Regulation on the processing of personal data by TechnoLogica EAD

Version 2.0

header terms conditions

This document regulates the processing, transmission, storage and destruction of personal data, as well as the rights and obligations of the parties to the Subscription Use Agreement software product, in accordance with the terms of the Personal Data Protection Act (PDPA) and Regulation 2016/679 of the European Parliament and of the Council of the European Union (GDPR).

 

OBJECT

Article 1. (1) The ADMINISTRATOR shall provide access to personal data to the Employee in connection with the execution of specific commercial relationships under the Agreement for Subscription Use of a Software Product, as the same shall be considered as entrusting the Employee on behalf of the ADMINISTRATOR to process the data within the meaning of Art. 4, item 3 of the GDPR.

  • The personal data referred to in paragraph 1 are listed exhaustively in Appendix No 1, forming an integral part of this Regulation.
  • The ADMINISTRATOR is responsible for the accuracy and completeness of the collected personal data, which it transmits to the Employee.
  • The personal data whose processing and protection is regulated by this Regulation shall be collected by the ADMINISTRATOR.
  • The data shall be accessed by:
    • Providing data import files;
    • Providing technical and functional support for the software as a HeRMeS eXpress service; Through the Help-desk system to support users.
 

CONCEPTS

Article 2. The terms used in this document are worded as follows, namely:

ADMINISTRATOR means a natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be laid down in Union or Member State law.

A Personal Data Processor or Processor is a processor within the meaning of Article 3(3) of the GDPR, i.e. processes personal data through assignment by the ADMINISTRATOR.

Personal Data means any information relating to an identified or identifiable natural person (“data subject”). An identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.

Processing means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.

Consent of data means any freely given, specific, informed and unambiguous indication of the data subject’s wishes, by a statement or a clear affirmative action, expressing his or her consent to the processing of personal data relating to him or her.

Personal Data Security Breach means a breach of security that results in accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to personal data transmitted, stored or otherwise processed.

Providing Personal Data are actions for the transfer, in whole or in part, of personal data from one controller to another or to a processor, or to a third party within or outside the territory of the country.

 

RETENTION AND DESTRUCTION PERIODS

Article 3. (1) After fulfilling the obligations of the PROCESSOR under the subscription agreement for HeRMeS eXpress, the latter undertakes to delete the personal data provided in its databases in electronic and/or paper form, if such are provided. “Deletion” means the removal or destruction of personal data so that it cannot be recovered or restored.

  • After the expiration of the subscription period under this Regulation, the retention period of the data for the Employee is 30 calendar days, in order to resolve questions regarding claims made by the ADMINISTRATOR.
  • Where a legal act obliges one of the parties to store personal data for a longer, statutory period, then in this case the information shall not be deleted.
  • Within 30 days after the expiry of the period referred to in paragraph 2, the TECHNOLOGICA shall submit to the ADMINISTRATOR information certifying the deletion of the same information (e.g. a protocol for the destruction of arrays of information).
  • In the event that it retains the data in compliance with its legal obligation, the Party concerned undertakes to apply all technical and organisational protection measures to such data and to use it only for the purposes for which it is stored.

Article 4. (1) At the explicit request of the ADMINISTRATOR, the PROCESSOR shall be obliged to transmit to him (return) the data after the expiration of the retention period under para 2. The return of the data is with the transmission of the documents in the original paper form (if any) and the signing of a handover protocol or transmission by electronic means through a secure file format or encrypted.

(2) After the date of deletion of the data, the parties agree that they will not make any claims against each other regarding the processing of such personal data.

 

TECHNICAL AND ORGANISATIONAL MEASURES

Article 5. (1) The Parties to this Regulation shall take the necessary technical and organisational measures to protect the data against accidental or unlawful destruction, accidental loss, unauthorised access, alteration or dissemination, as well as other unlawful forms of processing.

(2) The Parties undertake to implement technical and organizational measures for the protection of personal data described in Annex 2 when processing personal data.

Article 6. In implementing the measures referred to in Article 5, the Parties to this Regulation agree that the systems through which data are processed shall be confidential and shall allow the storage of the information in its entirety, as well as its availability and continued sustainability.

Article 7. Each Party to this Regulation shall have the right to modify and require the other party to change the organisational and technical protection measures applied in the event of a recommendation by the Commision for Personal Data Protection (CPDP) or a legislative change.

 

PERSONAL DATA BREACH

Article 8. (1) In the event of a breach of the security of personal data, the PROCESSOR shall be obliged to notify the ADMINISTRATOR thereof within 24 hours of becoming aware of the breach.

(2) The notification should specify the following information:

  1. the nature of the breach and, if possible, the categories of personal data concerned, the approximate number of data subjects concerned, the type of datasets concerned, in paper or electronic form;
  2. indicate the official from whom more information can be obtained;
  3. Measures taken by the Party concerned to remedy the breach, restore information and prevent and/or limit adverse effects on data subjects.

Article 9. The Parties agree that they will make every reasonable effort to prevent and/or limit any breach and its adverse effects.

 

RIGHTS AND OBLIGATIONS OF THE PARTIES

Article 10. (1) The ADMINISTRATOR declares and guarantees that the personal data he/she provides within the meaning of Art. 2, item 7 of this Regulation to the PROCESSOR has been collected on a legally determined basis, as well as that the obligations for explicit consent towards the data subject have been fulfilled.

Article. 11. (1) The PROCESSOR processes personal data only after a documented order from the ADMINISTRATOR, including as regards the transmission of personal data to a third country or an international organization, except when obliged to do so by virtue of Union law or the law of a Member State, which applies to the processor of personal data, in which case the PROCESSOR of personal data informs the ADMINISTRATOR of this legal requirement before processing, unless this right prohibits such information on important grounds of public interest.

  • The PROCESSOR guarantees that the persons authorized to process the personal data have undertaken a commitment to confidentiality or are obliged by law to observe confidentiality.
  • The PROCESSOR shall take all necessary and reasonable measures pursuant to Article 32 of the GDPR.
  • The PROCESSOR complies with the conditions under Art. 28, para. 2 and 4 of the GDPR for the inclusion of another personal data processor.
  • The PROCESSOR, taking into account the nature of the processing, assists the ADMINISTRATOR, as far as possible, through appropriate technical and organizational measures in fulfilling the ADMINISTRATOR’s obligation to respond to requests to exercise the rights of data subjects provided for in Chapter III of the GDPR.
  • The PROCESSOR assists the ADMINISTRATOR in guaranteeing the fulfillment of the obligations according to articles 32-36 of the GDPR, taking into account the nature of processing and the information to which the personal data processor has access.

Article 12 (1) The ADMINISTRATOR has the right once a year, after prior agreement, to audit or check the fulfillment by the PROCESSOR of the obligations under this regulation. The audit can also be performed by an auditor authorized by the ADMINISTRATOR.

  • The ADMINISTRATOR shall provide the PROCESSOR with a notification of the performance of the audit or verification within a reasonable time, not less than 30 days before their implementation, except in the cases where the audit is initiated by acts or actions of state bodies.
  • The ADMINISTRATOR and the auditors selected by him shall not cause any damage, interruptions or disturbances in the premises, equipment, staff and business of the PROCESSOR for the time the staff is on the premises while an audit or inspection is being carried out.
  • The PROCESSOR is obliged to provide the necessary assistance to the ADMINISTRATOR in carrying out the audit or verification.
  • The carrying out of an audit or verification under Article 12, paragraph 1 of the Regulation shall not be grounds for providing commercial, financial, economic, know-how or other type of information, which is of a confidential nature for the PROCESSOR, as well as information representing copyright and/or intellectual right protected by law of national or Community law. In this case, the ADMINISTRATOR performs an audit without providing the information of a confidential nature. The PROCESSOR may not invoke confidentiality regarding the technical and organisational protection measures applied.
  • For damages suffered and lost benefits by the PROCESSOR, which are a direct consequence of the audit in accordance with Art. 12, the ADMINISTRATOR owes compensation in full for lost benefits.
  • All expenses, travel, transportation, expenses for an external auditor, are for the account of the ADMINISTRATOR.

Article 13. Each Party to this Regulation shall have the following obligations vis-à-vis the other Party:

  • To process the personal data lawfully, accurately, in good faith in the performance of its duties;
  • Collect only such personal data necessary to achieve the purposes of processing and not further process it in a manner incompatible with those purposes;
  • Provide a technical possibility to update the data where necessary;
  • Delete and/or correct the data where it is found to be inaccurate or disproportionate in relation to the purposes for which they are processed;
  • To monitor compliance by its employees with the internal rules for the processing of personal data, with the mandatory instructions and methodologies of the CPDP, with the normative provisions of national and Community law;
  • To provide its data processors with appropriate training on data protection, to inform them of the confidentiality of personal data and the risks of a possible breach;
  • Notify the other party to this Regulation upon receipt of a request/application/by a data subject under Art. 15-22 GDPR;
  • Notify the other parties to this Regulation of the receipt of a complaint by a data subject by submitting a copy thereof;
  • Put in place, at its own expense, all reasonable organisational and technical protection measures under this Regulation.
  • Require the other Party to make reasonable changes to the technical and organisational protection measures applied, in accordance with the regulatory requirements or instructions of the CPDP.
  • Obtain information on checks, audits and impact assessments carried out by the other party to the Regulation.
  • To receive information about complaints received and/or the exercise of a right of defence by a data subject.

 

NON-COMPLIANCE AND COMPENSATION

Article 14. (1) The ADMINISTRATOR involved in the processing of personal data shall be liable for damages arising from the processing carried out, which is in violation of this Regulation and the PDPA.

  • The PROCESSOR shall be liable for damages arising from the processing carried out only where it has failed to comply with the obligations under this Regulation and the PIPA specifically directed at it or where it has acted outside or contrary to the lawful instructions of the ADMINISTRATOR.
  • The ADMINISTRATOR and/or the PROCESSOR shall be relieved of liability pursuant to paragraphs 1 and 2 where he proves that he/she is not responsible in any way for the event giving rise to the damage.
  • Where both Parties to this Regulation are involved in the same processing operation, they shall be jointly and severally liable for all the damage where they are liable under paragraphs 1 and 2 for damage caused by the processing in order to ensure effective compensation to the data subject.

Article 15. (1) Each Party shall promptly notify the other party of any complaint and/or alert concerning processed data under this Regulation.

  • Each Party undertakes to notify the other Party without undue delay of any administrative proceedings initiated by the CPDP or any other authority with special jurisdiction when the relevant proceedings deal with the processing of data under this Regulation.
  • Each Party undertakes to provide the other Party with the necessary assistance and support in the relevant administrative and/or judicial proceedings, with due diligence.

 

ADDITIONAL PROVISIONS

Article 16. This regulation may be amended or supplemented with the express consent of the parties expressed in writing.

Article 17. For all irregular issues, the provisions of the PDPA, the GDPR and the regulations, methodologies and instructions of the CPDP and the competent authorities shall apply.

Article 18. Disputes arising concerning the conclusion, operation, interpretation, amendment, implementation and termination of this Regulation shall be settled between the parties by negotiation, in a spirit of equal treatment and mutual compromise. In the event that a resolution of the dispute cannot be reached, it concerns a resolution before the CPDP and the property disputes before the competent Bulgarian court in Sofia.

Appendix 1:

PURPOSE AND SCOPE OF THE PROCESSING OF PERSONAL DATA

1.    Purposes of the processing of personal data
  • Implementation of an information system for human resources management;
  • Maintenance of an information system for human resources management;
  • Implementation of changes in the information system for human resources management; Conducting trainings.
2.      Categories of data subjects
  • Applicants;
  • Employees of the administrator;
  • Related persons;
  • Children;
  • Contractors (for training providers)
 
3.      Categories of personal data
Personal identificationKinshipsProfessional identificationFinancial dataSpecial categories of personal data
NamesType of kinship with another personPositionIBANDiagnosis from a hospital sheet
Personal ID numberRelated party namePositionBank card numberDisability rate
Type of identity documentDate of birth of a related partyLocationInsurance policy numberDecision of Disability rate
Identification document numberRelated person’s personal identification numberIdentification numberSalaryNationality
Place of birth Access card number Trade union affiliation
Address Document number  
Citizenship IP address  
E-mail address (email) Connectivity as representative of LE  
Phone Performance assessment  
Photo Workbook  
Education Disciplinary penalties  
Certificates Prizes  
Criminal record certificate Trainings passed  

Appendix 2:

TECHNICAL AND ORGANISATIONAL MEASURES

 
In connection with the performance of its contractual relations in the role of Processor, TechnoLogica EAD is committed to the implementation of the following technical and organizational measures:
SECURITY AREAS Technical and organisational measures
1. SECURITY OF NETWORKS AND SYSTEMS 1.1 Firewall and router configurations are set to limit incoming and outgoing traffic from “unreliable” networks (including wireless) and hosts. All traffic other than the protocols required for the Personal Data Environment (PDE) is prohibited.
1.2 Application firewalls are set in front of the PDE web servers to verify and confirm the traffic directed to the server. Any unauthorised service or traffic is blocked and an alert is generated and then managed in an appropriate way (analysis and removal).
1.3 Configuration templates are provided to strengthen the protection of ICT assets (e.g. databases, applications, operating systems) that process personal data so that only services that are explicitly needed for available planned activities remain.
1.4 Personal data shall be protected against the risk of breach and malware by activating appropriate electronic tools that are updated at least every six months.
1.5 Periodic review of software and operating system updates shall be carried out. A register of published and applicable updates shall be kept and the latter shall be installed for a minimum of six months.
1.6 The processor shall plan and carry out a vulnerability assessment and/or breach testing at least once a year in relation to the systems used to provide services to the data controller. Vulnerabilities identified and findings are managed appropriately (analysis and remediation). Upon request of the Administrator, the Processor shall provide the plans and results of the vulnerability assessment/breakthrough test.
2. DATA SECURITY 2.1 The retention time for personal data is limited to the extent necessary for the provision of each single service, subject to the legal and/or regulatory obligations in force. The maximum retention period for documents is up to 5 years from the date of termination of the contract or the required period under existing regulations, whichever is longer.
2.2 Paper documents containing personal data shall be physically destroyed by means of a shredder before being discarded.
2.3 Production data (actual data) are allowed and limited to production environments only. The processor may only process (actual) personal data if they are protected as a production environment. Other pre-production environments (such as development, testing, acceptability test (UAT) etc.) use either anonymous or synthetic data.
2.4 Access to production data administered by applications in the Client’s infrastructure is exceptionally permissible and upon request, in connection with a specific processing purpose.
2.5 Personal data are rendered unreadable (e.g. by encryption) when stored on a portable digital media, backup media, log files, except where the files are transferred to an institution that does not accept encrypted files.
2.6 The number of records of personal data (e.g. databases, files, copies, archives) is minimised, avoiding unnecessary duplications.
2.7 The transfer of personal data through open, public or unprotected networks is protected by secure encryption and the use of security protocols. In case the encryption channel is not applicable, files and applications containing personal data are protected by means of encryption whenever they are transmitted through open, public or unprotected networks.
2.8 The personal data of the Controller are only processed in a TechnoLogica environment. TechnoLogica does not use other cloud technology providers and/or other third parties processing data.
2.9 Carriers (portable and non-carrying) containing personal data are protected against unauthorised access by appropriate physical and logical security measures.
3. DATA AVAILABILITY 3.1 Control of the availability of the personal data processed is ensured by preventing accidental or deliberate destruction or loss of data. The measures envisaged include: Backup strategy, uninterrupted power supply (UPS, diesel generator), antivirus program, firewall, reporting procedures and emergency planning; security checks at infrastructure and application level, multistage backup process, standard processes when changing employees.
3.2 Timely restoration of the availability and access to personal data is ensured in the event of a physical or technical incident. Restoration is carried out by maintained two types of archives (shortterm and long-term), from which the performance of the systems according to validated procedures in ISO 27001 is restored.
3.3 Procedures have been put in place for erasure of personal data after the purpose of processing for which a register is kept has ceased. The deletion of personal data shall be carried out using methods ensuring an irreversible way of destruction or re-use. If this is impracticable, the data carriers will be destroyed or rendered unusable.
4. IDENTITY AND ACCESS MANAGEMENT 4.1 Access to production environments containing personal data is granted on a ‘need-to-know’ basis and ‘at least privileges’.
4.2 Policies and procedures are in place to ensure the correct identification of users who have access to systems managing personal data. Each user receives a username before being granted access to personal data systems. Each username is identified only one person.
4.3 Individual remote administrative access to systems managing personal data is in accordance with the policies of the Client, Administrator of Personal Data.
4.4 The password management policy for production systems and devices managing personal data requires: — maintaining complex passwords (containing at least 8 characters and fulfilling at least three of these conditions – contains capital letters, lower case letters, digits, special characters, e.g.: %?!); — impossibility of easy guessing, taking into account the name of the user; — they change at least once every 6 months; — the last two passwords used may not be used; — the password cannot be changed one month after its last change.
4.5 System resources and the right of access are assigned individually to each user profile.
4.6 Remote access (from external networks) to the data processing environment is protected by multifactor authentication.
4.7 Users’ access rights to personal data shall be reviewed at regular intervals and in any event at least once a year in accordance with the identity and access management policy.
5. LOGIN AND MONITORING 5.1 Any access to production environments containing personal data as well as access to personal data in the TechnoLogica Support Center is registered in logs.
5.2 Access to production personal data administered in the HeRMeS Human Resources Management System may be traced by recording at least the following information:
 – Consumer
 – Computer (see comments)
 – Date of entry
 – Entry status (Objective of access to personal data)
 – Date of exit
 – Exit status
6. ORGANISATION AND PHYSICAL PROTECTION 6.1 Procedures are in place to ensure the availability of personal data. A system and staff reservation organisation has been set up to ensure continuity of service for the data subject wishing to gain access to his or her own personal data.
6.2 A security awareness-raising programme has been put in place to familiarise all staff with policies and procedures related to the security of personal data.
6.3 The responsibilities and obligations of employees regarding the confidentiality of personal data are declared valid also after the termination or change of their employment relationship.
7. DATA PROTECTION AT THE DESIGN STAGE 7.1 When developing new ICT software/applications, security tests shall be applied to ensure that they are designed and developed taking into account built-in security requirements.
7.2 When implementing changes to ICT software/applications, security tests are applied to ensure that the changes are developed taking into account built-in security requirements.
8. PERSONAL DATA BREACH NOTIFICATIONS 8.1 Incident management processes and tools have been implemented and will be improved in such a way as to classify personal data breaches so that they are properly communicated to the controller within the time limits set out in paragraph “Personal Data Breach”.
8.2 A register of personal data incidents has been created and maintained.