ANNEX II: TECHNICAL AND ORGANIZATIONAL MEASURES

This Annex II corresponds to Annex II of the Standard Contractual Clauses and describes the technical and organizational security measures implemented by Processor to ensure an appropriate level of security for Personal Data.

Processor has implemented and maintains the following technical and organizational measures:

1. MEASURES OF PSEUDONYMIZATION AND ENCRYPTION

Encryption in Transit:

  • All data transmitted over the internet is encrypted using TLS 1.2 or higher with strong cipher suites
  • Certificate-based authentication for secure connections
  • HTTPS enforced for all web-based access to the Platform

Encryption at Rest:

  • Database encryption using AES-256 or equivalent encryption standards
  • Encrypted storage for backups and archives
  • Full-disk encryption on servers and storage systems
  • Encryption key management using industry best practices, with keys stored separately from encrypted data

Pseudonymization:

  • Internal identifiers used in place of directly identifying information where technically feasible
  • User activity logs pseudonymized where possible to limit exposure of Personal Data
  • Anonymization of data used for analytics and reporting purposes

2. MEASURES FOR ENSURING ONGOING CONFIDENTIALITY, INTEGRITY, AVAILABILITY AND RESILIENCE

Access Controls:

  • Role-based access control (RBAC) limiting employee access to Personal Data based on job function
  • Principle of least privilege applied to all system and data access
  • Multi-factor authentication (MFA) for all employee access to production systems
  • Unique user accounts for all employees; no shared credentials
  • Regular access reviews and revocation of access for terminated employees
  • Strong password policies enforced for all accounts

Network Security:

  • Firewalls and network segmentation to isolate production systems
  • Intrusion detection and prevention systems (IDS/IPS)
  • DDoS protection and mitigation
  • Regular vulnerability scanning and penetration testing
  • Security Information and Event Management (SIEM) system for log aggregation and analysis
  • Network traffic monitoring and anomaly detection

Application Security:

  • Secure software development lifecycle (SDLC) practices
  • Regular security code reviews and static code analysis
  • Input validation and output encoding to prevent injection attacks
  • Protection against OWASP Top 10 vulnerabilities
  • Regular security patches and updates applied to all systems
  • Web application firewall (WAF) to detect and block malicious requests

Physical Security (for data centers):

  • Access to data centers restricted to authorized personnel only
  • Biometric or multi-factor authentication for physical access
  • 24/7 surveillance and monitoring
  • Redundant power supplies and climate control systems
  • Physical security audits and assessments

System Resilience:

  • Redundant systems and infrastructure
  • Automated failover and disaster recovery capabilities
  • Regular backup of all Personal Data (daily incremental, weekly full backups)
  • Backups stored in geographically separate locations
  • Business continuity and disaster recovery plans tested annually

Availability:

  • Load balancing and auto-scaling to handle traffic spikes
  • Monitoring and alerting for system performance and availability issues
  • 99.9% uptime commitment for Enterprise customers (see SLA in Appendix A)
  • Regular maintenance windows scheduled during off-peak hours
  • Incident response procedures for rapid resolution of outages

3. MEASURES FOR ENSURING ABILITY TO RESTORE AVAILABILITY AND ACCESS

Backup and Recovery:

  • Automated daily backups of all Personal Data with retention for 30 days
  • Backups stored in encrypted form in geographically separate locations
  • Regular testing of backup restoration procedures (quarterly)
  • Recovery Time Objective (RTO) of 4 hours for complete system restoration
  • Recovery Point Objective (RPO) of 24 hours (maximum data loss in disaster scenario)

Disaster Recovery:

  • Comprehensive disaster recovery plan documented and tested annually
  • Procedures for rapid failover to backup systems in the event of disaster
  • Communication plan for notifying customers of disasters and recovery status

Data Retention and Deletion:

  • Clear data retention policies defining how long Personal Data is retained
  • Automated deletion of Personal Data after retention period expires
  • Secure deletion methods ensuring data cannot be recovered

4. PROCESSES FOR REGULAR TESTING, ASSESSMENT AND EVALUATION

Security Testing:

  • Annual third-party penetration testing of Platform infrastructure and applications
  • Quarterly vulnerability scanning using automated tools
  • Regular security assessments and audits (internal and external)
  • Program for responsible disclosure of security vulnerabilities
  • Security code reviews for all code changes before deployment

Compliance Audits:

  • ISO 27001 certification or pursuit of certification
  • Regular internal audits of security controls and procedures
  • Data Protection Impact Assessments (DPIAs) for high-risk processing activities

Monitoring and Logging:

  • Real-time monitoring of system security, performance, and availability
  • Centralized logging of all security-relevant events
  • Log retention for at least 30 days for security and audit purposes
  • Automated alerting for security incidents and anomalies
  • Regular review of security logs

Incident Response:

  • Documented incident response procedures
  • Designated incident response team with defined roles and responsibilities
  • Regular incident response drills and tabletop exercises
  • Post-incident reviews and lessons learned documentation
  • Communication plan for notifying affected parties of security incidents

5. MEASURES FOR USER IDENTIFICATION AND AUTHORIZATION

User Authentication:

  • Secure authentication using username/password with strong password requirements
  • Multi-factor authentication (MFA) available for all users
  • Single Sign-On (SSO) integration with Customer's identity provider (SAML, OAuth)
  • Account lockout after multiple failed login attempts
  • Session timeout after period of inactivity

User Authorization:

  • Role-based access control (RBAC) defining permissions for different user roles
  • Granular permissions for viewing, editing, commenting, and managing content
  • Organization administrators control user access and permissions
  • Audit logs tracking access and changes to sensitive data

Employee Access:

  • Background checks for employees with access to Personal Data
  • Confidentiality agreements signed by all employees
  • Regular security awareness training for all employees
  • Access to production systems restricted to authorized personnel only
  • Monitoring and logging of all employee access to Personal Data

6. MEASURES FOR PROTECTION OF DATA DURING TRANSMISSION

Network Security:

  • All data transmitted over the internet encrypted using TLS 1.2 or higher
  • Certificate-based authentication to verify server identity
  • Secure APIs using industry-standard authentication and authorization protocols

Internal Network:

  • Encrypted communications within internal networks where applicable
  • Network segmentation to isolate different system components
  • Virtual Private Networks (VPNs) for remote employee access

7. MEASURES FOR PROTECTION OF DATA DURING STORAGE

Storage Security:

  • Encryption of all stored Personal Data using AES-256 or equivalent
  • Encrypted backups stored in separate geographic locations
  • Full-disk encryption on all servers and storage devices
  • Secure key management with keys stored separately from encrypted data
  • Regular security assessments of storage infrastructure

Access Controls:

  • Strict access controls limiting who can access stored Personal Data
  • Monitoring and logging of all access to storage systems
  • Regular reviews of access permissions

8. MEASURES FOR ENSURING PHYSICAL SECURITY

Data Center Security:

  • Use of Tier III or higher certified data centers
  • 24/7 physical security and monitoring
  • Biometric or multi-factor authentication for physical access
  • Video surveillance of all access points
  • Visitor logs and escort requirements for non-employees
  • Environmental controls (fire suppression, climate control, power redundancy)

Office Security:

  • Physical access controls to office facilities
  • Clean desk policy for employees handling Personal Data
  • Secure disposal of physical media containing Personal Data
  • Restrictions on removable media and personal devices

9. MEASURES FOR ENSURING EVENTS LOGGING

Audit Logging:

  • Comprehensive logging of all security-relevant events, including:
    • User authentication and authorization events
    • Access to Personal Data
    • Changes to Personal Data
    • Administrative actions (user management, permission changes)
    • System configuration changes
    • Security incidents and anomalies

Log Management:

  • Centralized log collection and storage
  • Log retention for at least 12 months
  • Log integrity protection to prevent tampering
  • Regular review of logs for security and compliance purposes
  • Automated alerting for suspicious activities

10. MEASURES FOR ENSURING SYSTEM CONFIGURATION

Configuration Management:

  • Standardized, hardened system configurations based on industry best practices
  • Configuration management tools to ensure consistency across systems
  • Change control processes for all configuration changes
  • Regular audits of system configurations for compliance and security
  • Automated configuration monitoring and drift detection

Patch Management:

  • Regular application of security patches and updates to all systems
  • Automated patch management where possible
  • Emergency patch procedures for critical vulnerabilities
  • Testing of patches before deployment to production

11. MEASURES FOR INTERNAL IT AND IT SECURITY GOVERNANCE AND MANAGEMENT

Security Governance:

  • Information security policy approved by senior management
  • Security committee overseeing data protection and security initiatives
  • Regular reporting to management on security posture and incidents
  • Defined roles and responsibilities for data protection and security

Risk Management:

  • Regular information security risk assessments
  • Risk treatment plans for identified risks
  • Continuous monitoring of risk landscape

Compliance Management:

  • Monitoring of changes to applicable laws and regulations
  • Regular compliance assessments and gap analyses
  • Corrective action plans for identified compliance gaps

Vendor Management:

  • Security assessments of all third-party service providers (Subprocessors)
  • Contractual security and data protection requirements for vendors
  • Regular reviews of vendor compliance with security requirements

12. MEASURES FOR CERTIFICATION/ASSURANCE OF PROCESSES AND PRODUCTS

Certifications:

  • Pursuit of SOC 2 Type II audit for information security management
  • ISO 27001 certification
  • Other relevant certifications as applicable to the industry

Security Awareness:

  • Regular security awareness training for all employees (at least annually)
  • Phishing simulation exercises
  • Data protection training for employees handling Personal Data
  • Security champion program to promote security culture

Supplier Security:

  • Security requirements for all Subprocessors and suppliers
  • Regular security assessments of critical suppliers
  • Incident notification requirements for suppliers

13. MEASURES FOR ENSURING DATA MINIMIZATION

Data Collection:

  • Collection of only Personal Data necessary for the purposes of processing
  • Regular reviews of data collection practices to ensure minimization
  • Automatic deletion of unnecessary data

Data Processing:

  • Processing limited to what is necessary to provide the Services
  • Anonymization or pseudonymization where full Personal Data is not required
  • Aggregation of data for analytics purposes where possible

Data Retention:

  • Clear retention policies defining how long Personal Data is kept
  • Automated deletion of Personal Data after retention period expires
  • Customer controls for deleting Personal Data at any time

14. MEASURES FOR ENSURING DATA QUALITY

Data Accuracy:

  • Mechanisms for Authorized Users to update their own Personal Data
  • Customer responsibility for ensuring accuracy of Organization Content
  • Processes to correct inaccurate Personal Data upon notification

Data Integrity:

  • Backup and recovery procedures to prevent data loss

15. MEASURES FOR ENSURING LIMITED DATA RETENTION

Retention Policies:

  • Personal Data retained only as long as necessary for the purposes of processing
  • Automated deletion after defined retention periods
  • Customer controls for deleting Personal Data at any time
  • Retention of certain data as required by law (e.g., billing records for tax purposes)

Deletion Procedures:

  • Secure deletion methods ensuring data cannot be recovered
  • Deletion from active systems, backups, and archives
  • Certificate of deletion provided upon request

16. MEASURES FOR ENSURING ACCOUNTABILITY

Documentation:

  • Comprehensive documentation of all processing activities
  • Records of processing activities maintained in accordance with GDPR Article 30
  • Documentation of security measures and procedures
  • Documentation of data breaches and responses

Training and Awareness:

  • Regular training for employees on data protection obligations
  • Data protection policies and procedures accessible to all employees
  • Security awareness programs to promote a culture of data protection

Supervision:

  • Data Protection Officer appointed (if required) or designated privacy team
  • Regular oversight of processing activities
  • Internal audits of data protection compliance

Breach Notification:

  • Documented procedures for detecting, investigating, and responding to data breaches
  • Notification to Customer within 72 hours of becoming aware of a breach
  • Cooperation with Customer in notifying supervisory authorities and Data Subjects