity and contact details of the data importer(s), including any contact person with responsibility for data protection]
Name: See HP’s name in the Agreement
Address: See HP’s address in the Agreement
Contact person’s name, position and contact details: Xxx XxXxxxx, DPO, xxxxx://xxx.xx.xxx/xx- en/privacy/ww-privacy-form.html
Activities relevant to the data transferred under these Clauses: Same as the Agreement Signature and date: Same as the Agreement
Role (controller/processor): Processor
B. DESCRIPTION OF TRANSFER
Categories of data subjects whose personal data is transferred
See Attachment 1
Categories of personal data transferred
See Attachment 1.
Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.
See attachment 1.
The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis).
See attachment 1.
Nature of the processing
See Attachment 1.
Purpose(s) of the data transfer and further processing
See attachment 1.
The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period
See Agreement and DPA.
For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing
Subject matter: See Agreement 1. Nature: See Agreement 1.
Duration of the processing: As long as the contract is in effect.
C. COMPETENT SUPERVISORY AUTHORITY
Commission Nationale de l'informatique et des Libertés (CNIL)
ANNEX II
TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA
To protect Customer data, HP abides by a robust set of information security controls including policies, practices, procedures, and organizational structures to safeguard the confidentiality, integrity, and availability of its own and its customers’ information (including Personal Data as defined in HP’s Customer and Data Processing Addenda). The following sets forth an overview of HP's technical/organizational security measures throughout the company.
1. Security Policy
HP maintains globally applicable policies, standards, and procedures intended to protect HP and Customer data. The detail of HP’s security policies is confidential to protect the integrity of HP’s data and systems. However, summaries of our key policies are included below.
2. Information Security Organization
HP has an Information Security Organization responsible for directing and managing the organization's information security strategy and controls. An Information Security Framework/Management System is put in place to ensure compliance with HP’s security policies and controls and confirm that the security requirements of its customers are complied with. This Framework is structured in alignment with the NIST Cybersecurity Framework and is reviewed annually.
3. Asset Management
HP has a process in place for identifying technical information assets, and through this process, HP identifies all assets under its responsibility and categorizes the critical assets. HP further maintains a set of documented handling procedures for each information classification type, including those assets that contain Personal Data. Handling procedures address storage, transmission, communication, access, logging, retention, destruction, disposal, incident management, and breach notification.
4. Access Control
The principle of least privilege is used for providing logical access control. User access is provided via a unique user ID and password. HP’s password policy has defined complexity, strength, validity, and password-history related controls. Access rights are reviewed periodically and revoked upon personnel departure.
User account creation and deletion procedures, as have been mutually agreed upon, are implemented to grant and revoke access to client systems used during the engagement.
5. Personnel Training
HP employees must complete the Integrity at HP training designed to ensure that employees are familiar with the program, policies, and resources that govern HP’s expectations for ethical behavior, excellence, and compliance. Integrity at HP features modules on security and data privacy, and employees also are required to take an annual “refresher” course. HP employees must also complete an annually refreshed dedicated security awareness training focused on essential security policies and emphasizing the employees’ responsibilities related to incident management, data privacy, and information security.
6. Third Parties and Subcontractors
HP has processes in place to select sub-contractors that are able to comply with comprehensive contractual security requirements.
For applicable suppliers (suppliers that handle/store/transmit HP data and customer owned HP held data or have access to the HP network), HP Cybersecurity performs a risk assessment to verify the existence of an information security program. An adequate program must include physical, technical, and administrative safeguards. This assessment must be done before the supplier has access to HP information.
7. Systems Security
By policy, the development of systems and supporting software within HP follow a secure development
methodology to ensure security throughout the system/software lifecycle. The Software Development Lifecycle defines initiation, development/acquisition, implementation, operations, and disposal requirements. All system components, including modules, libraries, services, and discrete components, are evaluated to determine their impact on the overall system security state.
HP has defined controls for the protection of application service transactions. These controls include validating and verifying user credentials, mandating digital signatures and encryption, implementing secure communication protocols, storing online transaction details on servers within the appropriate network security zone.
Internal vulnerability scans are performed regularly.
8. Physical and Environmental Security
HP facilities are secured using various physical and electronic access controls and surveillance capabilities. Depending on the facility, this could include security guards, electronic access control, and closed-circuit television (CCTV).
All HP personnel are registered and are required to carry appropriate identification badges.
Facilities have required infrastructure support with temperature control and power backups where required, using UPS and/or diesel generators to support critical services.
9. Operations Management
HP has defined a minimum set of hardening requirements for technology infrastructure, including workstations, servers, and network equipment. Workstation/servers images contain pre-hardened operating systems. Hardening requirements vary depending on the type of operating system and applicable controls implemented.
HP has deployed Network Intrusion Detection/Prevention Systems (NIDS/ NIPS) within the network and are monitored and managed 24*7.
HP security policies and standards mandate secure disposal of media.
10. Cryptography
HP has defined a set of robust processes for cryptography to ensure the confidentiality, integrity, and availability of information assets. Approved protocols require encryption for certain assets, including those that contain personal data.
11. Information Security Incident Management
HP follows a developed Cyber Incident Management Process that addresses purpose, scope, roles, responsibilities, management commitment, organizational coordination, implementation procedures, and compliance checking. HP reviews and updates this process on an annual basis.
A Cyber Incident Response Team, which includes HP Cybersecurity personnel trained in incident response and crisis management, is assembled for regular table-top reviews of process and any incident or event.
12. Business Continuity Management
HP maintains a global Continuity of Operations program. This program takes a holistic, company-wide approach for end-to-end continuity through a set of collaborative, standardized, and internally documented planning processes.
HP periodically exercises its business continuity plans to ensure their effectiveness. HP currently tests and updates all plans at least yearly and ensures that people with a role in the business continuity plan are trained.
For transfers to (sub-) processors, also describe the specific technical and organisational measures to be taken by the (sub-) processor to be able to provide assistance to the controller and, for transfers from a processor to a sub-processor, to the data exporter
Sub-processors only process: name, business email address, business phone number, business address. The purpose of transferring this data is to complete the contract.
For HP all of the above technical and organizational measures are flowed down to the sub-processors through the partner code of conduct and contract terms. Sub-processors are required to commit to
following HP’s requirements.
Attachment 4
INTERNATIONAL DATA TRANSFER AGREEMENT (IDTA) (UK)
Part 1: Tables
Table 1: Parties and signatures
Start date | Same as in the Agreement | |
The Parties | Exporter (who sends the Restricted Transfer) | Importer (who receives the Restricted Transfer) |
Parties’ details | Full legal name: See Customer’s full legal name in the Agreement Trading name (if different): See Customer’s trading name in the Agreement Main address (if a company registered address): See Customer’s main address in the Agreement Official registration number (if any) (company number or similar identifier): See Customer’s official registration number in the Agreement | Full legal name: See HP’s full legal name in the Agreement Trading name (if different): See HP’s trading name in the Agreement Main address (if a company registered address): See HP’s main address in the Agreement Official registration number (if any) (company number or similar identifier): See HP’s official registration number in the Agreement |
Key Contact | Full Name (optional): See in the Agreement Job Title: See in the Agreement Contact details including email: See in the Agreement | Full Name (optional): See in the Agreement Job Title: See in the Agreement Contact details including email: See in the Agreement |
Importer Data Subject Contact | HP Privacy Office xxxxx://xxx.xx.xxx/xx- en/privacy/ww-privacy-form.html | |
Signatures confirming each Party agrees to | Signed for and on behalf of the Exporter set out above | Signed for and on behalf of the Importer set out above |
be bound by this IDTA | Signed: See in the Agreement Date of signature: See in the Agreement Full name: See in the Agreement Job title: See in the Agreement | Signed: See in the Agreement Date of signature: See in the Agreement Full name: See in the Agreement Job title: See in the Agreement |
Table 2: Transfer Details
UK country’s law that governs the IDTA: | England and Wales Northern Ireland Scotland |
Primary place for legal claims to be made by the Parties | England and Wales Northern Ireland Scotland |
The status of the Exporter | In relation to the Processing of the Transferred Data: Exporter is a Controller Exporter is a Processor or Sub-Processor |
The status of the Importer | In relation to the Processing of the Transferred Data: Importer is a Controller Importer is the Exporter’s Processor or Sub-Processor Importer is not the Exporter’s Processor or Sub-Processor (and the Importer has been instructed by a Third Party Controller) |
Whether UK GDPR applies to the Importer | UK GDPR applies to the Importer’s Processing of the Transferred Data UK GDPR does not apply to the Importer’s Processing of the Transferred Data |
Linked Agreement | If the Importer is the Exporter’s Processor or Sub-Processor – the agreement(s) between the Parties which sets out the Processor’s or Sub-Processor’s instructions for Processing the Transferred Data: Name of agreement: If applicable, see in the Agreement |
Date of agreement: If applicable, see in the Agreement Parties to the agreement: If applicable, see in the Agreement Reference (if any): If applicable, see in the Agreement Other agreements – any agreement(s) between the Parties which set out additional obligations in relation to the Transferred Data, such as a data sharing agreement or service agreement: Name of agreement: If applicable, see in the Agreement Date of agreement: If applicable, see in the Agreement Parties to the agreement: If applicable, see in the Agreement Reference (if any If applicable, see in the Agreement If the Exporter is a Processor or Sub-Processor – the agreement(s) between the Exporter and the Party(s) which sets out the Exporter’s instructions for Processing the Transferred Data: Name of agreement: If applicable, see in the Agreement Date of agreement: If applicable, see in the Agreement Parties to the agreement: If applicable, see in the Agreement Reference (if any): If applicable, see in the Agreement | |
Term | The Importer may Process the Transferred Data for the following time period: the period for which the Linked Agreement is in force time period: (only if the Importer is a Controller or not the Exporter’s Processor or Sub- Processor) no longer than is necessary for the Purpose. |
Ending the IDTA before the end of the Term | the Parties cannot end the IDTA before the end of the Term unless there is a breach of the IDTA or the Parties agree in writing. the Parties can end the IDTA before the end of the Term by serving: months’ written notice, as set out in Section 29. (How to end this IDTA without there being a breach). |
Ending the IDTA when the Approved IDTA changes | Which Parties may end the IDTA as set out in Section 29.2: Importer Exporter |
neither Party | |
Can the Importer make further transfers of the Transferred Data? | The Importer MAY transfer on the Transferred Data to another organisation or person (who is a different legal entity) in accordance with Section 16.1 (Transferring on the Transferred Data). The Importer MAY NOT transfer on the Transferred Data to another organisation or person (who is a different legal entity) in accordance with Section 16.1Error! Reference source not found. (Transferring on the Transferred Data). |
Specific restrictions when the Importer may transfer on the Transferred Data | The Importer MAY ONLY forward the Transferred Data in accordance with Section 16.1: if the Exporter tells it in writing that it may do so. to: to the authorised receivers (or the categories of authorised receivers) set out in: there are no specific restrictions. |
Review Dates | No review is needed as this is a one-off transfer and the Importer does not retain any Transferred Data First review date: The Parties must review the Security Requirements at least once: each month(s) each quarter each 6 months each year each year(s) each time there is a change to the Transferred Data, Purposes, Importer Information, TRA or risk assessment |
Table 3: Transferred Data
Transferred Data | The personal data to be sent to the Importer under this IDTA consists of: The categories of Transferred Data will update automatically if the |
information is updated in the Linked Agreement referred to. The categories of Transferred Data will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. | |
Special Categories of Personal Data and criminal convictions and offences | The Transferred Data includes data relating to: racial or ethnic origin political opinions religious or philosophical beliefs trade union membership genetic data biometric data for the purpose of uniquely identifying a natural person physical or mental health sex life or sexual orientation criminal convictions and offences none of the above set out in: And: The categories of special category and criminal records data will update automatically if the information is updated in the Linked Agreement referred to. The categories of special category and criminal records data will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. |
Relevant Data Subjects | The Data Subjects of the Transferred Data are: The categories of Data Subjects will update automatically if the information is updated in the Linked Agreement referred to. The categories of Data Subjects will not update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. |
Purpose | The Importer may Process the Transferred Data for the following purposes: |
The Importer may Process the Transferred Data for the purposes set out in the Agreement. In both cases, any other purposes which are compatible with the purposes set out above. The purposes will update automatically if the information is updated in the Linked Agreement referred to. The purposes will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. |
Table 4: Security Requirements
Security of Transmission | HP has defined controls for the protection of application service transactions. These controls include: validating and verifying user credentials, mandating digital signatures and encryption, implementing secure communication protocols, storing online transaction details on servers within the appropriate network security zone. |
Security of Storage | HP’s cybersecurity department/organization and HP’s legal department maintain a set of documented handling procedures for each information classification type and work along with department in charge of Data Privacy for any pertinent matters. Handling procedures account for: storage, transmission, communication, access, logging, retention, destruction, disposal, incident management, and breach notification. HP Information Technology have a process in place for identifying technical information assets. HP identifies all assets under its responsibility, categorizing the critical assets. A record of information assets and systems that are both HP- owned and externally managed by service providers is maintained. Documented processes for server decommissioning, orphaned and legacy media are also implemented to ensure proper management and disposition of non-removable media. |
Security of Processing | By policy, development of systems and supporting software within HP follow a secure development methodology to ensure security throughout the system/software lifecycle. The Software Development Lifecycle defines initiation, development/acquisition, implementation, operations, and disposal requirements. All system components, which include modules, libraries, services, and discrete components, are evaluated to determine their impact on the overall system security state. HP implements logging mechanisms for system applications and devices. HP has developed robust procedures for the installation, configuration, upgrade, testing, and security patching of operational software, including but not limited to email, office productivity suites, and Internet browsers. Internal vulnerability scans are performed both on a quarterly basis and after any significant change. |
Organisational security measures | To protect its own as well as Customer Personal Data, HP has defined a minimum set of hardening requirements for technology infrastructure which includes workstations, servers and network equipment. Workstation / servers images contain pre-hardened operating systems. Hardening requirements vary depending on the type of operating system and applicable controls implemented. Systems with external connections will be protected by hardening and firewalls. Externally facing systems will be placed in a Demilitarized Zone (DMZ) or other similar configuration to protect internal HP systems. Critical network zones are logically isolated. Remote access to devices on the HP internal network, with the exception of the email system, requires the use of HP standard VPN solution. Network Intrusion Detection / Prevention Systems (NIDS/ NIPS) are placed in strategic locations within the network and are monitored and managed 24*7. All devices that have logging capabilities, such as operating systems, databases, applications, firewalls, routers and switches are required to be configured as per HP’s logging and auditing standard. HP security policies and standards mandate secure disposal of media. |
Technical security minimum requirements | Developers are required to follow the coding standards and testing guidelines defined for the system to comply with application security requirements. Source code is required to be secured in a manner that prevents unauthorized access. Preliminary testing is performed and non-production patch testing is scheduled. Post feedback from the non-production testing, implementation on production environment is scheduled and implemented. |
Updates to the Security Requirements | The Security Requirements will update automatically if the information is updated in the Linked Agreement referred to. The Security Requirements will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. |
Part 2: Extra Protection Clauses
Extra Protection Clauses: | |
(i) Extra technical security protections | |
(ii) Extra organisational protections |
(iii) Extra contractual protections |
Part 3: Commercial Clauses
Commercial Clauses |
Part 4: Mandatory Clauses
Mandatory Clauses | Part 4: Mandatory Clauses of the Approved IDTA, being the template IDTA A.1.0 issued by the ICO and laid before Parliament in accordance with s119A of the Data Protection Xxx 0000 on 2 February 2022, as it is revised under Section 5.4 of those Mandatory Clauses. |
Attachment 5
STANDARD CONTRACT CLAUSES (Argentina)
In accordance with the provisions of clause 6.3.1 of the Data Processing Addendum, Customer Personal Data originally collected in the Argentine Republic may be transferred, if required in connection with the services, to third countries.
If the transfer mentioned in the preceding paragraph implies transfer of Customer Personal Data to countries that are not considered as countries that provide adequate levels of protection by applicable Data Protection and Privacy Laws in Argentina, the EU Standard Contractual Clauses included in Attachment 2, with the modifications set forth below, shall be applicable to transfer.
1. Clause 1, items (a), (c) and (e) shall be replaced as follows:
(a) ‘personal data’, sensitive data’, ‘process/processing’, ‘controller’, ‘processor’, ‘data subject’ and ‘supervisory authority’ shall have the same meaning as set forth in the Argentine Data Protection Law No. 25.326, its regulatory Decree No. 1558/2001, and their complementary regulations (as amended or replaced from time to time);
(c) “the data importer” means the service provider located outside of Argentina that receives the personal data from the data exporter for the processing in accordance with the terms of this agreement;
(e) ‘the applicable data protection law’ means the Argentine Data Protection Law No. 25,326 and its supporting regulations (as amended or replaced from time to time).
2. Clause 4, item (f) shall be replaced as follows:
(f) that the data subject has been informed or will be informed before, or as soon as possible after, the transfer that its data could be transmitted to a third country not providing adequate protection within the meaning of the Argentine Data Protection Law 25,326 and its supporting regulations (as amended or replaced from time to time).
3. Clause 7, subsection 1, item (b) shall be replaced as follows:
(b) to refer the dispute to the judicial and administrative jurisdiction of the Argentine Republic.
4. Clause 9 shall be replaced as follows:
This agreement shall be governed by the laws of the Argentine Republic, in particular by the Law No. 25,326, its regulations and dispositions issued by the Argentine Data Protection Authority (as amended or replaced from time to time),
Attachment 6
Standard Contract for Personal Information Cross-Border Transfer
In order to ensure that the activities of PI Processor and Overseas Recipient meet the PI protection standards under the Relevant Laws and Regulations of the PRC and specify the PI protection related rights and obligations of PI Processor and Overseas Recipient, the Parties have mutually agreed to enter into this Contract.
PI Processor: see in the Agreement Address: see in the Agreement Contact Method: see in the Agreement Contact Person: see in the Agreement Title: see in the Agreement
Overseas Recipient: see in the Agreement Address: see in the Agreement
Contact Method: see in the Agreement Contact Person: see in the Agreement Title: see in the Agreement
PI Processor and Overseas Recipient will conduct the outbound transfer of PI in accordance with this Contract, and the Parties have entered into an Agreement as of date stated therein to govern the commercial activities related thereto.
The main body of this Contract is formulated in accordance with the requirements of the Measures on the Standard Contract for Personal Information Cross-Border Transfer, and any other contractual provisions, if any, as agreed between the Parties, can be specified in Annex II, which shall be deemed part of this Contract, if they do not conflict with the main body of this Contract.
Article I - Definitions
In this Contract, unless otherwise provided herein:
1. “PI Processor” refers to an entity or individual in PI processing activities that independently decides the
purpose and method of the PI processing activities and transfers PI outside of the PRC.
2. “Overseas Recipient” refers to an entity or individual outside of the PRC that receives the PI from PI
Processor.
3. PI Processor or Overseas Recipient are referred to individually as a “Party”, and collectively as the
“Parties”.
4. “PI Subject” refers to a natural person identified by or associated with the PI.
5. “PI” refers to all kinds of information, recorded electronically or otherwise, related to identified or
identifiable natural persons, but excluding anonymized information.
6. “Sensitive PI” refers to the PI that, once leaked or illegally used, may damage the personal dignity or endanger the personal or property safety of a natural person, including biometric recognition, religious belief, specific identity, medical health, financial account, personal whereabouts, etc., and the PI of minors under the age of 14.
7. “Regulatory Authority” refers to the cyberspace administration of the PRC at the provincial level or
above.
8. “Relevant Laws and Regulations” refer to the PRC Cybersecurity Law, the PRC Data Security Law, the PRC Personal Information Protection Law, the PRC Civil Code, the PRC Civil Procedure Law, the Measures on the Standard Contract for Outbound Transfer of PI, and other PRC laws and regulations.
9. The terms not defined in this Contract have the same meanings as defined under the Relevant Laws and Regulations.
Article 2 - Obligations of PI Processor
PI Processor shall perform the following obligations:
1. process PI in accordance with the Relevant Laws and Regulations, and limit the PI to be transferred abroad to the minimum scope required for the purpose of processing.
2. inform the PI Subject of the name and contact information of Overseas Recipient, the purpose and method of processing, type of PI and retention periods as specified in Annex I – Details of the Outbound Transfer of PI, the methods and procedures for PI Subject to exercise his/her rights, and etc.; in case of an outbound transfer of Sensitive PI, inform the PI Subject of the necessity of the outbound transfer of Sensitive PI and the impact on the rights and interests of the PI Subject; provided in each case that such obligation can be exempted by the laws and administrative regulations.
3. obtain a separate consent of PI Subject if the PI is transferred abroad based on the consent of the individual; or, if the PI of a minor under the age of 14 is involved, obtain a separate consent of the minor’s parents or other guardians. The consent shall be in a written form if so required by the laws and administrative regulations.
4. inform XX Subject that PI Processor and Overseas Recipient have agreed that the PI Subject will be a third-party beneficiary under this Contract, and if the PI Subject does not expressly object within 30 days, the PI Subject shall be entitled to the rights of a third-party beneficiary in accordance with this Contract.
5. make reasonable efforts to ensure that Overseas Recipient takes the following technical and managerial measures (comprehensively considering potential PI security risks that may arise from the purpose of PI processing, the type, scale, scope and sensitivity of the PI, the volume and frequency of the PI transfer, the PI transmission, the period of retention by Overseas Recipient, and etc.) to perform its obligations under this Contract: see Xxxxx XXX.
6. provide copies of the relevant laws and technical standards to Overseas Recipient upon the request of Overseas Recipient.
7. respond to inquiries from the Regulatory Authority about Overseas Recipient’s processing activities.
8. conduct a PI protection impact assessment on the proposed transfer of PI to Overseas Recipient in accordance with the Relevant Laws and Regulations. The assessment shall focus on the following matters:
(1) the legitimacy, justifiability and necessity of the purpose, scope and method of PI processing by PI processor and Overseas Recipient;
(2) the scale, scope, types and sensitivity of the PI to be transferred abroad, and the risks to PI rights and interests that may arise from the cross-border transfer of PI;
(3) the obligations to be undertaken by Overseas Recipient, and whether the management and technical measures and capabilities for performance of the obligations can ensure the security of the PI to be transferred abroad;
(4) the risks of the PI being tampered with, destroyed, leaked, lost or illegally used after its transfer abroad, and whether the channels for safeguarding the PI rights and interests are smooth;
(5) the impact of the PI protection policies and regulations of the country or region where Overseas Recipient is located on the performance of contract; and
(6) other matters that may affect the security of cross-border transfer of PI. The PI protection impact assessment report shall be kept for at least three years.
9. provide a copy of this Contract to PI Subject upon the request of PI Subject. If trade secrets or confidential business information are involved, the relevant contents of the copy of this Contract can be handled appropriately to the extent not affecting PI Subject’s understanding of this Contract.
10. assume the burden of proof on the performance of obligations under this Contract.
11. in accordance with the Relevant Laws and Regulations, provide the Regulatory Authority with all the information under Article 3(11), including all the compliance audit results.
Article 3 - Obligations of Overseas Recipient
Overseas Recipient shall perform the following obligations:
1. process the PI in accordance with Annex I – Details of the Outbound Transfer of PI. If Overseas Recipient processes the PI in a manner that is beyond the purpose and method of PI processing and/or the type of PI as agreed, a separate consent of PI Subject shall be obtained if the PI is transferred abroad based on the consent of the individual; if the PI of a minor under the age of 14 is involved, a separate consent of the minor’s parents or other guardians shall be obtained.
2. If entrusted by PI Processor to process PI, process the PI in accordance with the agreement with PI Processor and not process the PI in a manner that is beyond the purpose or method of the PI processing as agreed with PI processor.
3. provide a copy of this Contract to PI Subject upon the request of PI Subject. If trade secrets or confidential business information are involved, the relevant contents of the copy of this Contract can be handled appropriately to the extent not affecting the PI Subject’s understanding of this Contract.
4. process the PI in a manner that has the least impact on the rights and interests of PI Subject.
5. ensure that the retention period of PI is the minimum period necessary for achieving the purpose of PI processing. Delete the PI (including all back-up copies) upon expiry of the retention period. Where Overseas Recipient is entrusted by PI Processor to process PI and the entrustment agreement does not take effect, becomes null and void, or is cancelled or terminated, the PI being processed shall be returned to PI Processor or shall be deleted, and a written statement shall be provided to PI Processor. If it is technically difficult to delete the PI, all processing of the PI shall be ceased, other than storing the PI and taking necessary
security measures.
6. ensure the security of PI processing in accordance with the following:
(i) take technical and managerial measures including but not limited to those listed in Article 2(5) of this Contract, and conduct periodic inspections to ensure the security of PI; and
(ii) ensure that the personnel authorized to process PI perform their confidentiality obligations, and establish access controls based on the minimum authorization principle.
7. In the event that PI is or may be tampered with, destroyed, leaked, lost, illegally used, provided or accessed without authorization, Overseas Recipient shall:
(i) promptly take appropriate remedial measure to mitigate the adverse impact on PI Subject;
(ii) immediately notify PI Processor, and report to the Regulatory Authority in accordance with the Relevant Laws and Regulations. The notice shall contain the following contents:
a. the type of PI being or likely to be tampered with, destroyed, leaked, lost, illegally used, provided or accessed without authorization, the reasons and potential harm of such incident;
b. the remedial measures that have been taken;
c. the measures that can be taken by PI Subject to mitigate the harm; and
x. the contact information of the person or team responsible for handling the relevant incident.
(iii) where the Relevant Laws and Regulations require a notification to PI Subject, the contents of the notice shall include those under Article 3(7)(ii) above; if Overseas Recipient is entrusted by PI Processor to process PI, the notice shall be sent by PI Processor to PI Subject;
(iv) record and archive all the circumstances related to the occurrence or likely occurrence of tampering, destruction, leakage, loss, illegal use, unauthorized provision or access, including all remedial measures taken.
8. Overseas Recipient may provide PI to a third party located outside of the PRC only if all of the following requirements are met:
(i) it is indeed necessary for business purposes;
(ii) unless otherwise provided under the laws and administrative regulations, PI Subject has been informed of the name and contact information of the third party, and the purpose and method of PI processing, the type of PI, retention periods, and the methods and procedures for PI Subject to exercise his/her rights; if Sensitive PI will be transferred to such third party, PI Subject shall also be informed of the necessity for the outbound transfer of Sensitive PI and the impact on the rights and interests of PI Subject;
(iii) if the processing of PI is based on the consent of PI Subject, a separate consent of PI Subject shall be obtained; or, if the PI of a minor under the age of 14 is involved, a separate consent of the minor’s parents or other guardians shall be obtained. The consent shall be in a written form if so required by laws and administrative regulations;
(iv) it has entered into a written agreement with the third party to ensure that the processing of PI by the third party meets the standards for protection of PI required by the Relevant Laws and Regulations, and Overseas Recipient will be liable for the infringement of PI Subject’s rights due to the provision of PI to such third party;
(v) it will provide a copy of the above-mentioned agreement with the third party to PI Subject upon the request of PI Subject. If trade secrets or confidential business information are involved, the relevant contents of the copy of such agreement can be handled appropriately to the extent not affecting PI Subject’s understanding of such agreement.
9. If Overseas Recipient is entrusted by PI Processor to process PI, and Overseas Recipient intends to sub- contract the processing to a third party, Overseas Recipient shall obtain the consent of PI Processor in advance, ensure that the sub-contractor will not process PI in a manner that is beyond the purpose and method of the processing as specified in Annex – Details of the Outbound Transfer of PI, and monitor the PI processing activities of the third party.
10. When making use of PI for automated decision-making, Overseas Recipient shall ensure the transparency of decision-making and fair and impartial results, and shall not carry out unreasonable or differentiated treatment of PI Subject in terms of transaction conditions, such as transaction price. Where automated decision-making is used for information pushing and/or commercial marketing to PI Subject, Overseas Recipient shall also provide PI Subject with options that are not tailored to personal characteristics, or provide a convenient way for PI Subject to opt out.
11. Overseas Recipient shall undertake to provide PI Processor with all necessary information required to comply with the obligations under this Contract, shall allow PI Processor to review the necessary data documents and files, or shall allow PI processor to conduct a compliance audit of the processing activities under this Contract and shall provide facilitation for the compliance audit conducted by the PI Processor.
12. Overseas Recipient shall maintain an objective record of the PI processing activities, keep such records for at least 3 years and provide the relevant records and documents to the Regulatory Authority directly or through PI Processor in accordance with the Relevant Laws and Regulations.
13. Overseas Recipient agrees to accept the supervision and regulation by the Regulatory Authority during the course of its supervision of the implementation of this Contract, including but not limited to responding to inquiries, and cooperating with inspections, by the Regulatory Authority, abiding by the actions taken or decisions made by the Regulatory Authority, and providing written evidence that necessary actions have been taken, etc.
Article 4 - Impact of PI Protection Policies and Regulations in the Overseas Recipient’s Country or Region
on the Performance of Contract
1. The Parties warrant that they have exercised reasonable care when entering into this Contract and are not aware of PI protection polices and regulations in the Overseas Recipient’s country or region (including any requirements on providing PI or authorizing public authorities to access PI) that would impact Overseas Recipient’s performance of its obligations under this Contract.
2. The Parties represent that, when making the warranties under Article 4(1), they have conducted an assessment in light of the following circumstances:
(i) the specific circumstances of the outbound transfer, including the purpose of PI processing, the type, scale, scope and sensitivity of the PI, the volume and frequency of the PI transfer, the PI transmission , the period of retention by Overseas Recipient, the previous experience of Overseas Recipient with respect to similar outbound transfer and processing of PI, whether any PI security incident has occurred to Overseas Recipient and whether such incident was timely and effectively handled, whether Overseas Recipient has received any request to provide PI to the public authorities of the country or region where it is located and how Overseas Recipient responded to such request;
(ii) the PI protection policies and regulations of the country or region where Overseas Recipient is located, including the following factors:
a. the currently effective PI protection laws, regulations and generally applicable standards of the country or region;
b. the regional or global PI protection organizations that the country or region accedes to, and binding international commitments made by the country or region; and
c. the mechanisms for PI protection implemented in the country or region, e.g. whether the supervision and enforcement authorities and relevant judicial authorities are capable of protecting PI.
(iii) Overseas Recipient’s security management rules and technical capabilities.
3. Overseas Recipient warrants that it has used its best efforts to provide PI Processor with the necessary relevant information for the assessment under Article 4(2).
4. The Parties shall keep a record of the process and results of the assessment carried out under Article 4(2).
5. Where Overseas Recipient is unable to perform this Contract due to any change in the PI protection policies and regulations of the country or region where Overseas Recipient is located (including an amendment to laws in such country or region, or imposition of mandatory measures), Overseas Recipient shall notify PI Processor immediately after becoming aware of such change.
6. If Overseas Recipient is requested by a governmental authority or judicial authority in the country or region where Overseas Recipient is located to provide PI under this Contract, it shall promptly notify PI Processor.
Article 5 - Rights of PI Subject
The Parties agree that PI Subject shall be entitled to the following rights as a third-party beneficiary under this Contract:
1. PI Subject, in accordance with the Relevant Laws and Regulations, has the right to know and the right to make decisions concerning the processing of his/her PI, has the right to restrict or refuse the processing of his/her PI by others, has the right to review, duplicate, correct, supplement or delete his/her PI, and has the right to request others to explain the rules for the processing of his/her PI.
2. When PI Subject requests to exercise the above-mentioned rights regarding his/her PI that has been transferred abroad, PI Subject may request PI Processor or directly request Overseas Recipient to take appropriate measures to realize such rights. If PI Processor is unable to realize those rights, it shall notify Overseas Recipient and request Overseas Recipient to assist.
3. Overseas Recipient shall, in accordance with PI Processor’s notice or PI Subject’s request, cause the realization of the rights to which PI Subject is entitled s within a reasonable time period and in accordance with the Relevant Laws and Regulations.
Overseas Recipient shall inform PI Subject of the relevant information in a conspicuous, true, accurate and complete manner, and in clear and understandable language.
4. If Overseas Recipient refuses PI Subject’s request, it shall inform PI Subject of the reasons for the
refusal, and how PI Subject can raise complaints to the Regulatory Authority and seek judicial remedies.
5. PI Subject is a third-party beneficiary to this Contract, and has the right to claim against one or both of PI Processor and Overseas Recipient in accordance with this Contract and require them to perform the following clauses under this Contract relating to the rights of PI Subject:
(i) Article 2, except for Articles 2(5), 2(6), 2(7) and 2(11);
(ii) Article 3, except for Articles 3(7)(ii) and 3(7)(iv),3(9),3(11),3(12) and 3(13);
(iii) Article 4, except for Articles 4(5) and 4(6);
(iv) Article 5;
(v) Article 6;
(vi) Article 8(2) and 8(3); and
(vii) Article 9(5).
The provisions agreed above shall not affect the rights and interests of PI Subject under the PRC Personal Information Protection Law.
Article 6 - Remedies
1. Overseas Recipient shall identify a contact person who is authorized to respond to inquiries or complaints concerning the processing of PI, and shall promptly handle such inquiries or complaints raised by PI Subject. Overseas Recipient shall notify PI Processor of the contact information of such contact person and shall, by separate notice or announcement on its website in an easy-to-understand manner, inform PI Subject of the contact information of such contact person. [The specific language shall be:] Contact person and contact information (office phone number or email address).
2. If a dispute arises between a Party and PI Subject with respect to the performance of this Contract, such Party shall notify the other Party and the Parties shall cooperate to resolve the dispute.
3. If the dispute cannot be resolved through friendly corporation and PI Subject exercises the rights as a third-party beneficiary in accordance with Article 5, Overseas Recipient shall accept that PI Subject may choose from of the following:
(i) making a complaint to the Regulatory Authority,
(ii) bringing a lawsuit to the court specified under Article 6(5).
4. The Parties agree that when PI Subject exercises the rights as a third-party beneficiary with respect to a dispute under this Contract, if PI Subject chooses to apply the Relevant Laws and Regulations of the PRC, such choice shall prevail.
5. The Parties agree that when PI Subject exercises the rights as a third-party beneficiary with respect to a dispute under this Contract, PI Subject may file a lawsuit with a competent court in accordance with the PRC Civil Procedure Law.
6. The Parties agrees that the choices made by PI Subject to safeguard his/her rights is without prejudice
to PI Subject’s rights to seek remedies in accordance with other laws and regulations. Article 7 - Termination of the Contract
1. If Overseas Recipient breaches the obligations under this Contract or Overseas Recipient is unable to perform this Contract due to a change in the PI protection policies and regulations of the country or region where Overseas Recipient is located (including an amendment to laws in such country or region, or imposition of mandatory measures), PI Processor may suspend the provision of PI to Overseas Recipient until the breach is rectified or the Contract is terminated.
2. Under any one of the following circumstances, PI Processor shall be entitled to terminate this Contract and notify the Regulatory Authority where necessary:
(i) PI Processor has suspended the provision of PI to Overseas Recipient in accordance with Article 7(1) for more than one month;
(ii) Overseas Recipient’s compliance with this Contract will violate the laws and regulations of its
own country or region;
(iii) Overseas Recipient seriously or continuously breaches the obligations under this Contract;
(iv) Overseas Recipient or PI Processor has been determined to have breached this Contract pursuant to a final decision of a competent court or the regulatory body supervising Overseas Recipient; or Overseas Recipient may also terminate this Contract in case of sub-paragraph (i), (ii) or (iv) of above.
3. This Contract may be terminated upon mutual agreement by the Parties, provided that such termination shall not exempt the Parties from the obligations of protecting PI during the processing of the PI.
4. If the Contract is terminated, Overseas Recipient shall promptly return or delete the PI (including all back-up copies) received hereunder and provide PI Processor with a written statement. If it is technically difficult to delete the PI, other than storing and taking necessary security protection measures, all processing of the PI shall be ceased.
Article 8 - Liability for Breach of the Contract
1. Each Party shall be liable for any damages as a result of its breach of this Contract suffered by the other Party.
2. Each Party shall bear civil liabilities to PI Subject if its breach of this Contract infringes on the rights of PI Subject, without prejudice to the administrative, criminal or other legal liabilities that shall be assumed by PI Processor under the Relevant Laws and Regulations.
3. If the Parties shall assume joint and several liabilities in accordance with the law, PI Subject shall have the right to request each Party or both of the Parties to assume liabilities. When the liability assumed by one Party exceeds the liability such Party shall be assumed, such Party shall have the right to claim against the other Party accordingly.
Article 9 - Miscellaneous
1. If this Contract conflicts with any other legal documents between the Parties, this Contract shall prevail.
2. The formation, validity, performance and interpretation of this Contract and any dispute between the Parties arising from this Contract shall be governed by the Relevant Laws and Regulations.
3. All notices shall be promptly transmitted or sent by e-mails, cable, telex, facsimile (a confirmation copy shall be sent by airmail), or registered airmails to [address of the Parties respectively] or such other addresses designated by a written notice). The notice under this Contract sent by registered airmail shall be deemed to have been received [*] days after its postmark-date, and [*] working days after it is sent via e-mail, cable, telex or facsimile.
4. For any dispute arising from this Contract between the Parties, and any claim by either Party against the other for recovery of payment for the infringement on PI Subject, the Parties shall resolve such dispute or claim through negotiation; if such negotiation fails, either Party may adopt any of the following methods to resolve the dispute (check the box for the chosen arbitration institution if the Parties choose arbitration):
(i) Arbitration. The dispute shall be submitted to:
China International Economic and Trade Arbitration Commission China Maritime Arbitration Commission
Beijing Arbitration Commission (Beijing International Arbitration Center) Shanghai International Arbitration Center
Other arbitration institutions that are members of the Convention on the Recognition and Enforcement of Foreign Arbitral Awards
The arbitration shall be conducted in [venue] in accordance with its arbitration rules then in force.
(ii) Litigation. The dispute shall be submitted to a competent PRC people’s court in accordance
with law.
5. This Contract shall be interpreted in accordance with the Relevant Laws and Regulations and shall not be interpreted in a manner inconsistent with the rights and obligations set forth in the Relevant Laws and Regulations.
6. This Contract shall be executed in [*] originals, and each Party shall hold [*] original(s) respectively, and all of which shall have equal legal effect. This contract is signed in [*].
PI Processor: see in Agreement Date: see in Agreement
Overseas Recipient: see in Agreement Date: see in Agreement
Annex I
Details of the Outbound Transfer of PI
Details of the cross-border transfer of personal information under this Contract are agreed upon as follows:
(1) The personal information to be transferred belongs to the following categories of personal information subjects:
(2) The transfer is for the following purposes:
(3) Volume of personal information to be transferred:
(4) Categories of personal information to be transferred abroad (refer to GB/T 35273 Information security technology - Personal information security specification and relevant standards):
(5) Categories of sensitive personal information to be transferred abroad (if applicable, refer to GB/T 35273 Information security technology - Personal information security specification and relevant standards):
(6) The personal information to be transferred by the overseas recipient shall only be provided to the following recipients:
(7) Method of transfer:
(8) Storage period after cross-border transfer:
(9) Storage location after cross-border transfer:
(10) Other matters (as appropriate):
Xxxxx XX
Other Terms Agreed Upon By the Parties (If necessary)
Xxxxx XXX
Technical and organizational measures
1. Organization
HP has an Information Security Organization responsible for directing and managing the organization's information security strategy and controls. An Information Security Framework/Management System is put in place to ensure compliance with HP’s security policies and controls and confirm that the security requirements of its customers are complied with. This Framework is structured in alignment with the NIST Cybersecurity Framework and is reviewed annually.
2. Asset Management
HP has a process in place for identifying technical information assets, and through this process, HP identifies all assets under its responsibility and categorizes the critical assets. HP further maintains a set of documented handling procedures for each information classification type, including those assets that contain Personal Data. Handling procedures address storage, transmission, communication, access, logging, retention, destruction, disposal, incident management, and breach notification.
3. Access Control
The principle of least privilege is used for providing logical access control. User access is provided via a unique user ID and password. HP’s password policy has defined complexity, strength, validity, and password-history related controls. Access rights are reviewed periodically and revoked upon personnel departure.
User account creation and deletion procedures, as have been mutually agreed upon, are implemented to grant and revoke access to client systems used during the engagement.
4. Personnel Training
HP employees must complete the Integrity at HP training designed to ensure that employees are familiar with the program, policies, and resources that govern HP’s expectations for ethical behavior, excellence, and compliance. Integrity at HP features modules on security and data privacy, and employees also are required to take an annual “refresher” course. HP employees must also complete an annually refreshed dedicated security awareness training focused on essential security policies and emphasizing the employees’ responsibilities related to incident management, data privacy, and information security.
5. Third Parties and Subcontractors
HP has processes in place to select sub-contractors that are able to comply with comprehensive contractualsecurity requirements.
For applicable suppliers (suppliers that handle/store/transmit HP data and customer owned HP held data or have access to the HP network), HP Cybersecurity performs a risk assessment to verify the existence of an information security program. An adequate program must include physical, technical, and administrative safeguards. This assessment must be done before the supplier has access to HP information.
6. Systems Security
By policy, t h e development of systems and supporting software within HP follow a secure
development methodology to ensure security throughout the system/software lifecycle. The Software Development Lifecycle defines initiation, development/acquisition, implementation, operations, and disposal requirements. All system components, including modules, libraries, services, and discrete components,are evaluated to determine their impact on the overall system security state.
HP has defined controls for the protection of application service transactions. These controls include validating and verifying user credentials, mandating digital signatures and encryption, implementing secure communication protocols, storing online transaction details on servers within the appropriate network security zone.
Internal vulnerability scans are performed regularly.
7. Physical and Environmental Security
HP facilities are secured using various physical and electronic access controls and surveillance capabilities. Depending on the facility, this could include security guards, electronic access control, and closed-circuit television (CCTV).
All HP personnel are registered and are required to carry appropriate identification badges.
Facilities have required infrastructure support with temperature control and power backups where required, using UPS and/or diesel generators to support critical services.
8. Operations Management
HP has defined a minimum set of hardening requirements for technology infrastructure, including workstations, servers, and network equipment. Workstation/servers images contain pre-hardened operating systems. Hardening requirements vary depending on the type of operating system and applicable controls implemented.
HP has deployed Network Intrusion Detection/Prevention Systems (NIDS/ NIPS) within the network and aremonitored and managed 24*7.
HP security policies and standards mandate secure disposal of media.
9. Cryptography
HP has defined a set of robust processes for cryptography to ensure the confidentiality, integrity, and availability of information assets. Approved protocols require encryption for certain assets, including thosethat contain personal data.
10. Information Security Incident Management
HP follows a developed Cyber Incident Management Process that addresses purpose, scope, roles, responsibilities, management commitment, organizational coordination, implementation procedures, and compliance checking. HP reviews and updates this process on an annual basis.
A Cyber Incident Response Team, which includes HP Cybersecurity personnel trained in incident response and crisis management, is assembled for regular table-top reviews of process and any incident or event.
12. Business Continuity Management
HP maintains a global Continuity of Operations program. This program takes a holistic, company-wide approach for end-to-end continuity through a set of collaborative, standardized, and internally documentedplanning processes.
HP periodically exercises its business continuity plans to ensure their effectiveness. HP currently tests and updates all plans at least yearly and ensures that people with a role in the business continuity plan are trained.