Data Protection Agreement
DPA
This HASH Data Protection Agreement ("DPA") forms part of the HASH Customer Agreement between Customer (“You”) and HASH, Inc. (“HASH”) covering Your legal entity’s use of the Online Services. It sets forth the parties’ obligations with respect to Customer Personal Data processed by HASH. Capitalized terms not defined in this document shall have the meaning as provided elsewhere in your HASH Customer Agreement.
In the event of any conflict or inconsistency between the DPA Terms and any other terms in the HASH Customer Agreement, the DPA Terms will prevail. The provisions of the DPA Terms supersede any conflicting provisions of the HASH Privacy Statement that otherwise may apply to processing of Personal Data. For clarity, the Standard Contractual Clauses prevail over any other term of the DPA Terms.
1. Definitions
Capitalized terms used but not defined in this DPA will have the meanings provided in the HASH Customer Agreement. The following defined terms are used in this DPA:
→
“CCPA” means the California Consumer Privacy Act as set forth in Cal. Civ. Code §1798.100 et seq. and its implementing regulations.→
“Customer Personal Data” means all data, including all text, sound, video, or image files, and software, that are provided to HASH by, or on behalf of, Customer through use of the Online Service.→
“DPA” means this HASH Data Protection Agreement.→
“Data Protection Requirements” means the applicable obligations imposed on HASH by the GDPR, any subordinate legislation or regulations implementing the GDPR, the CCPA, and any other applicable laws, regulations, and other legal requirements applicable to HASH and relating to:→
privacy and data security; or→
the use, collection, retention, storage, security, disclosure, transfer, disposal, and other processing of any Personal Data.
→
“GDPR” means:→
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016; and→
Regulation (EU) 2016/679 as transposed into national law of the United Kingdom by the UK European Union (Withdrawal) Act 2018 and amended by the UK Data Protection, Privacy and Electronic Communications (Amendments etc.) (EU Exit) Regulations 2019 (as may be amended from time to time).
→
“HASH Affiliate” means any entity that controls HASH, is controlled by HASH, or is under common control with HASH.→
“HASH Customer Agreement” or “Agreement” means Your agreement(s) for the Online Services.→
“Instructions” mean the activities you instruct HASH to perform as Processor acting on Your behalf.→
“Online Services” means any service or software that HASH provides You under a written and executed agreement.→
“Preview” means Online Services provided for preview, evaluation, demonstration, or trial purposes, and any beta, technical preview, or other pre-release versions of the Online Services.→
“Professional Services” means training, consulting or implementation services provided by HASH. Professional Services do not include support.→
“Professional Services Data” means all Customer Personal Data that are provided to HASH, by or on behalf of a Customer or that Customer authorizes HASH to obtain from an Online Service or otherwise obtained or processed by or on behalf of HASH through an engagement with HASH to obtain Professional Services.→
“Security Incident” means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Personal Data processed by HASH on Your behalf.→
“Standard Contractual Clauses” or “SCCs” means:→
where the GDPR applies the contractual clauses annexed to the European Commission's Implementing Decision 2021/914 of 4 June 2021 on standard contractual clauses for the transfer of Personal Data to third countries pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council (the “EU SCCs”);→
where the UK GDPR applies, the “International Data Transfer Addendum to the EU Commission Standard Contractual Clauses” issued by the Information Commissioner under s.119A(1) of the Data Protection Act 2018 (“UK Addendum”); and→
where the Swiss Data Protection Act (“Swiss DPA”) applies, the applicable standard data protection clauses issued, approved or otherwise recognized by the Swiss Federal Data Protection and Information Commissioner (“FDPIC”) (the “Swiss SCCs”).
→
“Subprocessor” means a third-party Processor retained by HASH to process Your data.→
“Subprocessor List” means the list of Subprocessors identified on the HASH website at https://trust.hash.ai/subprocessors or a successor location.→
“Troubleshooting” means preventing, detecting, investigating, mitigating, and repairing problems, including Security Incidents and problems identified in the relevant products. Troubleshooting includes fixing software defects and otherwise keeping the Online Services up to date and performant.→
“Controller”, “Data Subject”, “Personal Data”, “Process”, and “Processor” have the meanings ascribed to them in the GDPR.
2. Scope and Order of Precedence
A. This DPA applies to all Online Services except:
→
Products specifically identified as excluded in bespoke HASH product terms, in which case those terms shall control so long as such terms are compliant with Data Protection Requirements, and→
Previews, unless expressly designated by HASH as being governed by this DPA. Previews may employ privacy and security measures that are different from those normally provided in Online Services and are offered under Preview Terms. Unless otherwise noted, Customers should not use Previews to process Personal Data or other data that is subject to legal or regulatory compliance requirements.
B. In the event of any other conflict or inconsistency between the terms of this DPA Terms and any other terms in the HASH Customer Agreement, the terms of this DPA shall prevail. The terms of this DPA shall supersede any conflicting provisions with respect to the processing of Customer Personal Data or Professional Services Data.
3. Processing Roles and Responsibilities
A. Roles. You are the Controller of Customer Personal Data, and we are the Processor of that data, unless:
→
You are the Processor of the Customer Personal Data. In that case, HASH is a Subprocessor;→
HASH is an independent Controller processing Customer Personal Data for the purposes listed in Section 3.C of this DPA; or→
Otherwise expressly stated in the specific terms applicable to a particular Online Service in accordance with Section 2.A.
B. Your Processing Instructions to HASH. You instruct HASH to perform the following activities as Processor acting on Your behalf:
→
Provide Online Services by: a. Providing and updating the Online Services as configured and used by You or Your users, and to make ongoing personalized experiences and recommendations; b. Troubleshooting; and c. Keeping Online Services up to date and performant, and enhancing user productivity, reliability, efficacy, quality, privacy, accessibility and security.→
Provide Professional Services by: a. Delivering the Professional Services, including providing technical support, professional planning, advice, guidance, data migration, deployment, and solution/software development services; b. Troubleshooting in connection with Professional Services; and c. Enhancing delivery, efficacy, quality, and security of Professional Services and the underlying product(s) based on issues identified while providing Professional Services, including fixing software defects, and otherwise keeping the Professional Services up to date and performant. 3 . Process Customer Personal Data as set out in: a. Your HASH Customer Agreement; b. Annex I to the Standard Contractual Clauses; and c. any other documented instruction provided by You and acknowledged in writing by HASH as constituting instructions for purposes of this DPA.
C. HASH’s Independent Processing of Data. HASH Processes some Customer Personal Data as an independent Controller. HASH conducts such processing in compliance with Data Protection Requirements generally, and the GDPR specifically, and in a manner consistent with the purposes outlined in the HASH Privacy Statement. Those exhaustive purposes are restated here for transparency and convenience:
→
account, billing, and customer relationship management and related customer correspondence;→
compensation (e.g., calculating employee commissions and partner incentives);→
complying with and resolving legal obligations, including responding to Data Subject requests for Personal Data processed by HASH as Controller (for example website data), tax requirements, agreements, and disputes;→
abuse detection, prevention, and protection, virus scanning, and scanning to detect violations of terms of service and→
creating aggregated statistical data for internal reporting, financial reporting, revenue planning, capacity planning, and forecast modeling (including product strategy).
You agree that HASH may conduct this Processing.
HASH will not use or otherwise process Customer Personal Data for: (a) user profiling, (b) advertising or similar commercial purposes, (c) data selling or brokering, or (d) any other purpose, other than for the purposes set out in this section.
D. Lawfulness of Instructions.
→
It is Your responsibility to ensure that Your Instructions comply with Data Protection Requirements. HASH is not responsible for determining what laws or regulations apply to Your business, or for determining whether HASH’s provision of services meets the requirements of such laws.→
You will ensure that processing Customer Personal Data in accordance with your Instructions will not cause HASH to violate any law or regulation, including Data Protection Requirements.→
HASH will inform you if it becomes aware, or reasonably believes, that Your Instructions violate any applicable law or regulation.
E. Additional Instructions. The parties will agree to additional instructions outside the scope of the HASH Customer Agreement or DPA in writing.
F. Disclosure of Customer Personal Data.
→
HASH will not disclose or provide access to any Customer Personal Data unless it is: a. in accordance with Your Instructions; b. as described in this DPA; or c. required by law, in which case the Additional Safeguards Addendum in Annex IV to the Standard Contractual Clauses will apply.→
HASH will not disclose or provide access to any Customer Personal Data to law enforcement unless required by law or compelled by legal process. Requests by law enforcement for Customer Personal Data will be directed to You where possible.→
HASH will contact You if disclosure of Your Customer Personal Data is compelled and provide a copy of the legal process compelling the disclosure, unless we are legally prohibited from doing so.
G. Data Subject Rights. If HASH receives a request from one of Your Data Subjects pertaining to an Online Service where HASH functions as Your Processor or Subprocessor, HASH will redirect the Data Subject to You. Consistent with the functionality of the Online Services and HASH's role, we will cooperate with You and provide You the necessary means to respond. You are solely responsible for responding to these requests.
4. Security
HASH will implement and maintain appropriate technical and organizational measures and security safeguards as set out in Annex II to the Standard Contractual Clauses. You and HASH shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including as appropriate:
→
A. the pseudonymisation and encryption of Personal Data;→
B. the ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services;→
C. the ability to restore the availability and access to Personal Data in a timely manner in the event of a physical or technical incident; and,→
D. a process for regularly testing, assessing, and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.
5. Audit
Where HASH's Additional Professional Services Terms form part of Your HASH Customer Agreement, or if You are a current customer of HASH Ultra, HASH will provide You with security compliance reporting, such as external SOC2 Type 2 and ISO 27001 audit reports, upon Your request. Should You be required to respond to a regulatory or supervisory request that requires HASH’s participation, and Your obligations cannot reasonably be satisfied with HASH’s standard security compliance reports, HASH will promptly respond to Your additional Instructions and requests for information, in accordance with the following terms and conditions:
→
A. HASH will provide access to relevant knowledgeable personnel, documentation, and application software.→
B. You and HASH will agree in writing upon the scope, timing, duration, control, and evidence requirements.→
C. Unless HASH is otherwise required by law or a supervisory authority of competent jurisdiction, HASH will provide such access:→
if the regulator or supervisory authority uses an independent and accredited third-party audit firm;→
during HASH's regular business hours;→
on 30 days advance written notice; and→
only to Your data and to those HASH systems or facilities involved in the relevant Online Services. Neither You, Your regulators, or Your regulators’ delegates shall have access to any data from HASH’s other customers or to HASH systems or facilities not involved in the Online Services.
→
D. You will compensate HASH for the expenses incurred by our cooperation, including all out-of-pocket costs and reasonable costs and fees for time HASH expends, or services HASH provides, in connection with such cooperation.→
E. Unless prohibited by law from doing so, You will share with HASH any reports, findings, or recommended actions pertaining to HASH.
6. Security Incidents
→
A. If HASH becomes aware of a Security Incident, HASH will without undue delay:→
notify You of the Security Incident, in accordance with the notice provisions in this DPA;→
investigate the Security Incident and provide detailed information about it; and,→
take reasonable steps to mitigate its effects and minimize any resulting damage.
→
B. HASH’s notification of or response to a Security Incident under this section is not an acknowledgement of any fault or liability.→
C. You are solely responsible for complying with Your obligations under any incident notification laws. HASH will assist you to the extent required under applicable law in fulfilling Your obligation to notify the relevant authorities and data subjects.→
D. You must notify HASH promptly about any possible misuse of Your accounts or authentication credentials, or any Security Incident related to an Online Service.
7. Data Transfers and Location
You appoint HASH to transfer Customer Personal Data to the United States or any other country in which HASH or its Subprocessors operate, and to store and process Customer Personal Data to provide the Online Services, subject to the safeguards below and described elsewhere in this DPA.
→
A. HASH may transfer and process Customer Personal Data to and in the United States, to third-party countries (including those outside of the European Economic Area (“EEA”) without an adequacy statement from the European Commission), and to Subprocessors, HASH Affiliates, and our professional advisors. HASH shall ensure that such transfers are made in compliance with Data Protection Requirements and this DPA. If you select and use an Online Service where certain data is stored at rest in a specific geographic area, HASH will store the applicable data based on that instruction.→
B. Any transfer of Customer Personal Data subject to this DPA from member states of the EU, EEA, Switzerland, or the United Kingdom to any countries where the European Commission, the FDPIC, or the UK Information Commissioner's Office has not decided that the third country or more specified sectors within that third country ensures an adequate level of protection, shall be undertaken:→
subject to HASH’s self-certification to the EU-US Data Privacy Framework and, as applicable, the UK Extension to the EU-US Data Privacy Framework, and/or the Swiss-US Data Privacy Framework; and/or→
through the Standard Contractual Clauses.
→
C. For the Standard Contractual Clauses, the Parties agree:→
Controller to Controller Transfers. The SCCs shall apply to Personal Data that is protected by the GDPR and processed in accordance with Section 3.C of this DPA, completed as follows:
→
a. Module One will apply;→
b. in Clause 7, the optional docking clause will apply;→
c. in Clause 11, the optional language will not apply;→
d. in Clause 17, Option 1 will apply, and the New EU SCCs will be governed by the law of Germany; and,→
e. in Clause 18(b), disputes shall be resolved before the courts of Germany.
→
Controller to Processor/Processor to Processor Transfers.** The SCCs shall apply to Personal Data that is protected by the GDPR and processed in accordance with Section 3.B of this DPA, completed as follows:
→
a. Module Two or Module Three will apply (as applicable);→
b. in Clause 7, the optional docking clause will apply;→
c. in Clause 9, Option 2 will apply, and the time period for prior notice of Subprocessor changes shall be as set out in Section 9 of this DPA;→
d. in Clause 11, the optional language will not apply;→
e. in Clause 17, Option 1 will apply, and the EU SCCs will be governed by the law of Germany; and,→
f. in Clause 18(b), disputes shall be resolved before the courts of Germany.
→
Transfers from the UK. In relation to Personal Data that is protected by the UK GDPR, the UK Addendum will apply, completed as follows:
→
a. The SCCs shall also apply to transfers of such Personal Data, subject to sub-section (b) below;→
b. Tables 1 to 3 of the UK Addendum shall be deemed completed with relevant information from the SCCs, completed as set out in Section 7.B.(i)-(ii) of this DPA, and the option “neither party” shall be deemed checked in Table 4; and,→
c. The start date of the UK Addendum (as set out in Table 1) shall be the date of this DPA.
→
Transfers from Switzerland. In relation to Personal Data that is protected by the Swiss DPA, the EU SCCs will apply in accordance with Sections 7.B.(i)-(ii) with the following modifications:
→
a. any references in the EU SCCs to “Directive 95/46/EC” or “Regulation (EU) 2016/679” shall be interpreted as references to the Swiss Federal Data Protection Act;→
b. references to “EU”, “Union”, “Member State” and “Member State law” shall be interpreted as references to Switzerland and Swiss law, as applicable; and,→
c. references to the “competent supervisory authority” and “competent courts” shall be interpreted as references to the FDPIC and competent courts in Switzerland, unless the SCCs as implemented above cannot be used to lawfully transfer such Personal Data in compliance with the Swiss DPA, in which event the Swiss SCCs shall instead be incorporated by reference and form an integral part of this DPA and shall apply to such transfers. Where this is the case, the relevant Annexes of the Swiss SCCs shall be populated using the information contained in Annexes I and II of this DPA.
8. Retention and Deletion
Following the completion of the Services, to the extent that HASH is a Processor and unless prohibited by law, HASH will delete or return all the Customer Personal Data to You, whichever you elect, and delete existing copies in accordance with our retention and deletion policy.
9. Subprocessors
A. HASH may hire Subprocessors of our choosing. The above authorization constitutes Your prior written consent to HASH subcontracting the processing of Personal Data to any Subprocessor on the Subprocessor List.
B. From time to time, HASH may engage new Subprocessors. HASH will give You notice of such engagements by updating the Subprocessor List and providing You with notice of that update by e-mail 30 days before providing that Subprocessor with access to Customer Personal Data.
C. If You do not approve of a new Subprocessor, You may terminate any subscription for the affected Online Services without penalty by providing written notice of termination before the end of the relevant notice period. If the affected Online Service is part of a suite or purchased as part of a bundle, then any termination will apply to the entire suite or bundle.
D. HASH is responsible for our Subprocessors’ compliance with HASH’s obligations in this DPA, and will engage such Subprocessors by written agreements compliant with the requirements of the GDPR governing the use of Subprocessors. HASH will oversee the Subprocessors to ensure that their contractual obligations are met.
10. CCPA
If and to the extent HASH is processing Personal Data within the scope of the CCPA on Your behalf and in accordance with Your documented Instructions, HASH will not:
A. sell the Personal Data as the term “selling” is defined in the CCPA;
B. share, rent, release, disclose, disseminate, make available, transfer, or otherwise communicate orally, in writing, or by electronic or other means, the Personal Data to a third party for cross-context behavioral advertising, whether or not for monetary or other valuable consideration, including transactions for cross-context behavioral advertising in which no money is exchanged;
C. retain, use, or disclose the Personal Data for any purpose other than for the business purposes specified in this DPA and the HASH Customer Agreement, or as otherwise permitted by the CCPA;
D. retain, use, or disclose the Personal Data outside of the direct business relationship with Customer; or
E. combine the Personal Data with personal information that it receives from or on behalf of a third party or collects from California residents, except that HASH may combine Personal Data to perform any business purpose as permitted by the CCPA or any regulations adopted or issued under the CCPA.
11. Resticted Data
11. Restricted Data
A. US Educational Data
→
If You are an educational agency or institution subject to the regulations under the Family Educational Rights and Privacy Act, 20 U.S.C. § 1232g (FERPA), or similar US state student or educational privacy laws (collectively “Educational Privacy Laws”), You shall not provide Personal Data covered by such Educational Privacy Laws to HASH without obtaining HASH’s prior, written, and specific consent expressly reciting HASH’s agreement to accept Personal Data subject to an Educational Privacy Law, and entering into a separate agreement with HASH governing the parties’ rights and obligations with respect to the processing of such Personal Data by HASH in connection with the Online Services.→
Without waiver of the above, or limiting HASH’s remedies in the event of a breach of the above provision, if You breach the above provision by providing HASH any Personal Data covered by FERPA without such a separate agreement, You agree and acknowledge that, for the purposes of this DPA, HASH is a “school official” with “legitimate educational interests” in the Personal Data, as those terms have been defined under FERPA and its implementing regulations. You understand HASH may possess limited or no contact information for Your students and students’ parents. Consequently, You are responsible for obtaining any student or parental consent that may be required by applicable law for any end user’s use of the Online Services and to convey notification on behalf of HASH to students (or a student’s legal guardian when required) of any judicial order or lawfully issued subpoena requiring the disclosure of Personal Data in HASH’s possession as may be required under applicable law.
B. US Criminal Justice Data
Except with HASH’s prior, written, and specific consent, You shall not provide HASH any Personal Data relating to criminal convictions and offenses or Personal Data collected or otherwise processed by Customer subject to or in connection with FBI Criminal Justice Information Services or the related Security Policy.
C. US Healthcare Data
Except with HASH’s prior, written, and specific consent, You shall not provide HASH any Personal Data:
→
constituting protected health information governed by the privacy, security, and breach notification rules issued by the United States Department of Health and Human Services, Parts 160 and 164 of Title 45 of the Code of Federal Regulations, established pursuant to the Health Insurance Portability and Accountability Act of 1996 (Public Law 104-191) or by state health or medical privacy laws; or→
collected as part of a clinical trial or other biomedical research study subject to, or conducted in accordance with, the Federal Policy for the Protection of Human Subjects.
D. Biometric Data
Except with HASH’s prior, written, and specific consent, You shall not provide HASH any Personal Data covered by US state, US federal, or international (non-US) biometric privacy laws or otherwise constituting biometric information including information on an individual’s physical, physiological, biological, or behavioral characteristics or information derived from such information that is used or intended to be used, singly or in combination with each other or with other information, to establish individual identity.
12. Breach
If You believe that HASH is in breach of our obligations under this DPA, you must provide HASH with notice of such breach and HASH shall have 14 business days to cure any such breach.
13. Notices
A. Notices to HASH. You will provide notices to HASH by:
→
The method provided for in Your HASH Customer Agreement; or→
Contacting HASH customer support, or using HASH’s privacy web form located at https://hash.ai/contact, with a copy emailed to HASH’s Data Protection Officer at [email protected] and a copy mailed toHASH c/o Industrious, Eichhornstr. 3, Berlin 10785, Germany(if in the EU) orHASH Privacy, 2109 Broadway #1141, New York, NY 10023, USA(outside the EU).
B. Notices to You. HASH may provide notices to you by:
→
The method provided for in Your HASH Customer Agreement; or→
Any means of notifying Your administrator(s), including email, that HASH selects. It is Your obligation to maintain accurate contact information with HASH, and You will monitor any contact address provided to HASH so that You can receive and respond to such Notices.
DPA Attachment 1
Annex I to the Standard Contractual Clauses (EU/EEA)A. List of Parties
MODULE ONE: CONTROLLER TO CONTROLLER; MODULE TWO: CONTROLLER TO PROCESSOR; MODULE THREE: PROCESSOR TO PROCESSOR.
Data exporter(s) for the above modules:→
Name and contact details: as set out in the Agreement.→
Activities relevant to the data transferred under these Clauses: as set out in the Agreement.→
Signature and date: Annex 1 is deemed to be executed on the date the transfer commenced or the date that the Agreement was executed, whichever is earlier.→
Role:MODULE ONE: CONTROLLER,MODULE TWO: CONTROLLER,MODULE THREE: PROCESSOR
→
Name and contact details: as set out in the Agreement.→
Activities relevant to the data transferred under these Clauses: as set out in the Agreement.→
Signature and date: Annex 1 is deemed to be executed on the date the transfer commenced or the date that the Agreement was executed, whichever is earlier.→
Role:MODULE ONE: CONTROLLER,MODULE TWO: PROCESSOR,MODULE THREE: (SUB)PROCESSOR
B. Description of Transfer
MODULE ONE: CONTROLLER TO CONTROLLER; MODULE TWO: CONTROLLER TO PROCESSOR; MODULE THREE: PROCESSOR TO PROCESSOR.
Categories of data subjects whose personal data is transferred:Data subjects include the data exporter’s representatives and end-users including employees, contractors, collaborators, and customers of the data exporter. Data subjects may also include individuals attempting to communicate or transfer personal data to users of the services provided by data importer. HASH acknowledges that, depending on Customer’s use of the Online Service or Professional Services, Customer may elect to include personal data from any of the following types of data subjects in the personal data:
→
Employees, contractors, and temporary workers (current, former, prospective) of data exporter;→
Data exporter’s collaborators/contact persons (natural persons) or employees, contractors, or temporary workers of legal entity collaborators/contact persons (current, prospective, former);→
Users and other data subjects that are users of data exporter’s services;→
Partners, stakeholders, or individuals who actively collaborate, communicate, or otherwise interact with employees of the data exporter and/or use communication tools such as apps and websites provided by the data exporter.
The personal data transferred that is included in e-mail, documents, and other data in an electronic form in the context of the Online Services or Professional Services. HASH acknowledges that, depending on Customer’s use of the Online Service or Professional Services, Customer may elect to include personal data from any of the following categories in the personal data:
→
Basic personal data (for example place of birth, street name and house number (address), postal code, city of residence, country of residence, mobile phone number, first name, last name, initials, email address, gender, date of birth);→
Authentication data (for example username, password or PIN code, security question, audit trail);→
Contact information (for example addresses, email, phone numbers, social media identifiers; emergency contact details);→
Pseudonymous identifiers;→
Device identification (for example IMEI-number, SIM card number, MAC address); or→
Any other personal data identified in Article 4 of the GDPR.
HASH does not request or otherwise ask for sensitive data and receives such data only if and when customers or data subjects decide to provide it.
The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis):Continuous as part of the Online Services or Professional Services.
Nature of the processing:The personal data transferred will be subject to the following basic processing activities:
→
Duration and Object of Data Processing. The duration of data processing shall be for the term designated under the applicable HASH Customer Agreement between data exporter and the data importer. The objective of the data processing is the performance of Online Services and Professional Services.→
Personal Data Access. For the term designated under the applicable HASH Customer Agreement, data importer will, at its election and as necessary under applicable law, either: (1) provide data exporter with the ability to correct, delete, or block personal data, or (2) make such corrections, deletions, or blockages on its behalf.→
Data Exporter’s Instructions. For Online Services and Professional Services, data importer will only act upon data exporter’s instructions and the Agreement.
The scope and purpose of processing personal data is described in DPA Sections 2 and 3 on Scope and Processing Roles. Processing may take place in any jurisdiction where data importer or its subprocessors operate such facilities in accordance with Section 7 on Data Transfers and Locations.
The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period:Upon expiration or termination of data exporter’s use of Online Services or Professional Services, it may extract personal data and data importer will delete personal data, each in accordance with the DPA terms applicable to the agreement.
For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing:In accordance with the DPA, the data importer may hire other companies to provide limited services on data importer’s behalf, such as providing customer support. Any such subcontractors will be permitted to obtain personal data only to deliver the services the data importer has retained them to provide, and they are prohibited from using personal data for any other purpose. Unless a particular subcontractor is replaced ahead of time, the processing will be for the term designated under the applicable HASH Customer Agreement between data exporter and data importer.
C. Competent Supervisory Authority
MODULE ONE: CONTROLLER TO CONTROLLER; MODULE TWO: CONTROLLER TO PROCESSOR; MODULE THREE: PROCESSOR TO PROCESSOR.
The supervisory authority with responsibility for ensuring compliance by the data exporter with Regulation (EU) 2016/679.
DPA Attachment 2
Annex II to the Standard Contractual Clauses (EU/EEA)A. Technical & Organizational Measures
TECHNICAL AND ORGANIZATIONAL MEASURES INCLUDING THOSE TO ENSURE THE SECURITY OF THE DATA Description of the technical and organizational measures implemented by the data importer(s) (including any relevant certifications) to ensure an appropriate level of security, taking into account the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons:→
Data Security Certifications. Data importer is currently preparing to be audited for the following data security certifications:
→
SOC 2 Type II; and,→
ISO 27001:2022.
→
Personnel. Data importer’s personnel will not process personal data without authorization. Personnel are obligated to maintain the confidentiality of any such personal data and this obligation continues even after their engagement ends.→
Data Privacy Contact. The data privacy officer of the data importer can be reached at [email protected] and the following addresses:HASH c/o Industrious, Eichhornstr. 3, Berlin 10785, Germany(in the EU) orHASH Privacy, 2109 Broadway #1141, New York, NY 10023, USA(outside the EU).→
Technical and Organization Measures. HASH implements and maintains the technical and organizational measures and security safeguards listed in Table 1 below for processing Customer Personal Data on behalf and in accordance with Customer Instructions in connection with the Online Services. These measures in conjunction with the security commitments in this DPA are HASH's only responsibility with respect to the security of that data.→
Vendor management program - third-party risk program. The data importer has a vendor risk assessment process, vendor contract clauses and additional data protection agreements with vendors. Vendors undergo reassessment when a new business use case is requested. The data importer’s vendor risk program is structured so all of data importer’s vendors’ risk assessments are refreshed two years from the last review date. Vendors deemed high risk, such as data center providers or other vendors storing or processing data in scope for the data importer’s regulatory or contractual requirements, undergo reassessment annually.
| Domain | Practices |
|---|---|
| Organization of Information Security | Security Ownership HASH has appointed one or more security officers responsible for coordinating and monitoring the security policies and procedures. Security Roles and Responsibilities. HASH personnel with access to Customer Data and Personal Data are subject to confidentiality obligations. Risk Management Program. HASH performs an annual risk assessment. HASH retains its security documents pursuant to its retention requirements after they are no longer in effect. Vendor Management. HASH has a vendor risk assessment process, vendor contract clauses and additional data protection agreements with vendors. |
| Asset Management | Asset Inventory. HASH maintains an inventory of all media on which Customer Data and Personal Data is stored. Access to the inventories of such media is restricted to HASH personnel authorized to have such access. Asset Handling:
|
| Human Resources Security | Security Training. HASH requires all new hires to complete security and privacy awareness training as part of initial on-boarding. Participation in annual training is required for all employees to provide a baseline for security and privacy basics. |
| Physical and Environmental Security | Physical Access to Facilities. HASH limits access to facilities where information systems that process Customer Data and Personal Data are located to identified authorized individuals. Physical Access to Components. HASH maintains records of the incoming and outgoing media containing Customer Data, including the kind of media, the authorized sender/recipients, date and time, the number of media and the types of Customer Data and Personal Data they contain. Protection from Disruptions. HASH uses a variety of industry standard systems to protect against loss of data due to power supply failure or line interference. Component Disposal. HASH uses industry standard processes to delete Customer Data and Personal Data when it is no longer needed. |
| Communications and Operations Management | Operational Policy. HASH maintains security documents describing its security measures and the relevant procedures and responsibilities of its personnel who have access to Customer Data. Data Recovery Procedures:
Data Beyond Boundaries:
|
| Access Control | Access Policy. HASH maintains a record of security privileges of individuals having access to Customer Data. Access Authorization:
|
| Information Security Incident Management | Incident Response Process:
|
| Business Continuity Management |
|
DPA Attachment 3
Annex III Standard Contractual Clauses (EU/EEA): List of SubprocessorsMODULE ONE: CONTROLLER TO CONTROLLER; MODULE TWO: CONTROLLER TO PROCESSOR; MODULE THREE: PROCESSOR TO PROCESSOR.
The Parties rely on general authorization under Clause 9a of the Standard Contractual Clauses (EU/EEA). The list of Subprocessors can be found on the HASH website at https://trust.hash.ai/subprocessors or a successor location.
DPA Attachment 4
Annex IV to the Standard Contractual Clauses (EU/EEA): Additional Safeguards AddendumThis Addendum to the Standard Contractual Clauses (“Addendum”) by HASH provides extra safeguards and redress for data subjects linked to Customer's personal data. It supplements but does not modify the Standard Contractual Clauses.
I. Challenges to Orders: If HASH receives an order demanding disclosure of personal data transferred under the Standard Contractual Clauses, HASH will:
→
Redirect the third party to request data from the Customer;→
Inform the Customer unless legally prohibited, striving to waive this prohibition;→
Challenge the disclosure order legally.
II. Indemnification of Data Subjects: HASH shall indemnify a data subject for damages caused by HASH's disclosure of their data in response to an order from a non-EU/EEA government body.
→
No Obligation to Indemnify: i. If the data subject has already received compensation for the same damage, HASH has no obligation to indemnify. ii. If HASH can prove the disclosure did not violate Chapter V of the GDPR, HASH has no obligation to indemnify.→
Conditions of Indemnification: Indemnification depends on the data subject proving that: i. HASH disclosed the data; ii. This led to an official proceeding against them; and iii. The disclosure directly caused damage.→
Scope of Damages: Indemnification covers only damages defined in the GDPR, excluding consequential and other damages not due to HASH’s GDPR infringement.
III. Exercise of Rights: Data subjects can enforce their rights under this Addendum against HASH irrespective of any restrictions in the Standard Contractual Clauses. Claims must be individual, not part of a collective action, and are non-transferable.
IV. Notice of Change: HASH warrants that the current legislation to which it is subject allows it to fulfill obligations under this Addendum and the Standard Contractual Clauses. If a legal change affecting these obligations occurs, HASH will notify the Customer, who can then suspend data transfer or terminate the contract.
V. Termination: This Addendum ends if a different lawful transfer mechanism is approved that covers the data transfers of the Standard Contractual Clauses, and doesn't require these additional safeguards.
Create a free account
Sign up to try HASH out for yourself, and see what all the fuss is about
By signing up you agree to our terms and conditions and privacy policy