Gentlent GmbH
Am Trippelsberg 92
40589 Düsseldorf
Germany
This Data Processing Agreement ("DPA") applies to the processing activities of personal data by Gentlent GmbH (also referred to as "we" or "Contractor"), which are provided to Controller (hereinafter referred to as "Client" or "You") in performance of the Main Contract.
The Contractor shall provide services to the Client in accordance with the Main Contract concluded between them on the Services of the IT Service Agreement (hereinafter: “Main Contract”). Part of the performance of the Main Contract is the processing of personal data within the meaning of the General Data Protection Regulation (“GDPR”). In order to comply with the requirements of the GDPR for such constellations, the Parties conclude the following Data Processing Agreement (also “DPA” or “Agreement”), which comes into effect upon signing or entry into force of the Main Contract.
The term of this DPA corresponds to the term of the Main Contract. It thus ends automatically upon termination of the Main Contract. If the Main Contract can be terminated with due notice, the provisions on due notice of termination shall apply accordingly to this DPA. If the Contractor no longer processes any Client Data before the Main Contract expires, this DPA shall also end automatically.
Annexes
Subject & Term Overview of Requirements and Specifications | |
---|---|
(1) Main Contract | IT Service Agreement |
(2) Subject | IT services, in particular domain registration, allocation of IP addresses, DNS, web, server and email hosting, as well as SaaS services. |
(3) Purpose | In order to fulfill the obligations of the Contractor arising from the Main Contract, personal data from the Client's sphere of control shall be processed by the Contractor to the full extent within the meaning of Art. 4 No. 2 of the GDPR, in particular collected, stored, changed, read out, queried, used, disclosed, compared, linked and deleted as necessary in each case. The purpose of the processing thus depends on the respective order described in the main contract |
(4) Art der Daten |
The categories of personal data concerned by the processing depend on the use of the Contractor's services by the
Client. The categories of data that may be considered as the subject of processing are as follows:
|
(5) Data Subject |
The categories of data subjects concerned by the processing depend on the use of the Contractor's services by the
Client. The categories of data subjects that may be considered are:
|
No. | Name of Subcontractor Address / Country | Subject of Service | Processed Data |
---|---|---|---|
1 | Cloudflare, Inc. 101 Townsend Street San Francisco, CA 94107 USA | All Services | See above „Type“ |
2 | Stripe Payments Europe, Limited 1 Grand Canal Street Lower Grand Canal Dock D02 H210, Dublin Ireland | All Services | See above „Type“ |
3 | Intercom R&D Unlimited Company 124 St Stephen’s Green DC02 C628, Dublin 2 Ireland | All Services | See above „Type“ |
4 | sevDesk GmbH Im unteren Angel 1 77652 Offenburg Germany | All Services | See above „Type“ |
5 | OpenAI Ireland Ltd 1st Floor, The Liffey Trust Centre 117-126 Sheriff Street Upper D01 YC43, Dublin 1 Ireland | AI-Services | See above „Type“ |
6 | NETIM SARL 264 avenue Arthur Notebart 59160 Lille France | Hosting-Services / Domains | See above „Type“ |
7 | Google Cloud EMEA Limited 70 Sir John Rogerson’s Quay D02 R296, Dublin 2 Ireland | All Services | See above „Type“ |
8 | Twilio Ireland Limited 70 Sir John Rogerson’s Quay D02 R296, Dublin 2 Ireland | All Services | See above „Type“ |
9 | WhatsApp Ireland Limited Merrion Road D04 X2K5, Dublin 4 Ireland | All Services | See above „Type“ |
10 | Hetzner Online GmbH Industriestr. 25 91710 Gunzenhausen Germany | Hosting-Services | See above „Type“ |
11 | The Constant Company, LLC 319 Clematis St West Palm Beach, FL 33401 USA | All Services | See above „Type“ |
Pursuant to Article 32 of the GDPR, data controllers are obliged to take technical and organizational measures to ensure the security of the processing of personal data. Measures must be selected in such a way that, taken together, they ensure an appropriate level of protection. Against this background, this overview explains which concrete measures have been taken by the Contractor with regard to the processing of personal data in the specific case.
Instructions to Technical & Organsational Measures |
---|
1. Organisation of Information Security Policies, processes and responsibilities must be defined to implement and control information security. |
---|
Measures: ☐ Information security policy. ☑ User guidelines for handling devices and behavior when using information technology. ☑ Processes for the management of data media and disposal of data media. ☑ Definition of roles and responsibilities for application and system operation, data protection, and information security. ☑ Obligation of employees to maintain confidentiality and data secrecy. ☑ Regular implementation of training and awareness measures. |
Further Measures: |
2. Privacy by Design Privacy by design includes the idea that systems should be designed and constructed in such a way that the amount of personal data processed is minimized. Essential elements of data economy are the separation of personal identifiers and content data, the use of pseudonyms, and anonymization. In addition, the deletion of personal data must be implemented in accordance with a configurable retention period. |
---|
Measures: ☑ No more personal data is collected than is necessary for the respective purpose. ☑ Process to ensure privacy by design when introducing or modifying systems and applications. ☑ The processing operations and systems are designed in such a way that they enable and ensure DSGVO-compliant deletion of the personal data processed. |
Further Measures: |
3. Privacy by Default Privacy by Default refers to the privacy-friendly default settings / standard settings. To what extent have these been made by you? Example: When visiting a website, the visitor can expect that all programs that collect personal data are initially deactivated. |
---|
Measures: ☑ Simple exercise of the right of withdrawal of the data subject by technical measures. ☑ Tracking functions that monitor the data subject are disabled by default. ☑ All default settings for selection options meet the requirements of the GDPR with regard to privacy-friendly default settings (e.g., no default settings for opt-ins). |
Further Measures: |
4. Access Control Measures to ensure that those authorized to use the data processing procedures can only access the personal data or information and data requiring protection that are subject to their access authorization (description of security mechanisms inherent in the system, encryption procedures in accordance with the state of the art. In the case of online access, it must be made clear which side is responsible for issuing and managing access security codes). The Contractor shall ensure that the users authorized to use IT infrastructure can only access content for which they are authorized and that personal data cannot be copied, modified or deleted without authorization during processing and after storage. |
---|
Measures: ☐ Authorization concepts documented. ☑ Avoidance of group users. ☑ Access to data is restricted and only possible for authorized persons. ☑ Blocking of the user account in case of failed attempts / inactivity. ☑ Locking of the terminal device when leaving the workplace or inactivity. ☑ Number of administrators reduced to the "bare minimum". ☑ Logging of accesses to applications, especially when entering, changing, and deleting data. ☑ Implementation of a process for assigning authorizations. ☑ Regular review of authorizations. ☑ Password policy, implementation of complex passwords. ☑ Use of strong authentication with at least 2 factors from knowledge, possession, properties (pin, token, smartcard, biometric methods). |
Further Measures: |
5. Cryptographie and Pseudonymization Use of encryption procedures to ensure the proper and effective protection of the confidentiality, authenticity or integrity of personal data or information requiring protection. Measures that are likely to make identification of the data subject difficult. |
---|
Measures: ☑ Organizational instruction for the encryption of data. ☑ Encryption of data carriers (e.g. mobile hard disks, USB sticks, etc.). ☑ Encryption of end devices (PC, laptop, smartphones). ☑ Encrypted storage of personal data. ☑ Encryption of data backup media (e.g., tapes, hard disks, etc.). ☑ Encryption of network access points and connections. ☑ Use of pseudonyms, procedures for pseudonymization of data. ☑ Use of procedures for anonymizing data. |
Further Measures: |
6. Building protection Preventing unauthorized physical access to, damage to and impairment of the organization's information and information processing equipment. The Contractor shall take measures to prevent unauthorized persons from gaining access (to be understood spatially) to data processing equipment with which personal data are processed. |
---|
Measures: ☐ Zone concept and definition of security areas. ☐ Building security by means of fences. ☑ Security locks and key management / logging of key issuance. ☑ Use of locking and access systems (chip card / transponder locking system, code security, etc.). ☑ Alarm system. ☑ Video surveillance. ☑ Light barriers / motion detectors. ☐ Use of security guards. ☑ Employee / visitor passes. ☐ Regulation for dealing with visitors. ☐ Registration for visitors (reception). ☐ Control of visitors (gatekeeper/reception). ☐ Logging of visitors (visitor book). |
Further Measures: Further measures have been implemented by our service providers. If you are interested in the specific technical and organizational measures taken by the service providers, please feel free to contact us. |
7. Protection of operating resources / information assets Prevention of loss, damage, theft or impairment of assets and disruption of the organization's operations. |
---|
Measures: ☑ Secure placement of the systems so that protection against theft is guaranteed. ☐ Protection of operating equipment against fire, water, or overvoltage. ☑ Storage of files and documents in locked offices, filing cabinets. ☑ Placement of server and network components in secured rooms, cabinets, etc. ☑ Regular maintenance of operating equipment. ☑ Secure deletion, destruction, and disposal of operating equipment. |
Further Measures: Further measures have been implemented by our service providers. If you are interested in the specific technical and organizational measures taken by the service providers, please feel free to contact us. |
8. Operating procedures and responsibilities Ensure proper and secure operation of systems and procedures for processing information. |
---|
Measures: ☐ Documented system configurations and operating procedures, operations management manuals. ☑ Clear assignment of responsibilities for system and application support. ☑ Separation of processing of data from the individual clients. ☑ Separation of development, test, and production systems. ☑ Monitoring of system operation and installations. ☑ Maintenance contracts with appropriate response time. ☑ Use of systems for managing systems and devices (asset management, mobile device management, software management and distribution). |
Further Measures: |
9. Data backups Measures to ensure that personal data or information and data requiring protection are protected against accidental destruction or loss. |
---|
Measures: ☑ Data backup concept with regular backups. ☑ Outsourcing of backups to other fire zones. ☑ Outsourcing of backups to other buildings. ☑ Regular testing of data backup and recovery of data, applications, and systems. |
Further Measures: |
10. Malware protection and patch management Preventing exploitation of technical vulnerabilities by using up-to-date antivirus software and implementing patch management. |
---|
Measures: ☑ Regular monitoring of the status of security updates and system vulnerabilities. ☑ Use of anti-malware software. ☑ Regularly apply security patches and updates. |
Further Measures: |
11. Logging and monitoring Measures to ensure that it is possible to check and determine retrospectively whether and by whom personal data has been entered into, modified or removed from IT systems. (All system activities are logged; the logs are kept by the contractor for at least 3 years). |
---|
Measures: ☐ Logging of system administrator activities. ☐ Monitoring of system usage. ☐ Logging of accesses. ☐ Logging of accesses. ☑ Evaluation of log files. |
Further Measures: Further measures have been implemented by our service providers. If you are interested in the specific technical and organizational measures taken by the service providers, please feel free to contact us. |
12. Network Security Management Adequate protection for the network must be implemented so that the information and infrastructure components are protected. |
---|
Measures: ☐ Use of network management software. ☑ Use of firewall systems. ☐ Use of intrusion detection / intrusion prevention systems. ☑ User authentication and encryption of external access. |
Further Measures: Further measures have been implemented by our service providers. If you are interested in the specific technical and organizational measures taken by the service providers, please feel free to contact us. |
13. Information transfer Measures to ensure that personal data or information requiring protection and data cannot be read, copied, modified or removed by unauthorized persons during electronic transmission or during their transport or storage on data carriers, and that it is possible to check and determine to which bodies a transmission of personal data or information requiring protection and data is intended by data transmission facilities. (Description of the facilities and transmission protocols used, e.g. identification and authentication, encryption in accordance with the state of the art, automatic call-back, etc.). |
---|
Measures: ☑ Regulations for the exchange of sensitive information and restriction of the group of persons authorized to transfer data. ☑ Transfer of data to third parties only after verification of the legal basis. ☑ Legality and written definition of the transfer of data to third countries. ☑ Secure data transmission between client and server. ☑ Appropriate protection of e-mails containing sensitive information/data. ☑ Use of encrypted external access. ☑ Secure transport and dispatch of data carriers, data, and documents. |
Further Measures: |
14. Mains disconnection Groups of information services, clients, users and information systems should be kept separate from each other in networks. |
---|
Measures: ☑ Logical client separation. ☐ Data separation by segmenting networks of different clients. ☐ Separation of networks for remote accesses. |
Further Measures: |
15. Acquisition, development and maintenance of systems Measures to ensure that information security is an integral part across the lifecycle of information systems. |
---|
Measures: ☑ Definition of security-specific regulations and requirements for the deployment of new information systems and for the expansion of existing information systems. ☑ Definition of regulations for the development and adaptation of software and systems. ☑ Guidelines for secure system development. ☑ Monitoring of outsourced system development activities. ☑ Protection of test data. |
Further Measures: |
16. Supplier Relations Measures concerning information security to reduce risks related to suppliers' access to the company's assets should be agreed with sub-suppliers / subcontractors and documented. |
---|
Measures: ☑ Selection of the contractor under due diligence aspects (in particular with regard to data security). ☑ Written instructions to the contractor (e.g., by order processing agreement) within the meaning of the GDPR the contractor has appointed a data protection officer. ☑ Effective control rights vis-à-vis the contractor agreed. ☑ Prior review and documentation of the security measures taken at the contractor. ☑ Obligation of the contractor's employees to maintain data secrecy. ☐ Ongoing review of the contractor and its activities. ☐ Ensuring the destruction of data after completion of the order. |
Further Measures: |
17. Information security incident management Consistent and effective measures for the management of information security incidents (theft, system failure, etc.) shall be implemented. |
---|
Measures: ☐ Documented procedure for handling security incidents. ☑ Immediate information of the client in the event of data protection incidents. ☐ Involvement of the data protection and information security officer in the event of data protection incidents. ☐ Formal process and responsibilities for the follow-up of security incidents and data breaches. |
Further Measures: |
18. Information security aspects of business continuity management / emergency management Maintaining system availability in difficult situations, such as crisis or damage events. Emergency management must ensure this. The requirements regarding information security should be defined in the planning for business continuity and disaster recovery. |
---|
Measures: ☑ Use of redundant systems. ☐ Use redundant systems at physically separate locations (e.g., emergency data center). ☐ Documented emergency plans. ☐ Regular tests regarding the effectiveness of the emergency measures. ☑ Early information of the customer in case of emergencies. |
Further Measures: Further measures have been implemented by our service providers. If you are interested in the specific technical and organizational measures taken by the service providers, please feel free to contact us. |
19. Compliance with legal and contractual requirements Implementation of measures to prevent violations of legal, official or contractual obligations as well as any safety requirements. |
---|
Measures: ☑ Ensuring compliance with legal obligations within the scope of the cooperation. ☑ Returning all data, operating resources, and information assets to the client at the end of the contract. ☑ Establishment of license management. ☑ Confidentiality obligations with employees as well as subcontractors and service providers. |
Further Measures: |
20. Data protection requirements and data protection management Privacy as well as protection of personal data should be ensured according to the requirements of relevant legal regulations, other regulations as well as contractual provisions. |
---|
Measures: ☑ Establishment of a data protection organization. ☐ Appointment of a data protection officer. ☑ Directory of processing activities. ☐ Data protection impact assessment for processes that handle sensitive information/data. ☑ Conducting data protection training. ☑ Establishment of a data protection management system. ☐ Documented data protection concept. ☐ Data protection guidelines implemented. |
Further Measures: |
21. Information Security Audits Regular checks must be made to ensure that information processing is carried out in accordance with the defined security measures. For this purpose, the Contractor shall perform regular audits. The Contractor grants the Client the right to carry out regular audits / checks at its premises. |
---|
Measures: ☑ Regular performance of internal audits on the topics of data privacy and information security. ☑ Conducting penetration tests. |
Further Measures: |