DATA PROCESSING AGREEMENT
Last Updated May 6, 2024
This Data Processing Agreement (“DPA”) is governed by and hereby attached to the Master Service Agreement, Terms of Service, or any other agreement (“Agreement”) executed by and between Akeyless Security Ltd. or Akeyless Security USA Inc. (“Akeyless”), and you, a customer, user or individual (“Customer”).
All capitalized terms not defined herein shall have the meaning set forth in the Agreement.
WHEREAS, Akeyless is the developer and operator of a cloud-based SaaS solution enabling enterprises and organizations to secure and manage authorizations, access, and permissions to IT and Cloud environments (“Akeyless Technology”), all as agreed by the parties in the applicable order form or other ordering documents that are incorporated in the Agreement (collectively the “Service(s)”);
WHEREAS, the Services may require Akeyless to Process Personal Data (as such terms are defined below) on Customer’s behalf, which Customer discloses to Akeyless only for the limited and specified purposes set forth herein, and subject to the terms and conditions of this DPA; and
WHEREAS, the parties desire to supplement this DPA to achieve compliance with the UK, EU, Swiss, United States and other data protection laws and agree on the following:
- DEFINITIONS
- “Adequate Country” is a country that received an adequacy decision from the European Commission or other applicable data protection authority.
- The terms “Business Purpose“, “Controller”, “Data Subject”, “Personal Data”, “Personal Data Breach”, “Processing” (and “Process”), “Processor”, , “Special Categories of Personal Data” and “Supervisory Authority”, shall all have the same meanings as ascribed to them in the EU Data Protection Law, the CPA, the VCDPA and the CTDPA. The terms “Business”, “Business Purpose”, “Consumer”, “Contractor”, “Cross-contextual Advertising”, “Service Provider”, “Sale”, “Sell” and“Share”, “Targeted Advertising”, “Third Party Business”, shall have the same meaning as ascribed to them in the US Data Protection Laws. “Data Subject” shall also mean and refer to (under this DPA) a “Consumer”, as such term defined in the US Data Protection Laws, and “Personal Data” shall include “Personal Information” under this DPA.
- “CCPA” means the California Consumer Privacy Act (Cal. Civ. Code §§ 1798.100 – 1798.199) of 2018, including as modified by the California Privacy Rights Act (“CPRA”) as well as all regulations promulgated thereunder from time to time.
- “CPA” means the Colorado Privacy Act C.R.S.A. § 6-1-1301 et seq. (SB 21-190), including any implementing regulations and amendments thereto.
- “CTDPA” means the Connecticut Data Privacy Act, S.B. 6 (Connecticut 2022), including any implementing regulations and amendments thereto.
- “Customer Data” means Customer Data (as defined in the Agreement) and any Personal Data processed by Akeyless in the course of its Services provision to Customer, all as detailed in Annex I attached herein.
- “Data Privacy Framework” means the EU-U.S. Data Privacy Framework and the UK Extension to the EU-U.S. Data Privacy Framework operated by the U.S. Department of Commerce; as may be amended, superseded or replaced.
- “Data Privacy Framework Principles” means the Principles and Supplemental Principles contained in the relevant Data Privacy Framework; as may be amended, superseded or replaced.
- “Data Protection Law” means any and all applicable privacy and data protection laws and regulations (including, where applicable, EU Data Protection Law, UK Data Protection Laws, Swiss Data Protection Laws, Israeli Law and the US Data Protection Laws) as may be amended or superseded from time to time.
- 1.10.“EEA” means the European Economic Area.
- 1.11.“EU Data Protection Law” means the (i) EU General Data Protection Regulation (Regulation 2016/679) (“GDPR”); (ii) Regulation 2018/1725; (iii) the EU e-Privacy Directive (Directive 2002/58/EC), as amended (e-Privacy Law); (iv) any national data protection laws made under, pursuant to, replacing or succeeding (i) and (ii); (v) any legislation replacing or updating any of the foregoing; and (vi) any judicial or administrative interpretation of any of the above, including any binding guidance, guidelines, codes of practice, approved codes of conduct or approved certification mechanisms issued by any relevant Supervisory Authority.
- 1.12.“Israeli Law” means Israeli Privacy Protection Law, 5741-1981, the regulations promulgated pursuant thereto, including the Israeli Privacy Protection Regulations (Data Security), 5777-2017 and other related privacy regulations.
- 1.13.“Security Incident” means any accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Data. Any Personal Data Breach will comprise a Security Incident.
- 1.14.“Standard Contractual Clauses” or “SCC” mean the standard contractual clauses for the transfer of Personal Data to third countries pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council adopted by the European Commission Decision 2021/914 of 4 June 2021, which may be found here.
- 1.15.“Swiss Data Protection Laws” or “FADP” shall mean collectively (i) the new Swiss Federal Data Protection Act; (ii) The Ordinance on the Federal Act on Data Protection ; and (iii) any national data protection laws made under, pursuant to, replacing or succeeding and any legislation replacing or updating any of the foregoing.
- 1.16.“Swiss SCC” shall mean the applicable standard data protection clauses issued, approved or recognized by the Swiss Federal Data Protection and Information Commissioner.
- 1.17.“UCPA” means the Utah Consumer Privacy Act, Utah Code Ann. § 13-61-101 et seq.
- 1.18.”US Data Protection Laws” means any U.S. federal and state privacy laws effective as of the Effective Date of this DPA and applies to Akeyless Processing of Customer Data, and any implementing regulations and amendment thereto, including without limitation, the CCPA, the CPA, the CTDPA, the UCPA and the VCDPA.
- 1.19.”UK Data Protection Laws” shall mean the Data Protection Act 2018 (DPA 2018), as amended, and EU General Data Protection Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, as incorporated into UK law as the UK GDPR, as amended, and any other applicable UK data protection laws, or regulatory Codes of Conduct or other guidance that may be issued from time to time.
- 1.20.”UK GDPR” shall mean the GDPR as it forms part of domestic law in the United Kingdom by virtue of section 3 of the European Union (Withdrawal) Act 2018 (including as further amended or modified by the laws of the United Kingdom or a part of the United Kingdom from time to time).
- 1.21.“UK Standard Contractual Clauses”or “UK SCC” means the UK “International Data Transfer Addendum to The European Commission Standard Contractual Clauses” available at https://ico.org.uk/media/for-organisations/documents/4019539/international-data-transfer-addendum.pdf as adopted, amended or updated by the UK Information Commissioner Office (“ICO”), Parliament or Secretary of State.
- 1.22.“VCDPA” means the Virginia Consumer Data Protection Act, Va. Code Ann. § 59.1-575 et seq. (SB 1392), including any implementing regulations and amendments thereto.
Any other terms that are not defined herein shall have the meaning provided under the Agreement or applicable Data Protection Laws. A reference to any term or section of the Data Protection Laws means the version as amended. Any references to the GDPR in this DPA shall mean the GDPR or UK GDPR depending on the applicable Law.
- ROLES AND DETAILS OF PROCESSING
- The parties agree and acknowledge that under the performance of their obligations set forth in the Agreement, and with respect to the Processing of Customer Data, and according to the applicable Data Protection Laws, Akeyless is acting as a Data Processor and Customer is acting as a Data Controller.
- Each party shall be individually and separately responsible for complying with the obligations that apply to such party under applicable Data Protection Law.
- The subject matter and duration of the Processing carried out by the Processor on behalf of the Controller, the nature and purpose of the Processing, the type of Personal Data and categories of Data Subjects are described in Annex I attached hereto.
- Additional US Data Protection Laws specifications are further detailed in Annex VII.
- REPRESENTATIONS AND WARRANTIES
- Akeyless represents and warrants that it shall Process Customer Data, on behalf of the Customer, solely for the purpose of providing the Service, all in accordance with Customer’s written instructions under the Agreement and this DPA. Notwithstanding the above, in the event Akeyless is required under applicable laws, including Data Protection Law or any union or member state regulation, to Process Customer Data other than as instructed by Customer, Akeyless shall make its best efforts to inform the Customer of such requirement prior to Processing such Customer Data, unless prohibited under applicable law.
- Akeyless shall provide reasonable cooperation and assistance to the Customer in ensuring compliance with its obligation to carry out data protection impact assessments.
- Where applicable, Akeyless shall assist the Customer in ensuring that Customer Data Processed is accurate and up to date, by informing the Customer without delay if it becomes aware of the fact that the Customer Data it is processing is inaccurate or has become outdated.
- Akeyless shall ensure: (i) the reliability of its staff and any other person acting under its supervision who may come into contact with, or otherwise have access to and Process Customer Data; and (ii) that persons authorized to Process the Customer Data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.
- Notwithstanding the above, in any event that the Israeli Law applies, the parties hereby undertake that they comply with the aforesaid regulations as well as comply with the DPA.
- DATA SUBJECTS RIGHTS AND REQUEST
- It is agreed that where Akeyless receives a request from a Data Subject or an applicable authority in respect of Customer Data, where applicable, Akeyless will notify the Customer of such request promptly and direct the Data Subject or the applicable authority to the Customer in order to enable the Customer to respond directly to the Data Subject’s or the applicable authority’s request, unless otherwise required under applicable laws.
- Parties shall provide each other with commercially reasonable cooperation and assistance in relation to the handling of and responding to Data Subject’s or applicable authority’s request, to the extent permitted under Data Protection Law, including such request under the Data Privacy Framework.
- SUB-PROCESSING
- The Customer acknowledges that Akeyless may transfer Customer Data to and otherwise interact with third party data Processors (“Sub-Processor”). The Customer hereby authorizes Akeyless to engage and appoint such Sub-Processors as listed in Annex III, to Process Customer Data, as well as permits each Sub-Processor to appoint a Sub-Processor on its behalf. Akeyless may continue to use those Sub-Processors already engaged by Akeyless, as listed in Annex III, or to engage an additional or replace an existing Sub-Processors to Process Customer Data, subject to the provision of a thirty (30) days prior notice of its intention to do so to the Customer. In case the Customer has not objected to the adding or replacing of a Sub-Processor within such notice period, such Sub-Processor shall be deemed approved by the Customer. In the event the Customer objects to the adding or replacing of a Sub-Processor, within such notice period, Akeyless may, under Akeyless’ sole discretion, suggest the engagement of a different Sub-Processor for the same course of services, or otherwise terminate the Agreement.
- Akeyless shall, where it engages any Sub-Processor, impose, through a legally binding contract between Akeyless and the Sub-Processor, data protection obligations that are no less onerous than, and provide at least the same level of protection as, those set out in this DPA. Akeyless shall ensure that such contract will require the Sub-Processor to provide sufficient guarantees to implement appropriate technical and organizational measures in such a manner that the Processing will meet the requirements of Data Protection Laws.
- Akeyless shall remain responsible to the Customer for the performance of the Sub-Processor’s obligations in accordance with this DPA. Akeyless shall notify the Customer of any failure by the Sub-Processor to fulfill its contractual obligations.
- TECHNICAL AND ORGANIZATIONAL MEASURES
- Taking into account the state of the art, the costs of implementation and the nature, scope, context, and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, and without prejudice to any other security standards agreed upon by the parties, Akeyless hereby confirms that it has implemented and will maintain appropriate physical, technical and organizational measures to protect the Customer Data as required under Data Protection Laws to ensure lawful Processing of Customer Data and safeguard Customer Data from unauthorized, unlawful or accidental processing, access, disclosure, loss, alteration or destruction.
- The parties acknowledge that security requirements are constantly changing and that effective security requires the frequent evaluation and regular improvement of outdated security measures.
- The security measures implemented and maintained by Akeyless are further detailed in Annex II.
- SECURITY INCIDENT
- Akeyless will notify the Customer without undue delay (and in any event within 24 hours) upon becoming aware of any Security Incident involving the Customer Data. Akeyless’ notification regarding or response to a Security Incident under this Section 7 shall not be construed as an acknowledgment by Akeyless of any fault or liability with respect to the Security Incident.
- Akeyless will: (i) take necessary steps to remediate, minimize any effects of and investigate any Security Incident and to identify its cause; (ii) co-operate with the Customer and provide the Customer with such assistance and information as it may reasonably require in connection with the containment, investigation, remediation or mitigation of the Security Incident; (iii) notify the Customer in writing of any request, inspection, audit or investigation by a Supervisory Authority or other authority; (iv) keep the Customer informed of all material developments in connection with the Security Incident and execute a response plan to address the Security Incident; and (v) co-operate with the Customer and assist Customer with its obligation to notify the affected individuals in the case of a Security Incident.
- AUDIT RIGHTS
- Akeyless shall maintain accurate written records of any and all the Processing activities of any Customer Data carried out under this DPA and shall make such records available to the Customer and applicable Supervisory Authorities upon written request. Such records provided shall be considered Akeyless’ Confidential Information and shall be subject to confidentiality obligations.
- Customer may audit Akeyless compliance with this DPA and Data Protection Laws by requesting a certificate issued for security verification reflecting the outcome of an audit conducted by a third party auditor (e.g., ISO27001/ISO27701 certification, SOC2 certificate) or a comparable certification or other security certification of an audit conducted by a third-party auditor, within twelve (12) months as of the date of Customer’s request.
- Alternatively, in the event the records and documentation provided subject to Section 8.1 and 8.2 above are not sufficient for the purpose of demonstrating compliance, Akeyless shall make available, solely upon prior reasonable written notice and no more than once per calendar year, to a reputable auditor nominated by the Customer, information necessary to reasonably demonstrate compliance with this DPA, and shall allow for audits, including inspections, by such reputable auditor solely in relation to the Processing of the Customer Data (“Audit”) in accordance with the terms and conditions hereunder. The auditor shall be subject to standard confidentiality obligations (including towards third parties). Akeyless may object to an auditor appointed by the Customer in the event Akeyless reasonably believes the auditor is not suitably qualified or is a competitor of Akeyless. Customer shall bear all expenses related to the Audit and shall (and ensure that each of its auditors shall) over the course of such Audit, avoid causing any damage, injury or disruption to Akeyless’ premises, equipment, personnel and business while its personnel are on those premises in the course of such Audit.
- Nothing in this DPA will require Akeyless to either disclose to Customer or its third-party auditor, or to allow Customer or its third-party auditor to access: (i) any data of any other Akeyless’ customer; (ii) Akeyless’ internal accounting or financial information; (iii) any trade secret of a Akeyless or its Affiliates; (iv) any information that, in Akeyless’ reasonable opinion, could compromise the security of any Akeyless’ systems or cause any breach of its obligations under applicable law or its security or privacy obligations to any third party; or (v) any information that Customer or its third-party auditor seeks to access for any reason other than the good faith fulfillment of Customer’s obligations under the Data Protection Laws.
- CROSS BORDER PERSONAL DATA TRANSFERS
- Where the GDPR, UK GDPR or the Swiss FADP is applicable:
- Akeyless will not transfer Customer Data originating from the EU, UK or Switzerland (which for the purpose of this Section 9 shall be referred as “Customer Data”), to any country or recipient not recognized as providing an adequate level of protection for such Personal Data (within the meaning of the applicable Data Protection Law), unless it first takes all such measures as are necessary to ensure the transfer is in compliance with applicable Data Protection Laws. Such measures may include (without limitation) (i) transferring such data to a recipient that is covered by a suitable framework or other legally adequate transfer mechanism recognized by the relevant authorities or courts as providing an adequate level of protection for Personal Data, including to an Adequate Country or in compliance with the Data Privacy Framework; (ii) to a recipient that has achieved binding corporate rules authorization in accordance with applicable Data Protection Law; or (iii) to a recipient that has executed the SCCs, UK SCCs or the Swiss SCCs.
- 9.1.2.When Customer and Akeyless, or Akeyless and or its Sub-Processor rely on the SCC or the UK SCC to facilitate a transfer to a third country (for example, if the Data Privacy Framework does not cover the transfer to Akeyless Security USA Inc. or the Data Privacy Framework is invalidated, or in the case of transfer from Switzerland) the following shall apply:
- transfer of Customer Data from the EEA the terms set forth in Annex IV shall apply.
- transfer of Customer Data from the UK, the terms set forth in Annex V shall apply; and
- transfer of Customer Data from Switzerland, the terms set forth in Annex VI shall apply.
- To the extent the provision of the Services includes the transfer of Customer Data to Akeyless subsidiary – Akeyless Security USA Inc., Akeyless Security USA Inc. will use the Data Privacy Framework to lawfully receive Customer Data in the United States and ensure that it provides at least the same level of protection to the Customer Data as required by the Data Privacy Framework Principles and will provide notice to Customer if it is unable to comply with this obligation.
- Where the GDPR, UK GDPR or the Swiss FADP is applicable:
- TERM, TERMINATION AND CONFLICT
- 10.1.This DPA shall be effective as of the Effective Date (as defined in the agreement) and shall remain in force until the Agreement terminates or as long as Akeyless Processes Customer Data.
- 10.2.Akeyless shall be entitled to terminate this DPA or cease the Processing of Customer Data in the event that Processing of Customer Data under the Customer’s instructions or this DPA infringe applicable legal requirements, provided Customer did not cure such infringement within ten (10) days from receiving applicable notice from Akeyless. Alternately, Akeyless may, in its sole discretion, suspend the Processing of the Customer Data until such infringement is cured without terminating the DPA.
- 10.3.Following the termination of this DPA, Akeyless shall, at the choice of the Customer, delete all Customer Data Processed on behalf of the Customer and certify to the Customer that it has done so, or, return all Customer Data to the Customer and delete existing copies, unless applicable law or regulatory requirements requires that Akeyless continue to store Customer Data. Until the Customer Data is deleted or returned, the parties shall continue to ensure compliance with this DPA. Customer’s choice shall be provided in writing to Akeyless, following effect of termination.
- 10.4.In the event of a conflict between the terms and conditions of this DPA and the Agreement, this DPA shall prevail. For the avoidance of doubt, in the event Standard Contractual Clauses have been executed between the parties, the terms of the Standard Contractual Clauses shall prevail over those of this DPA. Except as set forth herein, all of the terms and conditions of the Agreement shall remain in full force and effect.
ANNEX I
DETAILS OF PROCESSING
This Annex includes certain details of the Processing of Personal Data as required under the Data Protection Laws.
Categories of Data Subjects:
Customer employees, Customer’s customers, any data subject which are uploaded to the Service by Customer.
Categories of Personal Data processed:
Credentials, contact information, authentication and security credentials.
Special Categories of Personal Data:
None.
Nature of the processing:
Collection, storage, organization, communication, transfer, host and other uses in performance of the Services as set out in the Agreement.
Purpose(s) of Processing:
To provide the Service.
Retention Period:
For as long as is necessary to provide the Service by Akeyless; provided there is no legal obligation to retain the Personal Data post termination or unless otherwise requested by the Customer.
Process Frequency:
Continuous basis
ANNEX II
TECHNICAL AND ORGANIZATIONAL MEASURES
Please review Akeyless’ security policy here and here to learn more regarding the technical and organizational measures implemented by it in order to ensure an appropriate level of security for its Processing of Customer Data.
Additional Safeguards not derogating from the Data Privacy Framework to the extent applies:
Measures and assurances regarding U.S. government surveillance have been implemented by Akeyless, and Akeyless agrees and hereby represents it maintains the following additional safeguards:
- Akeyless maintains industry standard measures to protect the Customer Data from interception (including in transit from Customer to Akeyless and between different systems and services). This includes maintaining encryption in transit and at rest. In addition, the fragment key enabling the decryption of Customer Data is held independently by Customer, locally within Customer’s environment, and is the only feasible way to decrypt Customer Data.
- As of the “Last Updated” date stated above, Akeyless has not received any national security orders.
- No court has found Akeyless to be: (i) the type of entity eligible to receive process issued under section 702 of the United States Foreign Intelligence Surveillance Court (“FISA”); (ii) an “electronic communication service provider” within the meaning of 50 U.S.C § 1881(b)(4) or a member of any of the categories of entities described within that definition.
- In the event that FISA applies to Akeyless, Akeyless will make reasonable efforts to resist, subject to applicable laws, any request for bulk surveillance relating to the Customer Data, including (if applicable) under Section 702 of the FISA.
- If Akeyless becomes aware of any law enforcement agency or other governmental authority (“Authority”) attempt or demand to gain access to or receive a copy of the Customer Data (or part thereof), whether on a voluntary or a mandatory basis, then, unless legally prohibited or under a mandatory legal compulsion that requires otherwise, Akeyless shall: (i) inform the relevant Authority that Akeyless is a Processor of the Customer Data and that Customer, as the Controller, has not authorized Akeyless to disclose the Customer Data to the Authority; (ii) inform the relevant Authority that any and all requests or demands for access to Customer Data should be directed to or served upon Customer in writing; and (iii) use reasonable legal mechanisms to challenge any such demand for access to Customer Data.
- Notwithstanding the above, if, taking into account the nature, scope, context and purposes of the related Authority’s intended access to Customer Data, Akeyless has a reasonable and good-faith belief that urgent access is necessary to prevent an imminent risk of serious harm to any individual or entity, these subsections shall not apply. In such event, Akeyless shall notify Customer, as soon as possible, following the access by the Authority, and provide Customer with relevant details, unless and to the extent legally prohibited to do so.
- Akeyless will inform Customer, upon written request (and not more than once a year), of the types of binding legal demands for Customer Data Akeyless has received and complied with, including demands under national security orders and directives, specifically including any process under Section 702 of FISA.
ANNEX III
LIST OF SUB-PROCESSORS
As of the effective date above, Akeyless uses the following sub-processors:
Name | Processing region | Description of the processing | Transfer mechanism |
Amazon Web Services (AWS), Inc. | EU/US | Hosting | DPF Data Privacy Framework |
Google Cloud Platform LLC | EU/US | Hosting | DPF Data Privacy Framework |
Microsoft Azure | EU/US | Hosting | DPF Data Privacy Framework |
Zendesk, Inc. | US | Customer Support ticketing | DPF Data Privacy Framework |
Slack Technologies, LLC | US | Internal communication tool for Support. | DPF Data Privacy Framework |
SupportYourApp Limited | US | Customer support | SCC |
***Please note that the most updated and recent List of Sub-Processors can be found on our website in the link HERE.
ANNEX IV
EU INTERNATIONAL TRANSFERS AND SCC
- The parties agree that the terms of the Standard Contractual Clauses are hereby incorporated by reference and shall apply to transfer of Customer Data from the EEA to other countries that are not deemed as Adequate Countries.
- Module Two (Controller to Processor) of the Standard Contractual Clauses shall apply where the transfer is effectuated by Customer as the Controller of the Customer Data and Akeyless is the Processor of the Customer Data.
- The parties agree that for the purpose of transfer of Customer Data between Customer (as Data Exporter) and Akeyless (as Data Importer), the following shall apply:
- Clause 7 of the Standard Contractual Clauses shall not be applicable.
- In Clause 9, option 2 (general written authorization) shall apply and the method for appointing and time period for prior notice of Sub-Processor changes shall be as set forth in the Sub-Processer Section of the DPA.
- In Clause 11, the optional language will not apply, and Data Subjects shall not be able to lodge a complaint with an independent dispute resolution body.
- In Clause 17, option 1 shall apply. The parties agree that the Standard Contractual Clauses shall be governed by the laws of the EU Member State in which the Customer is established (where applicable).
- In Clause 18(b) the parties choose the courts of the Republic of Ireland, as their choice of forum and jurisdiction.
- Annex I.A of the Standard Contractual Clauses shall be completed as follows:
- “Data Exporter“: Customer
- “Data Importer“: Akeyless
- Roles: (A) With respect to Module Two: (i) Data Exporter is a Controller and (ii) the Data Importer is a Processor.
- Data Exporter and Data Importer Contact details: As detailed in the Agreement.
- Signature and Date: By entering into the Agreement and DPA, Data Exporter and Data Importer are deemed to have signed these Standard Contractual Clauses incorporated herein, including their Annexes, as of the Effective Date of the Agreement.
- Annex I.B of the Standard Contractual Clauses shall be completed as follows:
- The purpose of the Processing, nature of the Processing, categories of Data Subjects, categories of Personal Data and the parties’ intention with respect to the transfer of special categories are as described in Annex I (Details of Processing) of this DPA.
- The frequency of the transfer and the retention period of the Personal Data is as described in Annex I (Details of Processing) of this DPA.
- The Sub-Processors which Personal Data is transferred to are listed in Annex III.
- Annex I.C of the Standard Contractual Clauses shall be completed as follows:the competent supervisory authority in accordance with Clause 13 is the supervisory authority in the Member State stipulated in Section 3 above.
- Annex II of this DPA (Technical and Organizational Measures) serves as Annex II of the Standard Contractual Clauses.
- Annex III of this DPA (List of Sub-Processors) serves as Annex III of the Standard Contractual Clauses.
- Transfers to the US: Measures and assurances regarding US government surveillance (“Additional Safeguards”) are further detailed in Annex II.
ANNEX V
UK INTERNATIONAL TRANSFERS AND SCC
- The parties agree that the terms of the Standard Contractual Clauses as amended by the UK Standard Contractual Clauses, and as amended in this Annex V, are hereby incorporated by reference and shall apply to transfer of Customer Data from the UK to other countries that are not deemed as Adequate Countries.
- This Annex V is intended to provide appropriate safeguards for the purposes of transfers of Customer Data to a third country in reliance on Article 46 of the UK GDPR and with respect to data transfers from Controller to Processor or from a Processor to its Sub-Processors.
- Terms used in this Annex V that are defined in the Standard Contractual Clauses, shall have the same meaning as in the Standard Contractual Clauses.
- This Annex V shall (i) be read and interpreted in the light of the provisions of UK Data Protection Laws, and so that if fulfils the intention for it to provide the appropriate safeguards as required by Article 46 of the UK GDPR, and (ii) not be interpreted in a way that conflicts with rights and obligations provided for in UK Data Protection Laws.
- Amendments to the UK Standard Contractual Clauses:
- Part 1: Tables
- Table 1 Parties: shall be completed as set forth in Section 4 within Annex IV above.
- Table 2 Selected SCCs, Modules and Selected Clauses: shall be completed as set forth in Section 2 and 3 within Annex IV above.
- Table 3 Appendix Information:
- Annex 1A: List of Parties: shall be completed as set forth in Section 2 within Annex IV above.
- Annex 1B: Description of Transfer: shall be completed as set forth in Annex I above.
- Annex II: Technical and organizational measures including technical and organizational measures to ensure the security of the data: shall be completed as set forth in Annex II above.
- Annex III: List of Sub Processors: shall be completed as set forth in Annex III above.
- Table 4 ending this Addendum when the Approved Addendum Changes: shall be completed as “neither party”.
- Part 1: Tables
ANNEX VI
SUPPLEMENTARY TERMS FOR SWISS DATA PROTECTION LAW TRANSFERS ONLY
The following terms supplement the Clauses only if and to the extent the Clauses apply with respect to data transfers subject to Swiss Data Protection Law, and specifically the FDPA:
- The term ’Member State’ will be interpreted in such a way as to allow Data Subjects in Switzerland to exercise their rights under the Clauses in their place of habitual residence (Switzerland) in accordance with Clause 18(c) of the Clauses.
- The clauses in the DPA protect the Customer Data of legal entities until the entry into force of the upcoming revised FDPA.
- All references in this DPA to the GDPR should be understood as references to the FDPA insofar as the data transfers are subject to the FDPA.
- References to the “competent supervisory authority”, “competent courts” and “governing law” shall be interpreted as Swiss Data Protection Laws and Swiss Information Commissioner, the competent courts in Switzerland, and the laws of Switzerland (for Restricted Transfers from Switzerland).
- In respect of data transfers governed by Swiss Data Protection Laws, the EU SCCs will also apply to the transfer of information relating to an identified or identifiable legal entity where such information is protected similarly as Personal Data under Swiss Data Protection Laws until such laws are amended to no longer apply to a legal entity.
- The competent supervisory authority is the Swiss Federal Data Protection Information Commissioner.
ANNEX VII
US DATA PROTECTION LAWS ADDENDUM
This US Privacy Law Addendum (“US Addendum”) adds specification applicable to US Data Protection Laws. All terms used but not defined in this US Data Protection Laws Addendum shall have the meaning set forth in the DPA.
- CCPA Specifications:
- For the purpose of the CCPA, Customer is the Business and Akeyless is the Service Provider.
- Akeyless shall Process Customer Data on behalf of the Customer as a Service Provider under the CCPA and shall not: (i) Sell or Share the Customer Data; (ii) retain, use or disclose the Customer Data for any purpose other than for a Business Purpose specified in the Agreement; or (iii) combine the Customer Data with other Personal Data that it receives from, or on behalf of, another customer, or collects from its own interaction with California residents, expect as otherwise permitted by the CCPA.
- if, and to the extent applicable, Akeyless shall assist Customer in respect of a Consumer request to limit the use of its Sensitive Personal Information (“SPI”) by Akeyless.
- Akeyless certifies that it understands the rules, requirements and definitions of the CCPA and agrees to refrain from Selling any Customer Data.
- US Applicable States Specifications:
- For the purpose of this US Addendum ”Applicable States” shall mean Virginia, California, Colorado, Connecticut and Utah.
- Akeyless agrees to notify the Customer if Akeyless makes a determination that it can no longer meet its obligations under this US Addendum or US Data Protection Law.
- Akeyless shall provide information necessary to enable Customer to conduct and document any data protection assessments required by US Data Protection Laws. Notwithstanding the above, Akeyless is responsible for only the measures allocated to it.
- Akeyless shall provide assistance and procures that its subcontractors will provide assistance, as Customer may reasonably request, where and to the extent applicable, in connection with any obligation by Customer to respond to Consumer’s requests for exercising their rights under the US Data Protection Laws. Including without limitation, by taking appropriate technical and organizational measures, insofar as this is possible, for the fulfillment of the Customer’s respective obligation. Akeyless acknowledges and confirms that it does not receive any monetary goods, payments or discounts in exchange for Processing the Customer Data.
- Each party shall, taking into account the context of Processing, implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk. The parties are hereby establishing a clear allocation of the responsibilities between them to implement these measures. Akeyless technical measures are detailed in the DPA and Annexes above.
- The Processing instructions, including the nature of Processing, purpose of Processing, the duration of Processing, the type of Personal Data and categories of Data Subjects, are set forth in Annex I above.
- In addition to the Audit rights under Section 8 of the DPA, under US Data Protection Laws and subject to Customer’s consent, Akeyless my alternately, in response to Customer’s on-premise audit request, initiate a third-party auditor to verify Akeyless’ compliance with its obligations under this US Data Protection Laws. During such audit, Akeyless will make available to the third-party auditor all information necessary to demonstrate such compliance.
- Each party will comply with the requirements set forth under US Data Protection Laws with regards to processing of de-identified data, as such term is defined under the applicable US Data Protection Law.
- When Processing Customer Data or Usage Data (as defined in the Agreement) for the permitted purposes under US Data Protection Laws, Akeyless shall ensure it complies with applicable laws and shall be liable for such Processing activities.