Data Processing Agreement
according to
Art. 28 General Data Protection Regulation
of
mzio GmbH
Altenwall 26
28195 Bremen
Germany
This Data Processing Agreement (“DPA“) applies to the processing activities of personal data by mzio GmbH, Altenwall 26, 28195 Bremen (Germany) (also referred to as “we” or “Contractor“), which are provided to Controller (hereinafter referred to as “Client” or “You“) in performance of the Main Contract.
Preambel
The Contractor shall provide services to the Client in accordance with the Main Contract concluded between them on the Services of the mzmine software (hereinafter: “Main Contract”). Part of the performance of the Main Contract is the processing of personal data within the meaning of the General Data Protection Regulation (“GDPR”). In order to comply with the requirements of the GDPR for such constellations, the Parties conclude the following Data Processing Agreement (also “DPA” or “Agreement”), which comes into effect upon signing or entry into force of the Main Contract.
The term of this DPA corresponds to the term of the Main Contract. It thus ends automatically upon termination of the Main Contract. If the Main Contract can be terminated with due notice, the provisions on due notice of termination shall apply accordingly to this DPA. If the Contractor no longer processes any Client Data before the Main Contract expires, this DPA shall also end automatically.
Annexes
Annex 1 Contract Specifications
Annex 2 Technical & Organizational Measures (Art. 32 GDPR)
Annex 1 – Contract Specifications
Subject & Term | |
Main Contract | License Agreement on mzmine software |
Subject | Integrated solution for the import, visualization, processing, and annotation of mass spectrometry data |
Purpose | In order to fulfill the obligations of the Contractor arising from the Main Contract, personal data from the Client’s sphere of control shall be processed by the Contractor to the full extent within the meaning of Art. 4 No. 2 of the GDPR, in particular collected, stored, changed, read out, queried, used, disclosed, compared, linked and deleted as necessary in each case. The purpose of the processing thus depends on the respective order described in the main contract. |
Type | The categories of personal data concerned by the processing depend on the use of the Contractor’s services by the Client. The categories of data that may be considered as the subject of processing are as follows
– Master data (e.g. names, addresses, dates of birth), |
Data Subject | The categories of data subjects concerned by the processing depend on the use of the Contractor’s services by the Client. The categories of data subjects that may be considered are:
– Employees |
Subcontractors
Nr. | Name & Address | Subject of Service | Processed Data |
1 | Amazon Web Services EMEA SARL, 38 Avenue John F. Kennedy, L-1855 Luxembourg | Hosting Services | See above „Type“ |
1 | Microsoft Ireland Operations Limited, One Microsoft Place, Leopardstown, Dublin 18, Ireland | Hosting Services | See above „Type“ |
2 | QualityHosting AG, Uferweg 40-42, D-63571 Gelnhausen, Germany | Hosting Services | See above „Type“ |
3 | pipedrive OU, Mustamae tee 3a, Tallinn Harjumaa 10615, Estonia | CRM | See above „Type“ |
Annex 2 – Technical & Organsational Measures
Pursuant to Article 32 of the GDPR, data controllers are obliged to take technical and organizational measures to ensure the security of the processing of personal data. Measures must be selected in such a way that, taken together, they ensure an appropriate level of protection. Against this background, this overview explains which concrete measures have been taken by the Contractor with regard to the processing of personal data in the specific case.
Instructions to Technical & Organsational Measures |
1. Organisation of Information Security Policies, processes and responsibilities must be defined to implement and control information security. |
Measures: x Information security policy. x User guidelines for handling devices and behavior when using information technology. x Processes for the management of data media and disposal of data media. x Obligation of employees to maintain confidentiality and data secrecy. |
2. Privacy by Design Privacy by design includes the idea that systems should be designed and constructed in such a way that the amount of personal data processed is minimized. Essential elements of data economy are the separation of personal identifiers and content data, the use of pseudonyms, and anonymization. In addition, the deletion of personal data must be implemented in accordance with a configurable retention period. |
Measures: x No more personal data is collected than is necessary for the respective purpose. |
3. Privacy by Default Privacy by Default refers to the privacy-friendly default settings / standard settings. |
Measures: x Tracking functions that monitor the data subject are disabled by default. x All default settings for selection options meet the requirements of the GDPR with regard to privacy-friendly default settings (e.g., no default settings for opt-ins). |
4. Access Control Measures to ensure that those authorized to use the data processing procedures can only access the personal data or information and data requiring protection that are subject to their access authorization (description of security mechanisms inherent in the system, encryption procedures in accordance with the state of the art. In the case of online access, it must be made clear which side is responsible for issuing and managing access security codes). The Contractor shall ensure that the users authorized to use IT infrastructure can only access content for which they are authorized and that personal data cannot be copied, modified or deleted without authorization during processing and after storage. |
Measures: x Avoidance of group users. x Access to data is restricted and only possible for authorized persons. x Locking of the terminal device when leaving the workplace or inactivity. x Number of administrators reduced to the “bare minimum”. x Regular review of authorizations. x Password policy, implementation of complex passwords. x Use of strong authentication with at least 2 factors from knowledge, possession, properties (pin, token, smartcard, biometric methods). |
5. Cryptographie and Pseudonymization Use of encryption procedures to ensure the proper and effective protection of the confidentiality, authenticity or integrity of personal data or information requiring protection. Measures that are likely to make identification of the data subject difficult. |
Measures: x Organizational instruction for the encryption of data. x Encryption of end devices (PC, laptop, smartphones). x Encrypted storage of personal data. |
6. Building protection Preventing unauthorized physical access to, damage to and impairment of the organization’s information and information processing equipment. The Contractor shall take measures to prevent unauthorized persons from gaining access (to be understood spatially) to data processing equipment with which personal data are processed. |
Measures: ☐ Zone concept and definition of security areas. ☐ Building security by means of fences. ☐ Security locks and key management / logging of key issuance. ☐ Use of locking and access systems (chip card / transponder locking system, code security, etc.). ☐ Alarm system. ☐ Video surveillance. ☐ Light barriers / motion detectors. ☐ Use of security guards. ☐ Employee / visitor passes. ☐ Regulation for dealing with visitors. ☐ Registration for visitors (reception). ☐ Control of visitors (gatekeeper/reception). ☐ Logging of visitors (visitor book). |
Further Measures: Measures implemented by our service providers. If you are interested in the specific technical and organizational measures of the service providers, please feel free to contact us. |
7. Protection of operating resources / information assets Prevention of loss, damage, theft or impairment of assets and disruption of the organization’s operations. |
Measures: ☐ Secure placement of the systems so that protection against theft is guaranteed. ☐ Protection of operating equipment against fire, water, or overvoltage. ☐ Storage of files and documents in locked offices, filing cabinets. ☐ Placement of server and network components in secured rooms, cabinets, etc. ☐ Regular maintenance of operating equipment. ☐ Secure deletion, destruction, and disposal of operating equipment. |
Further Measures: Measures implemented by our service providers. If you are interested in the specific technical and organizational measures of the service providers, please feel free to contact us. |
8. Operating procedures and responsibilities Ensure proper and secure operation of systems and procedures for processing information. |
Measures: ☐ Documented system configurations and operating procedures, operations management manuals. ☐ Clear assignment of responsibilities for system and application support. ☐ Separation of processing of data from the individual clients. x Separation of development, test, and production systems. ☐ Monitoring of system operation and installations. ☐ Maintenance contracts with appropriate response time. ☐ Use of systems for managing systems and devices (asset management, mobile device management, software management and distribution). |
Further Measures: Measures implemented by our service providers. If you are interested in the specific technical and organizational measures of the service providers, please feel free to contact us. |
9. Data backups Measures to ensure that personal data or information and data requiring protection are protected against accidental destruction or loss. |
Measures: x Data backup concept with regular backups. x Outsourcing of backups to other fire zones. x Outsourcing of backups to other buildings. |
10. Malware protection and patch management Preventing exploitation of technical vulnerabilities by using up-to-date antivirus software and implementing patch management. |
Measures: x Regular monitoring of the status of security updates and system vulnerabilities. x Use of anti-malware software. x Regularly apply security patches and updates. |
11. Network Security Management Adequate protection for the network must be implemented so that the information and infrastructure components are protected. |
Measures: ☐ Use of network management software. ☐ Use of firewall systems. ☐ Use of intrusion detection / intrusion prevention systems. ☐ User authentication and encryption of external access. |
Further Measures: Measures implemented by our service providers. If you are interested in the specific technical and organizational measures of the service providers, please feel free to contact us. |
12. Acquisition, development and maintenance of systems Measures to ensure that information security is an integral part across the lifecycle of information systems. |
Measures: x Protection of test data. |
13. Supplier Relations Measures concerning information security to reduce risks related to suppliers’ access to the company’s assets should be agreed with sub-suppliers / subcontractors and documented. |
Measures: x Selection of the contractor under due diligence aspects (in particular with regard to data security). x Obligation of the contractor’s employees to maintain data secrecy. x Ongoing review of the contractor and its activities. |
14. Information security incident management Consistent and effective measures for the management of information security incidents (theft, system failure, etc.) shall be implemented. |
Measures: x Immediate information of the client in the event of data protection incidents. x Involvement of the data protection and information security officer in the event of data protection incidents. |
15. Information security aspects of business continuity management / emergency management. Maintaining system availability in difficult situations, such as crisis or damage events. Emergency management must ensure this. The requirements regarding information security should be defined in the planning for business continuity and disaster recovery. |
Measures: x Use of redundant systems. x Early information of the customer in case of emergencies. |
16. Compliance with legal and contractual requirements Implementation of measures to prevent violations of legal, official or contractual obligations as well as any safety requirements. |
Measures: x Ensuring compliance with legal obligations within the scope of the cooperation. x Returning all data, operating resources, and information assets to the client at the end of the contract. x Establishment of license management. x Confidentiality obligations with employees as well as subcontractors and service providers. |
17. Information Security Audits Regular checks must be made to ensure that information processing is carried out in accordance with the defined security measures. For this purpose, the Contractor shall perform regular audits. The Contractor grants the Client the right to carry out regular audits / checks at its premises. |
Measures: x Regular performance of internal audits on the topics of data privacy and information security. |