Appendix 1 - Specification of processing of personal data
1. Instructions
- 1.1.Brief description of the Service and the purpose of the treatment
Enter all purposes for which personal data are to be processed by Invajo:
Invajo is a digital tool for event-planning with which Event Organizers (Customers) can invite potential Participants (end users) and/or accept their registration.
- Invajo Main Agreement – Invajo will process personal data to the extent it is required to provide the Service, as described in the Main Agreement, and to follow the Customer’s instructions, as provided in its use of the Service.
- Invajo Main Agreement – Invajo will process personal data to the extent it is required in order to provide the end users of the Service with adequate support functions.
- 1.2.Categories of personal data
The personal data to be processed by Invajo:
The Customer decides, at its sole convenience, which categories of personal data Invajo is to process, which may include:
- Address
- Email address
- Employer
- Employment Title
- Event location presence
- Name
- Phone number
- Sex
The Customer decides, at its sole convenience, which categories of personal data Invajo is to process, which does not include:
- Birthdate
- Cookies
- Device Information
- Employment Identification number
- IP-address
- National Identification Number (Social Security Number)
- Nationality
- Passwords
- Pictures
- Passwords
- Sound Recordings
- System Usage Data (behavior)
- System Usage Location Data
- System Usage Timestamps
- User ID
- Vehicle Registration Number
- Address
- The Customer is also given the option to use a Supplementary Service for ticket-sales through its use of the Service, in which the following categories of personal data is processed from the relevant Customer’s account holder:
- Birth date
- Valid passport or driver’s license
- OR other as specified: _______________
Specify the special categories of personal data to be processed by Invajo (if any):
Invajo does not process special categories of personal data as part of basic Service. Special categories of personal data are processed only on instruction of the Customer, in its sole convenience. And may include:
- Health information (Allergies, Special Diets)
- Biometrics
- Passport Number
- Political Views
- Race or Ethnic origin
- Religious views
- Sexual Orientation or preference
- Union Affiliation
- OR other as specified: _________________
- Customer should notify Invajo when asking Invajo to process special categories of data.
- 1.3.Categories of registered data subjects
Specify which categories of registered data subjects of whom the Supplier will process personal data and its scope.
The Customer decides, at its sole convenience, which categories of registered data subjects will be subject to processing, which may include:
- Event Organizers (System Users)
- Event Visitors (Attendees)
- System Users
- 1.4.Processing activities (storage, administration, datasets that have been matched or combined, etc.)
Invajo is the provider of the Service and process personal information in accordance with the Customer’s instructions in the Main Agreement and this Specification, which may include the following activities:
- Adaptation
- Alignment
- Alteration
- Collection
- Combination
- Consultation (Troubleshooting, Support)
- Destruction
- Disclosure by Transmission
- Erasure
- Retrieval
- Storage
- Structuring
- 1.5.Enter all countries where personal data may be stored and / or processed by the Supplier:
Personal data is processed by Invajo and it sub-processors in Sweden, The United Kingdom, The Netherlands, Germany and USA (optional).
- 1.6.Use in order to improve the Service
The Supplier has the right to process personal data "For the purpose of developing and improving the Service", this shall be explicitly stated in the table below:
Personal data may be processed for the following activities for the purpose of developing and improving the Service (if any):
- Adaptation
- Alignment
- Collection
- Combination
- Consultation (Troubleshooting, Support)
- Destruction
- Disclosure by Transmission
- Erasure
- Retrieval
- Storage
- Structuring
Specification of the categories of personal data that may not be used to improve services ordered by the Customer (e.g.: name, address):
- Cookies
- Device Information
- Email Address
- Employer
- Employment Title
- Event Location Presence
- IP-address
- Name
- Nationality
- Passwords
- Phone number
- Pictures
- Phone number
- System Usage Data (behavior)
- System Usage Location Data
- System Usage Timestamp
- User ID
These personal data should be retrieved from the following treatments performed by the Supplier on behalf of the Customer (e.g.: backup, storage, troubleshooting)
- Collection
- Consultation (Troubleshooting, Support)
- Storage
And may only be used by the Supplier for the purpose of improving and / or developing the following types of services or categories of services ordered by the Customer (e.g.: Supplier's error handling process):
- Billing
- Compliance
- Consultation (Troubleshooting, Support)
- Customer Satisfaction
- Error handling
- Statistics
2. Security
Enter all organizational and technical security measures that are to be implemented by Invajo, Customer has a right to request specific documentation by contacting Invajo at privacy@invajo.com:
- Physical access control
- System Access Control
- Personal Data access Control
- Transfer Access Control
- Control of Entry of Personal Data
- Control of Availability
- Control of Separation
- Storage Policy
- Safety Policy
Invajo Keeps the following Policies for compliance:
- Acceptable Use Policy
- Backup and Retention Policy
- Change Management Policy
- Data Breach Response Policy
- Data Classification Policy
- Email and Electronic Use Policy
- Information Security Policy
- Privacy Policy
- Logging, Monitoring and Audit Policy
- Mobile Device Policy
- Password Policy
- Patch Management Policy
- Risk Assessment Policy
- Logical and Physical Separation of Production and Development areas
- 2.1.Physical access control
Measures that prevent unauthorized persons access to IT systems where processing of personal data occurs:
Invajo uses Glesys as sub-processor for servers and data storage that store Customer collected Personal Data.
Glesys state-of-the-art data centers are equipped with physical protection, CCTV, alarms, access control systems, backup power, and redundant internet connections. Certified according to ISO 27001.
- 2.2.System access control
Measures to prevent unauthorized use of IT systems:
Invajo has access to the Customer’s data through an Admin interface that implements:
- Different levels of access to the system for every user, controlled and approved by management and implemented in our employees’ admin interfaces.
- Secure passwords are registered in accordance with our safety- and IT-policy, in which routines for following up on said policies are set.
Access to Customer’s data is based on the employee’s role and needs on a user level. This is achieved by logical safeguards in the system by which the user only has access to the data that is necessary in order to perform the work as required by their Role and as required in order to Deliver the Service as defined in the Main Agreement. When accessing Customers collected Personal Data full system logging demonstrating access to this data is applied, as well as all changes made to personal data, this information is available to the Customer, these logs will follow the Invajo’s Logging, Monitoring and Audit Policy and contain the following information:
- What activity was performed?
- Who or what performed the activity, including where or on what system the activity was performed from (subject)?
- What the activity was performed on (object)?
- When was the activity performed?
- What tool(s) was the activity was performed with?
- What was the status (such as success vs. failure), outcome, or result of the activity?
Invajo staff needs to actively log into Customers environment which is only done by request of the Customer and per their strict instructions.
Invajo’s IT-operations and IT-security departments have access to Customer collected Personal data in order to reliably deliver the service in accordance with the Main agreement and this agreement and to comply with policies and regulations. Access is implemented with:
- Secure passwords and two-factor authentication and Secure passphrases through secure encrypted SSH tunnels. Registered in accordance with our safety- and IT-policy, in which routines for following up on said policies are set.
Customer may give access to their own environment by “inviting” Users to their account, no access is given unless a System User account is created for this User. Access can be revoked at any time.
- 2.3.Personal data access control
Measures to ensure that persons authorized to use the IT system only have access to personal data restricted to the person's established authority:
Invajo has access to the Customer’s data through an Admin interface that implements:
- Different levels of access to the system for every user, controlled and approved by management and implemented in our employees’ admin interfaces.
- Secure passwords are registered in accordance with our safety- and IT-policy, in which routines for following up on said policies are set.
Access to Customer’s data is based on the employee’s role and needs on a user level. This is achieved by logical safeguards in the system by which the user only has access to the data that is necessary in order to perform the work as required by their Role and as required in order to Deliver the Service as defined in the Main Agreement. When accessing Customer collected Personal Data full system logging demonstrating access to this data is applied, as well as all changes made to personal data, this information is available to the Customer, these logs will follow the Invajo’s Logging, Monitoring and Audit Policy and contain the following information:
- What activity was performed?
- Who or what performed the activity, including where or on what system the activity was performed from (subject)?
- What the activity was performed on (object)?
- When was the activity performed?
- What tool(s) was the activity was performed with?
- What was the status (such as success vs. failure), outcome, or result of the activity?
Invajo staff needs to actively log into Customers environment which is only done by request of the Customer and per their strict instructions.
Invajo’s IT-operations and IT-security departments have access to Customer collected Personal data in order to reliably deliver the service in accordance with the Main agreement and this agreement and to comply with policies and regulations. Access is implemented with:
- Secure passwords and two-factor authentication and Secure passphrases through secure encrypted SSH tunnels. Registered in accordance with our safety- and IT-policy, in which routines for following up on said policies are set.
Customer may give access to their own environment by “inviting” Users to their account, no access is given unless a System User account is created for this User. Access can be revoked at any time.
- 2.4.Transfer access control
Measures to ensure that personal data cannot be read, copied, modified or deleted by electronic transmission or transfer or storage on storage devices without permission, and that recipients can be identified and verified when transfer of personal data is performed via electronic transmission:
All electronic transmissions are encrypted with SSL/TLS. No data is transferred unless the System User has logged into the Invajo system. All changes to personal data is logged as well as extractions from the system in machine readable formats as per defined in Invajo’s Logging, Monitoring an Audit policy.
- 2.5.Control of entry of personal data
Measures to ensure that it is possible to review and determine retroactively whether personal data has been entered, changed or deleted in the IT system and who has performed the activity:
All additions, changes or erasures of personal data is logged and monitored as per Invajo’s Logging, Monitoring and Audit Policy and the log is provided to the Customer. The log
will contain the following information:
- What activity was performed?
- Who or what performed the activity, including where or on what system the activity was performed from (subject)?
- What the activity was performed on (object)?
- When was the activity performed?
- What tool(s) was the activity was performed with?
- What was the status (such as success vs. failure), outcome, or result of the activity?
- 2.6.Control of availability
Measures to ensure that personal data are protected from accidental destruction or loss:
Backups of personal data is performed on a regular basis as per defined in Invajos Backup and Retention Policy.
- A full system backup will be performed weekly. Weekly backups will be saved for a full month.
- The last full backup of the month will be saved as a monthly backup. The other weekly backup media will be recycled by the backup system.
- Monthly backups will be saved for one year, at which time the media will be reused.
- Yearly backups will be retained for five years and will only be run once a year at a predetermined date and time.
- Differential or Incremental backups will be performed daily. Daily backups will be retained for two weeks. Daily backup media will be reused once this period ends.
Backups are saved as per defined above and verified (at least yearly) through the performance of a complete data restoration and by verifying the access and integrity of restored data. Backups are transmitted to a place separate from current data. Backups have the same safety levels as the original data. Invajo undertakes regular emergency planning to ensure that Invajo’s organization, personnel and systems are readily available for processing within a timeframe that corresponds to the agreed level of service.
- 2.7.Control of separation
Measures to ensure that personal data collected for different purposes can be treated separately:
Personal data is categorized and stored after the purpose of the processing and logically separated by “Event”. Access to the different personal data is logically separated at a System User Account level. To access Customer collected Personal Data a User needs to actively log into that Customers environment. Access can be given to a System User Account to either the entire Customer environment or to specific “event”. Access can be revoked at any time.
Measures to ensure that personal data are deleted during and after the term of agreement when use is no longer necessary for the initial purpose:
Customers may specify the retention schedule for the data Invajo Processes on behalf of the Controller. If Controller fails to specify retention time Invajo will erase or anonymize Personal Data six (6) months after it is deemed as inactive and not longer necessary to provide the service unless hindered to do so by law or technical limitations.
Provide the Supplier's internal security policy that apply to personal data processing, alternatively refer to website or other accessible platform, where the policy is available:
Invajo’s applicable security policies are provided to the Customer upon request sent to privacy@invajo.com.
3. Pre-approved sub processors