Data Processing Agreement
Please read this document carefully. It contains important information about your rights and obligations.
It also contains a disclaimer of warranty and a limitation of liability cause.
eyworks Limited, a private limited company under the laws of England and Wales, with registration number 07939645 and registered address Acorn House, 381 Midsummer Boulevard, Milton Keynes, England, MK9 3HP provides a range of applications for nurseries to successfully manage their childcare business.
This Data Processing Agreement is not applicable to the processing of personal data by eyworks Ltd. through services or activities other than the applications as meant in this Data Processing Agreement. For personal data processed through other services or activities than the aforementioned application, eyworks Ltd. acts as the Data Controller as defined by the GDPR. For more information, please refer to our privacy policy, available here:
You can contact us via dpo@eyworks.co.uk.
WHEREAS:
- Under this data processing agreement, the Processor will process Personal Data; and
- The Controller and Processor wish to formalise the terms and conditions applicable to the processing of personal data in this
THE PARTIES HAVE NOW AGREED AS FOLLOWS:
ARTICLE 1 DEFINITIONS
1.1 Terms with a capital in the Agreement are definitions and are set out in Annex A. All terms in the Agreement not defined in Annex A, but defined in the Data Protection Legislation will have the meaning as assigned thereto in the Data Protection Legislation.
ARTICLE 2 INSTRUCTIONS
2.2 The Processor will comply with the Data Protection Legislation in relation to the Personal Data of the Controller.
2.3 The Processor will only process Personal Data:
- for the provision of the Services;
- on written instructions from Controller, including, but not limited to, the instructions as set out in Annex B; or
- if required to do so by law to which the Processor is In that case, the Processor will notify the Controller of that legal requirement before the processing, unless those laws prohibit such notification.
ARTICLE 3 SECURITY
3.1 The Processor shall take appropriate technical and organisational measures to protect the Personal Data in accordance with the Data Protection Legislation. These measures are described in Annex C.
3.2 The Parties acknowledge that security measures need to be frequently updated in order to comply with the Data Protection Legislation. The Processor will therefore regularly evaluate and, if necessary, take any follow-up measures to maintain compliance with the Data Protection Legislation.
ARTICLE 4 SUBCONTRACTORS
4.2 The Processor shall obligate all Subcontractors to comply with the same obligations the Processor has under the Agreement.
4.3 The Processor shall remain fully liable towards the Controller for any acts or omissions by Subcontractors on the processing of Personal Data of the Controller.
4.4 All Subcontractors are listed in Appendix I.
ARTICLE 5 CONFIDENTIALITY
5.2 The Processor may disclose Confidential Information to its employees or Subcontractors insofar as this is necessary to perform the Services.
5.3 The Processor will ensure that its employees and Subcontractors are bound by the same confidentiality terms and conditions as the Processor under the Agreement.
5.4 This clause does not apply insofar as the relevant information has become part of the public domain without violation of the Agreement.
5.5 In the event of a conflict with other contractual arrangements between the Parties regarding confidentiality, the Agreement prevails.
ARTICLE 6 NOTIFICATION FOR PERSONAL DATA BREACH
6.2 The Processor will not inform the affected data subjects nor a Regulator of a Personal Data Breach, unless this is required by Union or Member State law. In that case, the Processor will inform the Controller thereof as soon as possible (if not prohibited by Union or Member State law).
ARTICLE 7 ASSISTANCE
- a complaint, inquiry or request from a natural person regarding the processing of Controller’s Personal Data by Processor;
- an investigation or seizure of Controller Personal Data by authorised government officials;
- a Data Protection Impact Assessment by Controller as required under the Privacy Law, including updates.
ARTICLE 8 INTERNATIONAL DATA TRANSFER
ARTICLE 9 RETENTION
9.1 The Processor will retain the Personal Data as long as necessary for providing the Services, as set out in more detail in Annex B.
9.2 Unless agreed otherwise in writing, Processor will delete all Personal Data of the Controller, and will confirm in writing to the Controller that all Personal Data have been deleted upon Controller’s written request thereto.
9.3 If the Processor cannot return and/or delete all Personal Data of the Controller because of technical reasons, or because any applicable law requires longer storage of the Personal Data of the Controller, the Processor will inform the Controller as soon as possible. In that event, the Processor will still take all necessary steps to come closest to a complete and permanent return and/or deletion of the Personal Data of the Controller and make the Personal Data of the Controller unavailable for further processing.
9.4 The Controller is responsible for notifying the Processor of any data retention period coming to an end to enable the Processor to delete or anonymise this data before the end of the data retention period.
ARTICLE 10 LIABILITIES
10.2 No limitation or exclusions will apply to liability arising out of either party’s violation of theProcessor’s intellectual property rights.
ARTICLE 11 AUDIT
ARTICLE 12 FORCE MAJEURE
ARTICLE 13 TERM AND TERMINATION
13.2 Unless terminated earlier in accordance with this Agreement, the Agreement will terminate by operation of law if the Processor no longer has access to or otherwise processes Personal Data for the Controller.
13.3 The Agreement may be terminated by either Party in writing with immediate effect in the event that the other Party:
- is declared bankrupt;
- has been granted suspension of
ARTICLE 14 MISCELLANEOUS
14.2 The Agreement is governed by the laws of England and Wales. The competent courts of London will have exclusive jurisdiction.
ANNEX A - DEFINITIONS
“Personal Data Breach” | A breach of security or confidentiality possibly leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Confidential Information |
“Personal Data” | Any personal data processed by Processor in connection with any Services |
“Agreement” | This data processor agreement including any annex(es) thereto |
“Confidential Information” | All Personal Data and other information about the processing, including the terms of this Agreement |
“Data Protection Legislation” | Any legislation that applies to the processing of the Personal data, such as, but not limited to, the UK General Data Protection Regulation (UK GDPR), the Data Protection Act, and any code of conduct and/or any (non-)UK local laws applicable to the processing of the Personal data |
“European Data Protection Legislation” | Any legislation that applies to the processing of the Personal data, such as, but not limited to, the EU General Data Protection Regulation (EU GDPR) and any code of conduct and/or any (non-)EU local laws applicable to the processing of the Personal data |
“Force Majeure Event” | means any events or circumstances, or any combination of such events or circumstances, which are beyond the reasonable control of and not otherwise attributable to the affected party |
“Regulator” | A supervisory authority such as the Dutch Data Protection Authority (Autoriteit Persoonsgegevens) or any other governmental body with supervisory authority over Controller |
“Services” | Any services provided by Processor for Controller |
“Subcontractor” | Any Third Party engaged by Processor for the processing of Personal Data |
“Third Party” | All other parties and entities other than Controller or Processor itself, such as Subcontractors, agents, other clients, business partners or group members of Processor |
“Member State law” | Any applicable law issued by a Member State of the European Union |
“Union law” | Any applicable law issued by (institutions of) the European Union |
ANNEX B - DETAILS ABOUT THE PROCESSING OF PERSONAL DATA
CATEGORY OF DATA SUBJECTS | CATEGORY OF DATA SUBJECTS | WHICH PROCESSING WILL PROCESSOR APPLY TO THE CONTROLLER PERSONAL DATA? | FOR WHICH PURPOSES WILL PROCESSOR PROCESS THE CONTROLLER PERSONAL DATA? | HOW LONG WILL THE PROCESSOR RETAIN THE CONTROLLER PERSONAL DATA? |
Children who frequent the nursery, where the nursery is the Controller | Name, last name | Store | To provide the Controller with the services it pays for | As long as the contract with the Controller continues, save where legal retention periods apply |
Date of birth | Consult | |||
Address | Combine | |||
Ethnicity | Transfer | |||
Religion | Amend | |||
Medical information | Delete | |||
Parent name, last name | ||||
Employees of the Controller | Name, last name | Store | To provide the Controller with the services it pays for; to create profiles for employees of Controller to use the application | As long as the contract with the Controller continues |
Email address | Consult | |||
Phone number | Combine | |||
Transfer | ||||
Amend | ||||
Delete |
CATEGORIES OF DATA
- Images
- Video images
- Accident logs
- Medical information
- Religion
- Ethnicity
AUTHORISED SUBCONTRACTORS
AWS
Function | Website hosting, Email provider, Document storage service, Application hosting |
Business process | Website, Email, Digital storage of documents, Administration, Software tools and applications |
Data categories | Identification, Financial, Date of Birth, Educational and employment history, Copy of ID, Health, Location, Social Security Number, Contracts, Software tools and applications, Business data, Technical data |
Data subjects | Customers, Employees, Contractors, Family members |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Google Workspace
Function | Email provider, Document storage service, Password manager, Appointment scheduling tool |
Business process | Email, Digital storage of documents, Administration |
Data categories | Identification, Financial, Date of Birth, Educational and employment history, Contracts, Business data |
Data subjects | Employees, Contractors, Suppliers, Partners |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Jira (Atlassian)
Function | Task management or work planning |
Business process | Software tools and applications |
Data categories | Technical data |
Data subjects | Employees |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Mailchimp
Function | Email provider, Marketing tool |
Business process | Email, Marketing |
Data categories | Identification, Financial, Date of Birth, Educational and employment history, Location, Contracts, Software tools and applications, Business data, Technical data |
Data subjects | Customers, Employees |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
New Relic
Function | Other software suite | |
Business process | Software tools and applications | |
Data categories | Technical data | |
Data subjects | Customers, Employees | |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Function | Task management or work planning, Office software |
Business process | Administration, Software tools and applications |
Data categories | Software tools and applications, Business data |
Data subjects | Employees |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Trello
Function | Task management or work planning |
Business process | Administration |
Data categories | Technical data |
Data subjects | Customers, Employees |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Xero
Function | Accountancy software, Bookkeeping software, Payment processing software |
Business process | Digital storage of documents, Administration |
Data categories | Identification, Financial, Location, Business data |
Data subjects | Customers, Employees, Suppliers |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Zoho
Function | CRM, Customer service software, Payment processing software, Password manager, Marketing tool, User management/authentication, Task management or work planning, Appointment scheduling tool, Office software |
Business process | Administration, Marketing, Software tools and applications |
Data categories | Identification, Location, Contracts, Business data |
Data subjects | Customers, Employees, Suppliers |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Facebook Analytics
Function | Marketing tool |
Business process | Marketing |
Data categories | Location, Technical data |
Data subjects | Customers, Employees, Suppliers, Partners |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
GoDaddy
Function | Website hosting |
Business process | Software tools and applications |
Data categories | Technical data |
Data subjects | Employees |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Google Analytics
Function | Marketing tool |
Business process | Marketing |
Data categories | Location, Technical data |
Data subjects | Customers, Employees, Suppliers, Partners |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Stripe
Function | Payment software, Payment processing software |
Business process | Software tools and applications |
Data categories | Identification, Financial, Location |
Data subjects | Customers, Employees |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Google Firebase
Function | Other software suite |
Business process | Software tools and applications |
Data categories | Technical data |
Data subjects | Customers, Employees |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
Wise
Function | Payment processing software |
Business process | Administration |
Data categories | Financial, Location |
Data subjects | Employees, Suppliers |
Security measures | Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimised and regularly deleted according to national retention periods. |
ANNEX C – DESCRIPTION OF THE SECURITY MEASURES
Physical and environmental security
Office security
Operational security policies and processes
Compliance with GDPR
Information Security Policy
Data Protection Officer and Information Security Officer
Security training for all employees
Confidentiality
Information security incident management
Data breach notification
Supply chain security
All third parties in the eyworks supply chain are evaluated on their level of security. Through signing processing agreements, we ensure that these third-party suppliers uphold the highest standards of security and compliance possible. eyworks regularly audits third-party suppliers and has ensured it can end the relationship immediately if the audit reveals inadequate levels of security and compliance.
Business Continuity
eyworks has a formal Business Continuity Management policy in place which requires the Business Continuity Plan to be updated at least once per annum and business continuity testing to take place at least annually. eyworks has Disaster Recovery plans in place to respond to disruption of the IT/Technology that provides services for our customers.
Hardware
All laptops and workstations are secured via full disk encryption. We update devices as soon as updates become available and monitor workstations for malware. eyworks has the ability to remotely wipe a machine.
Communications and data transfers
eyworks uses different communication tools for communications between teams and with our customers. eyworks has data processing agreements in place with all of these communication tool providers to ensure appropriate technical and organisational measures to protect personal data against unauthorised or unlawful processing and against accidental loss, destruction, damage, theft, alteration or disclosure are in place. In line with the GDPR, eyworks does not transfer data to countries outside of the UK without appropriate safeguards in place (in the meaning of art. 46 GDPR and Schrems II).
Security of our architecture
Application access and identity management
All eyworks users are required to set up an account with a combination of a unique username and strong and secure password (minimum 8 characters), complying with our access management policy and privacy by design requirements. Passwords are never stored unencrypted in any cache, file, database or access log.
User accounts are validated through email verification. If a wrong password is entered 5 times, the account will be locked for one hour.
The eyworks app uses AWS Cognito to authenticate users and grant access to the app. Through AWS Cognito, eyworks has defined roles and mapped users to different roles so the eyworks app can access only the resources that are authorised for each user.
Amazon Cognito encrypts data at-rest and in-transit. Amazon Cognito is HIPAA eligible and PCI DSS, SOC, ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, and ISO 9001 compliant.
User authentication and data access controls
Back-up and security of user data
Monitoring
Secure development practicesa
Source code management and review
Data centre security
All personal data sourced from our architecture is stored in Amazon data centres. Amazon employs a robust physical security program and is accredited against multiple security industry certifications, including SSAE 16, ISO 27001 and SOC type II. For more information on Amazon’s physical security processes, please visit: Cloud Security – Amazon Web Services (AWS).
Environment separation
Patching
Encrypted transactions
Privacy Policy
eyworks’ privacy policy, which describes how we handle data throughout all of our business process, can be found here: https://www.eyworks.co.uk/privacy-policy/
Want to report a security concern?
Email us at dpo@eyworks.co.uk.
Acorn House
381 Midsummer Boulevard
Milton Keynes, MK9 3HP
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies. Read More
Privacy Overview
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |