Last modified: June 2024
This Data Processing Agreement, including the Schedules and Annexes (“DPA”) incorporated herein by reference is between Avigilon Corporation, a wholly-owned subsidiary of Motorola Solutions, Inc., on behalf of itself and its affiliates and subsidiaries (collectively “Avigilon”) and the undersigned customer (“Customer”) and reflects the Parties’ agreement with respect to the Processing of Customer Data which may include Personal Data pursuant to Customer’s agreement with Avigilon (the “Agreement”). Unless otherwise defined herein, all capitalized terms shall have the meaning set forth in the Agreement. Customer and Avigilon are hereafter referred to collectively as the “Parties,” or individually as a “Party.”
In the event of a conflict between this DPA, the Agreement or any schedule, annex or other addenda to the Agreement, this DPA will prevail with respect to the handling of Customer and end user data, including but not limited to personally identifiable information.
1. Definitions.
All capitalized terms not defined herein must have the meaning set forth in the Agreement. All lower-case terms not defined in this DPA must have the meaning as set within Article 4 of the GDPR if defined therein, regardless of whether GDPR applies.
“Authorized Users” means Customer’s employees, contractors, agents, customers and end-users who are authorized to use the Services to access or receive Data. Avigilon or Customer (as determined by Avigilon) will be responsible for all User identification and password change management.
“Avigilon Data” means data provided by Avigilon and made available to Customer in connection with the provision of Products and Services.
“Controller” means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data.
“Customer Data” means data including images, text, videos, and audio, that are provided to Avigilon by, through, or on behalf of Customer and its Authorized Users or their end users, through the use of the Products and Services. Customer Data does not include Customer Contact Data, Service Use Data other than that portion comprised of Personal Information, or Third Party Data.
“Customer Contact Data” means data Avigilon collects from Customer for contact purposes, including, without limitation, contract fulfillment, marketing, advertising, licensing, and sales activities.
“Data” means collectively Avigilon Data and Customer Data, including any Personal Data included therein.
“Data Protection Laws and Policies” means all applicable corporate, state and local, federal and international laws, standards, guidelines, policies, regulations and procedures applicable to Avigilon pertaining to data security, confidentiality, privacy, and breach notification, as amended, including without limitation the European Union General Data Protection Regulation (GDPR), and the UK Data Protection Act 2018.
“Data Subjects” means the identified or identifiable person to whom Personal Data relates.
“GDPR” means European Union General Data Protection Regulation 2016/679.
“Metadata” means data that describes other data.
“Personal Data” or “Personal Information” means any information relating to an identified or identifiable natural person transmitted to Avigilon by, through, or on behalf of Customer and its Authorized Users or their end users as part of Customer Data. An identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
“Processor” means a natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller. Processors act on behalf of the relevant controller and under their authority. In doing so, they serve the controller’s interests rather than their own.
“Process” or “Processing” means any operation or set of operations which is performed on Personal Data or on sets of Personal Data, whether or not by automated means, such as collection, recording, copying, analyzing, caching, organization, structuring, storage, adaptation, or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.
“Security Incident” means an incident that compromises or is suspected to compromise the security, confidentiality, integrity or availability of Avigilon Data, Customer Data or Personal Data. For the avoidance of doubt, “suspected to compromise” means a determination by Avigilon based on specific and articulable facts and circumstances, taken together with rational inferences from those facts, that an act or omission may likely result in a breach of security, confidentiality, availability or integrity with respect to the Avigilon Data, Customer Data or Personal Data.
“Service Use Data” means data generated about the use of the Products and Services through Customer’s use or Avigilon’s support of the Products and Services, which may include Metadata, Personal Data, product performance and error information, activity logs, and date and time of use.
“Standard Contractual Clauses” means the clauses attached hereto as Schedule 1 as established by the European Commission’s decision (C(2021) 3972 of 4 June 2021) on Standard Contractual Clauses for the transfer of personal data to processor established in third countries which do not ensure an adequate level of data protection.
“Sub-processor” means other processors engaged by Avigilon to Process Customer Data which may include Personal Data, as outlined on the following website: https://www.motorolasolutions.com/en_us/about/trust-center/privacy/data-sub-processors.html.
“Third Party Data” means information obtained by Avigilon from publicly available sources or its third party content providers and made available to Customer through the Products or Services.
2. Processing of Customer Data
3. Service Use Data. Except to the extent that it is Personal Information, Customer understands and agrees that Avigilon may collect and use Service Use Data for its own purposes, provided that such purposes are compliant with applicable Data Protection Laws. Service Use Data may be processed by Avigilon at any of its global locations and/or disclosed to Sub-processors.
4. Third Party Data and Avigilon Data. Avigilon Data and Third Party Data may be available to Customer through the Products and Services. Customer and its Authorized Users may use the Avigilon Data and Third Party Data as permitted by Avigilon and the applicable Third Party Data provider, as described in the Agreement. Unless expressly permitted in the Agreement, Customer must not, and must ensure its Authorized Users must not: (a) use the Avigilon Data or Third Party Data for any purpose other than Customer’s internal business purposes or disclose the data to third parties; (b) “white label” such data or otherwise misrepresent its source or ownership, or resell, distribute, sublicense, or commercially exploit the data in any manner; (c) use such data in violation of applicable laws; (d) use such data for activities or purposes where reliance upon the data could lead to death, injury, or property damage; (e) remove, obscure, alter, or falsify any marks or proprietary rights notices indicating the source, origin, or ownership of the data; or (f) modify such data or combine it with Customer Data or other data or use the data to build databases. Additional restrictions may be set forth in the Agreement. Any rights granted to Customer or Authorized Users with respect to Avigilon Data or Third Party Data must immediately terminate upon termination or expiration of the Agreement. Further, Avigilon or the applicable Third Party Data provider may suspend, change, or terminate Customer’s or any Authorized User’s access to Avigilon Data or Third Party Data if Avigilon or such Third Party Data provider believes Customer’s or the Authorized User’s use of the data violates the Agreement, applicable law or Avigilon’s agreement with the applicable Third Party Data provider. Upon termination of Customer’s rights to use of any Avigilon Data or Third Party Data, Customer and all Authorized Users must immediately discontinue use of such data, delete all copies of such data, and certify such deletion to Avigilon. Notwithstanding any provision of the Agreement to the contrary, Avigilon has no liability for Third Party Data or Avigilon Data available through the Products and Services. Avigilon and its Third Party Data providers reserve all rights in and to Avigilon Data and Third Party Data not expressly granted in the Agreement.
5. Avigilon as a Controller or Joint Controller. In all instances where Avigilon acts as a Controller it must comply with the applicable provisions of the Avigilon Privacy Statement at Avigilon Privacy Statement as may be updated from time to time. Avigilon holds all Customer Contact Data as a Controller and must Process such Customer Contact Data in accordance with the Avigilon Privacy Statement. In instances where Avigilon is acting as a Joint Controller with Customer, the Parties must enter into a separate addendum to the Agreement to allocate the respective roles as joint controllers.
6. Sub-processors.
7. Data Transfers. Avigilon agrees that it must not make transfers of Personal Data under this Agreement from one jurisdiction to another unless such transfers are performed in compliance with this DPA and applicable Data Protection Laws. Avigilon agrees to enter into appropriate agreements with its affiliates and Sub-processors, which will permit Avigilon to transfer Personal Data to its affiliates and Sub-processors. Avigilon agrees to amend as necessary the Agreement to permit transfer of Personal Data from Avigilon to Customer. Avigilon also agrees to assist the Customer in entering into agreements with its affiliates and Sub-processors if required by applicable Data Protection Laws for necessary transfers.
8. Security. Avigilon must implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk posed by the Processing of Personal Data, taking into account the costs of implementation; the nature, scope, context, and purposes of the Processing; and the risk of varying likelihood and severity of harm to the data subjects. The appropriate technical and organizational measures implemented by Avigilon are set forth in Schedule 3. In assessing the appropriate level of security, Avigilon must weigh the risks presented by Processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to personal data transmitted, stored or otherwise Processed.
9. Security Incident Notification. If Avigilon becomes aware of a Security Incident, then Avigilon must (a) notify Customer of the Security Incident without undue delay, (b) investigate the Security Incident and apprise Customer of the details of the Security Incident, and (c) take commercially reasonable steps to stop any ongoing loss of Personal Data due to the Security Incident if in the control of Avigilon. Notification of a Security Incident must not be construed as an acknowledgement or admission by Avigilon of any fault or liability in connection with the Security Incident. Avigilon must make reasonable efforts to assist Customer in fulfilling Customer’s obligations under Data Protection Laws to notify the relevant supervisory authority and Data Subjects about such incident.
10. Data Retention and Deletion. Except for anonymized Customer Data, as described above, or as otherwise provided under the Agreement, Avigilon deletes all Customer Data ninety (90) days following termination or expiration of the Agreement unless otherwise required to comply with applicable law. Notwithstanding the foregoing, Avigilon will retain the Customer Data for at least thirty (30) days following such termination or expiration to accommodate a request by Customer for the Customer Data. If, within such thirty (30) day period, Customer requests (in writing), Avigilon will make Customer Data available to Customer for export or download for a period of thirty (30) days. Avigilon has no obligation to retain such Customer Data beyond such thirty (30) day period. Subject to Section 12.3 regarding CJIS Data, Avigilon may delete any Service Use Data upon termination or expiration of the Agreement.
11. Audit Rights
12. Regulation Specific Terms
13. Avigilon Contact. If Customer believes that Avigilon is not adhering to its privacy or security obligations hereunder, Customer must contact the Motorola Data Protection Officer at Motorola Solutions, Inc., 500 W. Monroe, Chicago, IL USA 90661 – 3618 or at privacy1@motorolasolutions.com.
Schedule 1
Cross Border Transfer Mechanisms
1.1 “Standard Contractual Clauses” means the Standard Contractual Clauses approved by the European Commission in decision 2021/914.
1.2 “UK IDTA” means the International Data Transfer Addendum to the EU Commission Standard Contractual Clauses issued by the UK Information Commissioner, Version B1.0, in force 21 March 2022.
2. Cross Border Data Transfer Mechanisms.
2.1 2021 Standard Contractual Clauses. The parties agree that the 2021 Standard Contractual Clauses will apply to personal data that is transferred via the Services from the European Economic Area or Switzerland, either directly or via onward transfer, to any country or recipient outside the European Economic Area or Switzerland that is not recognized by the European Commission (or, in the case of transfers from Switzerland, the competent authority for Switzerland) as providing an adequate level of protection for personal data. For data transfers from the European Economic Area that are subject to the 2021 Standard Contractual Clauses (https://commission.europa.eu/publications/sta), the 2021 Standard Contractual Clauses will be deemed entered into (and incorporated into this DPA by this reference) and completed as follows:
Module 2: Controller to Processor |
Module 3: Processor to Processor |
|
Clause 7 (Docking Clause) |
Intentionally Omitted |
Intentionally Omitted |
Clause 9 (Use of Sub-processors) |
Option 2: General Written Authorisation 30 business days |
Option 2: General Written Authorisation 30 business days |
Clause 11 (Redress) |
Intentionally Omitted |
Intentionally Omitted |
Clause 13 (Supervision) Option 1: Where the data exporter is established in an EU Member State Option 2: Where the data exporter is not established in an EU Member State and has appointed a representative Option 3: Where the data exporter is not established in an EU Member State without having to appoint a representative |
Option 1, Option 2 and/or Option 3 applies in accordance with whether the exporter(s) is/are established in an EU Member State and has/have appointed a representative. |
Option 1, Option 2 and/or Option 3 applies in accordance with whether the exporter(s) is/are established in an EU Member State and has/have appointed a representative. |
Clause 14 (Local laws and practices affecting compliance with the Clauses) |
Applicable |
Applicable |
Clause 15 (Obligations of the data importer in case of access by public authorities) |
Applicable |
Applicable |
Clause 17 (Governing law) |
Denmark |
Denmark |
Clause 18 (Choice of forum and jurisdiction) |
Denmark |
Denmark |
Appendix: Annex I: A |
Data Exporter and Data Importer: Avigilon and Supplier, as applicable. Contact Details: Motorola: privacy1@motorolasolutions.com; Supplier: Supplier’s publicly available email address for receiving privacy related notices. The Data Exporter’s role is as set forth in the Agreement. The Data Importer’s role is as set forth in the Agreement. Signature and Date: By entering into the Agreement, Data Exporter and Data Importer are deemed to have signed these Standard Contractual Clauses incorporated herein, including their Annexes, as of the Effective Date of the Agreement. |
|
Appendix: Annex I: B |
The Categories of data subjects are described in Schedule 2 (Details of Processing) of this Addendum. Sensitive Data transferred is described in Section 2 of Schedule 2 (Details of Processing) of this Addendum The frequency of the transfer is a continuous basis for the duration of the Agreement or as may otherwise be specified in the Agreement, a Work Order or a Purchase Order. The nature of the processing is described in Section 2 of this Addendum The period for which the personal data will be retained is described in Section 2 (Details of Processing) of this Addendum |
|
Appendix: Annex I: C (Competent Supervisory Authority) |
Datatilsynet (Danish Data Protection Agency) |
Datatilsynet (Danish Data Protection Agency) |
Link to Sub-processor list (Optional) |
This Annex must be completed for Modules Two and Three, in case of the specific authorisation of sub-processors (Clause 9(a), Option 1). However, MSI requires it to be filled out in either case, with a link to an online subprocessor list being sufficient. Controller shall inform, in writing, of any intended changes to the agreed list of sub-processors. In addition to the sub-processors linked in Annex III, Controller has authorized the use of the following sub-processors: 1. Name: … Address: … Contact person’s name, position and contact details: … Description of processing (including a clear delimitation of responsibilities in case several sub-processors are authorized): … |
|
Annex II |
Schedule 3 (Technical and Organizational Security Measures) of this Addendum serves as Annex II of the Standard Contractual Clauses. |
2.2 Data Transfers From Switzerland. For data transfers from Switzerland that are subject to the Standard Contractual Clauses, the Standard Contractual Clauses will be deemed entered into (and incorporated into this Addendum by this reference) and completed as set out in Section 2.1 of this Schedule 1, subject to the following modifications:
2.3 UK International Data Transfer Agreement. The parties agree that the UK IDTA will apply to personal data that is transferred via the Services from the United Kingdom, either directly or via onward transfer, to any country or recipient outside of the United Kingdom that is not recognized by the competent United Kingdom regulatory authority or governmental body as providing an adequate level of protection for personal data. For data transfers from the United Kingdom that are subject to the UK IDTA, the UK IDTA will be deemed entered into (and incorporated into this Addendum by this reference) and completed as follows:
SCHEDULE 2
(Annex I of the EU SCC)
B. DESCRIPTION OF TRANSFER
Categories of data subjects whose personal data is transferred
Data subjects include the data exporter’s representatives and end-users including employees, contractors, collaborators, and customers of the data exporter. Data subjects may also include individuals attempting to communicate or transfer personal information to users of the services provided by data importer. Avigilon acknowledges that, depending on Customer’s use of the Online Service, Customer may elect to include personal data from any of the following types of data subjects in the Customer Data:
Employees, contractors, and temporary workers (current, former, prospective) of data exporter;
Dependents of the above;
Data exporter’s collaborators/contact persons (natural persons) or employees, contractors or temporary workers of legal entity collaborators/contact persons (current, prospective, former);
Users (e.g., customers, clients, patients, visitors, etc.) and other data subjects that are users of data exporter’s services;
Partners, stakeholders or individuals who actively collaborate, communicate or otherwise interact with employees of the data exporter and/or use communication tools such as apps and websites provided by the data exporter;
Stakeholders or individuals who passively interact with data exporter (e.g., because they are the subject of an investigation, research or mentioned in documents or correspondence from or to the data exporter);
Minors; or
Professionals with professional privilege (e.g., doctors, lawyers, notaries, religious workers, etc.).
Customer’s use of the Products and Services, Customer may elect to include personal data from any of the following categories in the Customer Data:
Basic personal data (for example place of birth, street name, and house number (address), postal code, city of residence, country of residence, mobile phone number, first name, last name, initials, email address, gender, date of birth), including basic personal data about family members and children;
Authentication data (for example user name, password or PIN code, security question, audit trail);
Contact information (for example addresses, email, phone numbers, social media identifiers; emergency contact details);
Unique identification numbers and signatures (for example Social Security number, bank account number, passport and ID card number, driver’s license number and vehicle registration data, IP addresses, employee number, student number, patient number, signature, unique identifier in tracking cookies or similar technology)
Pseudonymous identifiers;
Commercial Information (for example history of purchases, special offers, subscription information, payment history);
Biometric Information (for example DNA, fingerprints and iris scans);
Location data (for example, Cell ID, geo-location network data, location by start call/end of the call. Location data derived from use of wifi access points);
Photos, video, and audio;
Internet activity (for example browsing history, search history, reading, television viewing, radio listening activities);
Device identification (for example IMEI-number, SIM card number, MAC address);
Profiling (for example based on observed criminal or antisocial behavior or pseudonymous profiles based on visited URLs, click streams, browsing logs, IP-addresses, domains, apps installed, or profiles based on marketing preferences);
HR and recruitment data (for example declaration of employment status, recruitment information (such as curriculum vitae, employment history, education history details), job and position data, including worked hours, assessments and salary, work permit details, availability, terms of employment, tax details, payment details, insurance details and location, and organizations);
Education data (for example education history, current education, grades and results, highest degree achieved, learning disability);
Citizenship and residency information (for example citizenship, naturalization status, marital status, nationality, immigration status, passport data, details of residency or work permit);
Information processed for the performance of a task carried out in the public interest or in the exercise of an official authority;
Special categories of data (for example racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health, data concerning a natural person’s sex life or sexual orientation, or data relating to criminal convictions or offenses); or
Any other personal data identified in Article 4 of the GDPR.
Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialized training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.
To the extent that a solution sold under an Agreement requires the processing of sensitive personal information, it will be restricted to the minimum processing necessary for the solution functionality and be subject to technical security measures appropriate to the nature of the information.
The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis).
Data may be transferred on a continuous basis during the term of the Agreement to which this DPA applies.
Nature of the processing
The nature, scope and purpose of processing personal data is to carry out performance of Avigilon’s obligations with respect to provision of the Products and Services purchased under the Agreement. The data importer utilizes a global network of data centers and management/support facilities, and processing may take place in any jurisdiction where data importer or its sub-processors utilize such facilities.
Purpose(s) of the data transfer and further processing
The nature, scope and purpose of processing personal data is to carry out performance of Avigilon’s obligations with respect to provision of the Products and Services purchased under the Agreement. The data importer utilizes a global network of data centers and management/support facilities, and processing may take place in any jurisdiction where data importer or its sub-processors utilize such facilities.
The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period
Data retention is governed by Section 10 of this DPA
For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing
Transfers to sub-processors will only be for carrying out the performance of Avigilon’s obligations with respect to provision of the Products and Services purchased under the Agreement. The duration of the processing will be for the term of the Agreement. The data importer utilizes a global network of data centers and management/support facilities, and processing may take place in any jurisdiction where data importer or its sub-processors utilize such facilities.
SCHEDULE 3
(Annex II of the EU SCC)
TECHNICAL AND ORGANIZATIONAL MEASURES INCLUDING TECHNICAL AND ORGANIZATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA
EXPLANATORY NOTE:
The technical and organizational measures must be described in specific (and not generic) terms. See also the general comment on the first page of the Appendix, in particular on the need to clearly indicate which measures apply to each transfer/set of transfers.
Measures of pseudonymisation and encryption of personal data
Where technically feasible and when not impacting services provided:
Avigilon minimizes the data it collects to information it believes is necessary to communicate, provide, and support products and services and information necessary to comply with legal obligations.
Avigilon encrypts data in transit and at rest.
Avigilon pseudonymizes and limits administrative accounts that have access to reverse pseudonymisation.
Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services
In order to ensure ongoing confidentiality, integrity, availability and resilience of processing systems and services, Avigilon Information Protection policy mandates the institutionalization of information protection throughout solution development and operational lifecycles. Avigilon maintains dedicated security teams for its internal information security and its products and services. Its security practices and policies are integral to its business and mandatory for all Avigilon employees and contractors The Motorola Chief Information Security Officer maintains responsibility and executive oversight for such policies, including formal governance, revision management, personnel education and compliance. Avigilon generally aligns to the NIST Cybersecurity Framework as well as ISO 27001.
Some of the system configuration is under the control of the customer.
Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident
Security Incident Procedures. Avigilon maintains a global incident response plan to address any physical or technical incident in an expeditious manner. Avigilon maintains a record of security breaches with a description of the breach, the time period, the consequences of the breach, the name of the reporter, and to whom the breach was reported, and the procedure for recovering data. For each security breach that is a Security Incident, notification will be made in accordance with the Security Incident Notification section of this DPA.
Business Continuity and Disaster Preparedness. Avigilon maintains business continuity and disaster preparedness plans for critical functions and systems within their control that support the Products and Services purchased under the Agreement in order to avoid services disruptions and minimize recovery risks.
Processes for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures in order to ensure the security of the processing
Avigilon periodically evaluates its processes and systems to ensure continued compliance with obligations imposed by law, regulation or contract with respect to the confidentiality, integrity, availability, and security of Customer Data, including personal information. Avigilon documents the results of these evaluations and any remediation activities taken in response to such evaluations. Avigilon periodically has third party assessments performed against applicable industry standards, such as ISO 27001, 27017, 27018 and 27701.
Measures for user identification and authorisation
Identification and Authentication. Avigilon uses industry standard practices to identify and authenticate users who attempt to access Avigilon information systems. Where authentication mechanisms are based on passwords, Avigilon requires that the passwords are at least eight characters long and are changed regularly. Avigilon uses industry standard password protection practices, including practices designed to maintain the confidentiality and integrity of passwords when they are assigned and distributed, and during storage.
Access Policy and Administration. Avigilon maintains a record of security privileges of individuals having access to Customer Data, including personal information. Avigilon maintains appropriate processes for requesting, approving and administering accounts and access privileges in connection with the Processing of Customer Data. Only authorized personnel may grant, alter or cancel authorized access to data and resources. Where an individual has access to systems containing Customer Data, the individuals are assigned separate, unique identifiers. Avigilon deactivates authentication credentials on a periodic basis.
Measures for the protection of data during transmission
Data is generally encrypted during transmission within the Avigilon managed environments. Encryption in transit is also generally required of any sub-processors. Further, protection of data in transit is also achieved through the access controls, physical and environmental security, and personnel security described throughout this Schedule 3.
Measures for the protection of data during storage
Data is generally encrypted during storage within the Avigilon managed environments. Encryption in storage is also generally required of any sub-processors. Further, protection of data in storage is also achieved through the access controls, physical and environmental security, and personnel security described throughout this Schedule 3.
Measures for ensuring physical security of locations at which personal data are processed
Avigilon maintains appropriate physical and environment security controls to prevent unauthorized access to Customer Data, including personal information. This includes appropriate physical entry controls to Avigilon facilities such as card-controlled entry points, and a staffed reception desk to protect against unauthorized entry. Access to controlled areas within a facility will be limited by job role and subject to authorized approval. Use of an access badge to enter a controlled area will be logged and such logs will be retained in accordance with Avigilon policy. Avigilon revokes personnel access to Avigilon facilities and controlled areas upon separation of employment in accordance with Avigilon policies. Avigilon policies impose industry standard workstation, device and media controls designed to further protect Customer Data, including personal information.
Measures for ensuring personnel security
Access to Customer Data. Avigilon maintains processes for authorizing and supervising its employees, and contractors with respect to monitoring access to Customer Data. Avigilon requires its employees, contractors and agents who have, or may be expected to have, access to Customer Data to comply with the provisions of the Agreement, including this Annex and any other applicable agreements binding upon Avigilon.
Security and Privacy Awareness. Avigilon must ensure that its employees and contractors remain aware of industry standard security and privacy practices, and their responsibilities for protecting Customer Data and Personal Data. This must include, but not be limited to, protection against malicious software, password protection, and management, and use of workstations and computer system accounts. Avigilon requires periodic Information security training, privacy training, and business ethics training for all employees and contract resources
Sanction Policy. Avigilon maintains a sanction policy to address violations of Avigilon’s internal security requirements as well as those imposed by law, regulation, or contract.
Background Checks. Avigilon follows its standard mandatory employment verification requirements for all new hires. In accordance with Avigilon internal policy, these requirements must be periodically reviewed and include, but may not be limited to, criminal background checks, proof of identity validation and any additional checks as deemed necessary by Avigilon.
Measures for ensuring events logging
Avigilon maintains policies requiring continuous monitoring and event logging on all production information resources. Application audit trail logs must be captured on all production Avigilon information resources. Audit trail logs of production Avigilon information resources are regularly reviewed and appropriate remedial actions are taken when necessary.
Measures for internal IT and IT security governance and management
The Avigilon Enterprise Information Security organization is structured as follows: Governance/ Risk/ Compliance, Threat Intelligence & Vulnerability Management, Detection, Protection, and Response. Avigilon assesses organization’s effectiveness annually via external assessors who report and share the assessment findings with Motorola Audit Services who tracks any identified remediations. For more information, please see the Motorola Trust Center at MSI Trust Center
Measures for certification/assurance of processes and products
Motorola performs internal Secure Application Review and Secure Design Review security audits and Production Readiness Review security readiness reviews prior to service release. Where appropriate, privacy assessments are performed for Motorola’s products and services. A risk register is created as a result of internal audits with assignments tasked to appropriate personnel. Security audits are performed annually with additional audits as needed. Additional privacy assessments, including updated data maps, occur when material changes are made to the products or services. Further, Motorola Solution has achieved AICPA SOC2 Type 2 reporting and ISO/IEC 27001:2013 certification for many of its development and support operations.
Measures for ensuring data minimisation
Avigilon policies require processing of all personal information in accordance with applicable law, including when that law requires data minimisation. Further, Avigilon conducts privacy assessments of its products and services and evaluates if those products and services support the principles of processing, such as data minimisation, as set forth in Article 5 of the GDPR.
Measures for ensuring data quality
Avigilon policies require processing of all personal information in accordance with applicable law, including when that law requires ensuring the quality and accuracy of data. Further, Avigilon conducts privacy assessments of its products and services and evaluates if those products and services support the principles of processing, such as ensuring data quality, as set forth in Article 5 of the GDPR.
Measures for ensuring limited data retention
Avigilon maintains a data retention policy that provides a retention schedule outlining storage periods for personal data. The schedule is based on business needs and provides sufficient information to identify all records and to implement disposal decisions in line with the schedule. The policy is periodically reviewed and updated.
Measures for ensuring accountability
To ensure compliance with the principle of accountability, Avigilon maintains a Privacy Program which generally aligns its activities to both the Nymity Privacy Management and Accountability Framework and NIST Privacy Framework. The Privacy Program is audited annually by Avigilon Audit Services.
Measures for allowing data portability and ensuring erasure]
When subject to a data subject request to move, copy or transfer their personal data, Avigilon will provide personal data in a structured, commonly used and machine readable format. Where possible and if an individual requests it, Avigilon can directly transmit the personal information to another organization.
SCHEDULE 4
(Annex III of the EU SCC)
LIST OF SUB-PROCESSORS
EXPLANATORY NOTE:
This Annex must be completed for Modules Two and Three, in case of the specific authorisation of sub-processors (Clause 9(a), Option 1).
The controller has authorized the use of the following sub-processors:
Motorola Sub-Processors unless otherwise identified below.
Our video security experts can help you implement the right security system for your business.