Career Hub

Data processing agreement

Data processing agreement

This Data Processing Agreement, including Appendices, (“DPA”) is incorporated into and forms part of the Agreement between Customer and Career Hub, Inc. (hereafter “Career Hub”).

Scope

This DPA between Customer, and if applicable, Customer’s Affiliates, and Career Hub contains the legal terms and conditions that apply to the processing of End User Data, which may include personal data, by any of the Services.

Definitions

The following definitions apply throughout this DPA:

Terms used in this DPA that are specifically defined in the GDPR shall have the same meaning as set forth in the GDPR. Terms used in this DPA that are not specifically defined in the GDPR shall have the same meaning as set forth in the Agreement.

Responsibilities of processing personal data as a processor

To the extent Career Hub processes personal data on behalf of Customer as a processor (as defined by applicable Data Protection Laws), Career Hub shall do so only on documented instructions from Customer pursuant to this DPA and the Agreement, to operate the Services, and as permitted or required by applicable law. Such instructions may include the configuration of the Product by the Customer. Career Hub shall immediately inform Customer if, in its opinion, an instruction infringes applicable Data Protection Laws.

Details of personal data being processed

Processing of end user data

Career Hub shall process and retain all personal data processed on behalf of the Customer, including but not limited to Customer data, Candidate data, End User data, and any other data subjects under the Customer’s control, no longer than necessary for the purposes for which it is processed. Upon termination of this DPA or the Agreement, Career Hub shall: (i) delete personal data that is no longer necessary to carry out any of the purposes under this DPA or the Agreement; or (ii) upon Customer’s request, provide options to return or erase, destroy, and render unrecoverable all such personal data, where reasonably possible and in compliance with applicable law. This obligation applies to all personal data processed by Career Hub as Data Processor, including data contained within test results or other outputs generated during service delivery.

Compliance with laws

The parties shall process personal data in accordance with applicable Data Protection Laws. Customer represents and warrants that its use of the Services, its authorization for Career Hub’ access to and any related submission of data, including any Customer personal data, to Career Hub, complies with all applicable laws, including those related to data privacy, data security, electronic communication and the export of technical, personal or sensitive data.

PCI compliance

Career Hub is not a payment processor and as such is not subject to compliance with PCI standards. However, Career Hub acknowledges that credit card information may be provided by Customer during the performance or use of the Services and therefore Career Hub shall use information data security controls that are compliant with PCI standards.

Limitation of liability

This DPA does not modify Career Hub’ liability, whether in contract, tort or under any other theory of liability, towards the Customer based on other terms in force between the Customer and Career Hub.

Conflict of terms

In the event of a conflict between the terms of this DPA and other terms in force between the Customer and Career Hub, the terms of this DPA shall prevail with regard to data processing activities.

Appendix 1 to DPA: List of Subprocessors

Subprocessor       Data Description                             Country

Hostinger           Candidate personal Data            EU (Germany) (DPA in place)

Digital Ocean      Tokenized Assessment Log            India (DPA in place)

Mailgun                Mailer Service                                USA (DPA in place)

Appendix 2 to DPA: Information Security Measures

1. Scope

Taking into account the nature, scope, context, and purposes of processing, the state of the art, the costs of implementation, as well as the risk of varying likelihood and severity of the rights and freedoms of natural persons, this document describes the technical and organizational measures that Company has in place and that will be implemented to secure Personal Data, End User Data, and Systems Data (collectively, “Data”) by any Company Product (“Measures”).

2. Definitions

“Agreement” means any underlying Company’ End User Agreement, Order Form, Engagement Letter, Statements of Work, or other legally entered and binding written, or electronic agreement entered into between Company and Customer that governs the provision of Products by Company.

“End User Data” means data that is provided by or on behalf of Customer to Company during the relationship governed by the Agreement. For the avoidance of doubt, End User Data does not include Systems Data.

“Personal Data” means any information Processed on behalf of the Customer during the provision of a Product that (i) relates to an identified or identifiable natural person; or (ii) is defined as “personally identifiable information”, “personal information”, “personal data” or similar terms, as such terms are defined under Data Protection Laws, including as may be used in this DPA.

“Product” means, collectively, Hardware, Software, Subscription, or any combination thereof, regardless of whether or not the Product was procured under an Enterprise Program.

“Systems Data” means data generated and/or collected in connection with Customer’s use of the Products, such as logs, session data, telemetry data, support data, usage data, threat intelligence or actor data, statistics, aggregated data, net flow data, copies of potentially malicious files detected by the Product, and derivatives thereof.

3. Security Management

3.1. Security Program

The company maintains a written information security program that:

3.2. Personnel Security

4. Due diligence on sub-contractors

4.1. Company will:

5. Logical security

5.1. Systems Access Control and Network Access Control

5.2. Telecommunication and Network Security

5.3. Malicious Code Protection

5.4. Data Loss Prevention

6. Software development and maintenance

6.1. Open Source

6.2. Change Management

6.3. Vulnerability Management and Application Security Assessments

7. Storage, handling and disposal

7.1. Data Segregation

Company physically or logically separates and segregates Personal Data and End User Data from its other customers’ data.

7.2. Encryption of Electronic Form Data

Company utilizes strong industry standard encryption algorithms and key strengths (i.e., AES 256-bit at rest, TLS v1.2 in transit) to encrypt all Personal Data and End User Data in electronic form while in transit over all public wired networks (e.g., Internet) and all wireless networks.

8. Business continuity and disaster recovery

8.1. Company develops, implements, and maintains a business continuity management program to address the needs of the business and Products provided to the Customer. To that end, Company completes a minimum level of business impact analysis, crisis management, business continuity, and disaster recovery planning:

8.2. Plan Content

Company’ plan documentation under 9.1 addresses actions that Company will take in the event of an extended outage of service. Company ensures that its plans address the actions and resources required to provide for (i) the continuous operation of Company, and (ii) in the event of an interruption, the recovery of the functions required to enable Company to provide the Products, including required systems, hardware, software, resources, personnel, and data supporting these functions.