Transparent Business Solution B.V. Data Protection Addendum
This Data Protection Addendum (“Addendum“) applies to Transparent Business Solution B.V. as well as its other brands under which they DBA such as Cyberclaims and Scam Help (herein all referred to as “the Organization”) and is governing their operations, their website Terms of Service, as well as other written or electronic agreement that also incorporates this Addendum (herein all referred as the “Service Agreement”). In any of these cases, the Addendum aims to set forth protocols between the Company and their partners, customers and other operational data providers (herein all referred as the “Client”).
Client enters into this Addendum on behalf of itself and any Affiliates authorized to use the Services under the Service Agreement and who have not entered into a separate contractual arrangement with the Organization. For the purposes of this Addendum only, and except where otherwise indicated, references to the “Client” shall include Client and such Affiliates.
The Parties hereby agree that the terms and conditions set out below shall be added as an Addendum to the Service Agreement.
If you have any questions regarding this Addendum, please contact us at info@tbsbv.com.
This Addendum applies to the Organization’s Processing of Client Personal Data under the Service Agreement to the extent such Processing is subject to Data Protection Laws. This Addendum is governed by the governing law of the Service Agreement unless otherwise required by Data Protection Laws.
The Parties warrant that they and any staff and/or subcontractors will comply with their respective obligations under Data Protection Laws for the term.
The provisions of this Addendum are supplemental to the provisions of the Service Agreement. In the event of any inconsistency between the provisions of this Addendum and the provisions of the Service Agreement, they will take priority in this order: (a) any Standard Contractual Clauses or other measures to which the parties have agreed to (Cross-Border Transfer Mechanisms) , (b) this Addendum, (c) the Service Agreement. In the event that any provision of this Addendum and/or the Service Agreement contradicts, directly or indirectly, the Controller to Processor SCCs, the Controller to Processor SCCs will control.
To the extent permissible by law, Client shall (a) defend the Organization and its Affiliates (collectively, “Indemnified Parties”) from and against any and all claims, demands, suits, or proceedings made or brought against any of the Indemnified Parties by any third party (each, a “Claim”), and (b) indemnify and hold harmless the Indemnified Parties from and against any and all losses, damages, liabilities, fines and administrative fines, penalties, settlements, and costs and expenses of any kind (including, without limitation, reasonable legal, investigatory and consultancy fees and expenses) incurred or suffered by any of the Indemnified Parties, in each case arising from any breach by Client of this Addendum or of its obligations under applicable Data Protection Laws. the Organization may participate in the defence and/or settlement of a Claim under this Section 9 with counsel of its choosing at its own expense.
Description of Processing Activities for Client Personal Data
This Annex includes certain details of the Processing of Client Personal Data by the Organization in connection with the Services.
Data Exporter
Name: | Client (as defined in the Service Agreement) |
Address: | As set forth in the relevant Services Order Form. |
Contact person’s name, position and contact details: | As set forth in the relevant Services Order Form. |
Activities relevant to the data transferred under these Clauses: | Recipient of the Services provided by the Organization in accordance with the Service Agreement. |
Signature and date: | Signature and date are set out in the Service Agreement. |
Role (controller/processor): | Controller |
Data Importer
Name: | Transparent Business Solutions B.V. |
Address: | Kalvermarkt 53, 2511 CB, The Hague, The Netherlands |
Contact person’s name, position and contact details: | Julia Blokhina, Julia.b@tbsbv.com |
Activities relevant to the data transferred under these Clauses: | Provision of the Services to the Client in accordance with the Service Agreement. |
Signature and date: | Signature and date are set out in the Service Agreement. |
Role (controller/processor): | Processor |
Identify the competent supervisory authority/ies in accordance (e.g. in accordance with Clause 13 SCCs) | As determined by application of Clause 13 of the EU SCCs. |
Categories of data subjects whose personal data is transferred | Client’s authorized users of the Services |
Categories of personal data transferred | Processed automatically by the Services: · Names · email IDs Processed where and to the extent provided by Client or its authorized users in connection with audit services provided by the Organization: · address · date of birth · past employment details |
Sensitive personal data transferred | None |
Frequency of the transfer | Continuous |
Nature of the processing | The nature of the processing is more fully described in the Service Agreement and accompanying order forms but will include the following basic processing activities: The provision of Services to Client. In order to provide people data, the Organization receives identifying Client Personal Data to permit the Organization to query, cleanse, standardize, enrich, (when required) send to additional data to feed providers, and to store the query information. The purpose of the transfer is to facilitate the performance of the Services more fully described in the Service Agreement and accompanying order forms. |
Purpose of the data transfer and further processing | |
For processing involving California consumers, please select the Business Purpose(s) for Processing Personal Data | ☐ N/A ☐ Auditing related to counting ad impressions to unique visitors, verifying positioning and quality of ad impressions, and auditing compliance with this specification and other standards ☒ Helping to ensure security and integrity to the extent the use of the consumer’s personal information is reasonably necessary and proportionate for these purposes ☒ Debugging to identify and repair errors that impair existing intended functionality. ☐ Short-term, transient use, including, but not limited to, non-personalized advertising shown as part of a consumer’s current interaction with the business, provided that the consumer’s personal information is not disclosed to another third party and is not used to build a profile about the consumer or otherwise alter the consumer’s experience outside the current interaction with the business ☒ Performing services on behalf of the business, including maintaining or servicing accounts, providing Client service, processing or fulfilling orders and transactions, verifying Client information, processing payments, providing financing, providing analytic services, providing storage, or providing similar services on behalf of the business. ☐ Providing advertising and marketing services, except for cross-context behavioral advertising, to the consumer provided that, for the purpose of advertising and marketing, a service provider or contractor shall not combine the personal information of opted-out consumers that the service provider or contractor receives from, or on behalf of, the business with personal information that the service provider or contractor receives from, or on behalf of, another person or persons or collects from its own interaction with consumers. ☒ Undertaking internal research for technological development and demonstration. ☒ Undertaking activities to verify or maintain the quality or safety of a service or device that is owned, manufactured, manufactured for, or controlled by the business, and to improve, upgrade, or enhance the service or device that is owned, manufactured, manufactured for or controlled by the business. ☒ To retain and employ another service provider or contractor as a subcontractor where the subcontractor meets the requirements for a service provider or contractor under CCPA. ☒ To build or improve the quality of the services it is providing to the business even if this Business Purpose is not specified in the written contract required by CCPA provided that Service Provider does not use the Client Personal Data to perform Services on behalf of another person. ☒ To prevent, detect, or investigate data security incidents or protect against malicious, deceptive, fraudulent, or illegal activity, even if this Business Purpose is not specified in the written contract. |
Period for which the personal data will be retained or criteria used to determine that period | The period for which the Client Personal Data will be retained is more fully described in the Service Agreement, Addendum, and accompanying order forms. |
Subprocessor transfers – subject matter, nature, and duration of processing | The subject matter, nature, and duration of the Processing more fully described in the Service Agreement, Addendum, and accompanying order forms. |
Description of the technical and organisational security measures implemented by the Organization as the data processor/data importer to ensure an appropriate level of security, taking into account the nature, scope, context, and purpose of the processing, and the risks for the rights and freedoms of natural persons.
The Organization’s Sub-processors
Name of Sub-processor | Description of Processing | Location of Sub-processor |
Zendesk | Client Relationship Management (CRM) and ticketing services | AUS |
Google Workspace | Email and Cloud Database services | EU |
Connecteam | Internal Communication | USA |
Gmail | Email services | EU |
Pandadoc | Electronic signature | USA |
Guidepost Solutions LLC | Crypto Tracing Investigations | USA |
CYBERTRACE PTY LTD | Crypto Tracing Investigations | AUS |
All consultants are able to give you a free call back at any time.
Please correct errors before submitting this form.