(Annex to the Terms and Conditions)
by Zesavi GmbH
Fellhornstraße 4, 87477 Sulzberg
- Contractor -
by Zesavi GmbH
Fellhornstraße 4, 87477 Sulzberg
- Contractor -
Collection, capturing, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction of data, access to data for maintenance, servicing or provision purposes.
The contractor offers software for digital knowledge management in the company. The value of the platform for the client increases with the amount of content created.
Each employee or predefined groups receive personalized access to the platform.
This ensures that:
See contract term.
For the processing of data on behalf of the Controller, the Processor uses the services of Third Parties who process data on behalf of the Processor ("subcontractors").
These companies are:
Microsoft Ireland Operations, Ltd.
One Microsoft Place
South County Business Park, Leopardstown
Dublin 18, D18 P521, Ireland
Purpose of data processing: Hosting of the web application, processing of videos, generation of texts, audio tracks, images, videos, keywords and translations
Telekom Deutschland GmbH
Landgrabenweg 151
D-53227 Bonn
Germany
Purpose of data processing: Storage of content and company and personal data until the end of the contract
Google Ireland Limited
Gordon House, Barrow Street
Dublin 4, Ireland
Purpose of data processing: Hosting of the web application, processing of videos, generation of texts, audio tracks, images, videos, keywords and translations
Intercom R&D Unlimited Company
124 St Stephen's Green,
Dublin 2, Ireland
Purpose of data processing: Communication services, e.g. for support chats and e-mail newsletters
Hetzner Online GmbH
Industriestr. 25
91710 Gunzenhausen
Germany
Purpose of data processing: Server Hosting
The Contractor shall take the following technical and organizational measures for data security within the meaning of Art. 32 GDPR.
No unauthorized access to data processing systems, ensured by
• Magnetic or chip cards
• Electric door openers
• Plant security or gatekeeper
• Alarm systems
• Video systems
• Electronic locking system
• Access concept
• Visitor process
• Documented key issueing
No unauthorized system use, ensured by
• Secure passwords (password policy)
• Automatic locking mechanisms
• Two-factor authentication
• Encryption of data carriers
• Central control of authorization (e.g. via directory service and identity management)
• Password-protected screensaver
• Host-based intrusion detection systems
• Software firewall
• Application layer gateway
• Reverse proxy
• Removal of unused applications and services
• No administrator accounts for normal users
• Regular installation of security-relevant patches, updates and service packs
• Port blocking
• Password renewal routine
• Restrictive assignment of admin rights to clients
• Routine for warning of acute threats
• IT policy
• Policy for handling mobile devices
• Penetration tests
No unauthorized reading, copying, modification or removal within the system, ensured by
• Authorization concepts
• Needs-based access rights
• Logging of access
• Encryption of data carriers
• Pseudonymization of data and separate storage of the assignment key
• Secure deletion of data carriers before reuse
• Proper destruction of data carriers
• Password regulation
• Authorization concept
• Rights management by a minimum group of administrators
• Four-eyes principle for critical administration activities
• Employee training
• Restrictive assignment of admin rights to clients
• Routine for warning of acute threats
• Routine for checking the assignment of rights
• Logically separated storage
• Separation of production and test systems
• Use of certified hypervisors in virtualized environments
• Assigning purpose attributes to data records
• Uniform encryption of data processed for one purpose
• Employee training
• Tagging of data records with purpose attributes
• Assignment of rights according to the need-to-know principle (least privilege model)
• Guidelines for software tests
Pseudonymization, namely:
• Encryption of data at rest, namely: Encryption via cloud provider keys
• Encryption of data transmitted via internal networks, namely: SSL
• Encryption of data transmitted via external networks, namely: SSL
• Central control of authorizations, e.g. by directory service
• Personal user accounts
• Document management
• Password regulation
• Authorization concept
• Personal user profiles
• Employee training
• Documentation of the processing processes including the software used and the data processed with it (processing overview)
• Central control of authorizations
• E-mail encryption
• SSL encryption for web access
• Encryption of mobile data carriers
• Pseudonymization of data
• Forwarding of data in anonymized or pseudonymized form
• Secure deletion of data carriers before reuse
• Authorization concept
• Employee training
• Careful selection of transport personnel and vehicles
• Policy on the retention, deletion and blocking of personal data
• Uninterruptible power supply (UPS)
• Mirroring of systems
• Staff training
• Air-conditioned server rooms
• Monitoring of temperature and humidity in server rooms
• External data backup
• Monitoring of relevant data sources (system status, failed authentication attempts)
• Structural fire protection
• Early fire detection
• Extinguishing technology
• Backup concept
• Recovery concept
• Emergency manual
• Recovery tests
• Routine for warning of acute threats
• Logging of security-relevant processes
• Use of vulnerability scanners
• Penetration tests & Security analyses
• Simulation of attacks, incidents and data loss
• Routine for checking implemented security measures
• Evaluation of security incidents
• Evaluation of logs of security-relevant processes
• Regular internal and external audits
(ISO27001:2022)