- DEFINITIONS
- “Additional Services” means additional model-driven fraud prediction and detection services, as agreed between the Customer and FingerprintJS.
- “Affiliate” means an entity that directly or indirectly Controls, is Controlled by or is under common Control with an entity.
- “Authorized Affiliate” means any of Customers’ Affiliate(s) permitted to or otherwise receiving the benefit of the Service and Additional Services pursuant to the Agreement.
- “Controller” has the meaning, or equivalent meaning given to such term, or equivalent terms, under the US Data Protection Laws including a “Business” under the CCPA.
- “CCPA” means the California Consumer Privacy Act of 2018, Cal. Civ. Code § 1798.100 et seq., as amended, including its implementing regulations and the California Privacy Rights Act of 2020.
- “Control” or “Controlled” means the possession, directly or indirectly, of the power to direct or cause the direction of management and policies of an entity, whether through the ability to exercise voting power, by contract or otherwise.
- “Customer” shall have the meaning ascribed to it in the Agreement.
- “Customer Personal Information” means any Personal Information that FingerprintJS and/or its Affiliates Processes in the course of providing the Service and Additional Services to Customer under the Agreement as set out in Schedule 1.
- “Data Subject” means an individual to whom Personal Information relates.
- “Deidentified Data” means data created using Customer Personal Information that cannot reasonably be linked to such Customer Personal Information, directly or indirectly.
- “Personal Information” means “personal information”, “personal data”, “personally identifiable information” or similarly defined data or information under US Data Protection Laws.
- “Processing” means any operation or set of operations (including storage) that is performed on Personal Information or on sets of Personal Information, whether or not by automated means. “Process”, “Processes” and “Processed” will be interpreted accordingly.
- “Processor” has the meaning, or equivalent meaning given to such term, or equivalent terms, under the US Data Protection Laws including “Service Provider” under the CCPA.
- “Security Incident” means any breach of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to Personal Information.
- “Sub-processor” means a Processor instructed to Process Personal Information on behalf of another Processor.
- “US Data Protection Laws” means all applicable federal and state laws rules, regulations, and governmental requirements relating to data protection, the Processing of Personal Information, privacy and/or data protection in force from time to time in the United States, including (without limitation) the CCPA.
- SCOPE AND APPLICABILITY OF THIS ADDENDUM
- INSTRUCTIONS FOR INFORMATION PROCESSING
- (a) selling Customer Personal Information or otherwise making Customer Personal Information available to any third party for monetary or other valuable consideration;
- (b) sharing Customer Personal Information with any third party for cross-context behavioral advertising;
- (c) retaining, using, or disclosing Customer Personal Information for any purpose other than for the business purposes specified in the Agreement or as otherwise permitted by US Data Protection Laws;
- (d) retaining, using, or disclosing Customer Personal Information outside of the direct business relationship between the Parties, unless permitted by US Data Protection Laws; and
- (e) except as otherwise permitted by US Data Protection Laws, combining Customer Personal Information with Personal Information that FingerprintJS receives from or on behalf of another person or persons, or collects from FingerprintJS’ own interaction with the applicable Data Subject.
- (a) for internal use by FingerprintJS to build or improve the quality of its Service and Additional Services, even if this business purpose is not specified in the Agreement;
- (b) to prevent, detect, or investigate detect data security incidents or protect against malicious, deceptive, fraudulent or illegal activity, even if this business purpose is not specified in the Agreement; or
- (c) for the purposes set out in US Data Protection Laws, including in California Civil Code section 1798.145, subdivisions (a)(1) through (a)(7).
- COMPLIANCE AND NOTICE
- (a) it has provided notice to Data Subjects, as required under US Data Protection Laws for a Controller, that the Personal Information is being used or shared as set forth in the Agreement; and
-
(b) taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the security measures set out in Schedule 2 are:
- (i) appropriate to ensure the security of the Customer Personal Information, including protection against a Security Incident; and
- (ii) otherwise consistent with the Customer’s obligations US Data Protection Laws.
- SUB-PROCESSORS
- SECURITY AND AUDITS
-
(a) all such assessments, audits or inspections shall be conducted:
- (i) only once per year, or more frequently if any audit indicates that FingerprintJS is in non-compliance with this DPA;
- (ii) on reasonable written notice to FingerprintJS;
- (iii) only during FingerprintJS’ normal business hours;
- (iv) in a manner that does not disrupt FingerprintJS’ business; and
- (v) by reference to an appropriate and accepted control standard or framework; and
-
(b) the Customer (or, where applicable, a third-party independent auditor appointed by the Customer) shall:
- (i) enter into a confidentiality agreement with FingerprintJS prior to conducting the audit in such form as FingerprintJS may request; and
- (ii) ensure that its personnel comply with FingerprintJS’ and any Sub-processor’s policies and procedures when attending FingerprintJS’ or Sub-processor’s premises, as notified to the Customer by FingerprintJS or Sub-processor. 6.9 FingerprintJS shall provide written responses (on a confidential basis) to all reasonable requests for information made by Customer, including responses to information security and audit questionnaires, that Customer (acting reasonably) considers necessary to confirm FingerprintJS’ compliance with this DPA, provided that Customer shall not exercise this right more than once per year.
- 6.10 FingerprintJS shall notify Customer if it makes a determination that it can no longer meet its obligations under US Data Protection Laws.
- DATA SUBJECT REQUESTS
- DEIDENTIFIED DATA
- (a) take reasonable measures to ensure the information cannot be associated with a Data Subject;
- (b) publicly commit to Process the Deidentified Data solely in deidentified form and not to attempt to reidentify the information; and
- (c) contractually obligate any recipients of the Deidentified Data to comply with the foregoing requirements and Data Protection Laws.
- RETURN AND DELETION
- (a) to the extent required by applicable laws, and only for such period and such purposes as required by applicable laws; or
- (b) to the extent that the Customer Personal Information has been archived on back-up systems, provided that FingerprintJS shall securely isolate and protect such Customer Personal Information from any further Processing, except to the extent required by applicable law, and purge such Customer Personal Information from the applicable back-up systems in accordance with its normal back-up cycle.
- COSTS
- (a) implementing any changes to the Service and Additional Services under Section 5.3;
- (b) facilitating and contributing to any audits of FingerprintJS under Section 6;
- (c) facilitating and contributing to any audits of FingerprintJS conducted by a supervisory authority; and
- (d) any assistance provided by FingerprintJS to the Customer with its fulfilment of its obligations to respond to Data Subjects’ requests under Section 7.
- MISCELLANEOUS
SCHEDULE 1
DETAILS OF PROCESSING Data Subjects The personal data transferred concern the following categories of data subjects:- The Customer’s end users who visit the Customer’s sites and services (“End Users”).
- The Customer’s employees and contractors that the Customer authorizes to access and use the Service (“Authorized Users”).
- Personal data contained within Visitor Data, including information relating to an End User’s device, operating system, browser, browser configuration, IP address, and approximate location, and IDs associated with successful detections of fraud on the Customer’s sites and services.
- contact information, including name, address, phone number, email address, login details, employing / engaging organization;
- account information, including login information;
- payment and transaction information;
- support request information;
- contact preferences, including preference set for notifications, marketing communications;
- comments and opinions; and
- technical information regarding access to the Service (including IP address, approximate location, pages viewed and log data, display and active functionalities).
SCHEDULE 2
TECHNICAL AND ORGANIZATIONAL SECURITY MEASURES- Introduction
- Governance and Policies
- (a) Data classification and business impact assessment
- (b) Selection, documentation, and implementation of security controls
- (c) Assessment of security controls
- (d) User access authorization and provisioning
- (e) Removal of user access
- (f) Monitoring of security controls
- (g) Security management
- Access control
- (a) Minimum password length is 16 characters
- (b) Require at least one uppercase letter from Latin alphabet (A–Z)
- (c) Require at least one lowercase letter from Latin alphabet (a–z)
- (d) Require at least one number
- (e) Require at least one non alphanumeric character ! @ # $ % ^ & * ( ) _ + - = [ ] | ’.
- (f) Passwords expires in 90 days
- (g) Allow users to change their own password
- Segmentation of personal data
- Encryption and Transmission
- (a) Information transmitted over the public internet (HTTPS)
- (b) Data transferred within system components (TLS)
- (c) Data transferred between organizations (SFTP)
- Data Backup, Recovery and Availability
- Incident Management and System Monitoring
- Asset and Software Management
- Physical Security
- Endpoint Security
- (a) Evidence of device encryption
- (b) Enterprise antivirus enabled
- (c) Antivirus daily updates
- (d) Requirement of user name and password
- (e) Patches or regular OS updates
- Service providers
- Customer Communications
- Staff training and awareness
What’s Next