Skytap, Inc. Omnibus General Data Protection Addendum
Last updated January 08, 2024
Skytap, Inc. Omnibus General Data Protection Addendum
This Omnibus General Data Protection Addendum (“Addendum”) is between: (i) Customer (“Customer, “Controller”) acting on its own behalf and as agent for each Controller Affiliate; and (ii) Skytap, Inc. (“Processor”) acting on its own behalf and as agent for each Processor Affiliate. This Addendum applies to each agreement between Processor (or any Processor Affiliate) and Controller (or any Controller Affiliate) under which Processor actually Processes Personal Data as part of performing under that agreement (“Agreement”), and the Addendum applies and is effective only if, under GDPR (defined below), Controller qualifies as a Data Controller and Processor qualifies as a Data Processor for Controller, in which case the Addendum then is incorporated into and is made a part of the Agreement effective when Processor processes Controller Personal Data (“Addendum Effective Date”).
This Addendum modifies and supplements the terms and conditions in the Agreement as they relate to Skytap’s Processing of Customer Personal Data and compliance with Data Protection Law. The terms used in this Addendum will have the meanings set forth in this Addendum. Capitalized terms not otherwise defined herein will have the meaning given to them in the Agreement. Except as modified below, the terms of the Agreement will remain in full force and effect.
Contact Information
Data Controller: Signatory to the Agreement between the parties
Data Processor: Skytap, Inc. | 255 South King Street, Ste 800, Seattle, WA, 98104 | +1 (206) 866-1162
Term
Expiration Date: Coterminous with the Agreement
1. DEFINITIONS
1.1 “Controller/Customer Personal Data” means any Personal Data provided by or on behalf of Controller/Customer to Processor under or pursuant to the Agreement or otherwise made available to, or collected as authorized pursuant to the Agreement, and as required for Processor in providing its services to the Controller under the Agreement. For the avoidance of any doubt, Customer Personal Data does not include any Personal Data for which Skytap is a data controller as defined by GDPR and this Addendum.
1.2 “CCPA” means The California Consumer Privacy Act, codified at Cal. Civ. Code §1798.100 et seq., as amended by the “California Privacy Rights Act“ or “CPRA”, and as may be further amended, and any final implementing regulations promulgated by the California Privacy Protection Agency and the State of California Department of Justice Office of The Attorney General.
1.3 “Commercial Purposes” has the meaning given to it under CCPA, which may be changed by amendment.
1.4 “Consumer” a resident of California to whom Personal Information under CCPA relates.
1.5 “Data Controller” or “Controller” means the entity which determines the purposes and means of the Processing of Personal Data.
1.6 “Data Processor” or “Processor” means the entity that Processes Personal Data on behalf of and on the instructions of the Data Controller, and that is bound by this Addendum.
1.7 “Data Subject” means the identified or identifiable person to whom Personal Data relates.
1.8 “Data Protection Legislation” means the (a) Data Protection Act 1998, the EU Data Protection Directive 95/46/EC, the Regulation of Investigatory Powers Act 2000, the Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 (SI 2000/2699), the Electronic Communications Data Protection Directive 2002/58/EC, the Privacy and Electronic Communications (EC Directive) Regulations 2003, GDPR, UK GDPR, and all applicable laws and regulations relating to processing Personal Data and privacy to the extent they are still in force, including where applicable the guidance and codes of practice issued by the Information Commissioner, and (b) CCPA as amended by CPRA.
1.9 “GDPR” means the Regulation (EU) 2016/679 of the European Parliament and of the Council of the 27 April 2016 on the protection of natural persons with regards to the processing of personal data and on the free movement of such data as applicable as of 25 May 2018, as may be amended from time to time. For convenience, references to GDPR also will refer to the UK General Data Protection Regulation (“UK GDPR”) as appropriate where these two forms of distinct and potentially applicable Data Protection Legislation are substantially the same.
1.10 “Personal Information” has the meaning given to it under CCPA and that is provided by or on behalf of Customer to the Data Processor under or pursuant to the Agreement or otherwise made available to, or collected by, the Data Processor as required to provide its services to the Customer under the Agreement. Personal Information does not include Aggregate Consumer Information or Deidentified information as defined under CCPA.
1.11 “Processing” or “Process” means any operation or set of operations which is performed on Regulated Data or on sets of Regulated Data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.
1.12 “Regulated Data” means both of Personal Information under CCPA and Customer Personal Data under GDPR.
1.13 “Security Incident” means unauthorized acquisition, access, use or disclosure of Controller Regulated Data.
1.14 “Sub-Processor” means another Data Processor engaged by Processor for carrying out processing activities in respect of the Regulated Data on behalf of Processor.
2. GENERAL
2.1 Each party will comply with Data Protection Legislation with regards to the processing of Regulated Data under the Agreement and this Addendum. Moreover, Skytap will receive and process the Regulated Data of Customer only on and in accordance with lawful instructions from the Customer.
2.2 The parties acknowledge and agree that with regard to the Processing of Customer Personal Data, Customer is the Contr>ler, Skytap is the Processor and that Skytap will engage Sub-Processors pursuant to Section 5 below.
2.3 As Data Processor in respect of the Customer Personal Data processed under the Agreement and this Addendum, Skytap will:
2.3.1 process the Customer Personal Data only to the extent, and in such manner as is necessary for, the provision of services to the Customer;
2.3.2 inform the Customer of any legal requirement under any applicable law that would require Skytap to process the Customer Personal Data other than the processing instructions, or if any Customer instruction infringes with applicable Data Protection Legislation; and
2.3.3 ensure any Sub-Processor that has access to Customer Personal Data from Skytap will comply with Skytap’s obligations under this Addendum.
2.4 The scope, purpose and duration of Customer Personal Data and Processing (including the type of Personal Data, categories of Data Subjects and security details) covered by the Agreement and this Addendum is set out in Schedule 1 of this Addendum.
2.5 This Addendum and the Agreement are Customer’s complete and final instructions to Skytap for the Processing of Customer Personal Data. Any additional or alternate instructions must be agreed upon separately and in writing by both the Customer and Skytap.
2.6 To the extent the Data Processor processes any Personal Information under the Agreement, the Data Processor shall comply with the requirements of a “Service Provider” under CCPA including but not limited to the following requirements.
2.6.1 Service provider appointment:Customer is a Business and appoints Skytap as its Service Provider to receive and process the Personal Information for the Business Purpose. Skytap acknowledges that it does not receive Personal Information as consideration for any services provided to Customer. Skytap is responsible for: (i) compliance with its obligations under this Addendum, (ii) for compliance with its obligations as a Service Provider under the CCPA and (iii) shall provide the same level of privacy protection as required by the CCPA. Skytap shall notify Customer if it reasonably determines that it cannot meet its obligations under the CCPA, and in such circumstances, and upon providing notice to Skytap, Customer shall be entitled to take reasonable and appropriate steps to remediate unauthorized use of Personal Information. Customer is responsible for compliance with its own obligations as a Business under the CCPA and shall ensure that it has provided notice and obtains any required consents and rights necessary under CCPA for Skytap to receive and process the Personal Information for the Business Purpose.
2.6.2 Business purpose:Skytap shall only receive and process Personal Information of the Customer as a Service Provider upon lawful documented instructions from Customer, including those in the Agreement, this Addendum, and Customer’s configuration of the Services or as otherwise necessary to provide the Services (the “Business Purpose“). Skytap must not process the Personal Information for any purpose other than for the Business Purpose, except to the extent CCPA otherwise permits.
2.6.3 Service provider certification:Skytap shall not: (a) Sell or Share the Personal Information; (b) retain, use, or disclose the Personal Information for any purpose other than for the Business Purpose, including to retain, use, or disclose the Personal Information for a Commercial Purpose other than providing its Services under the Agreement unless permitted by the CCPA; (c) retain, use, or disclose the Personal Information outside of the direct business relationship between the Skytap and Customer; (d) process the Personal Information for targeted and/or cross context behavioral advertising; (e) combine Personal Information with any other data if and to the extent this would be inconsistent with the limitations on service providers under the CCPA or other laws. Skytap certifies that it understands the restrictions set out in this Section 2.6 and otherwise in the Addendum and will comply with them.
2.6.4 Consumer’s rights: Skytap will, upon Customer’s instructions (and at Customer’s expense): (a) use reasonable efforts to assist Customer in deleting Personal Information in accordance with a Consumer’s request (and shall instruct any service providers it has appointed to do the same) except where and to the extent permitted to retain the Personal Information pursuant to an exemption under the CCPA and/or the CPRA; and (b) use reasonable efforts to assist Customer in responding to verified Consumer requests received by Customer to provide information as it relates to the collection of Personal Information for the Business Purpose.
2.6.5 Assistance: Skytap will, upon Customer’s instruction and upon proof of such a communication, provide reasonable assistance to Customer to enable Customer to respond to any correspondence, enquiry or complaint received from a Consumer, the California Attorney General and/or the California Privacy Protection Agency in connection with the Collection and processing of the Personal Information.
2.6.6 Security and Security Incidents. Skytap shall implement and maintain reasonable security procedures and practices appropriate to the nature of the Personal Information it will process to protect the Personal Information from and against a Security Incident in line with Skytap’s then-current security policy. Skytap shall notify Customer without undue delay (and in time to fulfil any Security Incident reporting obligations) after becoming aware of a Security Incident and provide timely information relating to the Security Incident as it becomes known or is reasonably requested by Customer.
2.6.7 Monitoring. To the extent required by the CCPA, Customer may take reasonable and appropriate steps to help ensure that the Personal Information is Processed by Skytap in a manner consistent with Customer’s obligations under the CCPA. Customer may audit Skytap’s compliance with the terms of this Addendum in the manner set out in this Addendum once annually. Customer may elect to perform such an audit on its own behalf or pursuant to a formal direction or request for information from the California Privacy Protection Agency. Customer must send Skytap notice in writing of a request to conduct an audit. Once requested by Customer, subject to the confidentiality obligations set forth in the Agreement, Skytap shall make available to Customer (or Customer’s independent third-party auditor) information regarding Skytap’s compliance with the obligations set forth in this Addendum, which the parties agree may be in the form of the third-party certifications and audits that Skytap receives and maintains. Upon review of such materials, If Customer identifies areas that have not been covered that it is lawfully permitted to audit under this Addendum, then Customer may submit reasonable requests for information security and audit questionnaires that are necessary to confirm Skytap’s compliance with this Addendum, provided that Customer shall not exercise this right more than once per year.
2.6.8 Subcontractors. Customer agrees that Skytap may engage third party subcontractors to process Personal Information in connection with the provision of the Services. Skytap shall enter into written agreements with such subcontractors that contain substantially similar obligations as this Addendum. Provided that Customer signs up for notifications at using the process described in Section 5.2 related to GDPR Sub-Processor notifications.
3. CUSTOMER RESPONSIBILITIES
3.1 Customer is the sole Controller of Customer Personal Data or has been instructed by, and obtained the authorization of, the relevant Controller(s) to agree to the Processing of Customer Personal Data by Skytap, as set out in this Addendum.
3.2 Customer will, in its use of the Services, process Customer Personal Data in accordance with the requirements of Data Protection Laws and Regulations. Customer will have sole responsibility for the accuracy, quality, and legality of Customer Personal Data and the means by which Customer acquired Customer Personal Data prior to uploading such Personal Data for Skytap to Process.
3.3 Customer acknowledges that it is responsible for properly implementing access and use controls and configuring certain features and functionalities of Skytap that Customer may elect to use and in such manner that Customer deems adequate to maintain appropriate security, protection, deletion, and backup of Customer Personal Data.
4. SECURITY
4.1 Skytap will implement and maintain, at its cost and expense, appropriate technical and organizational measures in relation to its processing of Customer Personal Data so as to ensure a level of security in respect of Customer Personal Data processed by it is appropriate to the risks that are presented by the processing, including from accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Personal Data transmitted, stored or otherwise processed.
4.2 With respect to any Security Incident involving Customer Personal Data, Skytap will, in accordance with Art. 28 paragraph 3 of GDPR, provide Customer with a) a description of the security incident and the approximate amount of data subjects and datasets involved, b) name and contact of a contact person for further information, c) a description on the probable consequences of the incident, and d) a description of the measures taken in order to remedy or reduce the incident.
4.3 Skytap will take reasonably appropriate measures to ensure that its personnel processing Customer Personal Data are subject to equivalent terms protecting Customer Personal Data, including training specific to the GDPR requirements.
5. SUB-PROCESSORS
5.1 Customer authorizes Skytap to engage another entity (a “Sub-Processor”) to perform specific processing activities in respect to the Customer Personal Data.
5.2 To receive Skytap’s current list of Sub-Processors and/or notifications of changed or new Sub-Processors, Customers may email subprocessors+subscribe@skytap.com with the subject “Subscribe.” Once Customer is subscribed, Skytap will provide Customer with advance notice of any changed or new Sub-Processors in connection with the provision of the applicable Services.
5.3 Where and to the extent Customer is established within the European Economic Area, Switzerland, the United Kingdom, or where otherwise required by Data Protection Laws and Regulations applicable to Customer, Customer may reasonably object to the use of a new Sub-Processor (e.g., if making Customer Personal Data available to the Sub-Processor may violate applicable Data Protection Law or weaken the protections for such Customer Personal Data) by providing written notification to Skytap within 10 days of receiving notice per Section 5.2 above. Customer must include the reasonable grounds for the objection. In the event Customer objects to a new Sub-Processor, Skytap will use commercially reasonable efforts to make available to Customer a change in the Services or recommend a commercially reasonable change to Customer’s configuration or use of the Services, to avoid Processing of Customer Personal Data by the objected-to new Sub-Processor without unreasonably burdening Customer. If Skytap is unable to make available such change within a reasonable period of time, either party may terminate the Services which cannot be provided by Skytap without the use of the objected-to new Sub-Processor. Such notice of termination by Customer must be made in writing to Skytap. If Skytap determines that Customer’s objection was reasonable and in good faith, Skytap will refund Customer a prorated portion of pre-paid charges for remainder of the term Customer’s subscription under the Agreement following the effective date of termination.
5.4 Skytap will remain liable to the Customer for the Sub-Processor’s performance, as well as for any acts or omissions of the Sub-Processor regarding its processing of Customer Personal Data, to the same extent Skytap would be liable if performing the Services of the Sub-Processor directly under the terms of this Addendum.
6. OTHER OBLIGATIONS
6.1 Skytap will forward to the Customer and otherwise cooperate with and assist the Customer with any requests received from Data Subjects of any Customer Personal Data under GDPR (i.e., “Data Subject Access Request”) or Consumers under CCPA (e.g., “Right to Know”) of any Regulated Data (generally referred to together in this Section 6 as, “Regulated Data Access Request”. Business Provider will specifically perform the following.
6.2 Skytap will provide reasonable assistance, information and cooperation to the Customer to ensure compliance with the Customer’s obligations under Data Protection Legislation in relation to the processing of Customer Personal Data under the Agreement and this Addendum. This includes assistance with any data protection impact assessments and consultations with (or notifications to) relevant data protection regulators.
6.3 Upon Customer’s written request at reasonable intervals, Skytap will make available to the Customer such information as is reasonably required by the Customer to demonstrate Skytap’s compliance with its obligations under Data Protection Legislation and this Addendum.
6.4 Pursuant to GDPR, Skytap will permit audits at reasonable intervals conducted by the Customer, or another auditor mandated by the Customer, solely for demonstrating Skytap’s compliance with its obligations under Data Protection Legislation and this Data Protection Addendum. This will be subject to the Customer giving Skytap reasonable prior notice of such audit and/or inspection and ensuring that any auditor is subject to binding obligations of confidentiality, is not a competitor of Skytap, and that such audit or inspection is undertaken so as to cause minimal disruption to Skytap’s business.
6.5 Skytap will, without undue delay, at the Customer’s request, either securely delete or return all the Customer Personal Data to the Customer at the end of the Agreement and this Addendum, or if earlier, as soon as processing by Skytap of any Customer Personal Data is no longer required for Skytap’s performance of its obligations under the Agreement, and securely delete existing copies (unless retention of any data is required by applicable law).
7. INTERNATIONAL DATA TRANSFERS
7.1 If Customer is established with the European Economic Area, Switzerland, the United Kingdom, or where otherwise required by Data Protection Laws and Regulations, Customer acknowledges that Skytap will transfer Customer Personal Data outside of the EEA or UK as applicable for Processing. Skytap is certified and registered under the EU (and by extension the UK) Data Privacy Framework (“EU/UK DPF”).
7.2 If for any reason the EU/UK DPF cannot legally be employed as a mechanism for governing restricted transfers between the parties, the parties also will enter into the standard SCCs with Modules 1-3 for Controller-to-Controller, Controller-to-Processor, and Processor-to-Subprocessor EU Model Clauses, UK addendum and Swiss addendum, all of which can be provided on request to legal@skytap.com as the “SCC Addendum”.
The parties agree that other than as set out herein, all other terms of any Agreement remain in force. In the event of any discrepancy between this Addendum and the remainder of the Agreement, the terms of this Addendum shall prevail.
Schedule 1: Data Processing Details
1) Subject-matter, nature and purpose of the Processing:
Skytap provides self-service public cloud infrastructure services to enterprise customers, also known as Infrastructure as a Service (IaaS). Upon contracting for services, Skytap provisions the Customer an account in the Customer’s chosen geographic region and provides login credentials for the Customer Primary Administrator to use a web portal and/or programmatically via REST API based on Personal Data provided by the Customer. Skytap manages the application infrastructure it provisions. The Customer is responsible for provisioning and managing additional user accounts for their Skytap Cloud instance, as well as the workloads running on the cloud infrastructure provided by Skytap, i.e., Skytap does not manage the Customer’s workloads, nor any data stored within them.
2) Duration of Processing:
Processing of the Customer Personal Data by Skytap will be for the term of the Agreement of for provision of the Services, provided that Customer Personal Data will not be Processed for longer than is necessary for the purpose for which it was collected or is being Processed (except where a statutory exception applies).
3) Customer Personal Data in Scope:
Skytap collects only the minimal personal information necessary to provision accounts, provide the services of Skytap Cloud, and provide audit capabilities to Skytap Cloud customers: User First/Last Names, Usernames/IDs, Email Addresses, Login Credentials, IP Addresses, Browser Type, Machine OS (via browser user agent), Employer (Customer association), User Region/Location (via IP Address).
As the Customer is responsible for provisioning and managing additional user accounts for their Skytap Cloud instance, as well as the workloads running on the cloud infrastructure provided by Skytap, i.e., Skytap does not manage the Customer’s workloads, nor any data stored within them. As Skytap does not have visibility into and relies on the Customer for any access to such workloads and data processed therein, Skytap does not know what Personal Data is in scope.
4) Technical and Organizational Measures for Customer Personal Data in Scope:
Description of the technical and organizational measures implemented by the Skytap (including any relevant certifications) to ensure an appropriate level of security, taking into account the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons.
Skytap is Certified pursuant to SOC 2 and ISO 27001. On executing a customary confidentiality agreement (NDA), Importer will provide its most recent audit reports to Exporter.
Technical and Organisational Measures |
Skytap Controls |
Measures of pseudonymisation and encryption of personal data |
Skytap follows industry standard practices regarding encrypting data in transit and at rest. Skytap systems use encryption to protect transmitted records and files containing data that will travel across public networks, with encryption at a strength that is commercially reasonable given the nature of the data transmitted and the transmission method(s). Skytap requires that systems used to process sensitive data, including personally identifiable information (PII), passwords, account information, etc., support encryption when in transit on the network and implement industry-standard practices regarding encryption of sensitive data stored at rest. Encryption use and applicable encryption standards are documented. The encryption strength of confidential information in transmission is defined. Cryptographic key management procedures are documented and automated. Products or solutions are deployed to keep the data encryption keys encrypted. |
Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services |
Skytap continuously gathers and analyses information regarding new and existing threats and vulnerabilities, actual attacks on the organisation or others, and the effectiveness of the existing security controls. Monitoring controls include related policy and procedures, virus and malicious code detection, intrusion prevention and detection, and event and system health and state monitoring. Related logging process provides an effective control to highlight and investigate security events. Robust controls are implemented over Skytap communication networks to safeguard data, tightly control access to network devices through management approval and subsequent audits, disable remote communications if no business need exists, log and monitor remote access, secure remote access devices, and use strong authentication and encryption to secure communications. Defined Access Control Lists (ACLs) to restrict traffic on routers and/ or firewalls are reviewed and approved by network administrators. IP addresses in the ACLs are specific and only authorised devices connect to the Skytap internal networks. Firewall management processes are documented. All changes firewalls are performed via documented change management processes. Firewall access is restricted to a small set of authorized. Periodic network vulnerability scans are performed, and any critical vulnerabilities identified are promptly remediated. |
Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident |
Protections against fire and power outages are implemented in data centers and include offsite backups. Effective controls are in place to protect against physical penetration by malicious or unauthorised people. Components supporting the physical and environmental security plan are based on the nature of the facility (e.g., data center, office facility). Protections for data centers include the following: Climate control systems; Thermostat sensors; Raised floors; Smoke detectors; Heat detectors; Fluid or water sensors; CCTV monitoring; Fire suppression systems; Uninterruptible power supplies (UPS); Batteries; Generators. Backup, redundancy/failover and offsite storage procedures are documented and tested regularly. Procedures cover the ability to fully restore or utilise redundant platform resources for applications and operating systems. Periodic testing of successful restoration from backup media and redundant failover solutions are demonstrated. |
Processes for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures in order to ensure the security of the processing |
Skytap engages, no less than annually, independent auditors to conduct SOC 2 Type 2, ISO 27001:2013, and PCI DSS audits to measure the effectiveness of security controls for the Skytap cloud platform. Additionally, Skytap engages with independent third party security firms to conduct regular penetration tests against the Skytap cloud platform, no less than annually. |
Measures for user identification and authorisation |
Authentication and authorisation controls are appropriately robust for the specific levels of risk to the information, data, application and platform. Access rights are monitored to ensure that access adheres to the ‘least privilege’ principle commensurate with the user’s job responsibilities. All access and security events are logged, and software is used that enables rapid analysis of, and anomaly detection in user activities. Access Control policy and corresponding procedures are documented. Access procedures define the request, approval, access provisioning, and de-provisioning, and monitoring processes. The access processes restrict user access (local or remote) based on user job function (role/ profile based, appropriate access) for applications, databases and systems to ensure segregation of duties. User access reviews are performed periodically (e.g., quarterly) for business-critical applications, to confirm that permissions and privileges are appropriate. Procedures are documented for the timely onboarding and offboarding of users who have joined, left, or changed roles within the organisation. Processes for management of privileged user accounts is defined. A review/governance process is in place and privileged accounts are reviewed periodically (e.g., quarterly) to ensure that access is restricted, appropriate and documented (requests, approvals) prior to account creation. Documented password policy covers all applicable systems, applications and databases. Password best practices are deployed to protect against unauthorised use of passwords. The password policy includes the following components: Password is communicated separately from user ID; Initial passwords are unique to each user and must be reset upon initial login; Minimum password length; Password complexity; Password history; Password lockout for failed password attempts; passwords are checked against a list that contains values known to be commonly used, expected, or compromised. Passwords are saved only as one-way hash/encrypted files. Access to password files is restricted only to system administrators. If the authentication engine for application fails, the default action is always to deny access. |
Measures for the protection of data during transmission |
Confidential information transmission over the public internet always utilises an encrypted channel. Confidential information is encrypted while in transit over any network using secure protocols like HTTPS, SSL, SFTP, etc. VPN transmissions are performed over an encrypted channel. Electronic transmission of data to and from off-site locations is performed over an encrypted channel. Wireless Access Points only allows authorised users to connect. Policies and procedures are established and adhered to for proper control of electronic mail and/or instant messaging systems. Preventative and detective controls block malicious emails/ attachments. Emails are encrypted via Transport Layer Security (TLS). Encryption technology used adheres to all legal requirements governing the use of such technology. |
Measures for the protection of data during storageSkytap |
Servers and devices containing confidential information are encrypted leveraging system level encryption. Use of any portable media (e.g., laptops, removable hard drives, flash drives, removable disks, or tapes) is restricted, and requires encryption of any confidential data stored on this media. Customer information is not stored on any unencrypted portable media. Backups are encrypted and stored on protected systems. Secure transportation procedures (e.g., inventory tracking, signed checklists) of media to and from off-site location are defined. |
Measures for ensuring physical security of locations at which personal data are processed |
Skytap inherits physical security controls from its hosting providers. Skytap reviews SOC 2 and other audit reports for its hosting providers regularly to ensure the following physical security controls are in place and operating effectively. Physical access to hosting provider facilities is restricted by using access control procedures for authorised users (e.g. badge access, security guards, etc.). Visitor access must be logged in a physical access log and visitors are escorted through restricted areas in the facility. Physical security plan for offsite facilities is documented. Access control is enforced at entry points and in storage rooms. Access to the off-site facility is restricted and there is an approval process to obtain access. Monitoring cameras (e.g., CCTVs) cover sensitive areas within the facility. The monitoring equipment (e.g., CCTV) feed is monitored by a qualified team. Alerting procedures are defined and notification is given to qualified personnel. Security guards are trained regarding their response to security events. Additionally, Skytap requires that all employees, employee candidates, contractors and third parties complete suitable background validation checks in accordance with applicable laws and regulations. Skytap maintains a clean desk/clear screen policy. Workstations are configured to lock after 15 minutes of inactivity, requiring users to re-authenticate to return to the existing session. Locked sessions are configured to obscure all session details. Documents containing confidential information are secured in a locked file cabinet or office with access granted to only those individuals with a business need for such information. |
Measures for ensuring events logging |
Security events are logged, monitored and addressed through timely and documented action. Network components, workstations, applications and monitoring tools are enabled to monitor and detect anomalous user activity. Organisational responsibilities for responding to events are defined. Configuration checking tools and logs are utilised to record critical system configuration changes. Audit logs are stored on a secured logging infrastructure with access restricted to only necessary personnel. Retention schedules for various logs are defined and enforced. Workstations updated automatically with latest antivirus/antimalware definitions. Defined procedure highlights all anti-virus updates. Alert events include the following attributes: Unique identifier; Date; Time; Priority level identifier; Source IP address; Destination IP address; Event description; Notification sent to security team. |
Measures for ensuring system configuration, including default configuration |
Information systems are deployed with appropriate security configurations and reviewed periodically for compliance with security policies and standards. Standard security configuration is documented. Security hardening and procedures include security patches, vulnerability management, and system hardening standards. Security patch process and procedures, including patch prioritisation, are documented. Penetration testing of the external perimeter is performed at least annually. For most recent testing results/report, follow-up is performed to eliminate or mitigate any issues rated as critical, high and medium risk. Tools/processes are in place to perform vulnerability monitoring, penetration testing, antivirus definition updates, firewall deployment and maintenance. Documented operating system versions are implemented. Minimum Security Baselines (MSB) are established for various operating systems and versions. |
Measures for internal IT and IT security governance and management |
Policies and procedures that regulate the use of information, including its processing, receipt, transmission, storage, distribution, access and deletion are documented and implemented, and address how confidential information is managed and protected. Policies and procedures are designed to comply with all applicable laws, rules and regulations in the countries in which Skytap conducts business. The Policies and Procedures are approved by senior management, reviewed and updated to remain compliant with the law and current industry practices. Documented IT operational procedures ensure secure operation of IT assets. IT operational procedures include the following components: Scheduling requirements; Handling errors; Generating and handling special output; Maintenance and troubleshooting of systems; managing service availability to required SLAs/KPIs. Problem Remediation Management Process/Procedures are documented. The problem management lifecycle includes the following discrete steps: Identification; Assignment of severity to each problem; Communication; Resolution; Training (if required); Testing/validation; Reporting. Changes to systems, networks, applications, data files structures, other system components, and physical/ environmental changes are monitored and controlled through a formal change control process. Changes are tested, reviewed, approved, and monitored to ensure that changes are operating as intended. Change management policies and procedures cover all changes to applications, operating systems and network infrastructures, including firewalls. Change management policies and procedures include the following attributes: Clearly identified roles and responsibilities, including separation of duties; Impact or risk analysis of the change request; Testing prior to implementation of change; Security implications review; Authorisation and approval; Post installation validation; Back-out or recovery plans; Management signoffs. |
Measures for certification/assurance of processes and products |
Skytap maintains documented Secure System Development Life Cycle (“SSDLC”) policies and procedures for defining, acquiring, developing, enhancing, modifying, testing and implementing information systems. Software development processes are documented and includes version control and release management procedures as wells as validation of security requirements (e.g., Information Security [IS] sign-offs, periodic IS reviews, static/dynamic scanning). System documentation is managed by appropriate access controls. Software vulnerability assessments are conducted internally or using external experts. Any vulnerability gaps identified are remediated in a timely manner. All product teams are required to follow Skytap’s secure development procedure which provides security standards, strategies and tactics for each phase of the product development lifecycle. These procedures include guidelines and requirements on what, when and how security activities should take place. Specifically, they include activities for all phases of the Secure System Development Lifecycle, such as Training, Coding Guidelines, Architectural Risk Analysis, Code Analysis, Penetration Testing, as well as Vulnerability Response. In addition, Skytap has processes to build privacy into products and services from the initial design phase and continuously improves its Privacy by Design (PbD) and Privacy by Default practices. Skytap solutions are required to adhere to technical security standards and safeguards that are appropriate for their intended use and benefit. Security standards are determined after a review is conducted that assesses the type of data that will be handled by the solution, how and where the solution is implemented, relevant industry requirements and applicable laws and regulations. Penetration testing of the internal/external networks and/or applications is performed at least annually. The tests are usually performed externally by a reputable external organisation. Automated vulnerability scans of confidential information are performed periodically to identify, mitigate and remediate any vulnerabilities. Assets covered by such scanning include all production systems, applications, and network devices. All issues identified from the penetration tests and vulnerability scans rated as high or medium risks are addressed through timely and documented remediation. Skytap maintains ISO/IEC 27001:2013 and PCI DSS certifications as well as conducting annual SOC 2 Type 2 audits. Skytap will provide certifications and audit reports to customers upon request. |
Measures for ensuring data minimisation |
Where Skytap acts as a Data Controller, it only collects personal data as necessary for, and proportionate to the purposes of the processing, pursuant to the terms of the Skytap Privacy Policy published at https://www.skytap.com/terms/privacy-policy/. Skytap’s products and services are developed and operated following the principle of Privacy by Design, so that such products and services will only collect and process the data necessary for, and proportionate to the fulfilment of their intended functionalities. |
Measures for ensuring data quality |
Where Skytap acts as a Data Controller, it takes technically feasible and commercially reasonable steps to ensure that the personal data it processes is accurate and relevant, pursuant to the terms of the Skytap Privacy Policy published at https://www.skytap.com/terms/privacy-policy/. Where Skytap acts as a Data Processor, it makes available technical and organisational means for the relevant Data Controller to perform through self-service facilities, or to obtain via service requests, the maintenance (e.g., rectification or erasure) of any personal data processed by Skytap on its behalf. |
Measures for ensuring limited data retention |
Skytap embeds the principle of limited data retention into the design and operation of the services and systems it develops and maintains and adheres to a defined record retention policy. Retention timelines for data in various systems, products and services will depend on the nature, scope and purpose of the system, product or service considered and of the data held therein; on the applicable contractual commitments; on the applicable legal and regulatory requirements; on the existence of a valid business need or legal obligation to retain the data. |
Measures for ensuring accountability |
Skytap operates a global privacy program managed by the Skytap privacy team. The program includes the creation and maintenance of records of data processing operations, fulfilment of data subject rights, handling of inquiries and complaints, enforcement of privacy by design and privacy by default principles, the provision of up-to-date transparency information about Skytap’s data processing practices and of the data processing practices involved in the use of specific Skytap products and services, response to privacy events and incidents, and privacy training. More detailed information about these practices may be found in the documentation published at https://www.skytap.com/terms/privacy-policy/. |
Measures for allowing data portability and ensuring erasure |
Procedures are defined for instructing personnel on the proper methods for destroying media and storage devices on which confidential information is stored. Media and storage devices containing confidential information are wiped utilising U.S. Department of Defense 5220.22-M or like industry standard procedures, which relate to the permanent and non-recoverable removal of data. Media and storage device destruction by a third party is accompanied by documented procedures (e.g., certificate of destruction) for destruction confirmation |
For (sub-) processors, also describe the specific technical and organizational measures to be taken by the (sub-) processor to be able to provide assistance to the controller and, for transfers from a processor to a sub-processor.
This Table under Section 5 below includes a list of subprocessors involved in provisions of services under Agreement(s) and hyperlinks to their websites where the subprocessor’s technical and organizational measures are described:
5. LIST OF Sub-Processors
EXPLANATORY NOTE:
Controller (and Exporter for purposes of Standard Contractual Clauses) has authorized the use of the following sub-processors(FN1) by Processor/Importer:
Country |
Subprocessor |
Services |
Specific Technical and Organisational Measures |
USA, EU, UK and AIPAC |
Microsoft Azure One Microsoft Way Redmond, WA 98052-7329 |
Hosting provider |
See (Sub)-Processor Website |
USA, EU, UK and AIPAC |
IBM Cloud 1 New Orchard Road Armonk, New York 10504-1722 United States |
Hosting provider |
See (Sub)-Processor Website |
USA |
Cyxtera Technologies BAC Colonnade Office Towers 2333 Ponce De Leon Blvd, Suite 900 Coral Gables, FL 33134 |
Hosting provider |
See (Sub)-Processor Website |
USA |
Equinix One Lagoon Drive, Redwood City, California, 94065 |
Hosting provider |
See (Sub)-Processor Website |
FN1 Processor/Importer relies on GDPR’s definitions of Data Controllers and Data Processors for purposes of identifying Data Sub-processors.