1. BACKGROUND AND PURPOSE
This Data Processing Agreement (“DPA”) forms part of the Services Agreement between: Lucidtech (“Data Processor”) and the Licensee (“Data Controller”) together referred to as the “Parties”. The Data Processor processes Personal Data either- as a data processor on behalf of the Licensee as a Data Controller; or
- as a sub-processor on behalf of another data processor that processes Personal Data on behalf of its customers, which are Data Controllers.
2. DEFINITIONS
In this DPA, the following terms shall have the meanings set out below:- “Data Processor” means Processor or a Sub-processor;
- “Data Protection Laws” means EU Data Protection Laws and, to the extent applicable, the data protection or privacy laws of any other country, such as the Norwegian Personal Data Act (LOV-2018-06-15-38) and Personal Data Regulations;
- “EU Data Protection Laws” means EU Directive 95/46/EC, as transposed into domestic legislation of each Member State and as amended, replaced or superseded from time to time, including by the GDPR and laws implementing or supplementing the GDPR;
- “GDPR” means EU General Data Protection Regulation 2016/679;
- “Personal Data” means any information relating to an identified or identifiable natural person (“Data Subject”); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person;
- “Sub-processor” means a third party sub-contractor engaged by the Processor which, will Process Personal Data on behalf of the Controller; and
3. PROCESSING OF PERSONAL DATA
The Data Processor processes data on behalf of the Data Controller in connection with offering machine learning powered cloud services for reading and validating documents such as receipts and invoices, with continuous self-improvement capabilities as an integral part of the service. The Processing involves extracting information such as date, total amount, supplier, currency, etc. from the documents which may consist of Personal Data. This extracted information will be returned to the Data Controller in a structured format. After Processing, the documents may be stored for up to 5 years on the Data Processor’s systems in order to fulfill the Data Processor’s duties to the Data Controller. The Data Processor will process the following types of personal data on behalf of the Data Controller:- Name, IP-address, contact information, occupation, purchase and other personal information that may appear on documents posted to the Service.
- The employees or customers of the Data Controller.
- To supply machine learning powered self-improving document interpretation cloud services to the Data Controller.
- Train machine learning models in order to continuously improve the accuracy of the service.
4. THE DATA PROCESSOR’S DUTIES
When Processing Personal Data on behalf of the Data Controller, the Data Processor shall follow the routines and instructions stipulated in this DPA. Data Processor shall:- comply with all applicable Data Protection Laws in the Processing of Personal Data; and
- not Process Personal Data other than on the Data Controller’s documented instructions unless Processing is required by Applicable Laws to which the Data Processor is subject, in which case Processor shall to the extent permitted by Applicable Laws inform the Controller before the relevant Processing of that Personal Data, and
- immediately inform the Data Controller if, its opinion, an instruction infringes applicable Data Protection laws.
5. THE DATA PROCESSOR’S OPPORTUNITY TO USE SUB-PROCESSORS
The Data Processor may use Sub-processors. The Data Processor shall ensure that the Sub-processors are bound by written agreements that require them to comply with data processing obligations corresponding to those contained in this DPA. The Data Processor shall remain fully liable to the Data Controller for the performance of the Sub-processor’s obligations. The following Sub-processor(s) are approved by the Data Controller:- Amazon Web Services EMEA SARL
6. TRANSFER OF PERSONAL DATA OUTSIDE THE EU/EAA
The Data Processor may not process or use Sub-processors that process Personal Data outside the EU/EEA without prior written approval from the Data Controller. The Data Processor shall ensure that there is a legal basis for the Processing of Personal Data data outside the EU/EEA, or facilitate the establishment of such legal basis.7. SECURITY
The Data Processor shall, in order to assist the Data Controller in fulfilling its legal obligations under Applicable Data Protection Law regarding security measures and privacy impact assessments, be obliged to take appropriate technical and organizational measures to protect the Personal Data, which is Processed. The Data Processor shall comply with any written information security requirements or policies communicated by the Data Controller from time to time, including, as appropriate, the measures referred to in Article 32(1) of the GDPR. The Data Processor shall maintain adequate security for the Personal Data appropriate to the risk of Processing. The Data Processor shall protect the Personal Data against destruction, modification, unlawful dissemination, or unlawful access. Having regard to the state of the art and the costs of implementation and taking into account the nature, scope, context and purposes of the Processing as well as the risk of varying likelihood and severity for the rights and freedoms of individuals, the Data Processor shall implement technical and organizational measures to secure the data. The Data Processor shall document routines and other measures made to comply with these requirements regarding the information system and security measures. The documentation shall be available at request by the Data Controller and the authorities. In addition to the technical and organizational measures mentioned above, the Data Processor shall implement the following measures:- Access control whereby access to the Personal Data is managed through a technical system for authorization control. There shall be procedures for allocating and removing authorizations.
- User IDs and passwords used to access Personal Data shall be personal and shall not be shared.
- Secure communications whereby external data communication connections shall be protected using technical functions ensuring that the connection is authorized and encrypted for Personal Data in transit in communication channels outside systems controlled by the Data Processor.
- A process to ensure secure data destruction when fixed or removable storage media no longer are used for their purpose.
- Computer equipment and removable storage media containing Personal Data at the Data Processor’s premises shall be encrypted in order to protect against unauthorized use and theft.
- A process to ensure the confidentiality of employees who have access to the Personal Data.
- Routines for entering into confidentiality agreements with suppliers providing repair and service of equipment used to store Personal Data.
- Routines for supervising the service performed by suppliers at the premises of the Data Processor. Storage media containing the Personal Data shall be locked up if supervision is not possible.