{"id":362,"date":"2024-10-28T16:31:32","date_gmt":"2024-10-28T14:31:32","guid":{"rendered":"https:\/\/mitdk-prod-b3cphaemhph8gef8.swedencentral-01.azurewebsites.net\/?page_id=362"},"modified":"2024-11-12T14:23:19","modified_gmt":"2024-11-12T13:23:19","slug":"brugervilkaar-bilag-b","status":"publish","type":"page","link":"https:\/\/mit.dk\/en\/brugervilkaar-bilag-b","title":{"rendered":"Brugervilk\u00e5r bilag B"},"content":{"rendered":"<h1>\n\t\tData Processing agreement for the post solution mit.dk to business operators\n\t<\/h1>\n\t<p><strong>Som Erhvervsdrivende, har du (herefter den &#8220;dataansvarlige&#8221;) og Netcompany A\/S, cvr-nr.: 14814833, Strandgade 3, 1401 K\u00f8benhavn K, Danmark (herefter &#8220;databehandleren&#8221;) (hver is\u00e6r en &#8220;Part&#8221; og sammen &#8220;Parterne&#8221;) aftalt f\u00f8lgende standardkontraktsbestemmelser (&#8220;Bestemmelserne&#8221;). Den Dataansvarlige accepterer, at dennes brug af mit.dk er underlagt Bestemmelserne ved den Dataansvarliges accept af <a href=\"\/en\/brugervilkaar\/\">Terms and Conditions<\/a> (herefter ben\u00e6vnt &#8220;Hovedaftalen&#8221;) i forbindelse med oprettelsen af den Dataansvarliges profil p\u00e5 mit.dk.<\/strong><\/p>\n\t<h2>1. Preamble<\/h2>\n<p>These Clauses are based on the Standard Contractural Clauses prepared by the Danish Data Protection Agency and approved by the European Data Protection Board pursuant to the General Data Protection Regulation article 28(8).<\/p>\n<p>These Clauses sets out the rights and obligations of the Data Controller and the Data Processor when the Data Processor process personal data on behalf of the Data Controller.<\/p>\n<p>Bestemmelserne er udformet med henblik p\u00e5 Parternes efterlevelse af artikel 28, stk. 3, i Europa-Parlamentets og R\u00e5dets forordning (EU) 2016\/679 af 27. april 2016 om beskyttelse af fysiske personer i forbindelse med behandling af personoplysninger og om fri udveksling af s\u00e5danne oplysninger og om oph\u00e6velse af direktiv 95\/46\/EF (&#8220;Databeskyttelsesforordningen&#8221; eller &#8220;Forordningen&#8221;).<\/p>\n<p>Ved &#8220;personoplysninger&#8221; forst\u00e5s enhver oplysning, der relaterer sig til en identific\u00e9rbar fysisk person, jf. artikel 4, stk. 1 i Databeskyttelsesforordningen.<\/p>\n<p>In the context of the Data Controllers accept of the Terms and Conditions and the Data Processors provision of mit.dk, the Data Processor process personsal data on behalf of the Data Controller in accordance with the Clauses.<\/p>\n<p>The Clauses shall take priority over any similar provisions contained in other agreements between the parties. If the Data Processor is subject to further obligations pursuant to any other agreement between the Parties, e.g., through the EU Commisions Standard Contractual Clauses pursuant to article 46(2)(c) and (d) in the General Data Protection Regulation, these obligations shall apply in addition to the Clauses.<\/p>\n<p>Five sub-appendices are attached to the Clauses and form an integral part of the Clauses.<\/p>\n<p>Sub-appendix A contains details about the processing of personal data, including the purpose and nature of the processing, type of personal data, categories of data subject and duration of the processing.<\/p>\n<p>Sub-appendix B contains the Data Controller\u2019s conditions for the Data Processor\u2019s use of sub-processors and a list of sub-processors authorised by the Data Controller.<\/p>\n<p>Sub-appendix C contains the Data Controller\u2019s instructions with regards to the processing of personal data, the minimum security measures to be implemented by the Data Processor and how audits of the Data Processor and any sub-processors are to be performed.<\/p>\n<p>Sub-appendix D contains provisions for other activities which are not covered by the Clauses. Sub-appendix D contains the provisions regarding other activities not covered by the Clauses.<\/p>\n<p>Sub-appendix E contains an overview of the techincal and organisational security measures, which are already implemented by the Data Processor.<\/p>\n<p>The Clauses along with sub-appendices shall be retained in writing, including electronically, by both parties.<\/p>\n<p>The Clauses shall not exempt the Data Processor from obligations to which the Data Processor is subject pursuant to the General Data Protection Regulation (the GDPR) or other legislation.<\/p>\n\t<h2>2. The rights and obligations of the Data Controller<\/h2>\n<p>Den Dataansvarlige er ansvarlig for at sikre, at behandlingen af personoplysninger sker i overensstemmelse med Databeskyttelsesforordningen (se Forordningens artikel 24) samt g\u00e6ldende databeskyttelsesbestemmelser i anden EU-ret eller medlemsstaternes nationale ret og disse Bestemmelser. Henvisninger til &#8220;medlemsstat&#8221; i Bestemmelserne skal forst\u00e5s som en henvisning til &#8220;EU\/E\u00d8S medlemsstater&#8221;.<\/p>\n<p>The Data Controller has the right and obligation to make decisions about the purposes and means of the processing of personal data.<\/p>\n<p>The Data Controller shall be responsible, among other, for ensuring that the processing of personal data, which the Data Processor is instructed to perform, has a legal basis.<\/p>\n\t<h2>3. The Data Processor acts according to instructions<\/h2>\n<p>The Data Processor shall process personal data only on documented instructions from the Data Controller, unless required to do otherwise by the Union or Member State law to which the processor is subject. The Data Controller's instructions shall be specified in sub-appendices A and C. Subsequent instructions, which falls outside the scope of these Clauses requires a prior written agreement between the Parties. The Data Controller is entitled to terminate the Main Agreement, if the Data Processor refuses to follow the instructions from the Data Controller, which falls outside the scope of and\/or changes the instruction, which has been given and is agreed to in these Clauses.<\/p>\n<p>The Data Processor shall immediately inform the Data Controller in writing if instructions given by the Data Controller, in the opinion of the Data Processor, contravene the GDPR or the applicable EU or Member State data protection provisions.<\/p>\n\t<h2>4. Confidentiality<\/h2>\n<p>The Data Processor shall keep all personal data confidential.<\/p>\n<p>The Data Processor shall only grant access to the personal data being processed on behalf of the Data Controller to persons under the Data Processor\u2019s authority and who have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality and only on a need to know basis. The list of persons to whom access has been granted shall be kept under periodic review. On the basis of this review, such access to personal data can be withdrawn, if access is no longer necessary, and personal data shall consequently not be accessible anymore to those persons.<\/p>\n<p>The Data Processor shall at the request of the Data Controller demonstrate that the concerned persons under the Data Processor\u2019s authority are subject to the abovementioned confidentiality.<\/p>\n<p>The Data Controller is correspondingly obligated to process all information received from the Data Processor confidential and may bit disclose such information without prior written approval.<\/p>\n\t<h2>5. Security of processing<\/h2>\n<p>Article 32 GDPR stipulates that, taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Data Controller and Data Processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk.<\/p>\n<p>The Data Controller shall evaluate the risks to the rights and freedoms of natural persons inherent in the processing and implement measures to mitigate those risks. Depending on their relevance, the measures may include the following:<\/p>\n<ul>\n<li>Pseudonymisation and encryption of personal data<\/li>\n<li>the ability to ensure ongoing confidentiality, integrity, availability and resilience of processing systems and services<\/li>\n<li>the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident<\/li>\n<li>a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing<\/li>\n<\/ul>\n<p>Efter Forordningens artikel 32 skal Databehandleren &#8211; uafh\u00e6ngigt af den Dataansvarlige &#8211; ogs\u00e5 vurdere risiciene for fysiske personers rettigheder og frihedsrettigheder, som behandlingen udg\u00f8r og gennemf\u00f8re foranstaltninger for at im\u00f8deg\u00e5 disse risici. Med henblik p\u00e5 denne vurdering skal den Dataansvarlige stille den n\u00f8dvendige information til r\u00e5dighed for Databehandleren, som g\u00f8r vedkommende i stand til at identificere og vurdere s\u00e5danne risici.<\/p>\n<p>Furthermore, the Data Processor shall assist the Data Controller in ensuring compliance with the Data Controller\u2019s obligations pursuant to Articles 32 GDPR, by inter alia providing the Data Controller with information concerning the technical and organisational measures already implemented by the Data Processor pursuant to Article 32 GDPR, cf. sub-appendix E, along with all other information necessary for the Data Controller to comply with the Data Controller\u2019s obligation under Article 32 GDPR.<\/p>\n\t<h2>6. Use of sub-processors<\/h2>\n<p>The Data Processor shall meet the requirements specified in Article 28(2) and (4) GDPR in order to engage another processor (a sub-processor).<\/p>\n<p>The Data Processor has the Data Controller\u2019s general authorisation for the engagement of sub-processors. The Data Processor shall inform in writing the Data Controller of any intended changes concerning the addition or replacement of sub-processors at least 30 days in advance, thereby giving the Data Controller the opportunity to object to such changes prior to the engagement of the concerned sub-processor(s). The Data Controller is only entitled to object to the use of a sub-processor if there are concrete matters in relation to data protection legislation relating to the use of the sub-processor in question that constitutes a breach of the Data Controller's obligation after applicable EU or Member State law. If the Data Controller wishes to object to the use of a sub-processor, the Data Controller may do so by terminating the Main Agreement. If the Data Processor cease to use a sub-processor, the Data Processor must notify the Data Controller in writing. Longer time periods of prior notice for specific sub-processing services can be provided in Appendix B. The list of sub-processors already authorised by the Data Controller can be found in sub-appendix B.<\/p>\n<p>Where the Data Processor engages a sub-processor for carrying out specific processing activities on behalf of the Data Controller, the same data protection obligations as set out in the Clauses shall be imposed on that sub-processor by way of a contract or other legal act under EU or Member State law, in particular providing sufficient guarantees to implement appropriate technical and organisational measures in such a manner that the processing will meet the requirements of the Clauses and the GDPR. The Data Processor shall therefore be responsible for requiring that the sub-processor at least complies with the obligations to which the Data Processor is subject pursuant to the Clauses and the GDPR. In this regard, the Data Processor is entitled to forward the Clauses (except for potential business related clauses) to the sub-processors engaged by the Data Processor.<\/p>\nUnderdatabehandleraftale(r) og eventuelle senere \u00e6ndringer hertil sendes &#8211; efter den Dataansvarliges anmodning herom &#8211; i kopi til den Dataansvarlige, som herigennem har mulighed for at sikre sig, at tilsvarende databeskyttelsesforpligtelser som f\u00f8lger af disse Bestemmelser er p\u00e5lagt underdatabehandleren. Bestemmelser om kommercielle vilk\u00e5r, som ikke p\u00e5virker det databeskyttelsesretlige indhold af underdatabehandleraftalen, skal ikke sendes til den Dataansvarlige.<br \/>\nThe Data Processor shall agree a third-party beneficiary clause with the sub-processor where \u2013 in the event of bankruptcy of the Data Processor \u2013 the Data Controller shall be a third-party beneficiary to the sub-processor agreement and shall have the right to enforce the agreement against the sub-processor engaged by the Data Processor, e.g. enabling the Data Controller to instruct the sub-processor to delete or return the personal data.\n<p>If the sub-processor does not fulfil its obligations pursuant to data protection regulations, the Data Processor shall remain fully liable to the Data Controller as regards the fulfilment of the obligations of the sub-processor. This does not affect the rights of the data subjects under the GDPR \u2013 in particular those foreseen in Articles 79 and 82 GDPR \u2013 against the Data Controller and the Data Processor, including the sub-processor.<\/p>\n\t<h2>7. Transfers to third countries or international organisations<\/h2>\n<p>Any transfer of personal data to third countries or international organisations by the Data Processor shall only occur on the basis of documented instructions from the Data Controller and shall always take place in compliance with Chapter V GDPR. If the Data Processor asks the Data Controller for an instruction to transfer personal data to a new receipient in a third country, the Data Controller is only entitled to refuse to give such instruction if specific data protection considerations related to the contemplated transfer constitutes a breach of the Data Controller's obligations pursuant to applicable EU or national law in the Member States concerning data protection. If the Data Controller refuses to provide such instruction, the Main Agreement shall be terminated.<\/p>\n<p>In case transfers to third countries or international organisations, which the Data Processor has not been instructed to perform by the Data Controller, is required under EU or Member State law to which the Data Processor is subject, the Data Processor shall inform the Data Controller of that legal requirement prior to initating the processing unless that law prohibits such information on important grounds of public interest.<\/p>\n<p>Without documented instructions from the Data Controller, the Data Processor therefore cannot within the framework of the Clauses:<\/p>\n<ul>\n<li>transfer personal data to a Data Controller or a Data Processor in a third country or in an international organization<\/li>\n<li>transfer the processing of personal data to a sub-processor in a third country<\/li>\n<li>have the personal data processed in by the Data Processor in a third country<\/li>\n<\/ul>\n<p>The Data Controller\u2019s instructions regarding the transfer of personal data to a third country including, if applicable, the transfer tool under Chapter V GDPR on which they are based, shall be set out in sub-appendix C, section C.6.<\/p>\n<p>The Clauses shall not be confused with the EU Commissions standard data protection clauses within the meaning of Article 46(2)(c) and (d) GDPR, and thus the Clauses cannot be relied upon by the parties as a transfer tool under Chapter V GDPR.<\/p>\n\t<h2>8. Assistance to the Data Controller<\/h2>\n<p>Taking into account the nature of the processing, the Data Processor shall assist the Data Controller by appropriate technical and organisational measures, insofar as this is possible, in the fulfilment of the Data Controller\u2019s obligations to respond to requests for exercising the data subject\u2019s rights laid down in Chapter III GDPR.<\/p>\n<p>This entails that the Data Processor shall, insofar as this is possible, assist the Data Controller in the Data Controller\u2019s compliance with:<\/p>\n<ul>\n<li>the right to be informed when collecting personal data from the data subject<\/li>\n<li>the right to be informed when personal data have not been obtained from the data subject<\/li>\n<li>the right of access by the data subject<\/li>\n<li>the right to rectification<\/li>\n<li>retten til sletning (&#8220;retten til at blive glemt&#8221;)<\/li>\n<li>the right to restriction of processing<\/li>\n<li>notification obligation regarding rectification or erasure of personal data or restriction of processing\nthe right to data portability<\/li>\n<li>retten til dataportabilitet<\/li>\n<li>the right to object<\/li>\n<li>the right not to be subject to a decision based solely on automated processing, including profiling<\/li>\n<\/ul>\n<p>In addition to the Data Processor\u2019s obligation to assist the Data Controller pursuant to Clause 6.3., the Data Processor shall furthermore, taking into account the nature of the processing and the information available to the Data Processor, assist the Data Controller in ensuring compliance with:<\/p>\n<ul>\n<li>the Data Controller\u2019s obligation to without undue delay communicate the personal data breach to the data subject, when the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons<\/li>\n<li>the Data Controller\u2019s obligation to without undue delay communicate the personal data breach to the data subject, when the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons<\/li>\n<li>the Data Controller\u2019s obligation to carry out an assessment of the impact of the envisaged processing operations on the protection of personal data (a data protection impact assessment)<\/li>\n<li>the Data Controller\u2019s obligation to consult the competent supervisory authority, the Danish Data Protection Authority, prior to processing where a data protection impact assessment indicates that the processing would result in a high risk in the absence of measures taken by the Data Controller to mitigate the risk<\/li>\n<\/ul>\n<p>The parties shall define in sub-appendix C the appropriate technical and organisational measures by which the Data Processor is required to assist the Data Controller as well as the scope and the extent of the assistance required. This applies to the obligations foreseen in this Clause.<\/p>\n\t<h2>9. Notification of personal data breach<\/h2>\n<p>In case of any personal data breach, the Data Processor shall, without undue delay after having become aware of it, notify the Data Controller of the personal data breach.<\/p>\n<p>The Data Processor\u2019s notification to the Data Controller shall, if possible, take place within 24 hours after the Data Processor has become aware of the personal data breach to enable the Data Controller to comply with the Data Controller\u2019s obligation to notify the personal data breach to the competent supervisory authority, cf. Article 33 GDPR.<\/p>\n<p>In accordance with Clause 8, the Data Processor shall assist the Data Controller in notifying the personal data breach to the competent supervisory authority, meaning that the Data Processor is required to assist in obtaining the information listed below which, pursuant to Article 33(3)GDPR, shall be stated in the Data Controller\u2019s notification to the competent supervisory authority:<\/p>\n<ul>\n<li>The nature of the personal data including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned;<\/li>\n<li>the likely consequences of the personal data breach<\/li>\n<li>the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects<\/li>\n<\/ul>\n<p>The parties shall define in sub-appendix C all the elements to be provided by the Data Processor when assisting the Data Controller in the notification of a personal data breach to the competent supervisory authority.<\/p>\n\t<h2>10. Erasure and return of data<\/h2>\n<p>On termination of the provision of personal data processing services, the Data Processor shall be under obligation to delete all personal data processed on behalf of the Data Controller and certify to the Data Controller that it has done so unless Union or Member State law requires storage of the personal data.<\/p>\n\t<h2>11. Audits and inspection<\/h2>\n<p>The Data Processor shall make available to the Data Controller all information necessary to demonstrate compliance with the obligations laid down in Article 28 and the Clauses and allow for and contribute to audits, including inspections, conducted by the Data Controller or another auditor mandated by the Data Controller.<\/p>\n<p>Procedures applicable to the Data Controller\u2019s audits, including inspections, of the Data Processor and sub-processors are specified in sub-appendices C, section C.7. and C.8.<\/p>\n<p>The Data Processor shall be required to provide the supervisory authorities, which pursuant to applicable legislation have access to the Data Controller\u2019s and Data Processor\u2019s facilities, or representatives acting on behalf of such supervisory authorities, with access to the Data Processor\u2019s physical facilities on presentation of appropriate identification.<\/p>\n\t<h2>12. The Parties' agreement on other terms<\/h2>\n<p>The parties may agree other clauses concerning the provision of the personal data processing service specifying e.g. liability, as long as they do not contradict directly or indirectly the Clauses or prejudice the fundamental rights or freedoms of the data subject and the protection afforded by the GDPR.<\/p>\n\t<h2>13. Commencement and termination<\/h2>\n<p>The Clauses shall become effective on the date of the Main Agreement coming into force.<\/p>\n<p>Both parties shall be entitled to require the Clauses renegotiated if changes to the law or inexpediency of the Clauses should give rise to such renegotiation. The Data Controller is entitled to terminate the Main Agreement between the Parties, if the Parties cannot come to an agreement.<\/p>\n<p>Furthermore, the Data Processor is entitled to make changes to the Clauses, if the Data Processor is of the opinion that such changes are necessary, e.g., as a result of changes to legislation or case law from the competent authorities. The Data Processor shall inform the Data Controller in writing about any potential changes as agreed in the Main Agreement. The Data Controller can terminate the Main Agreement if the Data Controller cannot accept the changes.<\/p>\n<p>The Clauses shall apply for the duration of the provision of personal data processing services. For the duration of the provision of personal data processing services, the Clauses cannot be terminated unless other Clauses governing the provision of personal data processing services have been agreed between the parties.<\/p>\n<p>If the provision of personal data processing services is terminated, and the personal data is deleted or returned to the Data Controller pursuant to Clause 11.1. and Appendix C.4., the Clauses may be terminated by written notice by either party.<\/p>\n\t<h2>Underbilag A &#8211; Oplysninger om behandlingen<\/h2>\nPlease note that the processing activities carried out on behalf of the Data Controller only related to the Data Processor's actual processing activities, if these are limited to the sending and retaining digital messages, as well as processing activites related to the basic functions at mit.dk, including eksport and deletion of digital messages.<br \/>\nDue to mit.dk's character as a standard solution, the Clauses are intended to cover processing activities for several different Data Controllers. For the same reason, it is considered that all types of personal data is processed as part of the Data Processors processing activities, even though it might only be a limited amount of the personal data stated in section A.1, which is processor for a specific Data Controller, and\/or the processing activities covers the processing of other types of personal data than the listed personal data.\n<h3>A.1 &#8211; Behandlingsinstruksen<\/h3>\n<p>The Data Processors processing of personal data on behalf of the Data Controller is carried out by the following processing activities:<\/p>\n\t<p>Data Processors activities<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Description<\/strong>\n<em>(the nature of the processing)<\/em><\/td>\n<td><strong>The purpose of the processing<\/strong><\/td>\n<td colspan=\"2\"><strong>Categories of personal data<\/strong>\n<em>(mark X)<\/em><\/td>\n<td><strong>Categories of data subjects<\/strong><\/td>\n<td><strong>The duration of the processing<\/strong>\n<em>(mark X)<\/em><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"20\"><strong>Mit.dk<\/strong>\n<em>(The funcitons at mit.dk covers the sending, recieving, retention, eksport, and deletion of digital messages. Furthermore, reading access can be granted to post to other users, which has been granted reading access by the Data Controller via mit.dk )<\/em><\/td>\n<td rowspan=\"20\">To provide a digital post solution.<\/td>\n<td colspan=\"2\"><strong>Ordinary personal data<\/strong><\/td>\n<td rowspan=\"20\">\n<ul>\n<li>Natural persons mentioned in the messages<\/li>\n<\/ul>\n<ul>\n<li>Employees of the Data Controller<\/li>\n<\/ul>\n<\/td>\n<td rowspan=\"20\">The processing is  and will continue during the duration of the Main Agreement between the Data Controller and the Data Processor to which it is noted that all digital messages are generally only deleted on the Data Controllers initiative.\n<p>In the event that an employee of the Data Controller chooses to delete their profile and\/or the Data Controller's profile, the Data Processor is required to stop its processing and delete the associated personal data.<\/p>\nRegardless of the above, the Data Processor must continuously delete log information on a rolling basis (6 years).<\/td>\n<\/tr>\n<tr>\n<td>Name, address, telephone no., e-mail<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Login information<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>IP addresses<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Birthdays<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Pictures<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Finansial information<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Sociale relations<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Addtional personal information\n<p>(stated below):<\/p>\nAll information kept in the messages.<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Special categories of personal data<\/strong><\/td>\n<\/tr>\n<tr>\n<td>National identification number<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Information about criminal offences (e.g. criminal records)<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><strong>Sensitive personal data<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Racial or ethnic origin<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Religous or philosopchial beliefs<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Politcal opinons<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Trade union memberships<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Data concerning health<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Information of sexual character<\/td>\n<td>X<\/td>\n<\/tr>\n<tr>\n<td>Genetic or biometric data<\/td>\n<td>X<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\t<h2>Underbilag B &#8211; Godkendte underdatabehandlere<\/h2>\n<h3>B.1 &#8211; Godkendte underdatabehandlere<\/h3>\n<p>On commencement of the Clauses, the Data Controller authorises the engagement of the following sub-processors:<\/p>\n\t<p>Data Controller's authorized sub-processors<\/p>\n<table>\n<thead>\n<tr>\n<td>Name<\/td>\n<td rowspan=\"2\">CVR<\/td>\n<td rowspan=\"2\">Address<\/td>\n<td rowspan=\"2\">Descrition of the processing<\/td>\n<td rowspan=\"2\">Location for the processing<\/td>\n<td rowspan=\"2\">Legal basis for the transfer to countries outside eu\/eea\n<em>(If relevant)<\/em><\/td>\n<\/tr>\n<tr>\n\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Netcompany Poland Sp. z.o.o<\/td>\n<td>Tax. no. 586-21-55-720<\/td>\n<td>ul. Pu\u0142awska 182, Pl-02-670 Warszawa, Poland<\/td>\n<td>Netcompany Polen can perform the same processing activities as descriped in sub-appendix A.<\/td>\n<td>ul. Pu\u0142awska 182, Pl-02-670 Warszawa, Poland<\/td>\n<td>N\/A<\/td>\n<\/tr>\n<tr>\n<td>Netcompany Norge AS<\/td>\n<td>Org. no. 881 886 472<\/td>\n<td>\u00d8vre Voll Gate 15, 0158 Oslo, Norway<\/td>\n<td>Netcompany Norway can perform the same processing activities as descriped in sub-appendix A.<\/td>\n<td>\u00d8vre Voll Gate 15, 0158 Oslo, Norway<\/td>\n<td>N\/A<\/td>\n<\/tr>\n<tr>\n<td>Netcompany Netherland B.V.<\/td>\n<td>Company no. 000037295179<\/td>\n<td>Kanaalweg 3b, 2628 EB Delft, The Netherlands<\/td>\n<td>Netcompany The Netherlands can perform the same processing activities as descriped in sub-appendix A.<\/td>\n<td>Kanaalweg 3b, 2628 EB Delft, The Netherlands<\/td>\n<td>N\/A<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Ved Bestemmelsernes ikrafttr\u00e6den har den Dataansvarlige accepteret brugen af ovenn\u00e6vnte underdatabehandlere for den beskrevne behandlingsaktivitet. \u00d8nsker Databehandleren efterf\u00f8lgende at g\u00f8re brug af en ny underdatabehandler, skal dette ske i overensstemmelse med Bestemmelsernes punkt 6. Derudover m\u00e5 Databehandleren ikke &#8211; i henhold til Bestemmelse 6 &#8211; behandle personoplysninger p\u00e5 andre lokaliteter end de aftalte, jf. ovenfor samt underbilag C, afsnit C.5.<\/p>\n<h3>B.2 &#8211; Varsel for godkendelse af underdatabehandlere<\/h3>\n<p>The Data Processor must inform the Data Controller in writing of any intended changes regarding the addition or replacement of sub-prcessors with at least 30 days prior notice.<\/p>\n\t<h2>Underbilag C &#8211; Instruks vedr\u00f8rende behandling af personoplysninger<\/h2>\n<h3>C.1 &#8211; Behandlingens genstand\/instruks<\/h3>\n<p>The Data Processor\u2019s processing of personal data on behalf of the Data Controller shall be carried out by the processing activities stated in sub-appendix A.<\/p>\n<h3>C.2 &#8211; Behandlingssikkerhed<\/h3>\n<p>The security level must be established taking into the art of the processing activities, the scope, context and purpose of the processing as well as the risk of the rights and freedoms of natural persons.<\/p>\n<p>Behandlingen kan &#8211; i forhold til visse Dataansvarlige &#8211; involvere en stor m\u00e6ngde personoplysninger, der er omfattet af Databeskyttelsesforordningens artikel 9 vedr\u00f8rende &#8216;s\u00e6rlige kategorier af personoplysninger&#8217;. Af samme grund er der fastsat et &#8216;h\u00f8jt&#8217; sikkerhedsniveau. Databehandleren og Databehandlerens koncernselskaber er alle certificeret under ISO\/IEC 27001, og sikkerhedsforanstaltningerne implementeret p\u00e5 mit.dk er alle baseret p\u00e5 antagelsen om, at al data der behandles i l\u00f8sningen, vedr\u00f8rer b\u00e5de s\u00e6rlige og sensitive kategorier af personoplysninger. Dermed er det h\u00f8jeste niveau af b\u00e5de tekniske og organisatoriske sikkerhedsforanstaltninger sikret.<\/p>\n<p>The Data Processor shall hereafter be entitled and obligated to make decisions about the technical and organisational security measures applied to ensure an adequate level of protection. In relation to this the Data Processor will as a minimum follow the security measures stated in sup-appendix E.<\/p>\n<p>Based on the above, the Data Controller does not require the implementation of further security measures.<\/p>\n<h3>C.3 &#8211; Bistand til den Dataansvarlige<\/h3>\n<p>In case of a personal data breach for which the Data Processor is responsible of, the Data Processor shall as a minimum make the following information available to the Data Controller:<\/p>\n<ul>\n<li>Categories and numbers of data subjects affected by the personal data breach<\/li>\n<li>The character of the personal data and the categories and numbers of the personal data covered by the personal data breach<\/li>\n<\/ul>\n<p>Any additional services that the Data Processor provides to the Data Controller in relation to the last section of Clause 5, Clause 8 and in case of a personal data breach (Clause 9) for which the Data Processor is not responsible, the Data Controller will be invoiced in accordance with sub-appendix D, section D.2.<\/p>\n<h3>C.4 &#8211; Opbevaringsperiode\/sletterutine<\/h3>\n<p>The Data Controller can at any time delete or download its Digital Post in the post solution at mit.dk. The processing of personal data in the form of Digital Post lasts until the Data Controller deletes Digital Post in the Data Controller's post solution at mit.dk, cf. the Main Agreement.<\/p>\n<h3>C.5 &#8211; Behandlingslokationer<\/h3>\n<p>In connection to Clause 6, the processing of personal data pursuant to the Clauses cannot be performed on other locations than the following:<\/p>\n<p><strong>Denmark:<\/strong><\/p>\n<p>Netcompany A\/S<\/p>\n<p>Primary locations:<\/p>\n<ul>\n<li>Strandgade 3, DK-1401 K\u00f8benhavn, Denmark<\/li>\n<li>S\u00f8ndergade 66-68, 3. sal, DK-8000 Aarhus, Denmark<\/li>\n<li>Toldbod Plads 1, DK-9000 Aalborg, Denmark<\/li>\n<li>Dirch Passers All\u00e9 76, DK-2000 Frederiksberg, Denmark<\/li>\n<li>Rued Langgaards Vej 4-8, DK-2300 K\u00f8benhavn Syd, Denmark<\/li>\n<\/ul>\n<p>Data center locations:<\/p>\n<ul>\n<li>The Capital Region of Denmark<\/li>\n<\/ul>\n<p><strong>Poland:<\/strong><\/p>\n<p>Netcompany Poland Sp. z.o.o<\/p>\n<ul>\n<li>ul. Pu\u0142awska 180, Pl-02-670 Warszawa, Poland<\/li>\n<\/ul>\n<p><strong>Norway:<\/strong><\/p>\n<p>Netcompany Norge AS<\/p>\n<ul>\n<li>\u00d8vre Voll Gate 15, 0158 Oslo, Norway<\/li>\n<\/ul>\n<p><strong>The Netherlands:<\/strong><\/p>\n<ul>\n<li>Netcompany Netherland B.V<br \/>\nKanaalweg 3b, 2628 EB Delft, The Netherlands<\/li>\n<\/ul>\n<p>Reference is made to the list in sub-appendix B, section B.1.<\/p>\n<h3>C.6 &#8211; Instruktion om overf\u00f8rsel af personoplysninger til tredjelande og internationale organisationer<\/h3>\n<p>The Data Processor does not transfer personal data to countries outside the EU\/EEA. If, at a later stage, the Data Processor wishes to transfer personal data to a country outside the EU\/EEA, this can only be done following specific instructions (authorisation) from the Data Controller.<\/p>\n<h3>C.7 &#8211; Procedurer for den Dataansvarliges revisioner, herunder inspektioner, af den behandling af personoplysninger, der udf\u00f8res af Databehandleren<\/h3>\n<p>The Data Processor shall each year at the Data Processor's own expense obtain an auditor's report from an independent third party concerning the Data Processor's compliance with the applicable EU or Member State data protection provisions.<\/p>\n<p>The Parties have agreed that the following auditor's reports may be used in accordance with the Clauses:<\/p>\n<ul>\n<li>General ISAE3000 type II (converning compliance with GDPR)<\/li>\n<li>General ISAE3402 type II (converning IT controls and relevant in relation to operating and hosting services at mit.dk)<\/li>\n<\/ul>\n<p>The Data Processor will, at the request and expense of the Data Controller, send all relevant information concerning sub-processor's compliance with applicable EU or Member State data protection provisions. \n\nInformation will as soon as possible be submitted to the Data Controller by his request. The Data Controller may contest the scope of the information and in such case request a new audit\/revision in relation to a revised scope and\/or different methodology. The Data Controller bears all the extra costs in this connection, including the Data Processor's reasonable costs in relation to the preparation of and participation in a revised audit.<\/p>\n<p>Documentation for such inspections shall without delay be submitted to the Data Controller after the completion of the inspection.  The Data Controller may contest the scope and\/or methodology of the report and may in such cases request a new inspection under a revised scope and\/or different methodology. The Data Controller bears all extra costs in this regard, including reasonable costs for the Data Processor and the sub-processor in relation to the preparation of and participation in a revised inspection.<\/p>\n<p>Based on the results of the audit, the data controller may request that additional measures be taken to ensure compliance with applicable EU and\/or member states' data protection regulations. The parties must agree on any additional measures to be implemented. The data controller is entitled to terminate the Main Agreement if the parties cannot reach an agreement on this.<\/p>\n<h3>C.8 &#8211; Procedurer for revision, herunder inspektioner, af behandling af personoplysninger, der udf\u00f8res af en underdatabehandler<\/h3>\n<p>The data processor will, at the request and expense of the data controller, request the sub-processor to submit all relevant information regarding the sub-processor's compliance with applicable EU law or national law of the member states regarding data protection.<\/p>\n<p>The information must be sent to the data controller as soon as possible upon request. The data controller may dispute the scope of the information and data, and in such cases, request a new audit\/inspection according to a revised scope and\/or another method. The data controller bears all additional costs associated with this, including the reasonable costs for the data processor and the sub-processor in connection with the preparation for and participation in a revised inspection.<\/p>\nThe data processor or the data processor's representative must also have access to inspect, including physically inspect, the locations where the processing of personal data is carried out by the sub-processor, including physical facilities and systems used for and in connection with the processing. The inspections are conducted to the extent that the data processor (or the data controller) deems it necessary. The data controller bears all costs associated with such physical inspections.<br \/>\nDocumentation of the inspections must be sent to the data controller as soon as possible after the inspections are completed. The data controller may dispute the scope and\/or method of the inspections and, in such cases, request a new inspection according to a revised scope and\/or another method. The data controller bears all additional costs associated with this, including the reasonable costs for the data processor and the sub-processor in connection with the preparation for and participation in a revised inspection.\n<p>Based on the results of the audit, the data controller may request that additional measures be taken to ensure compliance with applicable EU and\/or member states' data protection regulations. The parties must agree on any additional measures to be implemented. The data controller is entitled to terminate the Main Agreement if the parties cannot reach an agreement on this.<\/p>\n\t<h2>Underbilag D &#8211; Parternes regulering af andre forhold<\/h2>\n<h3>D.1. Consequences as a result of an unlawful instruction<\/h3>\n<p>In situations where the Data Processor has informed the Data Controller that an instruction in the Data Processor's opinion is unlawful, and the Data Controller does not agree hereto, the Data Controller must explain in writing, why the Data Controller considers the instruction to be lawful.<\/p>\n<p>If the Parties continue to disagree, they shall each prepare a memorandum setting out their views and sign and date this. The memoradums must be exchanged between the Parties and must as a minimum be stored for the duration of the processing, cf. sub-appendix A. If the Data Processor continues to assess that the instruction is unlawful, the Data Processor can terminate the Main Agreement.<\/p>\n<h3>D.2. The Data Processor's services<\/h3>\nAll services provided by the Data Processor which are not separately priced in the Clauses will be invoiced to the Data Controller in accordance with the time spend and pursuant to the prices informed to the Data Controller.<br \/>\nIn cases where changes to applicable law and\/or case law related to data protection provisions give rise to new and\/or changes obligations to the Data Controller and the Data Processor, each Party bears its own costs related to the compliance of each Party's respective obligations as Data Controller and Data Processor.\n<h3>D.3. Liability for compensation<\/h3>\nReference is made to the provisions on compensation in the Main Agreement.<br \/>\nUnderbilag E &#8211; Tekniske og organisatoriske sikkerhedsforanstaltninger implementeret hos databehandleren\n<h2>Underbilag E &#8211; Tekniske og organisatoriske sikkerhedsforanstaltninger implementeret hos databehandleren<\/h2>\n\t<p>Technical and organizational security precautions<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Area:<\/strong><\/td>\n<td><strong>Measure:<\/strong><\/td>\n<td><strong>Description:\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"22\"><strong>Access control<\/strong>\n&nbsp;<\/td>\n<td>Passwords<\/td>\n<td>All employees must have an individual password to the required systems and units, e.g., mobile phones, computers etc. Furthermore, all units must be locked when they are left unattended.<\/td>\n<\/tr>\n<tr>\n<td>Access from external locations<\/td>\n<td>To access the Data Processors internal systems, it is required that the users log in with an internal NCLAN account and is approved via VPN software<\/td>\n<\/tr>\n<tr>\n<td>Access from internal server rooms and main networks<\/td>\n<td>Eksternal parties are only allow to acces internal server rooms if they are accompanied by one of the Data Processor's employees. Only selected employees have acces to the rooms.<\/td>\n<\/tr>\n<tr>\n<td>Antivirus<\/td>\n<td>Antivirus programs are installed on all computers. Windows servers and Linux servers are updated frequently.<\/td>\n<\/tr>\n<tr>\n<td>Anti-spam and anti-phishing<\/td>\n<td>Anti-spam and anti-phishing software is installed on the internal mailsystem.<\/td>\n<\/tr>\n<tr>\n<td>Access control<\/td>\n<td>An authorisation system has been implemented in the organisation, which ensures that only relevant employees have access to the various systems. The authorisation system is built on the principle of minimum access.<\/td>\n<\/tr>\n<tr>\n<td>Clean desk policy<\/td>\n<td>Physical documents are rarely used, and if used, they are put away when not in use.<\/td>\n<\/tr>\n<tr>\n<td>DDoS attack<\/td>\n<td>The Data Processor has DDoS protection integrated against the Data Processor's ISP on the lines of the internet.<\/td>\n<\/tr>\n<tr>\n<td>Abolition of physical material<\/td>\n<td>All physical and confidential material is abolished by the use of locked garbage bin and subsequent shredding.<\/td>\n<\/tr>\n<tr>\n<td>Encryption<\/td>\n<td>All computers, e-mails and back-ups are encrypted and guidelines are implemented to ensure that data on mobile units is also encrypted.<\/td>\n<\/tr>\n<tr>\n<td>Endpoint security<\/td>\n<td>Endpoint security is established through antivirus programs, endpoint detection and response (EDR), frequent system updates, software alarms etc.<\/td>\n<\/tr>\n<tr>\n<td>Firewalls<\/td>\n<td>Firewalls are installed to protect against unauthorised access.<\/td>\n<\/tr>\n<tr>\n<td>IAM<\/td>\n<td>Identity and access controls are implemented by the use of individual user accounts.<\/td>\n<\/tr>\n<tr>\n<td>Information sharing<\/td>\n<td>In relation to data hosted by the Data Processor, data is encrypted and the encryption keys is send separately or in other secure ways with respect to the content of the data. The exchange of data will always take place through secure connections.<\/td>\n<\/tr>\n<tr>\n<td>Logging<\/td>\n<td>Information about user identity and user actions are logged.<\/td>\n<\/tr>\n<tr>\n<td>Network segmentation<\/td>\n<td>All systems are isolated from each other and all network equipment is provided by large suppliers, including Cisco, and only supplier supported equipment is used.<\/td>\n<\/tr>\n<tr>\n<td>Confidentiality agreements<\/td>\n<td>Confidentiality agreements are entered into with all employees, external consultants and other business partners who process personal data on behalf of the Data Processor.<\/td>\n<\/tr>\n<tr>\n<td>Protection against malware<\/td>\n<td>Antivirus software is installed on all computers and all downloaded software is monitored.<\/td>\n<\/tr>\n<tr>\n<td>Registration of guests<\/td>\n<td>All guests must wear a visible batch stating that they are guests.<\/td>\n<\/tr>\n<tr>\n<td>Secure abolition of equipment<\/td>\n<td>All equipment is wiped of all information before it is disposed of.<\/td>\n<\/tr>\n<tr>\n<td>Separation between development, test and production environments<\/td>\n<td>Development, test and production environments are kept separate from each other.<\/td>\n<\/tr>\n<tr>\n<td>Revocation of access rights<\/td>\n<td>Access rights are revoked when an employment or business relation has ended, or when an employee moves to another project.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"7\"><strong>Data access<\/strong><\/td>\n<td>Back-up<\/td>\n<td>The Data Processor works with a complete back-up solution, which includes a combination of local and external back-up. Data is thus protected in the Data Processor's primary data center while a full copy at the same time is always at the Data Processor's secondary data center.<\/td>\n<\/tr>\n<tr>\n<td>Equipment maintenance<\/td>\n<td>All the equiptment of the Data Processor is maintained continously.\n&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>Power supply security<\/td>\n<td>Datacentrene har flere l\u00f8sninger implementeret til beskyttelse af str\u00f8mforsyningen, UPS&#8217;er og k\u00f8ling. Retningslinjer for str\u00f8mforsyningen til udstyr sammen med den \u00e5rlige test af A\/B-feed sikrer korrekt funktion og ops\u00e6tning. Ved k\u00f8ling anvendes det samme k\u00f8lelement, men er redundant i begge ender af dette.<\/td>\n<\/tr>\n<tr>\n<td>Server room<\/td>\n<td>Best practice is used when IT equipment in the server room and at the data centers are inspected.<\/td>\n<\/tr>\n<tr>\n<td>Software updates and patching<\/td>\n<td>All computersoftware is updated and patched regularly.<\/td>\n<\/tr>\n<tr>\n<td>Code review<\/td>\n<td>All new codes or changes to existing codes is reviewed accordingly and approved by another employee than the encoder.<\/td>\n<\/tr>\n<tr>\n<td>Test of code<\/td>\n<td>The developed code is first tested by the encoder, then through peer review, then by testers and along the way static code analysis is performed by SonarQube.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\"><strong>Staff<\/strong><\/td>\n<td>Awareness<\/td>\n<td>All employees are obligated to yearly read and confirm that they have read the Data Processor's security policy, procedures and privacy policies.<\/td>\n<\/tr>\n<tr>\n<td>Criminal records<\/td>\n<td>Clean criminal records are required of the Data Processor's staff in critical positions.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\"><strong>Physical security<\/strong><\/td>\n<td>Alarm devices<\/td>\n<td>Alarmer er installerede p\u00e5 alle Databehandlerens kontorer for at undg\u00e5 tyveri og\/eller h\u00e6rv\u00e6rk.<\/td>\n<\/tr>\n<tr>\n<td>Fire<\/td>\n<td>Ildslukkere er placeret p\u00e5 alle Databehandlerens kontorer.<\/td>\n<\/tr>\n<tr>\n<td>Video surveillance<\/td>\n<td>Alle indgange til Databehandlerens kontorer videooverv\u00e5ges.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"6\"><strong>Policies, procedures and security organisation<\/strong><\/td>\n<td>Legislation<\/td>\n<td>New legislation and practice is followed up on continuously.<\/td>\n<\/tr>\n<tr>\n<td>Policies for use of electronic devices<\/td>\n<td>Guidelines are implemented to ensure a secure use of electronic devices and it is required that all employees reads and follow the guidelines in this regard.<\/td>\n<\/tr>\n<tr>\n<td>Privacy policies<\/td>\n<td>All employees must read and follow the Privacy Policy of the Data Processor, which includes guidelines for how to process personal data in accordance with applicable data protection legislation.<\/td>\n<\/tr>\n<tr>\n<td>Security breaches<\/td>\n<td>The Data Processor has implemented a strict procedure for the handling of security breaches, which all employees are obliged to read and follow.<\/td>\n<\/tr>\n<tr>\n<td>Security policy<\/td>\n<td>The security policy is revised yearly and updated accordingly.<\/td>\n<\/tr>\n<tr>\n<td>Security organisation<\/td>\n<td>The Data Processor has a security organisation consisting of a security committee, security officers and security managers who meet on a regular basis to discuss general security.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>","protected":false},"excerpt":{"rendered":"<p>Databehandleraftale for post-l\u00f8sningen mit.dk til erhvervsdrivende Som Erhvervsdrivende, har du (herefter den &#8220;dataansvarlige&#8221;) og Netcompany A\/S, cvr-nr.: 14814833, Strandgade 3, 1401 K\u00f8benhavn K, Danmark (herefter &#8220;databehandleren&#8221;) (hver is\u00e6r en &#8220;Part&#8221; og sammen &#8220;Parterne&#8221;) aftalt f\u00f8lgende standardkontraktsbestemmelser (&#8220;Bestemmelserne&#8221;). Den Dataansvarlige accepterer, at dennes brug af mit.dk er underlagt Bestemmelserne ved den Dataansvarliges accept af Brugervilk\u00e5rene (herefter&hellip;<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-362","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/mit.dk\/en\/wp-json\/wp\/v2\/pages\/362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mit.dk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mit.dk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mit.dk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mit.dk\/en\/wp-json\/wp\/v2\/comments?post=362"}],"version-history":[{"count":6,"href":"https:\/\/mit.dk\/en\/wp-json\/wp\/v2\/pages\/362\/revisions"}],"predecessor-version":[{"id":973,"href":"https:\/\/mit.dk\/en\/wp-json\/wp\/v2\/pages\/362\/revisions\/973"}],"wp:attachment":[{"href":"https:\/\/mit.dk\/en\/wp-json\/wp\/v2\/media?parent=362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}