Data Processing Agreement (DPA)

If you need a signed copy please contact [email protected].

Last updated: March 21, 2024

Structure

This DPA is structured as follows:

SectionContent
Section A – Key TermsThe key variables that apply to the DPA are defined in Section A.
Section B – Legal TermsSets out the general legal terms applicable to the processing.
Section C – TOMsThe applicable technical and organizational measures.

Section A – Key Terms

VariableValue
Controller(s)The Chat Thing Customer
Processor(s)Chat Thing Ltd, 61 Church Street, Newquay, Cornwall, TR7 3ESContact: Jozef Maxted ([email protected])(together with the Controller(s) the "Parties")
Processing purposeProcessing in the context of the Terms of Service dated 21 March 2024 (the "Base Agreement")
Duration of processingAs long as required for the Base Agreement
Categories of data subjectsCustomersPotential clients
Categories of personal dataContact data (email, phone)IP addressName
Place of storage & processingAs specified in the base agreement
On-premise auditsNo
Sub-processorsSub-processors are listed here: https://chatthing.ai/legal/sub-processors
Transfer outside of EU/EEA/SwitzerlandAllowed

The variables defined in Section A serve as definitions in Section B.

Section B – Legal Terms

Purpose and scope

  1. The purpose of this Data Processing Agreement (the "DPA") is to ensure compliance with Article 28(3) and (4) of the EU General Data Protection Regulation ("GDPR") and Article 9 of the Swiss Federal Act on Data Protection ("FADP"), with respect to each law only if and to the extent applicable to the respective processing activity.
  2. This DPA applies with respect to the processing of personal data as specified in Section A.

Interpretation

  1. Where this DPA uses the terms defined in the GDPR or the FADP, as applicable, those terms shall have the same meaning as in that law.
  2. This DPA shall be read and interpreted in the light of the provisions of the GDPR and the FADP, as applicable.
  3. These Clauses shall not be interpreted in a way that conflicts with rights and obligations provided for in the GDPR or the FADP, as applicable, or prejudices the fundamental rights or freedoms of the data subjects.

Hierarchy

In the event of a conflict between this DPA and the provisions of any other agreement between the Parties existing at the time when this DPA is agreed or entered into thereafter, this DPA shall prevail, except where explicitly agreed otherwise in text form.

Description of processing(s)

The details of the processing operations, and in particular the categories of personal data and the purposes of processing for which the personal data is processed on behalf of the data controller, are specified in Section A.

Obligations of the Parties

General

  1. The data processor shall process personal data only on documented instructions from the data controller, unless required to do so by Union, Member States or Swiss law to which the processor is subject. Such instructions are specified in Section A. In this case, the processor shall inform the controller of that legal requirement before processing, unless the law prohibits this on important grounds of public interest. Subsequent instructions may also be given by the data controller throughout the duration of the processing of personal data. Such instructions shall always be documented.
  2. The data processor shall immediately inform the data controller if instructions given by the data controller, in the opinion of the data processor, infringe applicable Union, Member States or Swiss data protection provisions.

Purpose limitation

The data processor shall process the personal data only for the specific purpose(s) of the processing, as set out in Section A.

Erasure or return of data

  1. Processing by the data processor shall only take place for the duration specified in Section A.
  2. Upon termination of the provision of personal data processing services or termination pursuant to Clause ‎8, the data processor shall return all the personal data to the data controller and delete existing copies unless Union, Member States or Swiss law requires storage of the personal data.

Security of processing

  1. The data processor shall implement the technical and organizational measures specified in Section C to ensure the security of the personal data, including protection against accidental or unlawful destruction, loss, alteration, unauthorized disclosure or access to that data (personal data breach), in accordance with Article 5, Article 28(3)(c) and Article 32 GDPR and Article 8 FADP. In assessing the appropriate level of security, they shall in particular take due account of the risks involved in the processing, the nature of the personal data and the nature, scope, context and purposes of processing.
  2. In the event of a personal data breach concerning data processed by the data processor, it shall notify the data controller without undue delay and at the latest within 48 hours after having become aware of the breach. Such notification shall contain the details of a contact point where more information concerning the personal data breach can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and data records concerned), its likely consequences and the measures taken or proposed to be taken to mitigate its possible adverse effects. Where, and insofar as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall be provided as it becomes available without undue delay.
  3. The data processor shall cooperate in good faith with and assist the data controller in any way necessary to enable the data controller to notify, where relevant, the competent data protection authority and the affected data subjects, taking into account the nature of processing and the information available to the data processor.
  4. The data processor shall grant access to the data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. The data processor shall ensure that persons authorized to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.
  5. If the processing involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (special categories of data), the data processor shall apply specific restrictions and/or additional safeguards as reasonably required by the data controller.

Documentation and compliance

  1. The Parties shall be able to demonstrate compliance with this DPA.
  2. The data processor shall deal promptly and properly with all reasonable inquiries from the data controller that relate to the processing under this DPA.
  3. The data processor shall make available to the data controller all information necessary to demonstrate compliance with the obligations set out in this DPA and that are stemming directly from the GDPR or the FADP and at the data controller’s request, allow for and contribute to reviews of data files and documentation or of audits of the processing activities covered by these Clauses, in particular if there are indications of non-compliance.
  4. The data controller may choose to conduct the audit by itself, to mandate, at its own cost, an independent auditor or to rely on an independent audit mandated by the data processor. Where the data processor mandates an audit, it has to bear the costs of the independent auditor. The data controller's audit, access, and inspection rights under this Clause are limited to the data processor's records only (including inter-alia the registers of personal data processing activities, the registers of recipients of personal data) and does not apply to Processor’s physical premises. Any audit and request for information shall be limited to information necessary for the purposes of this DPA and shall give due regard to the data processor's confidentiality obligations and legitimate interest to protect business secrets.
  5. The data processor and data controller shall make the information referred to in this Clause, including the results of any audits, available to the competent supervisory authority on request if and to the extent required by the GDPR or the FADP, as applicable.

Use of Sub-processors

  1. The data processor has the data controller’s general authorization for the engagement of sub-processors. The list of sub-processors of the data processor can be found in Section A. The data processor shall inform in text form the data controller of any intended changes to that list through the addition or replacement of sub-processors at least 30 days in advance, thereby giving the data controller the opportunity to object to such changes prior to the engagement of the concerned sub-processor(s). Such objection shall not be unreasonably raised. The Parties shall keep the list up to date.
  2. Where the data processor engages a sub-processor for carrying out specific processing activities (on behalf of the data controller), it shall do so by way of a contract which imposes on the sub-processor the same obligations as the ones imposed on the data processor under this DPA. The data processor shall ensure that the sub-processor complies with the obligations to which the data processor is subject pursuant to this DPA, Article 28(2) to (4) GDPR and Article 9(3) FADP.
  3. The data processor shall provide, at the data controller’s request, a copy of such a sub-processor agreement and subsequent amendments to the data controller.
  4. The data processor shall remain fully responsible to the data controller for the performance of the sub-processor’s obligations under its contract with the data processor. The data processor shall notify the data controller of any failure by the sub-processor to fulfil its obligations under that contract.

International transfers

  1. Any transfer of data to a "Third Country" (any country outside of the EU/EEA and Switzerland) or an international organization by the data processor shall be undertaken only if authorized in accordance with Section A and shall take place in compliance with Chapter V of the GDPR and Section 2 of the FADP, as applicable.
  2. The data controller agrees that where the data processor engages a sub-processor in accordance with Clause ‎5.6 for carrying out specific processing activities (on behalf of the data controller) in a Third Country and those processing activities involve transfer of personal data within the meaning of the GDPR or the FADP, as applicable, the processor and the sub-processor may use standard contractual clauses adopted by the Commission on the basis of Article 46(2) GDPR in order to comply with the requirements of Chapter V of the GDPR, provided the conditions for the use of those clauses are met and provided that an internal assessment concluded that such transfer meets the level of data protection of the GDPR and the FADP.

Data Subject Rights

  1. The data processor shall promptly notify the data controller about any request received directly from the data subject. It shall not respond to that request itself, unless and until it has been authorized to do so by the data controller.
  2. The data processor shall assist the data controller in fulfilling its obligations to respond to data subjects’ requests for the exercise of their rights in accordance with Chapter III of the GDPR and Chapter IV of the FADP, namely:
  3. the right to be informed when personal data are collected from the data subject,
  4. the right to be informed when personal data have not been obtained from the data subject,
  5. the right of access by the data subject,
  6. the right to rectification,
  7. the right to erasure (‘the right to be forgotten’),
  8. the right to restriction of processing,
  9. the notification obligation rectification or erasure of personal data or restriction of processing,
  10. the right to data portability,
  11. the right to object,
  12. the right not to be subject to a decision based solely on automated processing, including profiling,
  13. the right to withdraw consent.
  14. The data processor shall assist the data controller in case a data subject has lodged a complaint to the competent supervisory authority that concerns data processed on the basis of this DPA.
  15. In addition to the data processor’s obligation to assist the data controller pursuant to Clause ‎6‎b), the data processor shall furthermore assist the data controller in ensuring compliance with the following obligations, taking into account the nature of the processing and the information available to the data processor:
  16. The obligation to notify a personal data breach to the competent supervisory authority without undue delay after having become aware of it, (unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons), in accordance with Article 33 GDPR and Article 24(1) to (3) FADP;
  17. the obligation to communicate without undue delay the personal data breach to the data subject, when the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, in accordance with Article 34 GDPR and Article 24(3) FADP;
  18. the obligation to carry out an assessment of the impact of the envisaged processing operations on the protection of personal data (a ‘data protection impact assessment’) where a type of processing is likely to result in a high risk to the rights and freedoms of natural persons, in accordance with Article 35 GDPR and Article 22 FADP;
  19. the obligation to consult the competent supervisory authority prior to processing where a data protection impact assessment indicates that the processing would result in a high risk in the absence of measures taken by the data controller to mitigate the risk, in accordance with Article 36 GDPR and Article 23 FADP.
  20. The Parties shall set out in Section C the appropriate technical and organizational measures by which the data processor is required to assist the data controller in the application of this Clause as well as the scope and the extent of the assistance required.

Notification of personal data breaches

  1. In the event of a personal data breach, the data processor shall cooperate in good faith with and assist the data controller in any way necessary for the data controller to comply with its obligations under Articles 33 and 34 of the GDPR and Article 24 of the FADP, as applicable, taking into account the nature of processing and the information available to the processor.
  2. The data processor shall assist the data controller in notifying the personal data breach to the competent supervisory authority, where relevant. The data processor shall be required to assist in obtaining in particular the following information which, pursuant to Article 33(3) GDPR or Article 24(2) FADP, as applicable, shall be stated in the data controller’s notification:
  3. The nature of the personal data including where possible, the categories and approximate number of data subjects concerned, and the categories and approximate number of personal data records concerned;
  4. the likely consequences of the personal data breach;
  5. the measures taken or proposed to be taken by the data controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.

Termination

  1. Without prejudice to any provisions of the GDPR or the FADP, as applicable, in the event that the data processor is in breach of its obligations under this DPA, the data controller may instruct the data processor to temporarily suspend the processing of personal data until the latter complies with this DPA or the contract is terminated. The data processor shall promptly inform the data controller in case it is unable to comply with this DPA, for whatever reason.
  2. The data controller shall be entitled to terminate this DPA where:
  3. the processing of personal data by the data processor has been temporarily suspended by the data controller pursuant to point (a), data processor's breach is material, and compliance with this DPA is not restored within a reasonable time and in any event within one month;
  4. the data processor is in substantial or persistent breach of this DPA or its obligations under the GDPR or the FADP, as applicable, and such breach cannot be reasonably expected to be remedied;
  5. the data processor fails to comply with a binding decision of a competent court or the competent supervisory authority regarding its obligations under this DPA or under the GDPR or the FADP, as applicable.
  6. This Agreement shall remain in full force and effect so long as the Base Agreement remains in effect. Any provision of this DPA that expressly or by implication should come into or continue in force on or after termination of the Base Agreement in order to protect personal data shall remain in full force and effect.

Liability and indemnity

Each party's liability arising out of or related to this DPA shall be subject to the limitations and exclusions of liability set out in the Base Agreement.

Section C – TOMs

Description of the technical and organizational security measures implemented by the data processor(s):

Organizational security measures

Security Management

  1. Security policy and procedures: The data processor has a documented security policy with regard to the processing of personal data.
  2. Roles and responsibilities:
  3. Roles and responsibilities related to the processing of personal data is clearly defined and allocated in accordance with the security policy.
  4. During internal re-organizations or terminations and change of employment, revocation of rights and responsibilities with respective hand-over procedures is clearly defined.
  5. Access Control Policy: Specific access control rights are allocated to each role involved in the processing of personal data, following the need-to-know principle.
  6. Resource/asset management: The data processor has a register of the IT resources used for the processing of personal data (hardware, software, and network). A specific person is assigned the task of maintaining and updating the register (e.g. IT officer).
  7. Change management: The data processor makes sure that all changes to the IT system are registered and monitored by a specific person (e.g. IT or security officer). Regular monitoring of this process takes place.

Incident response and business continuity

  1. Incidents handling / Personal data breaches:
  2. An incident response plan with detailed procedures is defined to ensure effective and orderly response to incidents pertaining personal data.
  3. The data processor will report without undue delay to the controller any security incident that has resulted in a loss, misuse or unauthorized acquisition of any personal data.
  4. Business continuity: The data processor has established the main procedures and controls to be followed in order to ensure the required level of continuity and availability of the IT system processing personal data (in the event of an incident/personal data breach).

Human resources

  1. Confidentiality of personnel: The data processor ensures that all employees understand their responsibilities and obligations related to the processing of personal data. Roles and responsibilities are clearly communicated during the pre-employment and/or induction process.
  2. Training: The data processor ensures that all employees are adequately informed about the security controls of the IT system that relate to their everyday work. Employees involved in the processing of personal data are also properly informed about relevant data protection requirements and legal obligations through regular awareness campaigns.

Technical security measures

Access control and authentication

  1. An access control system applicable to all users accessing infrastructure is implemented. The system allows creating, approving, reviewing, and deleting user accounts.
  2. The use of common user accounts is avoided. In cases where this is necessary, it is ensured that all users of the common account have the same roles and responsibilities.
  3. When granting access or assigning user roles, the “need-to-know principle” shall be observed in order to limit the number of users having access to personal data only to those who require it for achieving the Processor’s processing purposes.
  4. Where authentication mechanisms are based on passwords, the data processor requires the password to be at least eight characters long and conform to very strong password control parameters including length, character complexity, and non-repeatability.
  5. The authentication credentials (such as user ID and password) shall never be transmitted unprotected over the network.

Logging and monitoring

Log files are activated for each system/application used for the processing of personal data. They include all types of access to data (view, modification, deletion).

Security of data at rest

  1. Server/Database security
  2. Database and applications servers are configured to run using a separate account, with minimum OS privileges to function correctly.
  3. Database and applications servers only process the personal data that are actually needed to process in order to achieve its processing purposes.

Network/Communication security

  1. Whenever access is performed through the Internet, communication is encrypted through cryptographic protocols.

Back-ups

  1. Backup and data restore procedures are defined, documented, and clearly linked to roles and responsibilities.
  2. Backups are given an appropriate level of physical and environmental protection consistent with the standards applied on the originating data.
  3. Execution of backups is monitored to ensure completeness.

Application lifecycle security

During the development lifecycle, best practice, state of the art and well acknowledged secure development practices or standards are followed.

Data deletion/disposal

  1. Software-based overwriting will be performed on media prior to their disposal. In cases where this is not possible (CD's, DVD's, etc.) physical destruction will be performed.
  2. Shredding of paper and portable media used to store personal data is carried out.