Last updated: 15.9.2023

 

abilitate – Data Processing Agreement

 

This Data Processing Agreement (“Agreement”), is entered into by tech2people GmbH, c/o Kerbler Holding Parkring 12/1/23, A-1010 Vienna (“t2p” or “data processor“) and you or the entity you represent (“data controller”) and sets forth the terms under which the data processor will process personal data in connection with the data controller’s use of its services. Data processor and data controller are referred to in the following either together or singly as the “parties“ and the “party“.

1. Subject matter of the Agreement

2. The obligations of the data controller

3. Instructions

4.Confidentiality

5. Security of processing

6.Use of sub-processors

The data processor shall therefore be responsible for requiring that the sub-processor at least complies with the obligations to which the data processor is subject pursuant to the Agreement and the GDPR.

7.International transfers

The SCC are modular, containing sections that relate to a specific type of entity or transfer. For the purpose of abilitate – Terms of Service and any transfer of personal data to third countries, only the modular sections in Module 4 (Processor-Controller) shall apply, in addition to all general sections, subject to the following:

8. Assistance to the data controller

9. Notification of personal data breach

Where, and insofar as, it is not possible to provide all this information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay.

10.Erasure and return of data

11. Audit and inspection

12. Liability

Except where otherwise provided by mandatory law, liability under this Agreement shall be the same as under the abilitate – Terms of Service (Sec 1).

13.Term and termination

13.2. If the provision of personal data processing services is terminated, and the personal data is deleted or returned to the data controller (Sec 10).

14. Modification of the Agreement

Data processor may make changes to this Agreement (and any linked documents) from time to time. Data processor will provide at least 30 days’ advance notice for material changes to the Agreement by sending an email to the data controller’s email address. Data controller’s continued use of the services (Sec 1) after such material change will constitute data controller’s consent to such changes.

15.Data Protection Point of Contact

16.Final provisions

 

Annex A Description of the Processing Activities and Transfer

A.1. Processing includes the following categories of data subject:

A.2. The processing includes the following categories of personal data about data subjects:

A.3. The data processor’s processing of personal data on behalf of the data controller shall mainly pertain to (the nature of the processing):

The nature of the processing (incl. transfer) is described in the abilitate – Terms of Service (Sec 1). It includes but is not limited to collection, structuring, storage, transmission, or otherwise making available personal data by automated means and in accordance with product and service functionalities.

A.4. The purpose(s) of the data processor’s processing of personal data on behalf of the data controller is:

A.5. The data processor’s processing of personal data on behalf of the data controller may be performed when the Agreement commence. Processing has the following duration:

The duration of the agreement is tied to the provision of personal data processing services (Sec 13).

A.6. Frequency of the transfer

Continuous

A.7. The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period

The data processor retains personal data for as long as required for its own legitimate purposes, in accordance with this Agreement. The criteria used to determine retention periods include:

A.8. Competent supervisory authority

The competent supervisory authority of the data processor as data exporter’s will be determined in accordance with the GDPR. The supervisory authority applicable to the data exporter in its EEA country of establishment is the Austrian Data Protection Authority, Barichgasse 40-42, 1030 Vienna, telephone: +43 1 52 152-0, e-mail: dsb@dsb.gv.at, website: https://dsb.gv.at.

 

Annex B        Authorised sub-processors

On commencement of the Agreement, the data controller authorises the engagement of the following sub-processors:

Subcontracting company Address/

Country

Contact Service Duration
Microsoft Azure One Microsoft Way, Redmond, WA 98052 USA Data Protection Officer at https://aka.ms/privacyresponse;  see also Privacy in Azure https://azure.microsoft.com/en-us/explore/trusted-cloud/privacy Cloud Service Provider Term of the Agreement (Sec 13)
 

 

Annex C        Technical and Organisational Measures

The data processor shall ensure data security and provide a level of protection appropriate to the risk concerning confidentiality, integrity, availability and resilience of the systems.

In order to achieve this, the data processor shall at, at all times, maintain appropriate and sufficient technical and organisational security measures to protect personal data or information against accidental or unlawful destruction or accidental loss, damage, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

These measures shall include, but are not limited to, physical access control, logical access control (i.e. non-physical access control measures such as passwords), data access control, data transfer control, input control, availability measures, and data separation, and in particular at least the measures set out in the table below.

For more detailed information on the latest state-of-the-art measures adopted by our hosting provider, please refer to the following link: https://azure.microsoft.com/en-us/explore/security.

 

Specific Measures
I. Confidentiality
1 Entry control Protection against unauthorised access to the data processing facilities and premises in which the processing of data takes place.
2 Access control (electronic) Protection against unauthorised access to and use of data, software, data mediums (e.g. hard disk) and systems for processing of data (e.g. devices and other equipment) with certificate-based login, firewall, automatic blocking of intrusion attempts, continuous monitoring, 2-factor authentication.
3 Data access control No unauthorised reading, copying, modification or removal of data within the system as technically implemented by a role-based system, e.g: Standard authorisation profiles on a need-to-know basis, standard authorisation allocation process, logging of all accesses to the personal data, so that processing operations actually carried out, such as in particular changes, queries and transfers, can be traced to the necessary extent with regard to their permissibility.
# Pseudonymization If possible for the data processing operation, the primary identifiers are removed from within the data processing operation and saved elsewhere.
# Data classification scheme Based on legal obligations or self-assessment (secret/confidential/internal/public).
II. Data Integrity
1 Transfer control Unauthorised reading, copying, modification or removal is not possible, as it is not intended by the system and is only possible with authorisation. All access (including reading) is logged. In the case of electronic transmission or transport, only encrypted.
# Input control Determining whether and by whom personal data has been entered, modified or removed from data processing systems through logging.
III. Availability and resilience
1 Availability control Onsite and offsite backups (also encrypted using state-of-the-art encryption), UPS for uninterrupted power supply, data centre standards are maintained.
# Recoverability Rapid recovery through full backups of all virtual machines in use and separate file and database backups.
# Data separation Established measures will be used to ensure that personal data processed on behalf of the data controller is logically separate to data processed on behalf of any other third party when at-rest.
# Deletion periods Data is not automatically deleted, but must be manually removed from the system when it is no longer needed, as it is not possible to automatically determine when data is no longer needed.
IV. Data Protection Management
1 Monitoring Continual monitoring of data protection risks and regular tests, assessments and evaluations of implemented technical and organisational measures.
2 DPO Data processor has designated a data protection officer
# Knowledge Regular employee training courses
# Data processing control Strict selection of sub-processors (ISO-certified, ISMS)