+ All Categories
Home > Documents > Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the...

Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the...

Date post: 31-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
19
Agreement on Data Processing Outsourcing as defined by section 11 of Germany’s Federal Data Protection Act (BDSG)
Transcript
Page 1: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

Stand 01.01.2017

Agreement onData Processing Outsourcingas defined by section 11 of Germany’s Federal Data Protection Act (BDSG)

Page 2: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

2Agreement on Data Processing Outsourcing

Agreement on Data Processing Outsourcing (conformable §11 BDSG)

between:(please complete below)

Company

Address

Postal code / city

Country

– “Principal” –

and:

AEB Gesellschaft zur Entwicklung von Branchen-Software mbH

Sigmaringer Str. 109 70567 StuttgartGermany

– “Agent” or “AEB” –

Page 3: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

3Agreement on Data Processing Outsourcing

Table of contents

1 Scope, responsibilities 4

2 Detailed instructions for data processing 4

3 Instructions of Principal 5

4 Technical and organizational measures 6

5 Data secrecy, monitoring, publicly accessible index 6

6 Violations of data privacy provisions or agreements 7

7 Information 7

8 Storage media, return, deletion 7

9 Audit and inspection rights of the Principal 8

10 Subcontractors 8

11 Threat from third-party actions 9

12 Applicable law, jurisdiction 9

13 Final provisions 10

14 Attachments 11

Page 4: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

4Agreement on Data Processing Outsourcing

Scope, responsibilities1

a) This annex sets forth the data privacy obligations of the parties deriving from the outsourced processing of data as detailed in the main agreement (including its annexes such as the system description). This annex applies to all activities relating to the main agreement and in which employees of the Agent or third parties subcontracted by the Agent may come into contact with the Principal’s personal data.

b) The main agreement consists of orders for services from the Agent, including the permission to use software solutions

provided by AEB; and associated services (such as support and

hosting). These contracts are listed in Annex 2. This list

can be extended in common if additional cont-racts should emerge. Both parties will take care of possible consequences to this agreement.

c) The Principal has carefully selected the Agent, giving special consideration to the suitability of the technical and organizational measures

undertaken by the Agent. Before data processing begins and at regular intervals thereafter, the Principal shall audit and document compliance with the technical and organizational measures.

d) The Agent processes personal data on behalf of the Principal. The Principal is responsible for complying with the provisions of data protection laws within the scope of this agreement, especially the legality of transmitting data to the Agent and the legality of the data processing. The Principal remains the “controller” as defined in sections 11 and 3 (7) of Germany’s Federal Data Protection Act (BDSG). This does not affect the obligations of the Agent as set forth in BDSG section 11.

e) The Agent and any persons it contracts in fulfilling its contractual duties must exercise care and follow all applicable provisions whenever they access data processing resources of the Principal (dialog systems, databases, etc.); such resources may not be destroyed, falsified, or used in a manner other than stipulated.

a) The subject and duration of the outsourced data processing derive from the main agreement (including support agreements and the product system description). This mandate ends upon termination of the main agreement.

b) The extent, type, and purpose of the collection, processing, and use of data; the type of data; and the category of data subjects also derive from the main agreement or system description.

c) The terminology from BDSG section 11 (2) is specified as follows from the perspective of the Principal:

Categories of data: Personnel master data, contact information, user data, customer data/addresses; and

i) in conjunction with products from Import/Freight/O&P also: supplier data/addresses

ii) in conjunction with Compliance, extended where applicable to include the address types from sanctions list screening

Detailed instructions for data processing2

Page 5: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

5Agreement on Data Processing Outsourcing

Detailed instructions for data processing2

Category of data subjects: Customers, employees as defined in BDSG section 3 (11); and

i) in conjunction with products from Import/Freight/O&P also: suppliers

ii) in conjunction with Compliance, extended where applicable to include the data subjects from addresses in sanctions list screening

d) The applications do not contain any special categories of personal data as defined in BDSG section 3 unless such data has been added by the Principal.

e) The Agent shall render its services within the following territory: EU / EEA Countries classified by the EU Commission as

having an appropriate level of data protection. Services may be provided from other countries

as well if appropriate security mechanisms have been put into place by mutual consent and following the consent of the Principal, and in compliance with applicable laws (such as the EU General Data Protection Regulation (GDPR), Articles 3, 44 ff.).

a) The Agent may collect, process, and/or use data only within the scope of the Principal’s instructions. Instructions are written orders by the Principal directing the Agent to handle (collect, process, and/or use) personal data in a specific manner. Initial instructions are defined by the main agreement and may be modified, extended, or replaced by the Principal through a single written instruction (individual instruction).

b) The Principal may issue specific instructions to request that data be corrected, deleted, or blocked.

c) The Agent shall execute individual instructions of the Principal that go beyond the contractually agreed scope only after an agreement on compensation has been reached. Otherwise, the current hourly rates of the Agent shall apply. The Principal indemnifies the Agent from all claims arising from the resulting delay in executing such individual instructions.

Instructions of Principal3

Page 6: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

6Agreement on Data Processing Outsourcing

Technical and organizational measures4

a) The Agent shall undertake the necessary technical and organizational measures pursuant to BDSG section 9 and organize its internal business in such a way that it complies with the specific requirements for protecting personal data. This specifically includes the following: Block unauthorized parties from physical

access to data processing systems that process and use personal data (physical access control)

Prevent unauthorized parties from using data processing systems (electronic access control)

Ensure that those authorized to use a data processing system can only access the data for which they are authorized and that personal data is not subject to unauthorized viewing, copying, modification, or deletion when it is processed or used or after it is stored (user access control)

Ensure that personal data cannot be viewed, copied, modified, or deleted without authorization while it is electronically transmitted, transported, or saved on storage media, and ensure that it is possible to monitor

and determine the intended destinations of personal data transferred using data transmission equipment (transmission control)

Ensure that it is possible to subsequently check and determine whether and by whom personal data was entered into data processing systems, modified, or deleted (input control)

Ensure that personal data processed on behalf of others can only be processed according to the Principal’s instructions (order control)

Ensure that personal data is protected against accidental destruction or loss (availability control)

Ensure that data collected for different purposes can be processed separately (separation control)

b) The technical and organizational measures are set forth in Annex 1 (Security Concept at AEB). The technical and organizational measures may be updated during the contractual relationship in response to technical and organizational improvements by the Agent.

a) The Agent’s employees that are involved in processing the Principal’s data are subject to the terms of BDSG section 5 (“Confidentiality”) and must be instructed in the data protection provisions of BDSG.

b) The Agent has appointed a data privacy officer, who can be reached at [email protected]. The Agent is subject to the supervisory authority of the State Commissioner for Baden-Württemberg.

c) Should the Principal be obligated to maintain a publicly accessible index pursuant to BDSG section 4g (2) sentence 2, the Agent shall provide the Principal with the necessary information if any service of the Agent under this agreement is affected.

Data secrecy, monitoring, publicly accessible index5

Page 7: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

7Agreement on Data Processing Outsourcing

If data privacy laws compel the Principal to provide an individual with information on the collection, processing, or use of that individual’s data, the Agent shall support the Principal in providing this information if the Principal submits a corresponding written request to the Agent and the Principal reimburses the Agent for the associated costs of such support. The terms for this reimbursement are as follows: The time spent by the Agent in cooperating to provide information is reimbursed by the Principal at an

hourly rate of EUR 100. The amount of billed time shall not exceed what is customary and expected for this type of contract or transaction. If it seems likely that more time is required, the parties shall enter into a separate agreement on compensation.

The Principal is aware that the Agent’s support (especially the type, extent, and duration of such support) depends primarily on ensuring that the security of personal and business data of the Agent’s other customers is not compromised.

Information7

a) Any storage media and any copies thereof remain the property of the Principal. The Agent must safeguard them carefully so they cannot be accessed by unauthorized parties. The Agent shall destroy testing and scrap materials in compliance with data protection guidelines when explicitly instructed by the Principal; the Principal shall assume the costs so incurred.

b) Upon completion of the main agreement, the Agent shall surrender the storage media and/or delete or block the data in accordance with BDSG specifications if requested by the Principal

except where prohibited by the recordkeeping requirements to which the Agent is subject. This does not affect the principle of separation as set forth in BDSG. The Principal must submit any such request in writing within one month following the end of the contract term. The Principal is responsible for the costs incurred by the Agent in surrendering, deleting, or blocking the data.

c) AEB is entitled to delete original and results files from Compliance 31 days after the relevant screening is carried out.

Storage media, return, deletion8

The Agent shall notify the Principal of any violations of data privacy guidelines or contractual provisions that the Agent, its employees, or other third parties commit as soon as the Agent is made aware of such violations.

Violations of data privacy provisions or agreements6

Page 8: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

8Agreement on Data Processing Outsourcing

Audit and inspection rights of the Principal9

a) The Principal or a designated proxy is entitled to visit the Agent’s premises during normal business hours to audit the technical and organizational measures pursuant to BDSG section 9. Audits require appropriate advance notification and must not disrupt the Agent’s business operations. The time spent by the Agent in cooperating with such an audit is reimbursed by the Principal at an hourly rate of EUR 100 when efforts exceed an amount of 4 person hours per year. The amount of billed time shall not exceed what is customary and expected for this type of contract or transaction. If it seems likely that more time is required, the parties shall enter into a separate agreement on compensation.

b) The Agent agrees to comply within a reasonable period with written requests by the Principal for any information needed to conduct a thorough

audit.c) The auditing rights do not extend to areas that

involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing is affected by such areas.

d) The findings and results obtained in exercising on-site auditing rights must be put into writing and provided to the Agent free of charge.

e) The Principal must provide the Agent with prompt and complete information of any irregularities with regard to data protection provisions that the Principal identifies while checking the results of the outsourced data processing.

a) The Principal is aware that as an IT provider, AEB provides services to a variety of customers. This means that even sub-contracting is generally assigned without any disclosure of customer identities.

b) As of the start of the contract term, the contractual services are carried out with the assistance of the following subcontractors:

c) The Agent is permitted to use companies within its corporate group and other subcontractors to perform its contractual obligations, exercising the due care stipulated by law, without obtaining special written consent if it duly notifies the Principal before such processing or use begins (generally 6 weeks before data processing begins).

d) Contracts with the subcontractors must comply with the terms of confidentiality, data privacy, and data security agreed between the parties. The Principal must be granted auditing rights as set forth in section 9 above. The Principal is entitled to request in writing from the Agent information on the key content of the contract and the subcontractor’s implementation of the data privacy obligations, if necessary by reviewing the contractual agreements relating to the outsourced data processing.

Subcontractors10

Subcontractors Function Location

AFI Solutions GmbH

Maintenance and sup-port for middle ware (communication soft-ware)

StuttgartGermany

Trivadis GmbH Database administra-tion and support

StuttgartGermany

Hewlett Packard GmbH

Hardware supplier BöblingenGermany

Page 9: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

9Agreement on Data Processing Outsourcing

Subcontractors10

e) The Agent shall notify the Principal of any intended change regarding the addition or replacement of other subcontractors, giving the Principal the opportunity to object to such changes.

f) If no objection from the Principal is received within 4 weeks following receipt of the notification

of the addition or change of subcontractors, the subcontracting is considered to be confirmed under the general written consent.

g) The Principal shall not unduly refuse to give such consent and not object without a good reason that is comprehensible for the Agent.

The Agent shall notify the Principal without delay if the Principal’s data held by the Agent is in danger of being seized or confiscated or is threatened by insolvency or receivership proceedings or other

events or measures of third parties. In such a situation, the Agent shall also promptly notify all relevant third parties known to the Agent that the Principal has sovereignty over the data.

Threat from third-party actions11

a) This agreement is subject to German law to the exclusion of the United Nations Convention on Contracts for the International Sale of Goods (CISG).

b) For all disputes arising in connection with this agreement and its extensions or additions or with regard to its validity that the parties cannot settle among themselves, AEB may initiate mediation and/or seek a resolution at its discretion either through an arbitration tribunal without recourse to the courts or through the standard jurisdiction of the courts.

c) As the future defendant or otherwise passive participant in judicial proceedings, AEB is obligated to exercise its discretion in advance of any trial within two weeks of receiving a written request from the counterparty. If the counterparty does not receive a written decision from AEB within this period, AEB is no longer entitled to demand mediation or object to the jurisdiction of the arbitration tribunal.

d) If AEB opts for mediation, the case is brought before the mediation center of the German Association of Law and Informatics (DGRI, www.dgri.de) for partial, provisional, or final

Applicable law, jurisdiction12

Page 10: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

10Agreement on Data Processing Outsourcing

resolution of the dispute in accordance with the DGRI rules of mediation current at the time mediation is initiated. The expiration of all claims arising from the actual circumstances under mediation is suspended from the time mediation is requested until such proceedings are complete. Section 203 BGB applies with the necessary modifications.

e) If AEB opts for a decision by an arbitration tribunal, the dispute is ultimately decided according to the rules of arbitration of the Stuttgart Chamber of Commerce and Industry (IHK) without recourse to

the courts. The place of arbitration proceedings is Stuttgart. The arbitration tribunal shall consist of a single arbitrator. The applicable substantive law is that of the Federal Republic of Germany. Arbitration shall be conducted in German.

f) If AEB opts for a decision by the courts, the venue is that of AEB’s main offices. AEB is also entitled, however, to assert claims in the venue of the counterparty’s main offices.

Applicable law, jurisdiction12

Additions and other changes to this annex must be in writing (BDSG section 11 (2)).

Final provisions13

Page 11: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

11Agreement on Data Processing Outsourcing

Attachments14

Principal

Place

Date

Name / position

Signature

Agent

Place

Date

Name / position

Signature

Annex 1: List of technical and organizational measures; as a document attachment with the current status (July, 2016) entitled: “Security Concept at AEB Gesellschaft zur Entwicklung von Branchen-Software mbH.”

Annex 2: Summary of contracts as main agreement (provides reason for this agreement on data processing outsourcing)

Page 12: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

Stand 01.01.2017

Security Conceptat AEB Gesellschaft zur Entwicklung von Branchen-Software mbH

(Technical and organizational measures / Controls)

Attachement 1, as of June 30, 2016

Page 13: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

13Attachement 1: Security Concept at AEB GmbH

Table of contents Attachement 1

A Basic Information 14

1. Concerning data protection 14

2. Concerning SOX Compliance 14

B Description of IT General Controls 14

1. Application Process Control 14

2. Organizational Control (management systems) 15

3. Technical and organizational measures 15

C Description of Application Controls 17

1. Quality Assurance 17

2. Quality Assurance by Defined Processes 17

3. Quality Assurance by External Auditors 17

Page 14: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

14Attachement 1: Security Concept at AEB GmbH

Basic InformationA

This document contains all Security control systems covering services of AEBs computer center. The according measures can be both of technical or organizational type. They must be state of the art and shall include the human factor.AEB is allowed to change and update the neccessary measures as long the Security level reached won’t be reduced. The measures you find here are general and sweeping and not customer-specific.This document is released with date information.

1. Concerning data protection In accordance with applicable laws of data

protection (like German Federal Data Protection Act – BDSG) there are adequate technical and/or organizational measures grouped in some controls to choose to meet the protection needs of personal data. Measures shall be considered necessary where the effort they involve is proportionate to the objective they are designed to achieve in terms of protection.

2. Concerning SOX Compliance The requirements for service providers, especially

those outlined in Section 404 of the Sarbanes-Oxley Act (SOX), oblige companies that are

subject to SOX to include outsourced compliance-relevant tasks in their internal controls.

These controls can be simplified by commissioning a report (certification) on the outsourced services. In this report, the service provider describes its own internal control system (data privacy, data security, access security, data integrity, etc.). This control system must be sophisticated enough to achieve the stated objectives. And it must be fully implemented.

This present document tries to support that by describing all the control systems of the AEB GmbH computer center services

Some more hints: See more concerning SSAE16 (Statement on

Standards for Attestation Engagements No. 16) with link zu Standard ISAE 3402 (International Standard on Assurance Engagements No. 3402)

Summarized from: Institute of Information Systems of the University of Bern, Switzerland, work report no. 190: Compliance Verification in IT Outsourcing, Gerhard F. Knolmayer, August 2006. Available online (in German) at http://www.ie.iwi.unibe.ch/publikationen/berichte/resource/WP-190.pdf.

Ealier Standard: American Institute of Certified Public Accountants: AICPA Audit Guide. Service Organizations: Applying SAS No. 70, as Amended. With Conforming Changes as of May 1, 2006. AICPA, New York 2006.

1. Application Process Control Ensures that applications are correctly

implemented and process data correctly. Both the services and the associated

technologies and processes are tested by the

ATLAS coordinating office (KoSt) at the Karlsruhe Regional Finance Office and certified only if all requirements are mapped.

The testing and certification logs are also available from the ATLAS coordinating office.

Description of IT General ControlsB

Page 15: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

15Attachement 1: Security Concept at AEB GmbH

Description of IT General ControlsB

2. Organizational Control (management systems)

2.1 Data Privacy The company’s Data Protection Officer tests and

controls compliance with applicable law like the provisions of the German Federal Data Protection Act (BDSG). Some of the following organizational and security controls are required in §9 BDSG.

A limited selection of IT teams assigns access rights using four-eyes-principle. IT/Organization carries out regularly or event-driven checks of access rights with the authority to object to or veto a particular access right.

2.2 Security control, risk management From a high-level-view operation of ISMS

(Information Security Management System in context with ISO 27001) ensures IT-security management in a continuous PDCA-life-cycle as a process. This process based on assets includes protection needs analysis and detailed risk management (estimation, evaluation, treatment).

Most important security criterions: Availability Confidentiality Integrity

ISMS itself includes regularly internal and external audits and management reviews. A further level is ensuring high security awareness for staff by adequate comprehensive package of measures (f.e. training).

For an overview to Information Security please see also our Guideline Integrated Management System (including Information Security) in https://service.aeb.com/en/open/guidelines-and-certificates.

3. Technical and organizational measures

3.1 Input Control Ensures that it is possible to subsequently check

and determine whether and by whom personal data was entered into data processing systems, modified or deleted. All products that process personal data keep a

log of all data entry, modifications and deletions. Personalized user accounts in applications

3.2 Order Control Ensures that personal data from orders can only

be processed according to the client’s instructions. The customer handles user and rights

administration at the user level in the products. Contracts (f.e. concerning outsourced data

processing) define the obligations of both parties.

Use of standardized and proven contracts in conformity with the applicable law.

Also possible subcontractors work according underlying contracts (covering f.e. confidentiality, data processing, possible system access conditions).

Access to business data have only employees with adequate roles and competences (like database administrators from System Management), working according to defined purposes.

Page 16: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

16Attachement 1: Security Concept at AEB GmbH

Description of IT General ControlsB

3.3 Separation Control Ensures that data collected for different purposes

can be processed separately. Separation of:

Employee data Customer contact data Customer test data (project work, customer

developments) Remote maintenance access data Customer data in the AEB computer center

System level: Customer data in the computer center is

administered in strict separation and in separate systems (databases, etc.) from customer (f.e. CRM) data of the AEB.

Different applications: Customer data and employee data are

processed using separate applications. Rights within the application:

Customer contact data is strictly separated from remote maintenance access data.

3.4 Physical Access Control Blocks unauthorized parties from physical access

to data processing systems that process and use personal data. Multilevel technical locking systems, partially

equipped with alerting system Security patrol service Control of identity (reception desk, registration of

guests, security awareness measures) Servers and remote maintenance routers are

protected by controlled access (coded locks) to the server room.

Remote maintenance systems are secured as follows: Access to remote maintenance data is

restricted to authorized persons. Systems for customer remote maintenance

are in a separate special protected network area.

3.5 Electronic Access Control Ensures that those authorized to use a data

processing system can only access the data for which they are authorized and that personal data is not subject to unauthorized viewing, copying, modification or deletion when it is processed or used or after it is stored.

Central rights management separates system access from application access.

Users can not change their own rights. Users can not request a change without

approval by their supervisor. Change management of user rights in

accordance with changing roles (f.e. at movements within the company)

External access is restricted to VPN- or SSH-secured connections.

Regularly Security checks of external access are carried out by appropriately specialized companies.

Internal Security regulation including need to know principle

Workstation computers are secured as follows: Users must log on through a centrally

controlled identity management system. Employees are required to lock their

computers. Computers are automatically locked after

15 minutes of idle time.3.6 Transmission Control Ensures that personal data can not be viewed,

copied, modified or deleted without authorization while it is electronically transmitted, transported or saved on storage media and that it is possible to monitor and determine the intended destinations of personal data transferred using data transmission equipment. The enterprise-wide data security policy

prohibits all transmission of unencrypted data. All upload/download connections via Internet

are secured through either SSL, SSH or VPN. All branch offices or mobile systems rely

exclusively on VPN- or SSH-secured connections controlled by AEB.

No personal data is stored locally; all data is stored centrally in Stuttgart/Germany.

External connections are possible only through approved applications.

External connections are possible only through approved services.

All remote data transfer connections are logged wherever technically possible.

Managed process for disposing of waste with confidential data in accordance with legal requirements.

Page 17: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

17Attachement 1: Security Concept at AEB GmbH

Description of IT General ControlsB

3.7 Availability Control Ensures that personal data is protected against

random destruction or loss. Redundant systems

Database: clusters Fileserver: clusters File server: SAN systems with redundant

components Uninterruptible power supply, back-up generator

(diesel units) Fire alarm or extinguishing systems (with argon

pressure) Water detection system

Connection to 24/7 security agency Tape protection

Daily tape backups Data storage in separate fire containment

section Additionally regularly data backups based

on Database tools Sophisticated system for monitoring and

alerting as part of business continuity management (principle of early detection)

System for incident and problem management for external and internal use

Providing emergency process

Description of Application ControlsC

1. Quality Assurance Quality is a top priority throughout AEB and is

assigned a special status. Owners of applications and processes are responsible for assuring quality in applications and processes. Based on continuous PDCA-lifecycle they are defining, optimizing and testing the processes of not only application development but maintenance and service too. To manage and enforce these common tools like guides, various templates and checklists are used. Main aim is working service- and process-oriented and establishing of cross-product standards.

The application testing includes both functional and usability tests. Each update is subject to multiple testing and approval phases.

Constant monitoring and implementation ensures that the latest technical requirements are met. Maintenance and service is evaluated and optimized in close cooperation with customers.

2. Quality Assurance by Defined Processes All new development steps and application

maintenance proceed according to defined processes (principle of transparency). All application development and maintenance tasks are executed as projects with a defined project workflow and a defined process using sample projects, a controlled sophisticated role concept and providing several steps of acceptances needed. In critical steps 4-eyes-principle is mandatory used. Where necessary security checks are intregrated.

3. Quality Assurance by External Auditors Applications are tested and certified by external

auditors where needed. This testing and certification is based in part on

IDW auditing standards and position papers such as IDW AuS 330 (“Auditing for the Use of Information Technology”) or IDS RS FAIT 1 (“Principles of Proper Accounting for the Use of Information Technology”).

Page 18: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

Stand 01.01.2017

List of Contracts

Attachement 2

Page 19: Agreement on Data Processing Outsourcing · involve the Agent’s business secrets unless the personal data of the Principal that is the subject of the data processing outsourcing

19Attachement 2: List of contracts

Contracts

The following contracts provide the legal basis for having the situation of Data Processing Outsourcing between Principal and Agent:

...

...

...


Recommended