ANNEX II: TECHNICAL AND ORGANIZATIONAL MEASURES
This Annex II corresponds to Annex II of the Standard Contractual Clauses and describes the technical and organizational security measures implemented by Processor to ensure an appropriate level of security for Personal Data.
Processor has implemented and maintains the following technical and organizational measures:
1. MEASURES OF PSEUDONYMIZATION AND ENCRYPTION
Encryption in Transit:
- All data transmitted over the internet is encrypted using TLS 1.2 or higher with strong cipher suites
- Certificate-based authentication for secure connections
- HTTPS enforced for all web-based access to the Platform
Encryption at Rest:
- Database encryption using AES-256 or equivalent encryption standards
- Encrypted storage for backups and archives
- Full-disk encryption on servers and storage systems
- Encryption key management using industry best practices, with keys stored separately from encrypted data
Pseudonymization:
- Internal identifiers used in place of directly identifying information where technically feasible
- User activity logs pseudonymized where possible to limit exposure of Personal Data
- Anonymization of data used for analytics and reporting purposes
2. MEASURES FOR ENSURING ONGOING CONFIDENTIALITY, INTEGRITY, AVAILABILITY AND RESILIENCE
Access Controls:
- Role-based access control (RBAC) limiting employee access to Personal Data based on job function
- Principle of least privilege applied to all system and data access
- Multi-factor authentication (MFA) for all employee access to production systems
- Unique user accounts for all employees; no shared credentials
- Regular access reviews and revocation of access for terminated employees
- Strong password policies enforced for all accounts
Network Security:
- Firewalls and network segmentation to isolate production systems
- Intrusion detection and prevention systems (IDS/IPS)
- DDoS protection and mitigation
- Regular vulnerability scanning and penetration testing
- Security Information and Event Management (SIEM) system for log aggregation and analysis
- Network traffic monitoring and anomaly detection
Application Security:
- Secure software development lifecycle (SDLC) practices
- Regular security code reviews and static code analysis
- Input validation and output encoding to prevent injection attacks
- Protection against OWASP Top 10 vulnerabilities
- Regular security patches and updates applied to all systems
- Web application firewall (WAF) to detect and block malicious requests
Physical Security (for data centers):
- Access to data centers restricted to authorized personnel only
- Biometric or multi-factor authentication for physical access
- 24/7 surveillance and monitoring
- Redundant power supplies and climate control systems
- Physical security audits and assessments
System Resilience:
- Redundant systems and infrastructure
- Automated failover and disaster recovery capabilities
- Regular backup of all Personal Data (daily incremental, weekly full backups)
- Backups stored in geographically separate locations
- Business continuity and disaster recovery plans tested annually
Availability:
- Load balancing and auto-scaling to handle traffic spikes
- Monitoring and alerting for system performance and availability issues
- 99.9% uptime commitment for Enterprise customers (see SLA in Appendix A)
- Regular maintenance windows scheduled during off-peak hours
- Incident response procedures for rapid resolution of outages
3. MEASURES FOR ENSURING ABILITY TO RESTORE AVAILABILITY AND ACCESS
Backup and Recovery:
- Automated daily backups of all Personal Data with retention for 30 days
- Backups stored in encrypted form in geographically separate locations
- Regular testing of backup restoration procedures (quarterly)
- Recovery Time Objective (RTO) of 4 hours for complete system restoration
- Recovery Point Objective (RPO) of 24 hours (maximum data loss in disaster scenario)
Disaster Recovery:
- Comprehensive disaster recovery plan documented and tested annually
- Procedures for rapid failover to backup systems in the event of disaster
- Communication plan for notifying customers of disasters and recovery status
Data Retention and Deletion:
- Clear data retention policies defining how long Personal Data is retained
- Automated deletion of Personal Data after retention period expires
- Secure deletion methods ensuring data cannot be recovered
4. PROCESSES FOR REGULAR TESTING, ASSESSMENT AND EVALUATION
Security Testing:
- Annual third-party penetration testing of Platform infrastructure and applications
- Quarterly vulnerability scanning using automated tools
- Regular security assessments and audits (internal and external)
- Program for responsible disclosure of security vulnerabilities
- Security code reviews for all code changes before deployment
Compliance Audits:
- ISO 27001 certification or pursuit of certification
- Regular internal audits of security controls and procedures
- Data Protection Impact Assessments (DPIAs) for high-risk processing activities
Monitoring and Logging:
- Real-time monitoring of system security, performance, and availability
- Centralized logging of all security-relevant events
- Log retention for at least 30 days for security and audit purposes
- Automated alerting for security incidents and anomalies
- Regular review of security logs
Incident Response:
- Documented incident response procedures
- Designated incident response team with defined roles and responsibilities
- Regular incident response drills and tabletop exercises
- Post-incident reviews and lessons learned documentation
- Communication plan for notifying affected parties of security incidents
5. MEASURES FOR USER IDENTIFICATION AND AUTHORIZATION
User Authentication:
- Secure authentication using username/password with strong password requirements
- Multi-factor authentication (MFA) available for all users
- Single Sign-On (SSO) integration with Customer's identity provider (SAML, OAuth)
- Account lockout after multiple failed login attempts
- Session timeout after period of inactivity
User Authorization:
- Role-based access control (RBAC) defining permissions for different user roles
- Granular permissions for viewing, editing, commenting, and managing content
- Organization administrators control user access and permissions
- Audit logs tracking access and changes to sensitive data
Employee Access:
- Background checks for employees with access to Personal Data
- Confidentiality agreements signed by all employees
- Regular security awareness training for all employees
- Access to production systems restricted to authorized personnel only
- Monitoring and logging of all employee access to Personal Data
6. MEASURES FOR PROTECTION OF DATA DURING TRANSMISSION
Network Security:
- All data transmitted over the internet encrypted using TLS 1.2 or higher
- Certificate-based authentication to verify server identity
- Secure APIs using industry-standard authentication and authorization protocols
Internal Network:
- Encrypted communications within internal networks where applicable
- Network segmentation to isolate different system components
- Virtual Private Networks (VPNs) for remote employee access
7. MEASURES FOR PROTECTION OF DATA DURING STORAGE
Storage Security:
- Encryption of all stored Personal Data using AES-256 or equivalent
- Encrypted backups stored in separate geographic locations
- Full-disk encryption on all servers and storage devices
- Secure key management with keys stored separately from encrypted data
- Regular security assessments of storage infrastructure
Access Controls:
- Strict access controls limiting who can access stored Personal Data
- Monitoring and logging of all access to storage systems
- Regular reviews of access permissions
8. MEASURES FOR ENSURING PHYSICAL SECURITY
Data Center Security:
- Use of Tier III or higher certified data centers
- 24/7 physical security and monitoring
- Biometric or multi-factor authentication for physical access
- Video surveillance of all access points
- Visitor logs and escort requirements for non-employees
- Environmental controls (fire suppression, climate control, power redundancy)
Office Security:
- Physical access controls to office facilities
- Clean desk policy for employees handling Personal Data
- Secure disposal of physical media containing Personal Data
- Restrictions on removable media and personal devices
9. MEASURES FOR ENSURING EVENTS LOGGING
Audit Logging:
- Comprehensive logging of all security-relevant events, including:
- User authentication and authorization events
- Access to Personal Data
- Changes to Personal Data
- Administrative actions (user management, permission changes)
- System configuration changes
- Security incidents and anomalies
Log Management:
- Centralized log collection and storage
- Log retention for at least 12 months
- Log integrity protection to prevent tampering
- Regular review of logs for security and compliance purposes
- Automated alerting for suspicious activities
10. MEASURES FOR ENSURING SYSTEM CONFIGURATION
Configuration Management:
- Standardized, hardened system configurations based on industry best practices
- Configuration management tools to ensure consistency across systems
- Change control processes for all configuration changes
- Regular audits of system configurations for compliance and security
- Automated configuration monitoring and drift detection
Patch Management:
- Regular application of security patches and updates to all systems
- Automated patch management where possible
- Emergency patch procedures for critical vulnerabilities
- Testing of patches before deployment to production
11. MEASURES FOR INTERNAL IT AND IT SECURITY GOVERNANCE AND MANAGEMENT
Security Governance:
- Information security policy approved by senior management
- Security committee overseeing data protection and security initiatives
- Regular reporting to management on security posture and incidents
- Defined roles and responsibilities for data protection and security
Risk Management:
- Regular information security risk assessments
- Risk treatment plans for identified risks
- Continuous monitoring of risk landscape
Compliance Management:
- Monitoring of changes to applicable laws and regulations
- Regular compliance assessments and gap analyses
- Corrective action plans for identified compliance gaps
Vendor Management:
- Security assessments of all third-party service providers (Subprocessors)
- Contractual security and data protection requirements for vendors
- Regular reviews of vendor compliance with security requirements
12. MEASURES FOR CERTIFICATION/ASSURANCE OF PROCESSES AND PRODUCTS
Certifications:
- Pursuit of SOC 2 Type II audit for information security management
- ISO 27001 certification
- Other relevant certifications as applicable to the industry
Security Awareness:
- Regular security awareness training for all employees (at least annually)
- Phishing simulation exercises
- Data protection training for employees handling Personal Data
- Security champion program to promote security culture
Supplier Security:
- Security requirements for all Subprocessors and suppliers
- Regular security assessments of critical suppliers
- Incident notification requirements for suppliers
13. MEASURES FOR ENSURING DATA MINIMIZATION
Data Collection:
- Collection of only Personal Data necessary for the purposes of processing
- Regular reviews of data collection practices to ensure minimization
- Automatic deletion of unnecessary data
Data Processing:
- Processing limited to what is necessary to provide the Services
- Anonymization or pseudonymization where full Personal Data is not required
- Aggregation of data for analytics purposes where possible
Data Retention:
- Clear retention policies defining how long Personal Data is kept
- Automated deletion of Personal Data after retention period expires
- Customer controls for deleting Personal Data at any time
14. MEASURES FOR ENSURING DATA QUALITY
Data Accuracy:
- Mechanisms for Authorized Users to update their own Personal Data
- Customer responsibility for ensuring accuracy of Organization Content
- Processes to correct inaccurate Personal Data upon notification
Data Integrity:
- Backup and recovery procedures to prevent data loss
15. MEASURES FOR ENSURING LIMITED DATA RETENTION
Retention Policies:
- Personal Data retained only as long as necessary for the purposes of processing
- Automated deletion after defined retention periods
- Customer controls for deleting Personal Data at any time
- Retention of certain data as required by law (e.g., billing records for tax purposes)
Deletion Procedures:
- Secure deletion methods ensuring data cannot be recovered
- Deletion from active systems, backups, and archives
- Certificate of deletion provided upon request
16. MEASURES FOR ENSURING ACCOUNTABILITY
Documentation:
- Comprehensive documentation of all processing activities
- Records of processing activities maintained in accordance with GDPR Article 30
- Documentation of security measures and procedures
- Documentation of data breaches and responses
Training and Awareness:
- Regular training for employees on data protection obligations
- Data protection policies and procedures accessible to all employees
- Security awareness programs to promote a culture of data protection
Supervision:
- Data Protection Officer appointed (if required) or designated privacy team
- Regular oversight of processing activities
- Internal audits of data protection compliance
Breach Notification:
- Documented procedures for detecting, investigating, and responding to data breaches
- Notification to Customer within 72 hours of becoming aware of a breach
- Cooperation with Customer in notifying supervisory authorities and Data Subjects
