APPENDIX 1: CONTACT INFORMATION AND INSTRUCTIONS
CONTACT INFORMATION
The Processor’s contact details:
Billogram AB
Klara Södra Kyrkogata 1
111 52 Stockholm
Contact e-mail: legal@billogram.com
2. PERSONAL DATA PROCESSING INSTRUCTIONS
2.1. Subject for Processing
The subject for Processing is such Processing as is necessary to enable the Processor to provide the Service and otherwise fulfil its obligations under, and take those measures set forth in, the Service Agreement.
2.2. Purpose
The purpose of the Processing is the issuance and distribution of invoices to the Controller’s customers, including such processing as is necessary for payment handling and accounts ledger management.
2.3. Processing activities (Nature of Processing)
The Processor’s Processing of Personal Data on behalf of the Data Controller primarily concerns the following processing activities:
invoice production and distribution
accounts ledger and invoice payments operations
direct debit mandates administration
communication with end customers through the provision of communication module and sales and offer module
end customer support
compiling statistics and executing analysis
[optimization of configurations and workflows in the Service based on the Controller’s business and end customer types, including profiling where applicable]
ensuring functionality and preventing misuse of the Service
ensuring compliance with applicable laws and regulations.
2.4. Categories of Data Subjects
Categories of Data Subjects are the Controller’s customers.
3.5. Categories of Personal Data
Identification data
Contact details
Billing and payment information
Bank details
Case details
Communication information
Consent details
Information generated by use of the Service
Billogram may also Process Personal Data related to the Controller’s relationship with its customers, such as information regarding churn, for the purpose of compiling statistics on the Controller’s behalf.
Special categories of Personal Data as defined in article 9 in the GDPR, such as information revealing trade union membership or data concerning health, may be Processed depending on the content on the invoice specified by the Controller.
2.6. Duration of the Processing
The duration of Processing is limited to the period of time necessary to provide the Service under the Service Agreement, which for bookkeeping documents shall be in accordance with national bookkeeping regulations and for all other information for as long as required with regards to the purpose for which the Personal Data is Processed, unless otherwise set forth in Data Protection Laws.
3. TECHNICAL AND ORGANISATIONAL MEASURES
Billogram implements appropriate technical and organisational measures which are designed to meet the data protection principles in an effective manner and ensures that appropriate safeguards are integrated into the Personal Data Processing to meet the requirements of the GDPR and to protect the rights of Data Subjects as described below. Further information about technical and organisational measures is available upon request.
Data protection risk assessment
Billogram executes and documents a risk assessment to decide which data security measures shall be implemented. The aim is to define the appropriate level of data security measures for each part of the Service. In all cases, Billogram has implemented at least the security measures described in the chapter “Security of Personal Data” below.
Security measures
Billogram has implemented an Information Security Management System (ISMS) in line with the ISO27001 standard. Security and privacy policies and instructions have been created and established throughout the Billogram organisation as part of the ISMS, which are available for customers on request. The policies are supported by a wide range of mandatory rules on different aspects of data protection and information security to ensure compliance with Data Protection Laws and this DPA. These internal documents include e.g. processes for Personal Data Breach management and Data Subject requests. The documents are subject to regular internal review and approval processes.
Security of Personal Data
Billogram has implemented the following measures based on requirements set out in “Security of Processing” (Article 32 of the GDPR):
a) The pseudonymisation and encryption of Personal Data;
b) The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
Protection of the Personal Data requires implementation of multiple security controls, which is covered by the ISMS. Standardised processes help to secure quality of the Service and to safeguard Personal Data Processing.
Access to Billogram IT environment is controlled. To access Billogram systems the employee must have a valid reason, and access to customer interface is only approved by utilising a process agreed on jointly with the customer. Connections to Billogram IT environment are logged to provide audit trails on administrative operations in the systems. At minimum all access to Billogram IT environment and services require a secured channel and strong authentication requirements. Other security controls are applied if required by the data protection risk assessment.
Unauthorised persons are prevented from gaining physical access to Data Processing facilities. Physical and environmental controls are utilised to protect Personal Data against accidental and unlawful destruction.
Billogram ensures adequate protection of administrative connections, third party access and file transfers which are deployed within Billogram’s infrastructure.
Security measures have been implemented to protect the system landscape from security threats.
Billogram plans, executes and controls customer business related operations. The organisational structure assigns roles and responsibilities to provide for adequate staffing and efficiency of operative capabilities. Billogram management establishes authority and appropriate lines of reporting for key personnel. As a part of the hiring process background checks are conducted based on the employee's position and level of access to Billogram processing facilities and systems.
Billogram maintains and controls the execution of the Billogram information security policy, provides regular security training to employees and performs application security reviews. These reviews assess the confidentiality, integrity and availability of data, as well as conformance to the information security policy.
c) The ability to restore the availability and access to Personal Data in a timely manner in the event of a physical or technical incident;
Billogram has backup processes and strategies which ensure rapid restoration of business critical systems as and when necessary.
Billogram has defined and implemented business continuity and disaster recovery plans for the infrastructure supporting Billogram’s Service delivery to customers. These plans are updated and tested on a regular basis.
d) A process for regularly testing, assessing, and evaluating the effectiveness of technical and organisational measures for ensuring the security of the Processing;
Billogram’s emergency processes, plans and systems are regularly tested to assess and evaluate the effectiveness of technical and organisational measures for ensuring the security of the Personal Data Processing.
Billogram conducts internal security testing and vulnerability scanning. For high risk environments Billogram utilises security testing services, including penetration testing. Billogram also utilises services for security testing and penetration testing in those parts of the IT environment where the risk is assessed to be high.