This Data Processing Agreement ("DPA") forms part of the Terms of Use (or other similarly titled written or electronic agreement addressing the same subject matter) ("Agreement") between Customer (as defined in the Agreement) and "Compliance Kart Pvt. Ltd" under which the Processor provides the Controller with the software and services (the "Services"). The Controller and the Processor are individually referred to as a "Party" and collectively as the "Parties".
The Parties seek to implement this DPA to comply with the requirements of EU GDPR (defined hereunder) in relation to Processor's processing of Personal Data (as defined under the EU GDPR) as part of its obligations under the Agreement.
This DPA shall apply to Processor's processing of Personal Data, provided by the Controller as part of Processor's obligations under the Agreement.
Except as modified below, the terms of the Agreement shall remain in full force and effect.
Terms not otherwise defined herein shall have the meaning given to them in the EU GDPR or the Agreement. The following terms shall have the corresponding meanings assigned to them below:
This DPA sets out various obligations of the Processor in relation to the Processing of Personal Data and shall be limited to the Processor's obligations under the Agreement. If there is a conflict between the provisions of the Agreement and this DPA, the provisions of this DPA shall prevail.
The Controller authorizes permission to the Processor to process the Personal Data to the extent of which is determined and regulated by the Controller. The current nature of the Personal Data is specified in Annex I to Schedule 1 to this DPA.
The objective of Processing of Personal Data by the Processor shall be limited to the Processor's provision of the Services to the Controller and or its Client, pursuant to the Agreement.
The Processor will Process Personal Data for the duration of the Agreement, unless otherwise agreed upon in writing by the Controller.
Any Data Transfer for the purpose of Processing by the Processor in a country outside the European Economic Area (the "EEA") shall only take place in compliance as detailed in Schedule 1 to the DPA. Where such model clauses have not been executed at the same time as this DPA, the Processor shall not unduly withhold the execution of such template model clauses, where the transfer of Personal Data outside of the EEA is required for the performance of the Agreement.
Having regard to the state of technological development and the cost of implementing any
measures, the Processor will take appropriate technical and organizational measures against
the unauthorized or unlawful processing of Personal Data and against the accidental loss or
destruction of, or damage to, Personal Data to ensure a level of security appropriate to:
(a) the harm that might result from unauthorized or unlawful processing or accidental loss,
destruction or damage; and
(b) the nature of the data to be protected [including the measures stated in Annex II of Schedule 1].
| Name | Customer (As set forth in the relevant Order Form) |
| Address | As set forth in the relevant Order Form |
| Contact person's name, position, and contact details | As set forth in the relevant Order Form |
| Activities relevant to the data transferred under these Clauses | Recipient of the Services provided by Compliance Kart Pvt. Ltd in accordance with the Agreement. |
| Signature and Date | Signature and date are set out in the Agreement. |
| Role (Controller/ Processor) | Controller |
| Name | Compliance Kart Pvt. Ltd |
| Address | 10th Floor, Tower B, B1002, Sector 142, Noida, Uttar Pradesh 201305 |
| Contact person's name, position, and contact details | Alok Panday, ceo@compliancekart.io |
| Activities relevant to the data transferred under these Clauses | Provision of the Services to the Customer in accordance with the Agreement. |
| Signature and Date | Signature and date are set out in the Agreement. |
| Role (Controller/ Processor) | Processor |
Description of the technical and organisational security measures implemented by Compliance Kart Pvt. Ltd as the data processor/data importer to ensure an appropriate level of security, taking into account the nature, scope, context, and purpose of the processing, and the risks for the rights and freedoms of natural persons.
Security
Security Management System.
Organization. Compliance Kart Pvt. Ltd designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program.
Policies. Management reviews and supports all security related policies to ensure the security, availability, integrity and confidentiality of Customer Personal Data. These policies are updated at least once annually.
Assessments. Compliance Kart Pvt. Ltd engages a reputable independent third-party to perform risk assessments of all systems containing Customer Personal Data at least once annually.
Risk Treatment. Compliance Kart Pvt. Ltd maintains a formal and effective risk treatment program that includes penetration testing, vulnerability management and patch management to identify and protect against potential threats to the security, integrity or confidentiality of Customer Personal Data.
Vendor Management. Compliance Kart Pvt. Ltd maintains an effective vendor management program.
Incident Management. Compliance Kart Pvt. Ltd reviews security incidents regularly, including effective determination of root cause and corrective action.
Standards. Compliance Kart Pvt. Ltd operates an information security management system that complies with the requirements of ISO/IEC 27001:2022 standard.
Personnel Security.
Compliance Kart Pvt. Ltd personnel are required to conduct themselves in a manner consistent with the company's guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. Compliance Kart Pvt. Ltd conducts reasonably appropriate background checks on any employees who will have access to client data under this Agreement, including in relation to employment history and criminal records, to the extent legally permissible and in accordance with applicable local labor law, customary practice and statutory regulations.
Personnel are required to execute a confidentiality agreement in writing at the time of hire and to protect Customer Personal Data at all times. Personnel must acknowledge receipt of, and compliance with, Compliance Kart Pvt. Ltd's confidentiality, privacy and security policies. Personnel are provided with privacy and security training on how to implement and comply with the Information Security Program. Personnel handling Customer Personal Data are required to complete additional requirements appropriate to their role (e.g., certifications). Compliance Kart Pvt. Ltd's personnel will not process Customer Personal Data without authorization.
Access Controls.
Access Management. Compliance Kart Pvt. Ltd maintains a formal access management process for the request, review, approval and provisioning of all personnel with access to Customer Personal Data to limit access to Customer Personal Data and systems storing, accessing or transmitting Customer Personal Data to properly authorized persons having a need for such access. Access reviews are conducted periodically to ensure that only those personnel with access to Customer Personal Data still require it.
Infrastructure Security Personnel. Compliance Kart Pvt. Ltd has, and maintains, a security policy for its personnel, and requires security training as part of the training package for its personnel. Compliance Kart Pvt. Ltd's infrastructure security personnel are responsible for the ongoing monitoring of Compliance Kart Pvt. Ltd's security infrastructure, the review of the Services, and for responding to security incidents.
Access Control and Privilege Management. Compliance Kart Pvt. Ltd's and Customer's administrators and end users must authenticate themselves via a Multi-Factor authentication system or via a single sign on system in order to use the Services.
Internal Data Access Processes and Policies – Access Policy. Compliance Kart Pvt. Ltd's internal data access processes and policies are designed to protect against unauthorized access, use, disclosure, alteration or destruction of Customer Personal Data. Compliance Kart Pvt. Ltd designs its systems to only allow authorized persons to access data they are authorized to access based on principles of "least privileged" and "need to know", and to prevent others who should not have access from obtaining access. Compliance Kart Pvt. Ltd requires the use of unique user IDs, strong passwords, two factor authentication and carefully monitored access lists to minimize the potential for unauthorized account use. The granting or modification of access rights is based on: the authorized personnel's job responsibilities; job duty requirements necessary to perform authorized tasks; a need to know basis; and must be in accordance with Compliance Kart Pvt. Ltd's internal data access policies and training. Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for accountability. Where passwords are employed for authentication (e.g., login to workstations), password policies follow industry standard practices. These standards include password complexity, password expiry, password lockout, restrictions on password reuse and re-prompt for password after a period of inactivity.
Data Center and Network Security.
Data Centers.
Infrastructure. Compliance Kart Pvt. Ltd has AWS as its data center.
Resiliency. Multi Availability Zones are enabled on AWS and Compliance Kart Pvt. Ltd conducts Backup Restoration Testing on a regular basis to ensure resiliency.
Server Operating Systems. Compliance Kart Pvt. Ltd's servers are customized for the application environment and the server have been hardened for the security of the services. <organization name> employs a code review process to increase the security of the code used to provide the Services and enhance the security product in production environments.
Disaster Recovery. Compliance Kart Pvt. Ltd replicates data over multiple systems to help to protect against accidental destruction or loss, Compliance Kart Pvt. Ltd has designed and regularly plans and tests its disaster recovery programs.
Security Logs. Compliance Kart Pvt. Ltd's systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into Compliance Kart Pvt. Ltd's systems.
Vulnerability Management. Compliance Kart Pvt. Ltd performs regular vulnerability scans on all infrastructure components of its production and development environment. Vulnerabilities are remediated on a risk basis, with Critical, High and Medium security patches for all components installed as soon as commercially possible.
Networks and Transmission.
Data Transmission. Transmissions on production environment are transmitted via Internet standard protocols. A External Attack Surface, AWS Security Group (which is equivalent to a virtual firewall) is in place for the Production environment on AWS.
Incident Response. Compliance Kart Pvt. Ltd maintains incident management policies and procedures, including detailed security incident escalation procedures. Compliance Kart Pvt. Ltd monitors a variety of communication channels for security incidents, and Compliance Kart Pvt. Ltd's Security personnel will react promptly to suspected or known incidents, mitigate harmful effects of such security incidents, and document such security incidents and their outcomes.
Encryption Technologies. Compliance Kart Pvt. Ltd makes HTTPS encryption (also referred to as SSL or TLS) available for data in transit.
Data Storage, Isolation, Authentication and Destruction. Compliance Kart Pvt. Ltd stores data in a multi-tenant environment on AWS servers, Data, wthe Services database and file system architecture are replicated between multiple availability zones on AWS. Compliance Kart Pvt. Ltd logically isolates the data of different customers. A central authentication system is used across all Services to increase uniform security of data. Compliance Kart Pvt. Ltd ensures secure disposal of Client Data through the use of a series of data destruction processes.
The controller has authorized the use of the following sub-processors: