Data Processing Agreement

between

Customer in accordance with the GTC as Controller (hereinafter “Controller“),

and

Spreadly GmbH, Forstenrieder Weg 1G, 82065 Baierbrunn, Deutschland as Data Processor (hereinafter „Data Processor“, Controller and Data Processor jointly the “Parties”)

Preamble

The Controller has commissioned the Data Processor in the GTC (hereinafter referred to as the "Main Agreement") for the services specified therein. Part of the execution of the contract is the processing of personal data. In particular, Art. 28 GDPR imposes specific requirements on such commissioned processing. To comply with these requirements, the Parties enter into the following Data Processing Agreement (hereinafter referred to as the “Agreement”), the performance of which shall not be remunerated separately unless expressly agreed.

§ 1 Definitions

(1) Pursuant to Art. 4 (7) GDPR, the Controller is the entity that alone or jointly with other Controllers determines the purposes and means of the processing of personal data.

(2) Pursuant to Art. 4 (8) GDPR, a Data Processor is a natural or legal person, authority, institution, or other body that processes personal data on behalf of the Controller.

(3) Pursuant to Art. 4 (1) GDPR, personal data means any information relating to an identified or identifiable natural person (hereinafter "Data Subject"); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.

(4) Personal data requiring special protection are personal data pursuant to Art. 9 GDPR revealing racial or ethnic origin, political opinions, religious or philosophical beliefs or trade union membership of Data Subjects, personal data pursuant to Art. 10 GDPR on criminal convictions and criminal offenses or related security measures, as well as genetic data pursuant to Art. 4 (13) GDPR, biometric data pursuant to Art. 4 (14) GDPR, health data pursuant to Art. 4 (15) GDPR, and data on the sex life or sexual orientation of a natural person.

(5) According to Article 4 (2) GDPR, the processing is any operation or set of operations that is performed upon personal data, whether or not by automatic means, such as collection, recording, organization, filing, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.

(6) Pursuant to Article 4 (21) GDPR, the supervisory authority is an independent state body established by a Member State pursuant to Article 51 GDPR.

§ 2 Subject of the contract

(1) The Data Processor provides the services specified in the Main Contract for the Controller. In doing so, the Data Processor obtains access to personal data, which the Data Processor processes for the Controller exclusively on behalf of and in accordance with the Controller's instructions. The scope and purpose of the data processing by the Data Processor are set out in the Main Contract and any associated service descriptions. The Controller shall be responsible for assessing the admissibility of the data processing.

(2) The Parties conclude the present Agreement to specify the mutual rights and obligations under data protection law. In case of doubt, the provisions of this Agreement shall take precedence over the provisions of the Main Contract.

(3) The provisions of this contract shall apply to all activities related to the Main Contract in which the Data Processor and its employees or persons authorized by the Data Processor come into contact with personal data originating from the Controller or collected for the Controller.

(4) The term of this Agreement shall be governed by the term of the Main Contract unless the following provisions give rise to further obligations or termination rights.

§ 3 Right of instruction

(1) The Data Processor may only collect, process or use data within the scope of the Main Contract and in accordance with the instructions of the Controller. If the Data Processor is required to carry out further processing by the law of the European Union or the Member States to which it is subject, it shall notify the Controller of these legal requirements prior to the processing.

(2) The instructions of the Controller shall initially be determined by this Agreement. Thereafter, they may be amended, supplemented, or replaced by the Controller in writing or text form by individual instructions (Individual Instructions). The Controller shall be entitled to issue such instructions at any time. This includes instructions with regard to the correction, deletion, and blocking of data.

(3) All instructions issued shall be documented by the Controller. Instructions that go beyond the service agreed in the Main Contract shall be treated as a request for a change in service.

(4) If the Data Processor is of the opinion that an instruction of the Controller violates data protection provisions, it shall notify the Controller thereof without undue delay. The Data Processor shall be entitled to suspend the implementation of the relevant instruction until it is confirmed or amended by the Controller. The Data Processor may refuse to carry out an obviously unlawful instruction.

§ 4 Types of data processed, group of Data Subjects, third country

(1) Within the scope of the implementation of the Main Contract, the Data Processor shall have access to the personal data specified in more detail in Annex 1.

(2) The group of Data Subjects affected by the data processing is listed in Annex 1.

(3) A transfer of personal data to a third country may take place under the conditions of Art. 44 et seq. GDPR.

§ 5 Protective measures of the Data Processor

(1) The Data Processor shall be obliged to observe the statutory provisions on data protection and not to disclose information obtained from the Controller's domain to third parties or expose it to their access. Documents and data shall be secured against disclosure to unauthorized persons, taking into account the state of the art.

(2) The Data Processor shall organize the internal organization within its field of responsibility in such a way that it meets the special requirements of data protection. It shall have taken the technical and organizational measures specified in Annex 2 to adequately protect the Controller's data pursuant to Art. 32 GDPR, which the Controller acknowledges as adequate. The Data Processor reserves the right to change the security measures taken while ensuring that the contractually agreed level of protection is not undercut.

(3) The persons employed in the data processing by the Data Processor are prohibited from collecting, processing or using personal data without authorization. The Data Processor shall oblige all persons entrusted by it with the processing and performance of this contract (hereinafter "Employees") accordingly (obligation of confidentiality, Art. 28 (3) lit. b GDPR) and shall ensure compliance with this obligation with due care.

(4) The Data Processor has appointed a data protection officer. The Data Processor’s data protection officer is heyData GmbH, Schützenstr. 5, 10117 Berlin, datenschutz@heydata.eu, www.heydata.eu.

§ 6 Information obligations of the Data Processor

(1) In the event of disruptions, suspected data protection violations or breaches of contractual obligations of the Data Processor, suspected security-related incidents or other irregularities in the processing of personal data by the Data Processor, by persons employed by it within the scope of the contract or by third parties, the Data Processor shall inform the Controller without undue delay. The same shall apply to audits of the Data Processor by the data protection supervisory authority. The notification of a personal data breach shall contain at least the following information:

(a) a description of the nature of the personal data breach, including, to the extent possible, the categories and the number of Data Subjects affected, the categories affected and the number of personal data records affected;

(b) a description of the measures taken or proposed by the Data Processor to address the breach and, where applicable, measures to mitigate its possible adverse effects;

(c) a description of the likely consequences of the personal data breach.

(2) The Data Processor shall immediately take the necessary measures to secure the data and to mitigate any possible adverse consequences for the Data Subjects, inform the Controller thereof and request further instructions.

(3) In addition, the Data Processor shall be obliged to provide the Controller with information at any time insofar as the Controller's data are affected by a breach pursuant to paragraph 1.

(4) The Data Processor shall inform the Controller of any significant changes to the security measures pursuant to Section 5 (2).

§ 7 Control rights of the Controller

(1) The Controller may satisfy itself of the technical and organizational measures of the Data Processor prior to the commencement of data processing and thereafter regularly on a yearly basis. For this purpose, the Controller may, for example, obtain information from the Data Processor, obtain existing certificates from experts, certifications or internal audits or, after timely coordination, personally inspect the technical and organizational measures of the Data Processor during normal business hours or have them inspected by a competent third party, provided that the third party is not in a competitive relationship with the Data Processor. The Controller shall carry out checks only to the extent necessary and shall not disproportionately disrupt the operations of the Data Processor in the process.

(2) The Data Processor undertakes to provide the Controller, upon the latter's verbal or written request and within a reasonable period of time, with all information and evidence required to carry out a check of the technical and organizational measures of the Data Processor.

(3) The Controller shall document the results of the inspection and notify the Data Processor thereof. In the event of errors or irregularities which the Controller discovers, in particular during the inspection of the results of the inspection, the Controller shall inform the Data Processor without undue delay. If facts are found during the control, the future avoidance of which requires changes to the ordered procedure, the Controller shall notify the Data Processor of the necessary procedural changes without delay.

§ 8 Use of service providers

(1) The contractually agreed services shall be performed with the involvement of the service providers named in Annex 3 (hereinafter “Sub-processors”). The Controller grants the Data Processor its general authorization within the meaning of Article 28 (2) s. 1 GDPR to engage additional Sub-processors within the scope of its contractual obligations or to replace Sub-processors already engaged.

(2) The Data Processor shall inform the Controller before any intended change in relation to the involvement or replacement of a Sub-processor. The Controller can object to the intended involvement or replacement of a Sub-processor for an important reason under data protection law.

(3) The objection to the intended involvement or replacement of a Sub-processor must be raised within 2 weeks of receiving the information about the change. If no objection is raised, the involvement or replacement shall be deemed approved. If there is an important reason under data protection law and an amicable solution is not possible between the Controller and the Processor, the Controller has a special right of termination at the end of the month following the objection.

(4) When engaging Sub-processors, the Data Processor shall oblige them in accordance with the provisions of this Agreement.

(5) A Sub-processor relationship within the meaning of these provisions does not exist if the Data Processor commissions third parties with services that are regarded as purely ancillary services. These include, for example, postal, transport and shipping services, cleaning services, telecommunications services without any specific reference to services provided by the Data Processor to the Controller and guarding services. Maintenance and testing services constitute Sub-processor relationships requiring consent insofar as they are provided for IT systems that are also used in connection with the provision of services for the Controller.

§ 9 Requests and rights of Data Subjects

(1) The Data Processor shall support the Controller with suitable technical and organizational measures in fulfilling the Controller's obligations pursuant to Articles 12-22 and 32 to 36 GDPR.

(2) If a Data Subject asserts rights, such as the right of access, correction or deletion with regard to his or her data, directly against the Data Processor, the latter shall not react independently but shall refer the Data Subject to the Controller and await the Controller's instructions.

§ 10 Liability

(1) In the internal relationship with the Data Processor, the Controller alone shall be liable to the Data Subject for compensation for damage suffered by a Data Subject due to inadmissible or incorrect data processing under data protection laws or use within the scope of the commissioned processing.

(2) The Data Processor shall have unlimited liability for damage insofar as the cause of the damage is based on an intentional or grossly negligent breach of duty by the Data Processor, its legal representative or vicarious agent.

(3) The Data Processor shall only be liable for negligent conduct in the event of a breach of an obligation, the fulfillment of which is a prerequisite for the proper performance of the contract and the observance of which the Controller regularly relies on and may rely on, but limited to the average damage typical for the contract. In all other respects, the liability of the Processor - including for its vicarious agents - shall be excluded.

(4) The limitation of liability pursuant to § 10.3 shall not apply to claims for damages arising from injury to life, body, health or from the assumption of a guarantee.

§ 11 Termination of the Main Contract

(1) After termination of the Main Contract, the Data Processor shall return to the Controller all documents, data and data carriers provided to it or - at the request of the Controller, unless there is an obligation to store the personal data under Union law or the law of the Federal Republic of Germany - delete them. This shall also apply to any data backups at the Data Processor. The Data Processor shall on request provide documented proof of the proper deletion of any data.

(2) The Controller shall have the right to control the complete and contractual return or deletion of the data at the Data Processor in an appropriate manner.

(3) The Data Processor shall be obligated to keep confidential the data of which it has become aware in connection with the Main Contract even beyond the end of the Main Contract. The present Agreement shall remain valid beyond the end of the Main Contract as long as the Data Processor has personal data at its disposal which have been forwarded to it by the Controller or which it has collected for the Controller.

§ 12 Final provisions

(1) To the extent that the Data Processor does not expressly perform support actions under this Agreement free of charge, it may charge the Controller a reasonable fee therefore, unless the Data Processor's own actions or omissions have made such support directly necessary.

(2) Amendments and supplements to this Agreement must be made in writing. This shall also apply to any waiver of this formal requirement. The priority of individual contractual agreements shall remain unaffected.

(3) If individual provisions of this Agreement are or become wholly or partially invalid or unenforceable, this shall not affect the validity of the remaining provisions.

(4) This agreement is subject to German law.

Annex 1 - Description of the data/data categories and affected Data Subject/groups of affected Data Subjects

Customer type Categories of data subjects Categories of data
Company accounts Employees Name, contact details, position, department, photo, company details, links to social media
Company accounts & individual users Interested parties IP address (city, country), contact details, name, company, message (optional)

Annex 2 - Technical and organizational measures of the Data Processor

1. Introduction

This document summarizes the technical and organizational measures taken by the Processor within the meaning of Art. 32 para. 1 GDPR. These are measures taken by the Processor to protect personal data. The purpose of the document is to support the Controller in fulfilling its accountability obligations under Art. 5 para. 2 GDPR.

2. Confidentiality (Art. 32 para. 1 lit. b GDPR)

2.1 Entry control

The following implemented measures prevent unauthorized persons from gaining access to the data processing systems:

  • Working from home: unauthorized persons have no access to employees' homes

  • Work in the home office: instruction to employees to work in a separate office from their living rooms if possible

2.2 Admission control

The following implemented measures prevent unauthorized persons from gaining access to the data processing systems:

  • Authentication with user and password

  • Use of firewalls

  • Use of mobile device management

  • Encryption of data carriers

  • Automatic desktop lock

  • Management of user authorizations

  • Creating user profiles

  • Central password rules

  • Use of 2-factor authentication

  • Company policy for secure passwords

  • General instruction to manually lock the desktop when leaving the workstation

2.3 Access control

The following implemented measures ensure that unauthorized persons have no access to personal data:

  • Logging of access to applications (in particular when entering, changing and deleting data)

  • Number of administrators is kept as small as possible

  • Management of user rights by system administrators

  • Instruction to employees that data will only be deleted after consultation

2.4 Separation control

The following measures ensure that personal data collected for different purposes is processed separately:

  • Physically separate storage on separate systems or data carriers

  • Separation of production and test system

  • Logical client separation (on the software side)

  • Definition of database rights

  • Internal instruction to anonymize/pseudonymize personal data in the event of disclosure or after expiry of the statutory deletion period, if possible.

3. Integrity (Art. 32 para. 1 lit. b GDPR)

3.1 Transfer control

It is ensured that personal data cannot be read, copied, changed or removed without authorization during transmission or storage on data carriers and that it is possible to check which persons or bodies have received personal data. The following measures have been implemented to ensure this:

  • WLAN encryption (WPA2 with strong password)

  • Logging of accesses and retrievals

  • Provision of data via encrypted connections such as SFTP or HTTPS

  • Ban on uploading company data to external servers

3.2 Input control

The following measures ensure that it is possible to check who has processed personal data in data processing systems and at what time:

  • Logging the entry, modification and deletion of data

  • Manual or automatic control of the logs

  • Traceability of data entry, modification and deletion through individual user names (not user groups)

  • Clear responsibilities for deletions

legal.dpa.latest.annexes.2.3.2.text.6

4. Availability and resilience (Art. 32 para. 1 lit. b GDPR)

The following measures ensure that personal data is protected against accidental destruction or loss and is always available to the client:

  • Fire extinguishers in server rooms

  • Devices for monitoring temperature and humidity in server rooms

  • Air conditioning in server rooms

  • Protective socket strips in server rooms

  • Uninterruptible power supply (UPS)

  • Video surveillance in server rooms

  • Alarm message for unauthorized access to server rooms

  • Regular backups

  • Checking the backup process

  • Storage of data backups in a secure, off-site location

  • Regular data recovery tests and logging of the results

  • No sanitary facilities in or above the server room

  • Hosting (at least of the most important data) with a professional hoster

5. Procedures for regular review, assessment and evaluation (Art. 32 para. 1 lit. d GDPR; Art. 25 para. 1 GDPR)

5.1 Data protection management

The following measures are intended to ensure that the organization meets the basic requirements of data protection law:

  • Use of the heyData platform for data protection management

  • Appointment of the data protection officer heyData

  • Obligation of employees to maintain data secrecy

  • Regular data protection training for employees

  • Maintaining an overview of processing activities (Art. 30 GDPR)

5.2 Incident response management

The following measures are intended to ensure that reporting processes are triggered in the event of data protection breaches:

  • Reporting process for data protection violations in accordance with Art. 4 No. 12 GDPR to the supervisory authorities (Art. 33 GDPR)

  • Notification process for data breaches in accordance with Art. 4 No. 12 GDPR to the data subjects (Art. 34 GDPR)

  • Involvement of the data protection officer in security incidents and data breaches

  • Use of firewalls

5.3 Data protection-friendly default settings (Art. 25 para. 2 GDPR)

The following measures are intended to ensure that reporting processes are triggered in the event of data protection breaches:

  • Reporting process for data protection violations in accordance with Art. 4 No. 12 GDPR to the supervisory authorities (Art. 33 GDPR)

  • Notification process for data breaches in accordance with Art. 4 No. 12 GDPR to the data subjects (Art. 34 GDPR)

5.4 Order control

The following measures ensure that personal data can only be processed in accordance with the instructions:

  • Written instructions to the contractor or instructions in text form (e.g. through a data processing agreement)

  • Ensuring the destruction of data after completion of the order, e.g. by requesting corresponding confirmations

  • Confirmation from contractors that they commit their own employees to data secrecy (typically in the data processing agreement)

  • Careful selection of contractors (especially with regard to data security)

  • Ongoing review of contractors and their activities

  • Ensuring the destruction of data after completion of the order, e.g. by requesting corresponding confirmations

Annex 3 – Current Sub-processors

Name Address Function Server location
Hetzner Online GmbH Industriestr. 25, 91710 Gunzenhausen, Germany Hosting & Infrastructure EU
Cloudflare, Inc. 101 Townsend Street, San Francisco, CA 94107, USA Content Delivery Network & Security Global, depending on location of user
Mailgun Technologies, Inc. 112 E Pecan St Ste 1135, San Antonio, TX, 78205-1509, USA Email Delivery EU
Functional Software, Inc. 132 Hawthorne Street San Francisco, CA 94107, USA Error Reporting & Monitoring EU
Microsoft Ireland Operations, Ltd. One Microsoft Place, South County Business Park, Leopardstown, Dublin 18, D18 P521, Ireland Customer Service & Communication EU
HubSpot, Inc. 25 1st Street Cambridge, MA 0214, USA Customer Service & Communication EU

Version 1.4, effective 20th of April, 2024

You want to have a signed copy of our Data Processing Agreement?
Print this Data Processing Agreement and send a signed version to privacy@spreadly.app with your customer number attached. You will receive a signed version from us within the next business days.

Spreadly logo Spreadly GmbH © 2024