Data Processing Addendum


Last Updated February 18, 2022

This Data Processing Addendum (DPA), reflects the parties' agreement regarding the processing of personal data under the Career.com Data Subscription Agreement (Agreement) and is hereby incorporated by reference into the Agreement. The term of this DPA shall follow the term of the Agreement. Terms not otherwise defined herein shall have the meaning as set forth in the Agreement.

Data Processing Addendum

This DPA is entered into between Career.com, and the customer (Customer) and is incorporated into and governed by the terms of the data subscription agreement between the parties.

Definitions. Any capitalized term not defined in this DPA will have the meaning given to it in the Agreement (defined below).

1. Purpose.

2. Scope.

In providing the Services to the Customer pursuant to the terms of the Agreement, Career.com will treat Personal Data as confidential and only process Personal Data on behalf of the Customer and to the extent necessary to provide Services in accordance with both the terms of the Agreement and the Customer's instructions documented in the Agreement and this DPA.

3. Term.

This DPA will automatically terminate upon the termination of the Agreement.

4. Career.com Obligations.

5. Customer Obligations.

6. Notification Of Security Breach.

7. Audit.

8. Compliance, Cooperation, and Response.

9. Sub-Processors.

10. Liability.

11. Termination.

Career.com will, upon written request, make the Service available to Customer for the return of Customer Data to the Customer at the expiration of the term of the Agreement within the time periods set out in the Agreement; and securely delete all Customer Data after such time period unless applicable laws prevent destruction of the Customer Data. Where any Customer Data is retained for such reasons the Customer Data shall be treated as Confidential Information and will no longer be actively processed.

12. General.

Schedule 1

CAREER.COM DATA SECURITY PRACTICES

Career.com currently observes the security practices described in this schedule. Career.com reserves the right to update or modify these practices at its discretion provided such modifications and updates do not material degrade the protection offered by these practices. All capitalized terms not otherwise defined herein shall have the meaning as set forth in the Agreement between the parties.

1. GENERAL PROVISIONS

Scope of Application: Career.com's compensation products and services are provided through a software as a service environment (Career.com's "Products"). Career.com provides the hardware, network, servers, and data center services for its production environment in a tier 3 data center facility (the "Hosting Environment").

Application Security: The Products incorporate a number of security features, such as session encryption, user authentication, password expiration, account lockout, and password reset, which are intended to help protect customers' data from unauthorized access.

Privacy Protection: Career.com may hold customer data and processes it on behalf of customers. In this data processor role, Career.com protects the security, confidentiality, and privacy of customer data, including personal identifiable information, with appropriate and technical organizational measures. Customers have a responsibility to manage and control the data and access to the data that they collect in a way that complies with privacy laws and regulations.

2. SECURITY PRACTICES

Information Security Program: Career.com maintains a written information security program that establishes roles and responsibilities for information security, and supports the confidentiality, integrity, and availability of information processing systems operated by Career.com.

Security Policies: Career.com implements and maintains information security policies that define requirements for access control, application and system development, passwords, remote access, data classification, operational security, network security and physical security. The information security policies will be reviewed annually, or when significant changes to the environment occur, to ensure their continuing suitability, adequacy, and effectiveness.

Separation of Duties: Career.com separates support roles and responsibilities for privileged access rights to applications, databases, systems, and security mechanisms with the least privilege required to perform each function.

Separation of Computing Layers: The Hosting Environment is partitioned into Web and Database layers with additional protections for database systems.

Physical Security: Career.com works with a reputable co-location provider to provide the physical security of the Hosting Environment in its tier 3 data center facility. The co-location vendor provides the surveillance, access control, and environmental control.

Network Security: Career.com maintains multiple layers of defense for production systems, including firewalls, network intrusion prevention, and host-based protections.

Logical Access Control: Career.com implements logical access controls with unique IDs, password complexity, strong (i.e. two-factor) authentication for remote access to production systems, and promptly revoking or changing access in response to terminations or changes in job functions.

System Security: Career.com implements detection, prevention, and recovery controls to protect against malicious software. Career.com also deploys anti-malware mechanisms and ensure the anti-malware mechanisms are updated regularly. Career.com employs a process to review system patches using a risk-based approach and apply them in a timely manner.

Security Assessment: Career.com will assess its security policies, processes, and information systems on a regularly basis. Career.com will remediate security findings or risks within a reasonable time frame.

3. OTHER PRACTICES

Business Continuity and Disaster Recovery: Career.com maintains a business continuity and disaster recovery plan to ensure the continued availability of information assets, systems and processes. The plan involves regular data backups, data replication, and redundant sites and systems if applicable. This plan will be tested on a regular basis.

Retention and Disposal: Any data stored on Career.com's backup media is encrypted using industry standard. Backup media are sent off-site regularly to a reputable backup vault provider. If Career.com retires any electronic media containing Customer data, the media will be securely destroyed or erased following industry standard.

Schedule 2

STANDARD CONTRACTUAL CLAUSES

THE FOLLOWING CLAUSES SHALL ONLY APPLY IN THE EVENT THAT PERSONAL DATA RELATING TO AN EU DATA SUBJECT IS TRANSFERRED OUTSIDE OF THE EUROPEAN ECONOMIC AREA.

THE FOLLOWING CLAUSES SHALL NOT APPLY WHERE SAID PERSONAL DATA IS PROCESSED (I) IN A THIRD COUNTRY OR TERRITORY RECOGNISED BY THE EU COMMISSION TO HAVE AN ADEQUATE LEVEL OF PROTECTION OR (II) BY AN ORGANIZATION LOCATED IN A COUNTRY WHICH HAS OTHER LEGALLY RECOGNISED APPROPRIATE SAFEGUARDS IN PLACE, SUCH AS THE BINDING CORPORATE RULES.

Customer (the data exporter)

and

Career.com LLC (the data importer)

each a "party"; together "the parties",

HAVE AGREED on the following Standard Contractual Clauses (the Clauses) in order to adduce adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of individuals for the transfer by the data exporter to the data importer of Personal Data.

STANDARD CONTRACTUAL CLAUSES

SECTION I

Clause 1 - Purpose and scope

Clause 2 - Effect and invariability of the Clauses

Clause 3 - Third-party beneficiaries

Clause 4 - Interpretation

Clause 5 - Hierarchy

In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties, existing at the time these Clauses are agreed or entered into thereafter, these Clauses shall prevail.

Clause 6 - Description of the transfer(s)

The details of the transfer(s), and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred, are specified in Annex I.B.

Clause 7 - Optional Docking clause

SECTION II - OBLIGATIONS OF THE PARTIES

Clause 8 - Data protection safeguards

The data exporter warrants that it has used reasonable efforts to determine that the data importer is able, through the implementation of appropriate technical and organisational measures, to satisfy its obligations under these Clauses.

MODULE TWO: Transfer controller to processor

8.1 Instructions

8.2 Purpose limitation

The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I.B, unless on further instructions from the data exporter.

8.3 Transparency

On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including the measures described in Annex II and personal data, the data exporter may redact part of the text of the Appendix to these Clauses prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand the its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information. This Clause is without prejudice to the obligations of the data exporter under Articles 13 and 14 of Regulation (EU) 2016/679.

8.4 Accuracy

If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to erase or rectify the data.

8.5 Duration of processing and erasure or return of data

Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the data exporter and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a).

8.6 Security of processing

8.7 Sensitive data

Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person's sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter 'sensitive data'), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

8.8 Onward transfers

The data importer shall only disclose the personal data to a third party on documented instructions from the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union (4) (in the same country as the data importer or in another third country, hereinafter 'onward transfer') if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if:

Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation.

8.9 Documentation and compliance

MODULE THREE: Transfer processor to processor

8.1 Instructions

8.2 Purpose limitation

The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I.B., unless on further instructions from the controller, as communicated to the data importer by the data exporter, or from the data exporter.

8.3 Transparency

On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including personal data, the data exporter may redact part of the text of the Appendix prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information.

8.4 Accuracy

If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to rectify or erase the data.

8.5 Duration of processing and erasure or return of data

Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the controller and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a).

8.6 Security of processing

8.7 Sensitive data

Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person's sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter 'sensitive data'), the data importer shall apply the specific restrictions and/or additional safeguards set out in Annex I.B.

8.8 Onward transfers

The data importer shall only disclose the personal data to a third party on documented instructions from the controller, as communicated to the data importer by the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union (6) (in the same country as the data importer or in another third country, hereinafter 'onward transfer') if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if:

Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation.

8.9 Documentation and compliance

Clause 9 - Use of sub-processors

MODULE TWO: Transfer controller to processor

MODULE THREE: Transfer processor to processor

Clause 10 - Data subject rights

MODULE TWO: Transfer controller to processor

MODULE THREE: Transfer processor to processor

Clause 11 - Redress

Clause 12 - Liability

Clause 13 - Supervision

SECTION III - LOCAL LAWS AND OBLIGATIONS IN CASE OF ACCESS BY PUBLIC AUTHORITIES

Clause 14 - Local laws and practices affecting compliance with the Clauses

Clause 15 - Obligations of the data importer in case of access by public authorities

15.1 Notification

15.2 Review of legality and data minimisation

SECTION IV - FINAL PROVISIONS

Clause 16 - Non-compliance with the Clauses and termination

Clause 17 - Governing law

These Clauses shall be governed by the law of the EU Member State in which the data exporter is established. Where such law does not allow for third-party beneficiary rights, they shall be governed by the law of another EU Member State that does allow for third-party beneficiary rights. The Parties agree that this shall be the law of _______ (specify Member State).]

Clause 18 - Choice of forum and jurisdiction

APPENDIX

ANNEX I

A. LIST OF PARTIES

Data exporter(s):

Name: ...

Address: ...

Contact person's name, position and contact details: ...

Activities relevant to the data transferred under these Clauses: ...

Signature and date: ...

Role (controller/processor): ...

2.

...

Data importer(s):

Name: ...

Address: ...

Contact person's name, position and contact details: ...

Activities relevant to the data transferred under these Clauses: ...

Signature and date: ...

Role (controller/processor): ...

...

B. DESCRIPTION OF TRANSFER

MODULE TWO: Transfer controller to processor

MODULE THREE: Transfer processor to processor

1. Categories of data subjects whose personal data is transferred:

2. Categories of personal data transferred

3. Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.

4. The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis).

5. Nature of the processing

6. Purpose(s) of the data transfer and further processing

7. The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period

8. For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing

C. COMPETENT SUPERVISORY AUTHORITY

Identify the competent supervisory authority/ies in accordance with Clause 13

To be provided by Data Controllers.

ANNEX II

TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA

Career.com currently observes the security practices described in this schedule. Career.com reserves the right to update or modify these practices at its discretion provided such modifications and updates do not material degrade the protection offered by these practices. All capitalized terms not otherwise defined herein shall have the meaning as set forth in the Agreement between the parties.

1. GENERAL PROVISIONS

Scope of Application: Career.com's compensation products and services are provided through a software as a service environment (Career.com's "Products"). Career.com provides the hardware, network, servers, and data center services for its production environment in a tier 3 data center facility (the "Hosting Environment").

Application Security: The Products incorporate a number of security features, such as session encryption, user authentication, password expiration, account lockout, and password reset, which are intended to help protect customers' data from unauthorized access.

Privacy Protection: Career.com may hold customer data and processes it on behalf of customers. In this data processor role, Career.com protects the security, confidentiality, and privacy of customer data, including personal identifiable information, with appropriate and technical organizational measures. Customers have a responsibility to manage and control the data and access to the data that they collect in a way that complies with privacy laws and regulations.

2. SECURITY PRACTICES

Information Security Program: Career.com maintains a written information security program that establishes roles and responsibilities for information security, and supports the confidentiality, integrity, and availability of information processing systems operated by Career.com.

Security Policies: Career.com implements and maintains information security policies that define requirements for access control, application and system development, passwords, remote access, data classification, operational security, network security and physical security. The information security policies will be reviewed annually, or when significant changes to the environment occur, to ensure their continuing suitability, adequacy, and effectiveness.

Separation of Duties: Career.com separates support roles and responsibilities for privileged access rights to applications, databases, systems, and security mechanisms with the least privilege required to perform each function.

Separation of Computing Layers: The Hosting Environment is partitioned into Web and Database layers with additional protections for database systems.

Physical Security: Career.com works with a reputable co-location provider to provide the physical security of the Hosting Environment in its tier 3 data center facility. The co-location vendor provides the surveillance, access control, and environmental control.

Network Security: Career.com maintains multiple layers of defense for production systems, including firewalls, network intrusion prevention, and host-based protections.

Logical Access Control: Career.com implements logical access controls with unique IDs, password complexity, strong (i.e. two-factor) authentication for remote access to production systems, and promptly revoking or changing access in response to terminations or changes in job functions.

System Security: Career.com implements detection, prevention, and recovery controls to protect against malicious software. Career.com also deploys anti-malware mechanisms and ensure the anti-malware mechanisms are updated regularly. Career.com employs a process to review system patches using a risk-based approach and apply them in a timely manner.

Security Assessment: Career.com will assess its security policies, processes, and information systems on a regularly basis. Career.com will remediate security findings or risks within a reasonable time frame.

3. OTHER PRACTICES

Business Continuity and Disaster Recovery: Career.com maintains a business continuity and disaster recovery plan to ensure the continued availability of information assets, systems and processes. The plan involves regular data backups, data replication, and redundant sites and systems if applicable. This plan will be tested on a regular basis.

Retention and Disposal: Any data stored on Career.com's backup media is encrypted using industry standard. Backup media are sent off-site regularly to a reputable backup vault provider. If Career.com retires any electronic media containing Customer data, the media will be securely destroyed or erased following industry standard.

ANNEX III

LIST OF SUB-PROCESSORS

MODULE TWO: Transfer controller to processor

MODULE THREE: Transfer processor to processor

The Data Importer has the controller's general authorization for the engagement of third party providers to provide aspects of Data Importer's products and/or services. The Data Importer will ensure such third-party providers only access and use data to provide the Data Importer's products and/or services and not for any other purpose. Subject to the Clauses, Data Exporter consents to Data Importer engaging its affiliated companies and the third-party providers specified below in order to fulfill Data Importer's contractual obligations:

1. Any Career.com, LLC controlled affiliate or subsidiary;

2. Iron Mountain (data backup and disaster recovery services)

3. Evoque Data Center Solutions (colocation services)

Back