CORE FINANCIAL GENERAL TERMS AND CONDTIONS


Annex 1 — Support & SLA Terms

Appendix 4

Support Terms

1. Introduction

This Support Service Level Agreement (“SLA”) sets out the procedure for logging queries and our response times when
providing Maintenance Services pursuant to any such Software Licence and Maintenance Agreement entered between
the parties hereto (“LMA”).

This SLA is designed to reflect our current structure and work methods, and is a means of communicating to you, our
customer, how we operate and our stated performance levels and response times in respect of the provision of
Maintenance Services to you. We undertake to meet the performance levels and response times specified herein when
providing Maintenance Services pursuant to any LMA.

This SLA is effective from the Effective Date of the agreement and shall continue for the duration of the provision of
Maintenance Services under any LMA.

Capitalized terms used in this SLA shall have the same meanings as in any LMA unless specifically stated otherwise.

2. Contacting Support

Support issues can be logged at our support desk by email at support@corefinancial.ie or through our Support Tool at
https://corefinancial.ie/support/#CoreSupport

Our Support Tool benefits to Customer include:

  • Tickets are categorised by the client.
  • 24/7 access.
  • Customers can Track the progress of their tickets.
  • Visibility of updates and know exactly who is managing the request.
  • Look back on historical Tickets – self serve – same issue repeating.
  • Dashboards – for reporting

The support desk operates between the hours of 9am and 5.30pm (excluding lunchtime between 1-2pm) Monday to
Friday excluding Bank and Public Holidays.

3. Service Levels

The support service framework is structured across four priority levels and three support tiers to ensure that incidents
are managed consistently and in alignment with their business impact.

Priority 1 issues—representing severe outages with no workarounds—receive the highest urgency, with accelerated
response and resolution targets across all tiers, including a dedicated Teams channel for immediate escalation under
the Gold tier.

Priority 2 incidents, which significantly affect user operations but allow partial functionality to continue, follow defined
response and resolution times that ensure timely restoration of service.

Priority 3 and 4 issues, representing non-critical disruptions or cosmetic inquiries, are managed within longer timelines
that reflect their limited impact on business operations.

The Gold, Silver, and Bronze support tiers provide organisations with flexible levels of service responsiveness,
ranging from the most rapid engagement for mission-critical environments to more economical options aligned with
lower-risk operational needs. The table below depicts the Service Levels based on priority levels.

 Priority 1Priority 2Priority 3Priority 4
ExampleSystem Down – Severe Business impact – No work arounds – affects all usersDisruption impacts a significant portion of users or a core function, but operations can continue with limitationsNon-Critical Issue – affecting some users or a minor feature – workarounds exist – Business impact is limitedCosmetic issues, general inquiries, or issues minimal impact – no urgency does not affect day to day operations
Gold Level
Teams Channel to Support Team for P1 IssuesTeams Channel to Support Team for P1 Issues
First Response1 hour2 hours4 hours24 hours
Resolution4 hours3 days6 days12 days
Silver Level
First Response2 hours3 hours5 hours24 hours
Resolution6 hours3 days6 days12 days
Bronze Level
First Response3 hours4 hours6 hours24 hours
Resolution8 hours4 days7 days12 days


 

Annex 2 — Data Processing Agreement (DPA)

1. Introduction

This Data Processing Agreement (“DPA”) governs the processing of personal data by Core Financial Systems
Limited (“Core” or “Processor”) on behalf of the Customer (“Customer” or “Controller”) as part of the
services provided under the Master Services Agreement (“Agreement”) or the General Terms and
Conditions. This DPA reflects the parties’ agreement on data protection and security, in compliance with
Article 28 of the General Data Protection Regulation (EU) 2016/679 (GDPR), the UK GDPR, and other
applicable data protection laws

2. Definitions

“Applicable Data Protection Law” means all data protection and privacy laws and regulations applicable
to the processing of Personal Data under the Agreement, including the GDPR, the UK GDPR, and relevant
national laws.

“Customer” or “Controller” means the legal entity that determines the purposes and means of the
processing of Personal Data.

“Core” or “Processor” means Core Financial Systems Limited, acting as a processor of Personal Data on
behalf of the Customer.

“Data Subject” means an identified or identifiable natural person to whom the Personal Data relates.

“Personal Data” means any information relating to an identified or identifiable natural person that is
processed under this Agreement.

“Special Category Data” means personal data as defined in Article 9(1) of the GDPR, including data
revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union
membership, genetic data, biometric data, health data, or data concerning a person’s sex life or sexual
orientation.

“Personal Data Breach” means a breach of security leading to the accidental or unlawful destruction, loss,
alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored or otherwise
processed.

“Processing” means any operation or set of operations performed on Personal Data, whether or not by
automated means.

“Sub-processor” means a third party engaged by Core to process Personal Data on behalf of the Customer.

“Supervisory Authority” means an independent public authority responsible for monitoring the
application of Applicable Data Protection Law.

“Standard Contractual Clauses” or “SCCs” means the standard data protection clauses adopted by the
European Commission or the UK Government for the transfer of Personal Data to processors or controllers
established in Third Countries, pursuant to Article 46 of the GDPR.

“Third Country” means a country outside the European Economic Area (EEA) or the United Kingdom (UK)
that is not subject to an adequacy decision.

“Transfer Impact Assessment” or “TIA” means an assessment of the laws and practices of a Third Country
to determine whether Personal Data transferred there is subject to adequate protection under GDPR
standards.

“Services” means the services provided by Core to the Customer under the Agreement.

“Technical and Organisational Measures” or “TOMs” means the security measures implemented by Core
as further described in Schedule 3.

3. Scope of Processing and Allocation of Responsibilities

3.1 Roles of the Parties

The Customer is the data controller and Core is the data processor with respect to the processing of
Personal Data carried out under this DPA. The Customer determines the purposes and means of the
processing, and Core acts solely on the documented instructions of the Customer, as set out in this DPA and
the Agreement.

3.2 Scope of Processing.

This DPA applies to all processing of Personal Data carried out by Core on behalf of the Customer in the
course of delivering the Services under the Agreement. The Services may include:

(a) Cloud Services (Software-as-a-Service):
(i) Provision of access to Core’s hosted applications and modules as configured and used by the
Customer;
(ii) Functional operation of the platform, including user access, account management, and data
processing based on user activity;
(iii) Troubleshooting and incident resolution (detecting, preventing, repairing service errors);
(iv) Application updates, patching, security enhancements, and performance optimisation.

(b) Support Services:
(i) Handling support tickets and technical queries submitted by the Customer;
(ii) Investigating, reproducing, and resolving reported issues;
(iii) Diagnostic log collection and review (where authorised by the Customer);
(iv) Communicating fixes or workarounds to the Customer.

(c) Professional Services / Consultancy:
(i) Planning and configuration services;
(ii) System design, deployment, and testing;
(iii) Data import/export, mapping, and migration assistance;
(iv) Process optimisation and advisory;
(v) Post-go-live support and operational guidance.

3.3 Processing Environment

This DPA applies only to the processing of Personal Data that occurs:
(i) Within Core’s managed systems and infrastructure;
(ii) In environments controlled or accessed by Core and its authorised Sub-processors;
(iii) As required to deliver the contracted Services to the Customer.
Processing performed by the Customer independently, including data input or management within the
Customer’s own environments, is outside the scope of this DPA.

3.4 Nature and Details of Processing.

The specific categories of personal data, data subjects, and processing activities are detailed in Schedule 1
(Description of Processing) to this DPA.

4. Core’s Obligations as Processor

Core warrants and undertakes that it shall:

4.1 process Personal Data solely for the purpose of delivering the Services and only on documented
instructions from the Customer as defined in the Agreement, this DPA, or as otherwise agreed in
writing;
4.2 promptly inform the Customer if, in Core’s opinion, an instruction infringes Applicable Data
Protection Law;
4.3 ensure that persons authorised to process Personal Data are bound by confidentiality obligations
or are under appropriate statutory obligations of confidentiality;
4.4 implement and maintain appropriate Technical and Organisational Measures to protect Personal
Data against accidental or unlawful destruction, loss, alteration, unauthorised disclosure or
access, as described in Schedule 3;
4.5 maintain a written record of processing activities in accordance with Article 30(2) of the GDPR
and make such records available to the Customer upon request;
4.6 assist the Customer in fulfilling its obligations under Applicable Data Protection Law, including in
relation to:
4.6.1 responding to requests from Data Subjects,
4.6.2 conducting data protection impact assessments (DPIAs),
4.6.3 consulting with Supervisory Authorities, and
4.6.4 meeting other compliance obligations under Articles 32 to 36 of the GDPR;
4.7 cooperate with the competent Supervisory Authorities, including the Data Protection
Commission or equivalent, on request and assist the Customer in responding to such inquiries or
investigations as required;
4.8 notify the Customer without undue delay upon becoming aware of a Personal Data Breach and
provide reasonable cooperation and assistance in connection with the investigation, mitigation,
and remediation of the breach;
4.9 at the choice of the Customer, delete or return all Personal Data at the end of the provision of the
Services, unless retention is required by applicable law, in which case Core shall continue to
ensure the confidentiality of the Personal Data and not actively process it;
4.10 make available to the Customer all information necessary to demonstrate compliance with this
DPA and allow for audits and inspections in accordance with Section 9 of this DPA; and
4.11 treat all Personal Data and any information derived from processing activities under this
Agreement as strictly confidential. Core shall ensure that access is limited to personnel or Sub-
processors who require such access for the performance of their duties, and who are bound by
appropriate statutory or contractual confidentiality obligations.

Where Core’s assistance to the Customer under this DPA (including but not limited to support in relation
to data subject requests, data protection impact assessments, consultations with Supervisory
Authorities, or responses to audits or investigations) requires effort or resources beyond Core’s
standard service obligations, Core may charge the Customer a reasonable fee for such additional
assistance. Such fees shall be agreed in advance in writing and shall reflect the time, expertise, and
resources required to perform the assistance in a commercially reasonable manner.

5. Customer Obligations as Controller

5.1 The Customer warrants and represents that:

5.1.1 It has obtained all necessary consents, permissions, and legal bases under Applicable Data
Protection Law to permit Core to process the Personal Data on its behalf, including to transfer
such Personal Data to Core and its authorised Sub-processors;
5.1.2 The Personal Data has been collected, processed, and transferred lawfully, fairly and in
accordance with Applicable Data Protection Law;
5.1.3 It is and will remain solely responsible for determining the purposes and means of Core’s
processing of the Personal Data;
5.1.4 It has fulfilled, and will continue to fulfil, its information obligations toward Data Subjects as
required by Articles 13 and 14 of the GDPR;
5.1.5 It has the legal authority to give the warranties and fulfil the undertakings set out in this
Agreement;
5.1.6 It is solely responsible for the accuracy, quality, and legality of the Personal Data provided to Core.

5.2 The Customer acknowledges and agrees that:
5.2.1 Core shall act solely on the documented instructions of the Customer in accordance with this DPA;
5.2.2 The Customer remains solely responsible for configuring its use of the Services to meet its legal
obligations, including its obligations relating to Data Subject rights;
5.2.3 The security measures described in Schedule 3 have been reviewed and approved by the
Customer as adequate for the types of processing and Personal Data involved.
5.2.4 The Customer shall comply with its obligations under Applicable Data Protection Law and is
responsible for ensuring that its instructions to Core are lawful. The Customer shall obtain all
necessary rights, permissions, and consents to allow Core to process Personal Data on its behalf.

6. Sub-processing

6.1 The Customer provides Core with a general authorisation to engage Sub-processors for the
performance of the Services, subject to the conditions set out in Article 28(2) and (4) of the GDPR.

6.2 A current list of authorised Sub-processors and their locations is available at:
https://corefinancial.ie/subprocessors

6.3 Core shall ensure that each Sub-processor is bound by written obligations that are substantially
similar to those set out in this DPA, including confidentiality obligations equivalent to those in Clause
4.11 of this DPA and providing sufficient guarantees to implement appropriate technical and
organisational measures.

6.4 Core shall remain fully liable to the Customer for the performance of any Sub-processor’s obligations.

6.5 Core shall inform the Customer of any intended changes to the list of Sub-processors and provide the
Customer with an opportunity to object on reasonable data protection grounds within thirty (30)
business days of such notice.

6.6 Where Core appoints a Sub-processor located in a third country outside the EEA or UK, and such
appointment involves a transfer of Personal Data, Core shall take primary responsibility for
preparing and documenting any required Transfer Impact Assessment (TIA), subject to the
Customer’s review and approval. Both parties shall cooperate in good faith to agree on a reasonable
TIA format. The Customer, as Controller, shall remain ultimately responsible for determining
whether the transfer satisfies the requirements of Applicable Data Protection Law, including whether
the TIA outcome and any supplementary measures are sufficient to permit the transfer.

6.7 Where the Customer objects to the appointment of a Sub-processor, the parties shall work together
in good faith to find a reasonable alternative. However, the Customer acknowledges that such an
objection may prevent Core from delivering the Services as agreed, and the Customer shall bear full
responsibility for any service limitations, delays, or resulting liabilities arising from its refusal to
authorise the use of that Sub-processor.

7. International Data Transfers

7.1 Core shall not transfer Personal Data outside the European Economic Area (EEA) or the United
Kingdom (UK) unless such transfer complies with Applicable Data Protection Law.

7.2 Core shall ensure that an appropriate transfer mechanism is in place, including one or more of the
following:

  • An adequacy decision by the European Commission or UK Government;
  • Standard Contractual Clauses (SCCs) adopted by the European Commission or UK Government;
  • Binding Corporate Rules or another approved certification or code of conduct mechanism
    recognised under Applicable Data Protection Law.

7.3 Transfers to authorised Sub-processors are governed by Section 6 of this DPA. Where required, Core
shall assist the Customer in conducting a Transfer Impact Assessment (TIA) and implementing
supplementary safeguards necessary to ensure an equivalent level of protection for Personal Data
transferred to a third country.

7.4 The Customer acknowledges that it remains responsible for determining whether the use of Core’s
services and the associated international transfers comply with its internal policies and legal
obligations under Applicable Data Protection Law.

8. Personal Data Breaches

8.1 Notification obligations in the event of a Personal Data Breach are described in Section 4.8 of this
DPA.

8.2 For clarity, Core shall notify the Customer without undue delay and no later than 48 hours after
becoming aware of a Personal Data Breach affecting Customer Personal Data, and shall cooperate in
accordance with Section 4.8.

8.3 Core shall provide the Customer with a description of the nature of the breach; the likely
consequences; the categories and approximate number of data subjects and records affected; and
measures taken or proposed to address the breach.

9. Right of Audit

9.1 Upon the reasonable request of the Customer, Core shall allow, for the purposes of audit and—where
confidentiality and contractual terms permit—access to data processing facilities, systems, files, and
documentation used for the processing of Personal Data. Such access shall be solely for the purposes
of reviewing, auditing and/or certifying Core’s compliance with the data protection obligations
under this DPA and Applicable Data Protection Law.

9.2 Such audits may be conducted by the Customer or by independent or impartial inspection agents or
auditors selected by the Customer and not reasonably objected to by Core.

9.3 The Customer shall provide at least 30 days’ prior written notice of its intention to audit. The notice
must include specific details on the scope, objectives, and categories of evidence required. The
parties shall mutually agree on audit dates and times before the audit commences.

9.4 Audits shall be conducted during Core’s normal business hours and in a manner that minimises
disruption to Core’s business operations. The Customer shall take all reasonable steps to prevent any
material business interruption.

9.5 If the audit extends beyond the agreed scope or period, reasonable additional costs may be incurred
by Core. Such costs shall be negotiated in advance and, where necessary, incorporated into a Schedule
or separate agreement.

9.6 The exercise of audit rights shall be subject to:
(a) any necessary regulatory or supervisory approvals required in the Customer’s jurisdiction;
(b) Core’s confidentiality obligations owed to other clients or third parties; and
(c) the confidentiality provisions of the Agreement, and any additional confidentiality obligations
reasonably required by Core to protect proprietary information, security protocols, or third-party
data, provided that such measures do not materially hinder or obstruct the audit.

10. Liability and Indemnity

10.1 Core shall not be liable for any claim brought by a Data Subject arising from any Processing activity
undertaken by Core in accordance with the documented instructions of the Customer, to the extent
that such instructions caused the breach.

10.2 Subject to Clause 10.1, each party (the “Indemnifying Party”) shall indemnify and keep indemnified
the other party (the “Indemnified Party”) against any direct losses, costs, claims, damages, liabilities,
or expenses (including reasonable legal fees) incurred by the Indemnified Party as a result of:
(a) any breach by the Indemnifying Party of its obligations under this Agreement or Applicable Data
Protection Law; or
(b) any monetary fine or penalty imposed on the Indemnified Party by a Supervisory Authority
arising from the Indemnifying Party’s non-compliance with this Agreement or Applicable Data
Protection Law.

10.3 Where a claim is brought against the Customer by a Data Subject in connection with Core’s
processing of Personal Data, and such processing was not in accordance with the Customer’s
documented instructions, Core shall indemnify and keep indemnified the Customer against all direct
costs, damages, and reasonable legal expenses incurred in relation to such claim.

10.4 Where a claim is brought against Core by a Data Subject and such claim arises from the Customer’s
instructions or from the Customer’s failure to comply with its obligations under Applicable Data
Protection Law, the Customer shall indemnify and keep indemnified Core against all direct costs,
damages, and reasonable legal expenses incurred in relation to such claim.

10.5 Neither party shall be liable to the other for any indirect or consequential loss, loss of profit, loss of
revenue, or loss of data, except to the extent such liability arises from:
(a) a breach of confidentiality under this Agreement;
(b) a Personal Data Breach resulting from a party’s failure to comply with its obligations under this
Agreement; or
(c) an indemnity obligation set out in this Clause 10.

11. Duration and Termination

11.1 This Data Processing Agreement shall remain in force for the duration of the Agreement between
Core and the Customer, or for as long as Core processes Personal Data on behalf of the Customer,
whichever is longer.

11.2 Upon termination or expiry of the Agreement, Core shall, at the Customer’s choice and subject to any
legal obligation to retain the data, delete or return all Personal Data processed on behalf of the
Customer, and shall certify such deletion if requested by the Customer in writing.

11.3 Core shall not retain Personal Data longer than is necessary for the performance of the Services
unless required by applicable law. In such case, Core shall continue to ensure the confidentiality and
integrity of the Personal Data and shall not process it for any other purpose.

12. Conflict and Precedence

12.1 In the event of any conflict between this Data Processing Agreement and the Agreement, the terms
of this Data Processing Agreement shall prevail solely in relation to the processing of Personal Data
and compliance with Applicable Data Protection Law.

13. Governing Law

13.1 This Data Processing Agreement shall be governed by, and construed in accordance with, the
governing law and jurisdiction provisions set out in the Agreement.

14. Variation of this Agreement

14.1 Core may update this Data Processing Agreement from time to time to reflect changes in applicable
law, regulatory guidance, or its Sub-processor arrangements. Any material changes shall be
communicated to the Customer in writing and published at: https://corefinancial.ie/dpa

14.2 Where required by Applicable Data Protection Law, the parties shall negotiate in good faith to agree
any necessary variations to ensure continued compliance.

14.3 No other variation of this Data Processing Agreement shall be effective unless made in writing and
signed by authorised representatives of both parties.

Schedule 1 – Description of Processing

Subject Matter: Provision of software and consulting services under the Agreement.
Duration: For the term of the Agreement or as otherwise agreed.
Nature and Purpose: Hosting, configuration, support, reporting, and processing activities necessary to
deliver the Services.
Categories of Data Subjects: Data Subjects may include Customer’s representatives and end-users including
employees, contractors, collaborators, business partners, and customers of Customer, depending on
Customer’s use of the Services at Customer’s election.
Categories of Personal Data: Contact information, account data, financial records, audit logs, and any data
uploaded by the Customer.
Special Category Data: The processing of Special Category Personal Data (as defined in Article 9 of the
GDPR) is not anticipated under this Agreement. Should the need to process such data arise, the Parties shall
agree in writing on the lawful basis, safeguards, and necessary amendments to this Agreement prior to any
such processing taking place.

Schedule 2 – Sub-processors and Locations

An up-to-date list of authorised Sub-processors and processing locations is available at:
https://corefinancial.ie/subprocessors

Full Legal NameProcessing ActivityCategory of Personal Data ProcessedLocation of ProcessingLocation of Headquarters
Microsoft Ireland Operations Ltd.Provision of Microsoft Azure Cloud hosting used for Core Financial Systems’ infrastructure and application environments. Microsoft acts as a data sub-processor solely for hosting and platform services.All categories of data stored within Core’s hosted systems, including business client data, user credentials, and technical logs.Ireland and within the EEA (data residency for Azure EU regions).Ireland
Viatel Technology Group Ltd.
Dublin 15, D15 PEC4, Ireland
Microsoft Azure cloud platform support and telecommunications backbone provider. Viatel supports Core’s Azure-hosted environment and ensures secure network connectivity and uptime.Customer and employee contact data, access credentials, and system technical data.IrelandIreland
Document Centric Solutions Ltd. (DCS)Provides technical helpdesk services and system maintenance on behalf of Core Financial Systems. Has access to user support data and system-level metadata in the financial management solution.User contact details, system usage data, and limited support‑related metadata.IrelandIreland
Infor (United Kingdom) LtdProvider of Infor Cloud Services (SaaS) for financial management applications, including hosting, maintenance, and technical support under Infor’s EU/EEA cloud infrastructure.Customer and transactional data, user credentials, and system metadata processed via the Infor Cloud environment.Within the EU/EEA (Infor’s European data centres per Data Protection Agreement).United Kingdom
IT.ie (IT Support and Services Ltd.)Managed IT services, cybersecurity monitoring, and data backup for Core’s internal and client-supporting systems.Employee and client contact data, limited technical logs, and system access credentials.IrelandIreland

Schedule 3 – Technical and Organisational Measures (TOMs)

The minimum technical and organisational measures that must be implemented by the Data Processor
when using their own IT resources to process Personal Data:

  1. All IT Networks (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process any Personal Data have properly managed, configured and up to date firewalls in place.
  2. All IT Networks (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data have properly managed and configured network monitoring and logging in place.
  3. All IT Networks (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data have properly managed, configured and up to date intrusion detection and/or intrusion prevention systems in place.
  4. All IT Networks (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data have strong access controls in place.
  5. Appropriate levels of network, system, and physical redundancy are in place.
  6. All the buildings or facilities (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to host IT systems, IT devices, servers and other critical IT equipment which are used to process Personal Data are protected by appropriate physical and environmental controls.
  7. All IT devices, mobile computer devices and servers (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data have real-time protection anti-virus, anti-malware and anti-spyware software installed and updated daily.
  8. All IT systems, IT devices, mobile computer devices, servers and other critical IT equipment (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data are protected by strong unique passwords which satisfy or better the requirements of the Data Controller’s Password Policy.
  9. All the mobile computer devices and removable storage devices (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data have encryption enabled which encrypts any Personal Data stored at rest on the device. The encryption of the Personal Data on the device may be achieved by either full- disk encryption, file system encryption or (as applicable) database encryption. All encryption used by the Data Processor must satisfy or better the requirements of the Data Controller’s Encryption Policy.
  10. All servers (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data have encryption enabled which encrypts any Personal Data stored at rest on the server. The encryption of the Personal Data on the server may be achieved by either full-disk encryption, file system encryption or (as applicable) database encryption. All encryption used by the Data Processor must satisfy or better the requirements of the Data Controller’s Encryption Policy.
  11. All servers (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data are backed up on a daily basis. Where the Data Processor backs up the Servers onto backup media, the Data Processor must ensure the following: 11.1 The backup media is stored a sufficient distance away from the server, for example, in another building on-site under the control of the Data Processor or off-site in a building or facility controlled by the Data Processor or a contracted third party; 11.2 When not in use, the backup media is protected from damage caused by fire, heat, humidity, water, and exposure to strong magnetic fields; 11.3 The backup media is password protected by strong unique passwords which satisfy or better the requirements of the Data Controller’s Password Policy; 11.4 The backup media is encrypted using strong encryption which satisfies or betters the requirements of the Data Controller’s Encryption Policy; 11.5 Access to the backup media is limited to the Data Processors employees, contractors and/or (as applicable) Sub-Processors who are involved in the backup process; 11.6 When in transit, the backup media is protected at all times from damage, theft, interference and loss; 11.7 The backup media is tested by the Data Processor on a regular basis; 11.8 All old, obsolete, and damaged backup media which was used to backup Personal Data is physically destroyed.
  12. All servers (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data have logging enabled, and the server logs are monitored by the Data Processor on a regular basis.
  13. All Personal Data which is sent in transit by the Data Processor is sent via secure channels (for example, VPN, Secure FTP or TLS) or encrypted email. All encryption used by the Data Processor must satisfy or better the requirements of the Data Controller’s Encryption Policy.
  14. Appropriate patch management procedures are in place for managing the timely application of relevant security software updates and patches to all IT devices, mobile computer devices, servers and other critical IT equipment (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data.
  15. Documented disaster recovery plans are in place which detail how the Data Processor will restore the availability of, and access to any servers (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data in the event of a physical or technical security breach.
  16. Appropriate asset management procedures are in place which allow for the management and recording of all the Data Processors IT hardware and software assets used to process Personal Data.
  17. Appropriate procedures are in place for the timely decommissioning and secure wiping or destruction (i.e. process that renders data unrecoverable) of all old, obsolete and damaged IT devices, mobile computer devices, servers, software and other critical IT equipment (with the exception of those which are owned or controlled by the Data Controller) used by the Data Processor to process Personal Data.
  18. Appropriate procedures are in place which allow the Data Processor to regularly, test, assess and evaluate the effectiveness of the technical and organisational measures they have implemented to ensure the security of Personal Data which they process on behalf of the Data Controller.
  19. Appropriate separation controls are in place which provide for the separation of different customers data on the Data Processors IT hardware and software and ensure Personal Data is Processed by the Data Processor as separately as possible from the Data Processors other customer’s data.
  20. Full separation (where applicable) of the Data Processors production and development / test / training environments is in place.
  21. Documented IT and information security policies are in place which all the Data Processor’s employees and contractors sign up to and are expected to comply with.
  22. Appropriate procedures are in place for the vetting of all new Data Processor employees and contractors who will have access to Personal Data.
  23. Non-disclosure and confidentiality clauses are included in the Data Processors contracts of employment for all their employees and contractors who have access to Personal Data.
  24. Where legally required to do so, the Data Processor has appointed a Data Protection Officer (DPO) in accordance with Article 37 of the GDPR.


 

Annex 3 — DORA Provisions

1.1. Definitions for this Annex 3;

1.1.1. “Financial Services Customer” refers to a customer of Company who is also classified as a
“financial entity”, under DORA Article 2(1) points (a) to (t).

1.1.2. ICT Risk” refers to any reasonably identifiable circumstance in relation to the use of network
and information systems which, if materialised, may compromise the security of the Services
or of network and information systems relevant to the Services or other operations or
processes relevant to the Services by producing adverse effects in the digital or physical
environment.

1.1.3. “Regulator” refers to any European financial service regulator or national competent
authority that has the monitoring or supervisory rights specified below over Customer
and/or over Company as the provider of the Services to Customer

1.2. The Services [DORA Article 30(2)(a) & Article 30(2)(e)].

1.2.1. Company will provide Customer with the Services in accordance with the service
description and performance standards set out in the Agreement

1.3. Incident Management [DORA Article 30(2)(f)].

1.3.1. If Customer or Company confirm the existence of, or in good faith reasonably suspect there
has been, a single event or series of linked events that have an adverse impact on the
functioning or performance, or compromises the security, of any of
Customer’s or Company’s equipment, software, network, information systems, or the
availability, authenticity, integrity or confidentiality of data held or controlled
by Company, such that the provision or receipt of the Services is impacted (an “ICT
Incident”), Company shall;

1.3.2. (if Company is the party impacted by the event(s)), notify Customer of that fact without
undue delay (and no later than 24 hours of its actual confirmation of the ICT Incident or
identification in good faith of a suspected ICT Incident), together with reasonable details of
the ICT Incident and any steps required to be taken or that it is taking to mitigate the effects
of the ICT Incident, including if relevant any steps necessary to reduce the risk of any future
breach of security of that same nature

1.3.3. provide reasonable assistance to Customer (at a cost agreed between the parties) to
support Customer to recover from the ICT Incident and to comply with its obligations under
Applicable Law including with regard to notifications to the Regulator; and

1.3.4. if Company is the party impacted by the event(s)), promptly address and remediate the ICT
Incident, and mitigate its effects.

1.4. Permitted Locations [DORA Article 30(2)(b)]

1.4.1. Company will provide the Services from and will store and process Customer Data and
Confidential Information in the UK and the EEA. Company’s subcontractors and banking
partners involved in providing the Services may also transfer personal data outside of the
UK and the EEA, as set out in our Privacy Notice. Further details regarding the
service locations and storage of data are available upon request.

1.5. Termination [DORA Article 28(7) & Article 30(2)(h)].

1.5.1. Customer may terminate the Agreement:

1.5.1.1. immediately on the giving of notice to Company where Company is in breach
of Applicable Laws;

1.5.1.2. immediately on the giving of notice to Company where Company commits a material
breach of the Agreement which is incapable of remedy or, if capable of remedy, is not
remedied within thirty (30) days after written notice to Customer of the occurrence of
such event;

1.5.1.3. immediately on the giving of notice to Company where Customer identifies or
becomes aware of circumstances or events which Customer reasonably considers are
capable of altering the performance of the Services provided under the Agreement,
including material changes that affect the Services or Company;

1.5.2. immediately on the giving of notice to Company where there is evidence of weaknesses in
the ICT risk management of Company or any Subcontractor it relies on, including in respect
of the security of any Customer Data; and

1.5.3. immediately on the giving of notice to Company upon request of a Regulator or
where Customer is otherwise required to do so by Applicable Law.

1.6. Consequences of Termination [DORA Article 30(2)(d)].

1.6.1. If the Agreement is terminated or expires, or in the case of the insolvency, resolution or
discontinuation of business operations of Company, Company shall ensure that
any Regulator can access any data owned by Customer, Customer Data and Confidential
Information, and that Customer can access, retrieve, store or otherwise deal with any data
owned by Customer, Customer Data and Confidential Information.

1.7. Information Security [DORA Article 30(2)(c) and (d)].

1.7.1. Company shall ensure that its information security measures, and those of
any Subcontractor(s) it uses to provide the Services, are appropriate in order to ensure at all
times: (i) the security, availability, authenticity, integrity, confidentiality, and accuracy
of Customer Data; and (ii) that the Customer Data can be traced, recovered, disposed of or
deleted as may be requested by Customer at any time. Company shall ensure
that Customer Data can be accessed, recovered and returned to Customer as needed and in
an accessible format.

1.8. Awareness and Training [DORA Article 30(2)(i)].

1.8.1. On reasonable request from Customer, Company shall participate in Customer’s (i) ICT
security awareness programmes; (ii) digital operational resilience training; and (iii) other
similar awareness and training initiatives. Where such participation in awareness and
training initiatives is requested by Customer, Customer and Company will agree, in good
faith and acting reasonably, which of Company personnel should participate.

1.9. Regulatory Assistance [DORA Article 30(2)(g)].

1.9.1. Company shall fully cooperate with, and provide Customer with reasonable assistance in
connection with, any investigation by or dealings with any Regulators relating to the
Agreement, and/or Customer’s purchase or use of the Services. Such assistance shall
include Company:

1.9.2. directing any and all queries from a Regulator relating to the Agreement or the
Services to Customer; and

1.9.3. cooperating with and responding to any request for information, confirmations and/or
assistance including replying to questions from a Regulator within a reasonable period of
time and at the reasonable direction of and in consultation with Customer and/or
a Regulator; and

1.9.4. granting each Regulator the right to give instructions in order to (i) prevent any breach of
regulatory requirements (ii) remove any obstacles that hinder the Regulator’s audit rights
and (iii) to remove any defects that impact the integrity of any entrusted assets or the due
performance of the Services and/or financial services.

1.10. Company will further ensure that its Subcontractors fully cooperate with Customer and
Regulators as is necessary for the discharge of Customer’s legal and regulatory obligations.

Scroll to Top