VERIFI ISSUER CDRN DATA PROCESSING AGREEMENT
Updated: July 15, 2023
This CDRN Issuer Data Processing Agreement (“DPA”) is an agreement between you and the entity you represent or have the authority to bind such entity hereto (“Issuer” or “you”), on the one hand, and Verifi, Inc., a California corporation (“Verifi”), on the other hand. It forms part of any written agreement between you and Verifi under which Verifi Processes Personal Information on your behalf (each, an “Agreement”), except with respect to any Agreement under which you and Verifi have entered data processing terms that address the subject matter hereof. Capitalized terms used herein but not defined in this DPA will have the meanings given to them in the Agreement. Each of Verifi and Issue are referred to herein as a “party” and collectively as the “parties.”
1 Processing of Issuer Personal Information.
1.1 Processor designation. The parties acknowledge and agree that Verifi Processes on behalf of Issuer, Personal Information in order to provide Verifi Services (as defined in the Agreement), which Processing may include, by way of example and for illustrative purposes, the Processing detailed on the Details of Processing Issuer Personal Information (Exhibit 2), and that Verifi is a “processor” or “service provider” under Applicable Data Protection Law acting on Issuer’s instructions (referred to as “Processor” for purposes of this DPA).
1.2 Authorization to Process. Processor will Process Issuer Personal Information on behalf of Issuer to provide Verifi Services, and Processor is authorized to Process Issuer Personal Information solely in connection with the following activities:
1.2.1 In accordance with the applicable Agreement(s), including, without limitation, any statement of works, exhibits, schedules, to provide Verifi Services, and any Processing required under applicable laws or regulations.
2 Issuer obligations
2.1 Issuer shall provide its Data Subjects with all privacy notices, information and any necessary choices and shall obtain any necessary consents to enable Verifi to comply with Applicable Data Protection Law;
2.2 Where required by Applicable Data Protection Law, Issuer shall promptly inform Processor when Issuer Personal Information must be corrected, updated, and/or deleted;
2.3 Issuer shall ensure that at the point of transferring Issuer Personal Information to Processor, the Issuer Personal Information is adequate, relevant and limited to what is necessary in relation to the Processing contemplated under the Agreement and this DPA; and
2.4 Issuer shall comply (and as applicable, ensure that its third party auditor’s comply) with Processor’s relevant security policies and appropriate confidentiality obligations as set out in the Agreement.
3 Verifi obligations
3.1 Applicable Data Protection Law. To the extent necessary to enable Issuer to comply with its obligations under Applicable Data Protection Law, Verifi further agrees to comply with any required provisions of the GDPR Schedule (other than when acting in accordance with Section 1.2 of this DPA) and/or CCPA Schedule, each to the extent applicable.
3.2 Data Subject Rights. Processor will, to the extent legally permitted, provide reasonable assistance to Issuer to respond to requests from Data Subjects to exercise their rights under Applicable Data Protection Law (e.g., rights to access or delete Personal Information) in a manner that is consistent with the nature and functionality of Verifi Services. In the event that Verifi receives any such request, it shall notify the Issuer and the Issuer is responsible for handling such requests by a Data Subject in accordance with Applicable Data Protection Law.
3.3 Engaging with Sub-Processors. Processor shall ensure that when engaging with another data processor (a “Sub-Processor”) for the purposes of carrying out specific Processing activities on behalf of Issuer, there is an agreement between Processor and the relevant Sub-Processor that provides at least the same level of protection for Issuer Personal Information as set forth in this DPA.
3.4 Staff. Processor shall ensure that persons authorized to Process Issuer Personal Information are under an appropriate obligation of confidentiality in accordance with applicable laws or regulations governing the same.
3.5 Security of Processing. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk to the rights and freedoms of natural persons, Processor will implement technical and organizational measures to ensure a level of security appropriate to that risk. In assessing the appropriate level of security, Processor shall, in particular, take into account the risks that are presented by the Processing, in particular from unauthorized or unlawful Processing, accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Issuer Personal Information transmitted, stored or otherwise Processed. Processor shall provide reasonable assistance to Issuer in ensuring Issuer meets its own compliance obligations with respect to these same security measures.
3.6 PCI Compliance. Processor’s storage, processing, and transmission of any payment instrument data shall comply with the Payment Card Industry (PCI) Security Standard, and Processor shall regularly validate its compliance as determined by its status as a Service Provider (as Service Provider is defined in the PCI Security Standard). Upon Issuer’s request, Verifi shall provide Issuer with written confirmation of its PCI compliance status.
3.7 Security Breach
3.7.1 In the event of an actual Security Breach (defined below) affecting Issuer Personal Information contained in Processor’s systems, Processor shall (i) investigate the circumstances, extent and causes of the Security Breach and report the results to Issuer and continue to keep Issuer informed on a regular basis of the progress of Processor’s investigation until the issue has been effectively resolved; and (ii) cooperate with Issuer in any legally required notification by Issuer to affected Data Subjects. The obligations herein shall not apply to Security Breaches caused by Issuer or Issuer’s Data Subjects.
3.7.2 Processor shall notify Issuer without undue delay upon Processor or any Sub-Processor becoming aware of an actual Security Breach affecting Issuer Personal Information, providing the Issuer with sufficient information and reasonable assistance to allow Issuer to meet its obligations under Applicable Data Protection Law to (i) notify a Supervisory Authority (as defined under Applicable Data Protection Law) of the Security Breach; and (ii) communicate the Security Breach to the relevant Data Subjects.
3.7.3 Except as required by applicable law or regulation, Processor will not make (nor permit any third party to make) any statement concerning the Security Breach that directly or indirectly references Issuer, unless Issuer provides its explicit written authorization.
3.8 Deletion and Retention. Processor shall, at the choice of Issuer, delete all Issuer Personal Information upon termination of the Agreement and delete existing copies unless storage is required by applicable law.
4 Miscellaneous. The terms of this DPA shall apply only to the extent required by Applicable Data Protection Law. To the extent not inconsistent herewith, the applicable provisions of the Agreement(s) (including without limitation, indemnifications, limitations of liability, enforcement, and interpretation) shall apply to this DPA. In the event of any conflict between this DPA and the terms of an applicable Agreement, the terms of this DPA shall control solely with respect to data processing terms where required by Applicable Data Protection Law, and, in all other respects, the terms of the applicable Agreement shall control. Notwithstanding any term or condition of this DPA, this DPA does not apply to any data or information that does not relate to one or more identifiable individuals, that has been aggregated or de-identified in accordance with Applicable Data Protection Law, or to the extent that Processor and you have entered separate data processing terms that address the subject matter hereof.
5 Definitions. Unless otherwise defined in the Agreement (including this DPA), all terms in this DPA shall have the definitions given to them in Applicable Data Protection Law.
5.1 “Applicable Data Protection Law” means any law or regulation pertaining to data protection, privacy, and/or the Processing of Personal Information, to the extent applicable in respect of a party’s obligations under the Agreement and this DPA. For illustrative purposes only, “Applicable Data Protection Laws” include, without limitation, and to the extent applicable, the General Data Protection Regulation (Regulation (EU) 2016/679 (the “GDPR”), UK Data Protection Laws, the California Consumer Privacy Act of 2018, Cal. Civ. Code § 1798.100 et seq. (“CCPA”), Swiss DP Laws and any associated regulations or any other legislation or regulations that transpose or supersede the above;
5.2 “EEA Standard Contractual Clauses” means the Standard Contractual Clauses set out in the European Implementing Decision (EU) 2021/914 on standard contractual clauses for the transfer of personal data to third countries pursuant to Regulation (EU) 2016/679, as amended or replaced from time to time by a competent authority under the Applicable Data Protection Law, including the Swiss amendments to the EU Standard Contractual Clauses required by the Swiss Federal Data Protection Information Commissioner (the “Swiss Addendum”) to the extent applicable;
5.3 “Personal Information” means all data or information, in any form or format, that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer (“Data Subject”) or household or that is regulated as “personal data,” “personal information,” or otherwise under Applicable Data Protection Law. For the avoidance of doubt, this includes any information relating to a Data Subjects as defined in the Agreement. For the avoidance of doubt, this includes data relating to legal entities, if and as long as they are protected under the Swiss DP Laws as well as any information relating to an End-User as defined in the Agreement;
5.4 “Process” or “Processed” or “Processing” means any operation or set of operations which is performed upon Personal Information , whether or not by automatic means, such as access, collection, recording, organization, storage, adaptation or alteration, retrieval, disclosure or otherwise making available, duplication, transmission, combination, blocking, redaction, erasure or destruction;
5.5 “Security Breach” means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Personal Information. A Security Breach includes a “personal data breach” (as defined in the GDPR), a “breach of security of a system” or similar term (as defined in any other applicable privacy laws) as well as any other event that compromises the security, confidentiality or integrity of Personal Information.
5.6 “Swiss DP Laws” means the Federal Act on Data Protection of June 19, 1992 (as updated, amended and replaced from time to time), including all implementing ordinances. In this DPA, in circumstances where and solely to the extent that the Swiss DP Laws apply, references to the GDPR and its provisions shall be construed as references to the Swiss DP Laws and their corresponding provisions;
5.7 “Transfer” means to transmit or otherwise make Issuer Personal Information available across national borders in circumstances which are restricted by Applicable Data Protection law;
5.8 “UK Data Protection Laws” means the GDPR as transposed into United Kingdom national law by operation of section 3 of the European Union (Withdrawal) Act 2018 and as amended by the Data Protection, Privacy and Electronic Communications (Amendments etc.) (EU Exit) Regulations 2019 (“UK GDPR“), together with the Data Protection Act 2018, the Data Protection, Privacy and Electronic Communications (Amendments etc.) (EU Exit) Regulations 2019 and other data protection or privacy legislation in force from time to time in the United Kingdom. In this DPA, in circumstances where and solely to the extent that the UK GDPR applies, references to the GDPR and its provisions shall be construed as references to the UK GDPR and its corresponding provisions;
5.9 “UK IDTA” means, the International Data Transfer Addendum to the EEA Standard Contractual Clauses issued by the UK Information Commissioner under section 119A(1) Data Protection Act 2018.
California Consumer Privacy Act
This Schedule applies in addition to any terms set forth in the body of the DPA (and is incorporated therein) when the California Consumer Privacy Act applies to your use of Verifi Services (the “Services”).
1.1 The parties agree that to the extent Issuer participates in Visa’s payment system as a Visa Member of Visa U.S.A. Inc (with the rights and obligations set forth in the Visa U.S.A. Inc. Certificate of Incorporation, Bylaws and Core Rules and Product and Service Rules, and associated documentation with the force of the Core Rules—as amended from time to time, subject to any waivers granted as set forth in this Agreement—collectively the “Visa Rules”), the privacy and data protection sections of such Visa Rules will continue to govern the Processing of data that is regulated by Applicable Data Protection Law in the U.S. This Schedule supplements the Visa Rules as set forth below so the parties can comply with applicable provisions of the California Consumer Privacy Act of 2018 and its implementing regulations, as amended or superseded from time to time (California Civil Code §§ 1798.100 to 1798.199) (collectively, the “CCPA”). The Visa Rules and this Schedule shall be interpreted consistently to the extent possible, with the terms of this Schedule supplementing as to its subject matter only to the extent necessary for compliance with the CCPA.
1.2 This Schedule is applicable solely to the extent that any Personal Information Processed by Verifi while performing the Services is subject to the CCPA. Notwithstanding anything else to the contrary, the parties agree that this Schedule does not apply to any information that is collected, processed, or sold or disclosed by the parties subject to the Gramm Leach Bliley Act (“GLBA”).
1.3 Capitalized terms used but not defined in this Schedule shall have meaning assigned to such terms in the Agreement or, if not defined therein, in the CCPA. In the event of a conflict between this Schedule and the Agreement, this Schedule will control, to the extent necessary to ensure compliance with the CCPA. The foregoing recitals are hereby incorporated by reference into this Schedule.
2. DATA PRIVACY ROLES AND OBLIGATIONS
2.1 For purposes of this Schedule, the Parties acknowledge that, with respect to Personal Information Verifi processes on behalf of Issuer under the Agreement that is not processed pursuant to GLBA (a) Issuer acts as a Business within the meaning provided by the CCPA and this Schedule; and (b) Verifi acts as a Service Provider within the meanings provided by the CCPA.
2.2 For the avoidance of doubt, Verifi is not acting as a Third Party, nor is Verifi providing Cross-Contextual Behavioral Advertising under this Schedule. If Issuer seeks to utilize Verifi for such services, the Parties will agree to a separate Schedule with the required clauses and obligations, as required in the CCPA, as described in California Civil Code §§ 1798.145(d).
2.3 Each Party shall comply with its obligations under the CCPA in respect of any Personal Information Processed under this Schedule. Issuer specifically acknowledges and agrees that its use of the Services will not violate the rights of any Consumer, including those that have opted-out from sales or other disclosures of Personal Information, to the extent applicable under the CCPA.
3. VERIFI OBLIGATIONS
3.1 In its role as a Service Provider, Verifi:
a) Will protect and secure Personal Information in accordance with the CCPA and shall provide the same level of privacy protection as is required by the CCPA;
b) Will Process Personal Information only for the specific business purposes set forth in the Agreement;
c) Except as permitted by the CCPA, will not sell or share Personal Information or retain, use, or disclose Personal Information (i) for any purpose other than as necessary to fulfill the business purposes set forth in the Agreement, including retaining, using, or disclosing Personal Information for a commercial purpose other than the business purpose set forth in the Agreement; or (ii) outside of the direct business relationship between Verifi and Issuer;
d) Will not combine the Personal Information with Personal Information that it receives from or on behalf of any other person(s) or entity(ies), or collects from its own interaction with an individual, except as otherwise permitted by the CCPA;
e) Will implement reasonable security procedures and practices, appropriate to the nature of the Personal Information, to protect the Personal Information from unauthorized or illegal access, destruction, use, modification, or disclosure;
f) Will immediately notify Issuer of any material changes in Verifi’s ability to meet its obligations under the CCPA, including but not limited to any determination that Verifi can no longer meet its obligations under this Schedule;
g) Will ensure that Verifi’s agreement with any sub-processors used to Process Personal Information complies with the CCPA, including, without limitation, the contractual requirements for Service Providers and Contractors;
h) Will provide reasonable cooperation to Issuer, upon request, to enable Issuer to comply with consumer requests made pursuant to the CCPA;
i) Grants Issuer the right to take reasonable and appropriate steps in accordance with the Agreement to ensure that Verifi uses Personal Information in a manner consistent with Issuer’s obligations under the CCPA; and
j) Grants Issuer the right, upon notice, and in accordance with the Agreement to take reasonable and appropriate steps to stop and remediate Verifi’s unauthorized use of Personal Information.
Verifi certifies that it understands its obligations, including restrictions, imposed upon it by CCPA with respect to Personal Information and will comply with them.
3.2 Notwithstanding the above, Verifi may retain, use or disclose Personal Information as permitted under the CCPA, including:
a) To retain and employ another Service Provider or Contractor as a subcontractor in accordance with Section 3.1(g) of this Schedule and any other applicable terms of the Agreement where the subcontractor meets the requirements for a Service Provider or Contractor under CCPA;
b) For its internal use to build or improve the quality of the Services, provided that Verifi does not use the Personal Information to perform services on behalf of another person;
c) To prevent, detect, or investigate data security incidents or protect against malicious, deceptive, fraudulent or illegal activity;
d) For the purposes enumerated in California Civil Code § 1798.145(a)(1) through §1798.145(a)(7); and/or
e) For any other purpose expressly contemplated or permitted by CCPA or other applicable law.
General Data Protection Regulation, UK GDPR AND SWISS DP LAWS
This GDPR Schedule applies in addition to any terms set forth in the body of the DPA (and is incorporated therein) when the GDPR, UK GDPR and/or the Swiss DP Laws applies to your use of Verifi Services. Capitalized terms not defined herein have the meaning assigned to them under the DPA. To the extent there are any conflicts between this GDPR Schedule and the DPA, this GDPR Schedule shall prevail.
1 Processor Obligations
1.1 Processing of Issuer Personal Information. Verifi shall Process Issuer Personal Information pursuant only to documented reasonable instructions from Issuer (including instructions with respect to transfers of Issuer Personal Information to a third country, if applicable) unless required to do so by Applicable Data Protection Law. In such circumstances, Processor shall inform Issuer of that legal requirement before processing, unless that law prohibits such information on important grounds of public interest.
1.2 Use of Sub-Processor
1.2.1 Processor reserves the right to maintain its Sub-Processor list through means such as publication of its Sub-Processor list online and also update it accordingly. In accordance with section 1.2.2 of this GDPR Schedule, Issuer provides authorization for Processor to engage with those Sub-Processors. Processor currently engages the Sub-Processor as listed at Exhibit 3 to this DPA.
1.2.2 Processor shall inform Issuer of any intended changes concerning the addition or replacement of other Sub-Processors to give Issuer the reasonable opportunity to object to such changes. In the event Issuer objects to Processor’s change or addition of Sub-Processor, Issuer shall promptly notify Processor of its objections in writing within ten (10) business days after receipt of Processor’s notice of such change or addition.
1.2.3 Processor may, at its option, undertake reasonable efforts to make available to Issuer a change in Verifi Services or recommend a commercially reasonable change to Issuer’s configuration or use of Verifi Services to avoid Processing of Issuer Personal Information by the objected-to new Sub-processor. If Processor is unable to make available such change within a reasonable period of time, which shall not exceed thirty (30) days, Issuer may terminate the Agreement with respect to only those aspects of Verifi Services, which cannot be provided by Processor without the use of the objected-to new Sub-Processor by providing written notice to Processor.
2 Data Protection Impact Assessments and Prior Consultation with Regulator
2.1 Processor shall immediately inform Issuer if, in Processor’s opinion, Issuer’s instructions would be in breach of Applicable Data Protection Law. Issuer agrees that Processor shall be under no obligation to take actions designed to form any such opinion.
2.2 Processor shall provide reasonable assistance to Issuer with any legally required (a) data protection impact assessments; and (b) prior consultations initiated by the Issuer with its regulator in connection with such data protection impact assessments. Such assistance shall be strictly limited to the Processing of Issuer Personal Information by Processor on behalf of Issuer under the Agreement taking into account the nature of the Processing and information available to Processor.
3 Demonstrating Compliance with this DPA
3.1 Processor shall make available to Issuer information necessary to demonstrate compliance with its obligations under this DPA and allow for (and contribute to) audits, including inspections conducted by Issuer or another auditor under the instruction of the Issuer for the same purposes of demonstrating compliance with the obligations set out in this DPA.
3.2 Issuer’s right under Section 3.1 of this GDPR Schedule is subject to the following:
3.2.1 If requested by Issuer, on no more often than an annual basis during the term of the Agreement, Verifi shall (i) provide Issuer with a copy of the result of its annual SOC 2, Type II audit within a reasonable period after receiving the report from its auditor; and (ii) provide Issuer with a copy of the Attestation of Compliance resulting from its annual PCI audit within a reasonable period after receiving the report from its Qualified Security Assessor.
To the extent that Processor can demonstrate compliance with its obligations set out in this DPA by adhering to an approved code of conduct, by obtaining an approved certification or by providing Issuer with an audit report issued by an independent third party auditor (provided that Issuer will comply with appropriate confidentiality obligations as set out in the Agreement and shall not use such audit report for any other purpose), Issuer agrees that it will not conduct an audit or inspection under Section 3.1 above.
4 Cross-Border Transfers
4.1 Processor shall comply with Issuer’s documented instructions concerning the transfer of Issuer Personal Information to a third country.
4.2 The Processor shall only Transfer any Issuer Personal Information outside the European Economic Area (“EEA”), the UK or Switzerland, in compliance with the Applicable Data Protection Law.
4.3 Issuer agrees and acknowledges that Processor transfers and stores certain Issuer Personal Information (relating to individuals located in the EEA, Switzerland and/or the UK) in the United States.
4.4 Transfers subject to the GDPR, UK GDPR, or Swiss DP Laws: Module 2 (transfer controller to processor) of the EEA Standard Contractual Clauses shall apply with respect to any transfer of Issuer Personal Information from the EEA, UK, or Switzerland to Verifi and any of its affiliated entities in the United States or other third countries (“Verifi Entities“). The parties acknowledge and agree that Module 2 (transfer controller to processor) of the EEA Standard Contractual Clauses is hereby incorporated by reference and;
4.4.1 Issuer and any of its commonly owned or controlled affiliates that have signed an Agreement for Verifi Product and Services (“Issuer Entities“) shall be deemed to be “data exporters” and the Verifi Entities shall be the “data importer”;
4.4.2 Clause 7 – Docking clause shall apply;
4.4.3 Clause 9 – Use of subprocessors Option 2 shall apply and the “time period” shall be 10 business days;
4.4.4 Clause 11(a) – Redress the optional language shall not apply;
4.4.5 Clause 13(a) – Supervision
a) Where the data exporter is established in an EU Member State the following shall apply: “The supervisory authority with responsibility for ensuring compliance by the data exporter with Regulation (EU) 2016/679 as regards the data transfer, as indicated in Annex I.C , shall act as competent supervisory authority.”
b) Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) and has appointed a representative pursuant to Article 27(1) of the GDPR the following shall apply: “The supervisory authority of the Member State in which the representative within the meaning of Article 27(1) of Regulation (EU) 2016/679 is established, as indicated in Annex I.C, shall act as competent supervisory authority.”
c) Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of the GDPR in accordance with its Article 3(2) without however having to appoint a representative pursuant to Article 27(2) of the GDPR, the following shall apply: “The supervisory authority of one of the Member States in which the data subjects whose personal data is transferred under these Clauses in relation to the offering of goods or services to them, or whose behaviour is monitored, are located, as indicated in Annex I.C, shall act as competent supervisory authority.”
4.4.6 Clause 17 – Governing law Option 1 shall apply and the “Member State” shall be Ireland;
4.4.7 Clause 18 – Choice of forum and jurisdiction the Member State shall be Ireland; and
4.4.8 the information in Exhibit 1 (Table 1) of this GDPR Schedule is incorporated into Annexes 1, 2 and 3 of the EEA Standard Contractual Clauses.
4.5 Transfers subject to the UK GDPR where the Transfer is subject to the UK GDPR, the EEA Standard Contractual Clauses and Section 4.4 of this Schedule B shall be read in accordance with, and deemed amended by, the provisions of Part 2 (Mandatory Clauses) of the UK IDTA. For the purposes of Table 4 in Part 1 (Tables) of the UK IDTA, the parties select the “neither party” option.Otherwise, the Parties confirm that the information required for the purposes of Part 1 (Tables) of the UK IDTA is set out in Exhibit 1.
4.6 If there is any conflict or inconsistency between a term in the body of this DPA, an Agreement and a term in Module 2 (transfer controller to processor) of the EEA Standard Contractual Clauses , incorporated into this DPA, the term in Module 2 (transfer controller to processor) of the EEA Standard Contractual Clauses shall take precedence.
4.7 Transfers subject to Swiss DP Laws: Where the Transfer is subject to the Swiss DP Laws, the EEA Standard Contractual Clauses and Section 4.4 of this Schedule B shall be read in accordance with this section 4.7. To the extent the Swiss DP Laws are applicable to a data export under the EEA Standard Contractual Clauses set forth in this DPA, the Parties agree on the following amendments to the EEA Standard Contractual Clauses and Section 4.4 of this Schedule B:
4.7.1 The term “Member State” according to Clause 18 (c) of the EEA Standard Contractual Clauses shall not be interpreted in a such a way that data subjects in Switzerland are excluded from exercising their rights, if any, at their place of habitual residence;
4.7.2 The supervisory authority pursuant to Clause 13 of the EEA Standard Contractual Clauses is the Swiss Federal Data Protection and Information Commissioner;
4.7.3 The law applicable to the EEA Standard Contractual Clauses pursuant to Clause 17 of the EEA Standard Contractual Clauses shall be Swiss DP Laws;
4.7.4 The place of jurisdiction under Clause 18 (b) of the EEA Standard Contractual Clauses shall be the courts of the city of Zurich;
4.7.5 Where the EEA Standard Contractual Clauses include references to the GDPR, such references shall be understood as references to the Swiss DP Laws.
Information Required for the EEA Standard Contractual Clauses, THE UK IDTA, AND SWISS DP LAWS
|ANNEX I A. LIST OF PARTIES|
|Data EXPORTER identity and contact details|
|Address||To be provided on request|
|Contact person’s name, position and contact details:||To be provided on request|
|Activities relevant to the data transferred under these Clauses:||As set out in the table in Exhibit 2 under “Nature and Purpose of the Processing”.|
|Data IMPORTER identity and contact details|
|Address||900 Metro Center Boulevard Foster City, CA 94404 U.S.A.|
|Contact person’s name, position and contact details:||firstname.lastname@example.org|
|Activities relevant to the data transferred under these Clauses:||As set out in the table in Exhibit 2 under “Nature and Purpose of the Processing”.|
|ANNEX I B. DESCRIPTION OF TRANSFER|
|Categories of data subjects whose personal data is transferred||As set out in the table in Exhibit 2 under “Categories of Data Subjects”.|
|Categories of personal data transferred||As set out in the table in Exhibit 2 under “Types of Personal Information”.|
|Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.||Not Applicable|
|The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis).||Continuous|
|Nature of the processing||As set out in the table in Exhibit 2 under “Nature and Purpose of the Processing”.|
|Purpose(s) of the data transfer and further processing||As set out in the table in Exhibit 2 under “Nature and Purpose of the Processing”.|
|The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period||Personal data will be retained in accordance with Verifi’s retention policies, for only as long as is required to meet Verifi’s legal, regulatory and operational requirements and as necessary to perform services.|
|For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing||As set out in the table in Exhibit 2 under “Nature and Purpose of the Processing”.|
|Annex I C. Competent Supervisory Authority|
|Competent supervisory authority/ies||To be provided by the data exporter on request.|
|ANNEX II TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA|
|Description of the technical and organisational measures implemented by the data importer(s) (including any relevant certifications) to ensure an appropriate level of security, taking into account the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons.||Verifi is certified as compliant with all standards established by the Payment Card Industry Data Security Standards (together with any successor organization thereto, “PCI DSS”) that are applicable to Verifi and its affiliates (such standards, the “PCI Standards”). As evidence of compliance, Verifi will provide its current Attestation of Compliance signed by a Payment Card Industry Qualified Security Assessor upon Issuer’s written request. Verifi maintains and enforces commercially reasonable information security and physical security policies, procedures and standards, that are designed (i) to insure the security and confidentiality of Issuer’s records and information, (ii) to protect against any anticipated threats or hazards to the security or integrity of such records, and (iii) to protect against unauthorized access to or use of such records or information which could result in substantial harm (the “Verifi Information Security Program”). At a minimum, the Verifi Information Security Program is designed to align with the standards set forth in ISO 27002 published by the International Organization for Standardization, as well as any revisions, versions or other standards or objectives that supersede or replace the foregoing. Verifi engages its independent certified public accountants to conduct a review of Verifi’s operations and procedures at Verifi’s cost. The accountants conduct the review in accordance with the American Institute of Certified Public Accounts Statement on Standards for Attestation Engagements No. 18 SOC I Type II (“SSAE 18”) and record their findings and recommendations in a report to Verifi. Upon request, and subject to standard confidentiality obligations, Verifi will provide its most recent SSAE 18 and, in Verifi’s reasonable discretion, additional information reasonably requested to address questions or concerns regarding the SSAE 18’s findings.|
|For transfers to (sub-) processors, also describe the specific technical and organisational measures to be taken by the (sub-) processor to be able to provide assistance to the controller and, for transfers from a processor to a sub-processor, to the data exporter||In respect of Transaction Services: initiatives, products, processes and supporting technology are assessed from a data privacy perspective, allowing Verifi to embed privacy controls to mitigate risks at early stages (privacy by design). Verifi has a robust privacy risk assessment framework (including privacy impact assessments), embedding this process in our change vehicles across the business, to ensure that both new and changed personal data processing activities are reviewed. Where Customer requires specific assistance, Customer may submit such requests for assistance to email@example.com|
|ANNEX III LIST OF SUB-PROCESSORS The controller has authorised the use of the following sub-processors:|
|As set out in Exhibit 3 of this DPA.|
Details of Processing Issuer Personal Information
|Service||Nature and purpose of the processing||Types of personal information||Categories of data subjects to whom the personal information relates to|
|CDRN||CDRN allows Issuers to actively process non-fraud and confirmed fraud pre-dispute cases with a refund or cancellation avoiding a Dispute.||If the Issuer opts to use CDRN, Verifi will use required transaction information, including, without limitation, transaction information and order detail information necessary for Processing the Issuer’s decisioning as it relates to a pre-dispute case to Issuer. Further detail is included in the applicable Services Documentation provided at the time of implementation of the Service.||Issuer’s employees, agents, advisors, or representatives; and/or Consumers.|
EXHIBIT 3 – LIST OF SUB-PROCESSORS
|Company||Functions Performed||Location||Applicable Service|
|Visa U.S.A., Inc.||Security and fraud management||U.S.A.||All|