MindSphere DataPrivacyTerms - PD
MindSphere DataPrivacyTerms - PD
MindSphere DataPrivacyTerms - PD
January 2018
8.2. After termination of the MMA, we will delete or anonymize 11.4. In case you can demonstrate that the Audit Reports provided
your Personal Data stored on the Platform , unless we are required are not reasonably sufficient to allow you or an Authorized Entity to
to retain such data in accordance with Laws. You acknowledge that comply with applicable audit requirements and obligations under
part of your Personal Data may be retained by us as part of our Applicable Data Protection Law, you or the respective Authorized
disaster recovery backup of the Platform until deletion of such files Entity shall specify the further information, documentation or
in accordance with our policies. support required. We shall render such information, documentation
or support within a reasonable period of time at your expense.
9. Personal Data Breach
11.5. The Audit Reports and any further information and
In the event of any Personal Data Breach, we shall notify you of such documentation provided during an audit shall constitute
breach without undue delay after we become aware of it. We shall Confidential Information and may only be provided to Authorized
(i) reasonably cooperate with you in the investigation of such event; Entities pursuant to confidentiality obligations substantially
(ii) provide reasonable support in assisting you in your security equivalent to the confidentiality obligations contained elsewhere in
breach notification obligations under Applicable Data Protection Law the MMA. In case audits relate to our Subprocessors, we may
(if applicable); and (iii) initiate respective and reasonable remedy require you and Authorized Entities to enter into non-disclosure
measures. agreements directly with the respective Subprocessor before issuing
13.5. “Data Subject” means an identified or identifiable natural 13.16. “Special Categories of Personal Data” shall mean
person. information revealing racial or ethnic origin, political opinions,
religious or philosophical beliefs, trade-union membership, social
13.6. “DPT” shall mean this Data Privacy Terms. security measures, administrative or criminal proceedings and
sanctions, or genetic data, biometric data for the purpose of
13.7. “EEA” shall mean the European Economic Area. uniquely identifying a natural person, data concerning health or data
concerning a natural person's sex life or sexual orientation.
13.8. “EU Model Contract” means the Standard Contractual Clauses
for the Transfer of Personal Data to Processors Established in Third 13.17. “Transfer Safeguards” shall mean (i) an adequacy decision in
Countries pursuant to Commission Decision 2010/87/EU of 5 the meaning of Article 45 of the General Data Protection Regulation
February 2010 or any successor document issued by the European (EU) 2016/679 or (ii) appropriate safeguards as required by Article
Commission. 46 of the General Data Protection Regulation (EU) 2016/679.
13.9. “Emergency Replacement” refers to a short-term 13.18. “Transfers to Non-EEA Recipients” shall mean (i) the
replacement of a Subprocessor which is necessary (i) due to an Processing of Personal Data outside the EEA or a Country With an
event outside of our reasonable control and (ii) in order to provide Adequacy Decision or (ii) any accesses to Personal Data from outside
the Services without interruptions (such as if the Subprocessor the EEA or a Country with an Adequacy Decision by us or any of our
Subprocessors.
The Parties may provide further details in the Order Forms if required for a particular Service, or we may provide further details in the
applicable Transaction Documents.
Processing operations
Data Subjects
The Personal Data Processed concerns the following categories of Data Subjects:
Data Subjects include employees, contractors, business partners or other individuals whose Personal Data is stored on the Platform.
Categories of data
The Personal Data Processed concerns the following categories of personal data:
You, your Authorized Entities and Users determine the categories of Personal Data that will be Processed in connection with the Services. The
respective data fields can be configured as part of the implementation of the Service or as otherwise permitted in the Service. The Personal Data
Processed may include: name, phone number, email address, time zone, address data, system access / usage / authorization data, company name,
contract data, invoice data, and any application-specific data which Users enter into the Service including bank account data, credit or debit card data.
The Services are not intended for the processing of Special Categories of Personal Data and you and your Authorized Entities shall not transfer, directly
or indirectly, any such sensitive personal data to us.
Some Services may be protected by different or additional technical and organizational security measures (TOMs), as set forth in the respective
Order Forms or the applicable Transaction Documents. In all other cases, the following technical and organizational security measures (TOMs)
implemented by us and/or our Subprocessors shall apply.
It is your own responsibility to implement measures in addition to the TOMs described below that fall in your own sphere of responsibility, such as
implementing physical and system access control measures for your own premises and assets or configuring the Services to your individual
requirements.
The following measures as implemented are designed to protect against unauthorized physical access to premises, buildings or rooms where data
processing systems are located which process and/or use Personal Data:
a) Physical components of the data center facilities, servers, networking equipment, and host software are housed in nondescript facilities.
b) Physical barrier controls are used to prevent unauthorized entrance to these facilities both at the perimeter (e.g., fencing, walls) and at
building access points.
c) Physical access points to server locations are managed by electronic access control devices and are secured with intrusion detection
devices that sound alarms if the door is forced open or held open.
d) Establishing access authorizations for employees and third parties, including the respective documentation.
e) All visitors are required to present identification and are signed in.
f) Use of video cameras (CCTV) to monitor individual physical access to data center facilities.
g) Data centers utilize security guards 24x7, who are stationed in and around the building.
The following measures are implemented to protect against the unauthorized access to and use of data processing systems used to provide
Services on the Platform:
a) User and administrator access to the data center facilities, servers, networking equipment, and host software is based on a role based
access rights model. A unique ID is assigned to ensure proper user-authentication management for users and administrators on all system
components.
b) The concept of least privilege is employed, allowing only the necessary access for users to accomplish their job function. When user
accounts are created, user accounts are created to have minimal access. Access above these least privileges requires appropriate
authorization.
c) IT access privileges are reviewed on a regular basis by appropriate personnel.
d) Access to systems is revoked within a reasonable timeframe of the employee record being terminated (deactivated).
e) First time passwords/passphrases are set to a unique value and changed immediately after first use.
f) User passwords/passphrases are changed at least every 90 days and only allow complex passwords.
g) Time stamped logging of security relevant actions is in place.
h) Automatic time-out of user terminal if left idle, with user identification and password required to reopen.
i) Assets (e.g. laptops) are configured with anti-virus software that includes e-mail filtering and malware detection.
j) Firewall devices are configured to restrict access to the computing environment and enforce boundaries of computing clusters.
k) Firewall policies (configuration files) are pushed to firewall devices on a regular basis.
The following measures are implemented to control that persons entitled to use data processing systems gain access only to the Personal Data
when they have a right to access, and Personal Data is not read, copied, modified or removed without authorization in the course of processing,
use and storage.
a) User and administrator access to the data center facilities, servers, networking equipment, and host software is based on a role based
access rights model. A unique ID is assigned to ensure proper user-authentication management for users and administrators on all system
components.
b) The concept of least privilege is employed, allowing only the necessary access for users to accomplish their job function. When user
accounts are created, user accounts are created to have minimal access. Access above these least privileges requires appropriate
authorization.
c) IT access privileges are reviewed on a regular basis by appropriate personnel.
d) Time stamped logging of access to and modification of Personal Data is in place.
The following measures are implemented to control that Personal Data is not read, copied, modified or removed without authorization during
transfer:
a) Prevention of unauthorized copying by us, our Subprocessors or unauthorized third parties: The measures taken to prevent unauthorized
copying of the physical storage infrastructure as such (e.g. copying your data by transferring them to an external storage medium as a
hard drive) are included in the measures described above.
b) Use of role based access rights model: described above.
c) Firewall policies : described above.
d) Implement an incident response plan: described above.
e) Storage Device Decommissioning: When a storage device has reached the end of its useful life, procedures implemented include a
decommissioning process that is designed to prevent customer data from being exposed to unauthorized individuals. All decommissioned
magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices and Applicable Data
Protection Law.
f) Secure access points: there are only a limited number of secure access points to the Platform which allow you to establish a secure
communication session with your storage or compute instances within the Services.
g) Connections to the network by personnel: personnel connect to the network using secure authentication that restricts access to network
devices and other cloud components.
The following measures are implemented to retrospectively examine and establish whether and by whom Personal Data have been entered,
modified or removed from data processing systems used to provide Services on the Platform:
Logging user activity: developers and administrators who need to access to our systems in order to maintain them must explicitly request
access. Approved personnel connect to the network using secure authentication that restricts access to network devices and other cloud
components, logging all relevant activity for security review. You will enter Personal Data through the usage of the Service and you are
hence responsible for implementing and maintaining measures for the establishment of an audit trail to document whether and by whom
personal data has been entered into, modified in, or removed from processing.
6. Order Control
The following measures are implemented in order to ensure that Personal Data which are processed on your behalf can only be processed in
compliance with your instructions:
a) Internal communication: various methods of internal communication are implemented at a global level to help employees understand
their individual roles and responsibilities and to communicate significant events in a timely manner. These methods include orientation
and training programs for newly hired employees and regular management meetings for updates on business performance and other
matters.
b) Corporate segregation: Logically, the production network is segregated from the corporate network by means of a complex set of
network security / segregation devices. Developers and administrators on the corporate network who need to access in order to maintain
them must explicitly request access. Approved personnel then connect to the network through secure means.
c) Robust compliance program: The providers of our cloud infrastructure are obliged to (i) implement and maintain a security program that
complies, inter alia, with the ISO 27001 or a successor standard (if any) that is substantially equivalent to ISO 27001 and that is designed
to provide at least the same level of protection as evidenced by the certification of the providers under ISO 2018 and (ii) have the
adequacy of their security measures annually verified by independent auditors.
d) Policies and security awareness Training: We and our Subprocessors maintain and provide periodic security awareness training to all
information system users. Policies and procedures have been established based upon data security and data protection requirements.
The following measures are implemented to protect Personal Data against accidental or unauthorized destruction or loss:
a) Fire detection and suppression: Automatic fire detection and suppression equipment has been installed with our data centers. The fire
detection system utilizes smoke detection sensors in all data center environments, mechanical and electrical infrastructure spaces, chiller
rooms and generator equipment rooms.
b) Redundant power systems: The data center electrical power systems are designed to be fully redundant and maintainable without impact
to operations, 24 hours a day, and seven days a week. Uninterruptible Power Supply (UPS) units provide back-up power in the event of an
electrical failure for critical and essential loads in the facility. Data centers use generators to provide back-up power for the entire facility.
c) Climate and temperature control: Personnel and systems monitor and control temperature and humidity at appropriate levels at data
centers.
d) Preventative maintenance: Preventative maintenance is performed to maintain the continued operability of the data center equipment.
The following measures are implemented to control that Personal Data collected for different purposes can be processed separately:
a) Multi-tenant environment: The Platform is a virtualized, multi-tenant environment. Security management processes and security controls
designed to isolate each customer from other customers are implemented. Systems are designed to prevent customers from accessing
physical hosts or instances not assigned to them by filtering through the virtualization software.
b) Corporate segregation: described in Section 6 above.