DAY
HR
MIN
SEC
Live panel
Join 5 TOP recruitment voices sharing how they win (and keep) clients & talent
This Workforce Cloud Tech, Inc. (Recruit CRM) Data Processing Agreement and its Annexes (“DPA”) reflects the parties’ agreement concerning the Processing of Personal Data by us on behalf of you in connection with the Recruit CRM Subscription Services under the Terms of Service between you and us (also referred to in this DPA as the “Agreement”).
This DPA is supplemental to, and forms an integral part of, the Agreement and is effective upon its incorporation into the Agreement, which may be specified in the Agreement, an Order or an executed amendment to the Agreement. In case of any conflict or inconsistency with the terms of the Agreement, this DPA will take precedence over the terms of the Agreement to the extent of such conflict or inconsistency.
We update these terms from time to time. If you have an active Workforce Cloud Tech, Inc. (Recruit CRM) subscription, we will let you know when we do via email or via an in-app notification.
The term of this DPA will follow the term of the Agreement. Terms not otherwise defined in this DPA will have the meaning as set forth in the Agreement.
1.1 The Parties agree that, for Processing Personal Data, the Parties shall be Controller and Processor.
1.2 Processor shall Process Personal Data only on behalf of Controller and at all times only in accordance with this Data Processing Agreement.
1.3 Within the scope of the Service Agreement, each Party shall be responsible for complying with its respective obligations as Controller and Processor under Data Protection Laws.
2.1 Processor will Process Personal Data in accordance with Controller's instructions. This Data Processing Agreement contains Controller's initial instructions to Processor. The Parties agree that Controller may communicate any change in its initial instructions to the Processor by way of written notification to the Processor and that Processor shall abide by such instructions. The Processor shall maintain a secure, complete, accurate and up to date record of all such individual instructions.
2.2 For the avoidance of doubt, any instructions that would lead to processing outside the scope of this Data Processing Agreement (e.g. because a new Processing purpose is introduced) will require a prior agreement between the Parties and, where applicable, shall be subject to the contract change procedure under the Service Agreement.
2.3 Where instructed by Controller, Processor shall correct, delete or block Personal Data.
2.4 Processor shall promptly inform the Controller in writing if, in Processor's opinion, an instruction infringes Data Protection Laws and provide an explanation of the reasons for its opinion in writing.
2.5 Processor shall not be liable for any DP Losses arising from or in connection with any processing made in accordance with Controller’s instructions following Controller’s receipt of any information provided by Processor in this Section 2.
The processor will restrict its personnel from Processing Personal Data without authorization. Processor will impose appropriate contractual obligations upon its personnel, including relevant obligations regarding confidentiality, data protection and data security.
4.1 Processor will not disclose Personal Data to any third party (including any government agency, court, or law enforcement) except as set forth in this Data Processing Agreement or with written consent from Controller or as necessary to comply with applicable mandatory laws. If Processor is obliged to disclose Personal Data to a law enforcement agency or third party, Processor agrees to give Controller reasonable notice of the access request prior to granting such access, to allow Controller to seek a protective order or other appropriate remedy. If such notice is legally prohibited, Processor will take reasonable measures to protect the Personal Data from undue disclosure as if it were Processor’s own confidential information being requested and shall inform Controller promptly as soon as possible if and when such legal prohibition ceases to apply.
4.2 In case Controller receives any request or communication from Data Subjects which relates to the Processing of Personal Data ("Request"), Processor shall provide the Controller with full cooperation, information and assistance ("Assistance") in relation to any such Request where instructed by Controller.
4.3 Where Processor receives a Request, Processor shall (i) not directly respond to such Request, (ii) forward the request to Controller within 3 (three) business days of identifying the Request as being related to the Controller and (iii) provide Assistance according to further instructions from Controller.
4.4 Processing via AI Features: Recruit CRM provides optional artificial intelligence (“AI”) powered features enabled through its integration with Workato, Inc. (“Workato”). The use of such AI Features is at the sole discretion of the Controller.
5.1 The Processor assists the Controller in ensuring compliance with the obligations pursuant to Articles 32 to 36 GDPR taking into account the nature of Processing and the information available to the Processor.
5.2 Where a Data Protection Impact Assessment ("DPIA") is required under applicable Data Protection Laws for the Processing of Personal Data, Processor shall provide upon request Controller with reasonable cooperation and assistance needed to fulfill Customer’s obligation to carry out a DPIA related to Customer’s use of the Services, to the extent that Customer does not otherwise have access to the relevant information and such information is available to Workforce Cloud Tech, Inc. (Recruit CRM).
5.3 The Controller shall pay the Processor reasonable charges mutually agreed between the parties for providing the assistance in Section 5, to the extent that such assistance is not reasonably able to be accommodated within the normal provision of the Services.
6.1 Processor shall, in accordance with Data Protection Laws, make available to Controller on request in a timely manner such information as is necessary to demonstrate compliance by Processor with its obligations under Data Protection Laws.
6.2 Workforce Cloud Tech, Inc. (Recruit CRM) has obtained third-party certifications and audits set forth on our security page. Upon Controller’s written request and subject to the confidentiality obligations set forth in the Service Agreement, Workforce Cloud Tech, Inc. (Recruit CRM) will make available to Controller a copy of Workforce Cloud Tech, Inc. (Recruit CRM)’ then most recent third-party certifications or audits, as applicable.
6.3 Processor shall, upon reasonable notice, allow for and contribute to inspections of the Processor's Processing of Personal Data, as well as the TOMs (including data processing systems, policies, procedures and records), during regular business hours and with minimal interruption to Processor's business operations. Such inspections are conducted by the Controller, its affiliates or an independent third party on Controller's behalf (which will not be a competitor of the Processor) that is subject to reasonable confidentiality obligations.
6.4 Controller shall pay Processor reasonable costs of allowing or contributing to audits or inspections in accordance with Section 6.3 where Controller wishes to conduct more than one audit or inspection every 12 months. Processor will immediately refer to Controller any requests received from national data protection authorities that relate to the Processor’s Processing of Personal Data.
6.5 Processor undertakes to cooperate with Controller in its dealings with national data protection authorities and with any audit requests received from national data protection authorities. Controller shall be entitled to disclose this Data Processing Agreement or any other documents (including contracts with subcontractors) that relate to the performance of its obligations under this Data Processing Agreement (commercial information may be removed).
6.6 AI Feature Transparency: Upon written request, Recruit CRM shall provide the Controller with information regarding the processing of Personal Data through AI Features, including the identity of applicable sub-processors.
In respect of Customer data incidents Processor shall:
7.1 Notify Controller of a Personal Data Breach involving Processor or a subcontractor without undue delay (but in no event later than 72 hours after becoming aware of the incident).
7.2 Make reasonable efforts to identify the cause of such incident and take those steps as Processor deems necessary and reasonable in order to remediate the cause of the incident to the extent that it is within Workforce Cloud Tech, Inc. (Recruit CRM)’ reasonable control.
7.3 Provide reasonable information, cooperation and assistance to Controller in relation to any action to be taken in response to a Personal Data Breach under Data Protection Laws, including regarding any communication of the Personal Data Breach to Data Subjects and national data protection authorities.
The obligations contained in Section 7 should not apply to data incidents that are caused by Customer or Customer’s users.
8.1 Workforce Cloud Tech, Inc. (Recruit CRM) may transfer your Personal Data to countries other than the one in which you live, including transfers to the United States. To the extent that Personal Data is transferred abroad, Workforce Cloud Tech, Inc. (Recruit CRM) will ensure compliance with the requirements of the applicable laws in the respective jurisdiction in line with Workforce Cloud Tech, Inc. (Recruit CRM)'s obligations.
8.2 Workforce Cloud Tech, Inc. (Recruit CRM) and its associated entities have entered into Standard Contractual Clauses (“SCC”) among themselves as authorized by the European Commission under the GDPR for the transfer of personal data from Workforce Cloud Tech, Inc. (Recruit CRM) in the EEA, UK, and Switzerland to provide the Service in accordance with the Terms of Service.
8.3 Wherever Personal Data is transferred outside its country of origin, each party will ensure such transfers are made in compliance with the requirements of Data Protection Laws.
8.4 Where the Client is based in the European Economic Area (EEA), the parties acknowledge that the transfer of Personal Data by Client to Workforce Cloud Tech, Inc. (Recruit CRM will involve the transfer of data outside the EEA. From an EU data protection perspective and purposes of applicable regulation, Client will be the Data Exporter and Workforce Cloud Tech, Inc. (Recruit CRM) will be the Data Importer.
8.5 Where the Data Exporter is not based in the United States (“US”) or the EEA, the parties acknowledge that the transfer of Personal Data by the Data Exporter to Workforce Cloud Tech, Inc. (Recruit CRM) will involve onward transfer of Personal Data from the country in which Data Exporter is based to the EEA, the US and other jurisdictions where Workforce Cloud Tech, Inc. (Recruit CRM) and its Sub-Processors are registered.
8.6 Client acknowledges that in connection with the performance of the Services, Workforce Cloud Tech, Inc. (Recruit CRM), is a recipient of European Client Data in the United States. The parties acknowledge and agree the following:
If, for any reason, Workforce Cloud Tech, Inc. (Recruit CRM) cannot comply with its obligations under the Standard Contractual Clauses or is in breach of any warranties under the Standard Contractual Clauses, and Client intends to suspend the transfer of European Client Data to Workforce Cloud Tech, Inc. (Recruit CRM). or terminate the Standard Contractual Clauses, Client agrees to provide Workforce Cloud Tech, Inc. (Recruit CRM) with reasonable notice to enable Workforce Cloud Tech, Inc. (Recruit CRM) to cure such non-compliance and reasonably cooperate with Workforce Cloud Tech, Inc. (Recruit CRM) to identify what additional safeguards, if any, may be implemented to remedy such noncompliance. If Workforce Cloud Tech, Inc. (Recruit CRM) has not or cannot cure the non-compliance, Client may suspend or terminate the affected part of the Service in accordance with the Terms of Service without liability to either party (but without prejudice to any fees you have incurred prior to such suspension or termination).
For the technical and organizational measures (TOMs), reference is made to and Annex II of the Standard Contractual Clauses.
For sub-processing, reference is made to Annex III of the Standard Contractual Clauses. In event of objection by the Controller to the appointment or replacement of any sub processor, Processor will either not appoint or replace the sub processor or, if this is not possible, Controller may suspend or terminate the Service(s) (without prejudice to any fees incurred by Controller prior to such suspension or termination).
10.1 This Data Processing Agreement becomes effective upon signature. It shall continue to be in full force and effect as long as Processor is processing Personal Data according to Exhibit 1 Annex I and shall cease automatically thereafter.
10.2 The Controller may terminate the Data Processing Agreement as well as the Service Agreement for cause, at any time upon reasonable notice or without notice, as selected by Controller, if the Processor is in material breach of the terms of this Data Processing Agreement.
10.3 Where amendments are required to ensure compliance of this Data Processing Agreements with Data Protection Laws, the Parties shall agree on such amendments upon request of Controller and, for the avoidance of doubt, with no additional costs to Controller. Where the parties are unable to agree upon such amendments, either party may terminate the Service Agreement and this Data Processing Agreement with 90 days written notice to the other party.
The controller may export all Customer Data prior to the termination of the Customer's Account. In any event, following the termination of the Customer's Account, (i) subject to (ii) and (iii) below and the Service Agreement, Customer Data will be retained for a period of fourteen (14) days from such termination within which Controller may contact Processor to export Customer Data; (ii) where the Controller does not use custom mailbox and uses the e-mail feature, if available within the Service(s), e-mails forming part of Customer Data are automatically archived for a period of three (3) months; and (iii) logs are archived for a period of thirty (30) days in the log management systems, post which logs are retired to a restricted archived cold storage for a period of eleven (11) months (each a "Data Retention Period"). Beyond each Data Retention Period, Processor reserves the right to delete all Customer Data in the normal course of operation except as necessary to comply with Processor's legal obligations, maintain accurate financial and other records, resolve disputes, and enforce its agreements. Customer Data cannot be recovered once it is deleted.
12.1 In case of any conflict, the provisions of this Data Processing Agreement shall take precedence over the provisions of any other agreement with the Processor.
12.2 The limitation of liability stated in the Service Agreement apply to the breach of the Data Processing Agreement.
12.3 No Party shall receive any remuneration for performing its obligations under this Data Processing Agreement except as explicitly set out herein or in another agreement.
12.4 Where this Data Processing Agreement requires a "written notice" such notice can also be communicated per email to the other Party. Notices shall be sent to the contact persons set out in Exhibit 1 Annex I.
12.5 Any supplementary agreements or amendments to this Data Processing Agreement must be made in writing and signed by both Parties.
12.6 Should individual provisions of this Data Processing Agreement become void, invalid or non-viable, this shall not affect the validity of the remaining conditions of this agreement.
12.7 Amendments for AI Features: Recruit CRM may amend this Data Processing Agreement to reflect the introduction or modification of AI Features. Notice shall be provided to the Controller via email or in-app notification. Continued use of AI Features shall constitute acceptance of such amendments.
"Data Protection Laws" shall mean the data protection laws of the country in which Controller is established, including the GDPR, and any data protection laws applicable to Controller in connection with the Service Agreement. Where the Controller is not established in an EU Member State the California Consumer Privacy Act applies in addition.
"DP Losses” means all liabilities, including:
(i) administrative fines, penalties, sanctions, liabilities or other remedies imposed by a data protection authority or any other relevant Regulatory Authority;
(ii) compensation to a Data Subject ordered by a data protection authority to be paid by Processor;
(iii) the costs of compliance with investigations by a data protection authority or any other relevant Regulatory Authority.
"GDPR" shall mean the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the Processing of personal data and on the free movement of such data.
"Personal Data" mean any information relating to an identified or identifiable natural person as defined by the General Data Protection Regulation of the European Union ("GDPR" EC-2016/679) that is Processed by the Processor as part of providing the services to Controller as described in Exhibit 1.
"Service Agreement" shall mean the Terms of Service available at https://recruitcrm.io/legal/terms/ or a master services agreement executed between the Parties.
"Standard Contractual Clauses/EU Standard Contractual Clauses" the standard contractual clauses set forth in Exhibit 1 for the transfer of Personal Data from a Data Controller in the European Economic Area to Processors established in third countries in the form set out in the Annex of the Commission Implementing Decision (EU) 2021/914 of 4 June 2021, as amended by incorporating the description of the Personal Data to be transferred and the technical and organizational measures to be implemented as set out in the Appendix.
"Controller", "Data Subject", "Personal Data Breach", "Processor" and "Process"/”Processing” shall have the meaning given to them in the GDPR.
(i) the natural or legal person(s), public authority/ies, agency/ies or other body/ies (hereinafter 'entity/ies') transferring the personal data, as listed in Annex I.A (hereinafter each 'data exporter'), and
(ii) the entity/ies in a third country receiving the personal data from the data exporter, directly or indirectly via another entity also Party to these Clauses, as listed in Annex I.A (hereinafter each 'data importer') have agreed to these standard contractual clauses (hereinafter: 'Clauses').
(i) Clause 1, Clause 2, Clause 3, Clause 6, Clause 7;
(ii) Clause 8 - Clause 8.1(b), 8.9(a), (c), (d) and (e);
(iii) Clause 9 – Clause 9(a), (c), (d) and (e);
(iv) Clause 12 – Clause 12(a), (d) and (f);
(v) Clause 13;
(vi) Clause 15.1(c), (d) and (e);
(vii) Clause 16(e);
(viii) Clause 18 – Clause 18(a) and (b);
In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties, existing at the time these Clauses are agreed or entered into thereafter, these Clauses shall prevail.
The details of the transfer(s), and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred, are specified in Annex I.B.
The data exporter warrants that it has used reasonable efforts to determine that the data importer is able, through the implementation of appropriate technical and organisational measures, to satisfy its obligations under these Clauses.
The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I. B, unless on further instructions from the data exporter.
On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including the measures described in Annex II and personal data, the data exporter may redact part of the text of the Appendix to these Clauses prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand the its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information. This Clause is without prejudice to the obligations of the data exporter under Articles 13 and 14 of Regulation (EU) 2016/679.
If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to erase or rectify the data.
Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the data exporter and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a).
Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.
The data importer shall only disclose the personal data to a third party on documented instructions from the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union (in the same country as the data importer or in another third country, hereinafter 'onward transfer') if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if:
Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation.
(i) lodge a complaint with the supervisory authority in the Member State of his/her habitual residence or place of work, or the competent supervisory authority pursuant to Clause 13;
(ii) refer the dispute to the competent courts within the meaning of Clause 18.
(i) the specific circumstances of the transfer, including the length of the processing chain, the number of actors involved and the transmission channels used; intended onward transfers; the type of recipient; the purpose of processing; the categories and format of the transferred personal data; the economic sector in which the transfer occurs; the storage location of the data transferred;
(ii) the laws and practices of the third country of destination– including those requiring the disclosure of data to public authorities or authorising access by such authorities – relevant in light of the specific circumstances of the transfer, and the applicable limitations and safeguards;
(iii) any relevant contractual, technical or organisational safeguards put in place to supplement the safeguards under these Clauses, including measures applied during transmission and to the processing of the personal data in the country of destination.
(i) receives a legally binding request from a public authority, including judicial authorities, under the laws of the country of destination for the disclosure of personal data transferred pursuant to these Clauses; such notification shall include information about the personal data requested, the requesting authority, the legal basis for the request and the response provided; or
(ii) becomes aware of any direct access by public authorities to personal data transferred pursuant to these Clauses in accordance with the laws of the country of destination; such notification shall include all information available to the importer.
(i) the data exporter has suspended the transfer of personal data to the data importer pursuant to paragraph (b) and compliance with these Clauses is not restored within a reasonable time and in any event within one month of suspension;
(ii) the data importer is in substantial or persistent breach of these Clauses; or
(iii) the data importer fails to comply with a binding decision of a competent court or supervisory authority regarding its obligations under these Clauses.
In these cases, it shall inform the competent supervisory authority of such non- compliance. Where the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise.
These Clauses shall be governed by the law of one of the EU Member States, provided such law allows for third-party beneficiary rights. The Parties agree that this shall be the law of the Federal Republic of Germany.
Name: The Customer, as defined in the Workforce Cloud Tech, Inc. (Recruit CRM) Terms of Service or Master Service Agreement (on behalf of itself and Permitted Affiliates)
Address: The Customer's address, as set out in the Master Service Agreement or Service Order Form
Contact person’s name, position and contact details: The Customer's contact details, as set out in the Master Service Agreement or Service Order Form and/or as set out in the Customer’s Workforce Cloud Tech, Inc. (Recruit CRM) Account
Activities relevant to the data transferred under these Clauses: Processing of Personal Data in connection with Customer's use of the Workforce Cloud Tech, Inc. (Recruit CRM) Services under the Workforce Cloud Tech, Inc. (Recruit CRM) Terms of Service or Master Service Agreement.
Role (controller/processor): Controller
Name Workforce Cloud Tech, Inc. (Recruit CRM) Inc.
Address: 28 Mohawk Avenue, Norwood, NJ 07648.,
Activities relevant to the data transferred under these Clauses: Processing on behalf of the controller (providing services)
Signature and date:
Role (controller/processor): processor
You may submit Personal Data in the course of using the Services, the extent of which is determined and controlled by you in your sole discretion, and which may include, but is not limited to Personal Data relating to the following categories of Data Subjects:
Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.
Continuous (duration of the service agreement (main contract))
We will Process Personal Data as necessary to provide the Services pursuant to the Terms of Service or Master Service Agreement, as further specified in the Service Order Form, and as further instructed by you in your use of the Services.
Data will be retained during the term of the Agreement and for 14 days after.
For workflow automation, we use Workato to execute workflows. The data retention period in Workato can be customized as per your preference. It defaults to 90 days, which is also the maximum period for which data can be retained in Workato. Users also get the flexibility to opt not to store data for specific recipes if need be; however, this is not recommended as these records help with troubleshooting errors in recipes.
For transfers to (sub-)processors, also specify subject matter, nature and duration of the processing
For the purposes of the Standard Contractual Clauses, the supervisory authority that shall act as competent supervisory authority is either (i) where Customer is established in an EU Member State, the supervisory authority responsible for ensuring Customer's compliance with the GDPR; (ii) where Customer is not established in an EU Member State but falls within the extra-territorial scope of the GDPR and has appointed a representative, the supervisory authority of the EU Member State in which Customer's representative is established; or (iii) where Customer is not established in an EU Member State but falls within the extra-territorial scope of the GDPR without having to appoint a representative, the supervisory authority of the EU Member State in which the Data Subjects are predominantly located. In relation to Personal Data that is subject to the UK GDPR or Swiss DPA, the competent supervisory authority is the UK Information Commissioner or the Swiss Federal Data Protection and Information Commissioner (as applicable).
Processor maintains and enforces various policies, standards and processes designed to secure personal data and other data to which Processor employees are provided access, and updates such policies, standards and processes from time to time consistent with industry standards. Following is a description of some of the technical and organizational measures implemented by Processor as of the date of signature:
1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data; (iii) protect against unauthorized access to or use of the Personal Data; (iv) ensure the proper disposal of Personal Data, as further defined herein; and, (v) ensure that all employees and subcontractors of Processor, if any, comply with all of the foregoing. Processor shall designate an individual to be responsible for the information security program. Such individual shall respond to Controller inquiries regarding computer security and to be responsible for notifying Controller-designated contact(s) if a breach or an incident occurs, as further described herein.
1.2 Processor shall conduct formal privacy and security awareness training for all its employees as soon as reasonably practicable after the time of hiring and/or prior to being appointed to work on Personal Data and annually recertified thereafter. Documentation of security awareness training shall be retained by Processor, confirming that this training and subsequent annual recertification process have been completed.
1.3 Controller shall have the right to review an overview of Processor’s information security program prior to the commencement of Service and annually thereafter upon Controller request.
1.4 Processor shall not transmit any unencrypted Personal Data over the internet or any unsecured network, and shall not store any Personal Data on any mobile computing device, such as a laptop computer, USB drive or portable data device, except where there is a business necessity and then only if the mobile computing device is protected by industry-standard encryption software. Processor shall encrypt Personal Data in transit into and out of the Services over public networks using industry standard protocols.
1.5 In the event of any apparent or actual theft, unauthorized use or disclosure of any Personal Data, Processor shall immediately commence all reasonable efforts to investigate and correct the causes and remediate the results thereof, and without undue delay and within 72 hours following confirmation of any such event, provide Controller notice thereof, and such further information and assistance as may be reasonably requested. Upon Controller request, remediation actions and reasonable assurance of resolution of discovered issues shall be provided to Controller.
2.1 All Processor connectivity to Controller computing systems and/or networks and all attempts at same shall be only through Controller’s security gateways/firewalls and only through Controller-approved security procedures.
2.2 Processor shall not access and will not permit unauthorized persons or entities to access Controller computing systems and/or networks without Controller’s express written authorization and any such actual or attempted access shall be consistent with any such authorization.
2.3 Processor shall take appropriate measures to ensure that Processor’s systems connecting to Controller’s systems and anything provided to Controller through such systems does not contain any computer code, programs, mechanisms or programming devices designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment, in any manner, to the operation of Controller’s systems.
2.4 Processor shall maintain technical and organisational measures for data protection including: (i) firewalls and threat detections systems to identify malicious connection attempts, to block spam, viruses and unauthorized intrusion; (ii) physical networking technology designed to resist attacks by malicious users or malicious code; and (iii) encrypted data in transit over public networks using industry standard protocols.
3.1 Erasure of Information and Destruction of Electronic Storage Media. All electronic storage media containing Personal Data must be wiped or degaussed for physical destruction or disposal, in a manner meeting forensic industry standards such as the NIST SP800-88 Guidelines for Media Sanitization, prior to departing Controller Work Area(s), with the exception of encrypted Personal Data residing on portable media for the express purpose of providing service to the Controller. Processor shall maintain commercially reasonable documented evidence of data erasure and destruction for infrastructure level resources.
3.2 Processor shall maintain authorization and authentication technologies and processes to ensure that only authorized persons access Personal Data, including: (i) granting access rights on the basis of the need-to-know-principle; (ii) reviewing and maintaining records of employees who have been authorized or who can grant, alter or cancel authorized access to systems; (iii) requiring personalized, individual access accounts to use passwords that meet complexity, length and duration requirements; (iv) storing passwords in a manner that makes them undecipherable if used incorrectly or recovered in isolation; (v) encrypting, logging and auditing all access sessions to systems containing Personal Data; and (vi) instructing employees on safe administration methods when computers may be unattended such as use of password protected screen savers and session time limits.
3.3 Processor shall maintain logical controls to segregate Personal Data from other data, including the data of other customers.
3.4 Processor shall maintain measures to provide for separate processing of data for different purposes including: (i) provisioning Controller within its own application-level security domain, which creates logical separation and isolation of security principles between customers; and (ii) isolating test or development environments from live or production environments.
4.1 Processor shall ensure that at least the following physical security requirements are met:
5.1 During the performance of Services under the Agreement, Processor shall engage, at its own expense and at least one time per year, a third party vendor (“Testing Company”) to perform penetration and vulnerability testing (“Security Tests”) with respect to Processor’s systems containing and/or storing Personal Data.
5.2 The objective of such Security Tests shall be to identify design and/or functionality issues in applications or infrastructure of the Processor systems containing and/or storing Personal Data, which could expose Controller’s assets to risks from malicious activities. Security Tests shall probe for weaknesses in applications, network perimeters or other infrastructure elements as well as weaknesses in process or technical countermeasures relating to the Processor systems containing and/or storing Personal Data that could be exploited by a malicious party.
5.3 Security Tests shall identify, at a minimum, the following security vulnerabilities: invalidated or un- sanitized input; broken or excessive access controls; broken authentication and session management; cross- site scripting (XSS) flaws; buffer overflows; injection flaws; improper error handling; insecure storage; common denial of service vulnerabilities; insecure or inconsistent configuration management; improper use of SSL/TLS; proper use of encryption; and anti-virus reliability and testing.
5.4 Within a reasonable period after the Security Test has been performed, Processor shall remediate the issues (if any) identified and subsequently engage, at its own expense, the Testing Company to perform a revalidation Security Test to ensure resolution of identified security issues. Results thereof shall be made available to the Controller upon request.
6.1 Processor, and all subcontracted entities (as appropriate) shall conduct at least annually an SSAE 18 (or equivalent) audit covering all systems and/or facilities utilized to provide the Service to the Controller and will furnish to Controller the results thereof promptly following Controller’s written request. If, after reviewing such audit results, Controller reasonably determines that security issues exist relating to the Service, Controller will notify Processor, in writing, and Processor will promptly discuss and where commercially feasible, address the identified issues. Any remaining issues shall be documented, tracked and addressed at such time as agreed upon by both Processor and the Controller.
Recruit CRM’s use of information received from Google APIs will adhere to Google API Services User Data Policy, including the Limited Use requirements.
| VENDOR | PURPOSE |
|---|---|
| Amazon Web Services, Inc. | Primary cloud infrastructure provider for Workforce Cloud Tech, Inc. (Recruit CRM), where all SaaS applications are hosted. Almost all data stored, processed and transmitted through Workforce Cloud Tech, Inc. (Recruit CRM) products and services resides on Amazon Web Services data centers. |
| SendGrid, Inc. | SendGrid is used by our products as an email service provider to deliver emails that are triggered programmatically from the products. |
| Twilio | Twilio provides a platform to programmatically initiate and receive calls or SMS. |
| New Relic, Inc. | New Relic provides analytics for Application Performance Monitoring (APM), Trap errors in production code and helps in troubleshooting. |
| Beamer | Beamer is used to provide specific in-product announcements. These are typically in the nature of new features or offers that we would roll out. |
| Google, Inc. | Regional Data Processing |
| Intercom | Conversation & Chat Functionality |
| Canny.io | Customer Feedback Management Tool |
| Nylas | Nylas is used to connect and sync mail, calendar, and contact data from any email service provider |
| AWS Cloudwatch & Elastic Search | This is primarily used for logging data. |
| Twilio | Twilio is used for calling, call recording, and texting. Text messages which are sent and received are also stored at Twilio’s end. |
| TextKernel USA LLC | TextKernel is an AI-powered resume parsing tool. Thus, any resumes submitted on Recruit CRM would be parsed through TextKernel to give you relevant recommendations from the existing candidate pool. |
| Mixpanel | Mixpanel is used for app tracking and gathering relevant insights. |
| OpenAI, L.L.C. | Integrated into Recruit CRM for generative AI capabilities such as note taking, call log summarization, job description generation, candidate summary generation, email drafting, and call transcripts. |
| Workato, Inc. | Workato is an automation and integration platform. It is used to create custom integrations, workflows, and data mappings between different apps and systems without coding or IT support. |
| Userpilot | Userpilot is a product experience software that gives non-technical teams the ability to create powerful contextual onboarding experiences |
| Heap | Heap automatically captures customer interactions and makes them actionable for anyone. |
| Singlestore | Singlestore is a real-time data analytics platform. Recruit CRM uses Singlestore to speed up its search queries. |
| Datadog, Inc. | Datadog is an observability and security platform for cloud applications. Recruit CRM uses it for application performance monitoring, real-user monitoring and to secure the application. |
| VONQ Inc. | VONQ is our job advertising and job distribution partner which allows you to advertise your jobs through Recruit CRM. VONQ offers job distribution through their network of 3000+ job boards via their own Marketplace and added Contracts. Added Contracts lets you add your own pre-purchased Job Boards to Recruit CRM. |
| Metabase, Inc. | Metabase is our advanced analytics partner which facilitates custom reporting. Metabase is an open-source business intelligence tool that connects with Recruit CRM's database, enabling you to query your data and visualize the results. |
| Unipile | The LinkedIn Messages feature in Recruit CRM is powered by our third-party provider, Unipile. By integrating your LinkedIn account, all LinkedIn messages are seamlessly synced to your Recruit CRM profile. |
| Geoapify | This is used for Location Services. |
| ContactOut Limited | ContactOut is used for Data Enrichment. |
| RocketReach LLC | RocketReach is used for Data Enrichment. |
| Bright Data, Inc. | Used for scraping external sites such as LinkedIn Profiles to get publicly available information. |
| Athina AI | Athina ai is a product experience software that gives non-technical teams the ability to create powerful contextual AI onboarding experiences. |
This Workforce Cloud Tech, Inc. (Recruit CRM) Data Processing Agreement and its Annexes (“DPA”) reflects the parties’ agreement concerning the Processing of Personal Data by us on behalf of you in connection with the Recruit CRM Subscription Services under the Terms of Service between you and us (also referred to in this DPA as the “Agreement”).
This DPA is supplemental to, and forms an integral part of, the Agreement and is effective upon its incorporation into the Agreement, which may be specified in the Agreement, an Order or an executed amendment to the Agreement. In case of any conflict or inconsistency with the terms of the Agreement, this DPA will take precedence over the terms of the Agreement to the extent of such conflict or inconsistency.
We update these terms from time to time. If you have an active Workforce Cloud Tech, Inc. (Recruit CRM) subscription, we will let you know when we do via email or via an in-app notification.
The term of this DPA will follow the term of the Agreement. Terms not otherwise defined in this DPA will have the meaning as set forth in the Agreement.
1.1 The Parties agree that, for Processing Personal Data, the Parties shall be Controller and Processor.
1.2 Processor shall Process Personal Data only on behalf of Controller and at all times only in accordance with this Data Processing Agreement.
1.3 Within the scope of the Service Agreement, each Party shall be responsible for complying with its respective obligations as Controller and Processor under Data Protection Laws.
2.1 Processor will Process Personal Data in accordance with Controller's instructions. This Data Processing Agreement contains Controller's initial instructions to Processor. The Parties agree that Controller may communicate any change in its initial instructions to the Processor by way of written notification to the Processor and that Processor shall abide by such instructions. The Processor shall maintain a secure, complete, accurate and up to date record of all such individual instructions.
2.2 For the avoidance of doubt, any instructions that would lead to processing outside the scope of this Data Processing Agreement (e.g. because a new Processing purpose is introduced) will require a prior agreement between the Parties and, where applicable, shall be subject to the contract change procedure under the Service Agreement.
2.3 Where instructed by Controller, Processor shall correct, delete or block Personal Data.
2.4 Processor shall promptly inform the Controller in writing if, in Processor's opinion, an instruction infringes Data Protection Laws and provide an explanation of the reasons for its opinion in writing.
2.5 Processor shall not be liable for any DP Losses arising from or in connection with any processing made in accordance with Controller’s instructions following Controller’s receipt of any information provided by Processor in this Section 2.
The processor will restrict its personnel from Processing Personal Data without authorization. Processor will impose appropriate contractual obligations upon its personnel, including relevant obligations regarding confidentiality, data protection and data security.
4.1 Processor will not disclose Personal Data to any third party (including any government agency, court, or law enforcement) except as set forth in this Data Processing Agreement or with written consent from Controller or as necessary to comply with applicable mandatory laws. If Processor is obliged to disclose Personal Data to a law enforcement agency or third party, Processor agrees to give Controller reasonable notice of the access request prior to granting such access, to allow Controller to seek a protective order or other appropriate remedy. If such notice is legally prohibited, Processor will take reasonable measures to protect the Personal Data from undue disclosure as if it were Processor’s own confidential information being requested and shall inform Controller promptly as soon as possible if and when such legal prohibition ceases to apply.
4.2 In case Controller receives any request or communication from Data Subjects which relates to the Processing of Personal Data ("Request"), Processor shall provide the Controller with full cooperation, information and assistance ("Assistance") in relation to any such Request where instructed by Controller.
4.3 Where Processor receives a Request, Processor shall (i) not directly respond to such Request, (ii) forward the request to Controller within 3 (three) business days of identifying the Request as being related to the Controller and (iii) provide Assistance according to further instructions from Controller.
4.4 Processing via AI Features: Recruit CRM provides optional artificial intelligence (“AI”) powered features enabled through its integration with Workato, Inc. (“Workato”). The use of such AI Features is at the sole discretion of the Controller.
5.1 The Processor assists the Controller in ensuring compliance with the obligations pursuant to Articles 32 to 36 GDPR taking into account the nature of Processing and the information available to the Processor.
5.2 Where a Data Protection Impact Assessment ("DPIA") is required under applicable Data Protection Laws for the Processing of Personal Data, Processor shall provide upon request Controller with reasonable cooperation and assistance needed to fulfill Customer’s obligation to carry out a DPIA related to Customer’s use of the Services, to the extent that Customer does not otherwise have access to the relevant information and such information is available to Workforce Cloud Tech, Inc. (Recruit CRM).
5.3 The Controller shall pay the Processor reasonable charges mutually agreed between the parties for providing the assistance in Section 5, to the extent that such assistance is not reasonably able to be accommodated within the normal provision of the Services.
6.1 Processor shall, in accordance with Data Protection Laws, make available to Controller on request in a timely manner such information as is necessary to demonstrate compliance by Processor with its obligations under Data Protection Laws.
6.2 Workforce Cloud Tech, Inc. (Recruit CRM) has obtained third-party certifications and audits set forth on our security page. Upon Controller’s written request and subject to the confidentiality obligations set forth in the Service Agreement, Workforce Cloud Tech, Inc. (Recruit CRM) will make available to Controller a copy of Workforce Cloud Tech, Inc. (Recruit CRM)’ then most recent third-party certifications or audits, as applicable.
6.3 Processor shall, upon reasonable notice, allow for and contribute to inspections of the Processor's Processing of Personal Data, as well as the TOMs (including data processing systems, policies, procedures and records), during regular business hours and with minimal interruption to Processor's business operations. Such inspections are conducted by the Controller, its affiliates or an independent third party on Controller's behalf (which will not be a competitor of the Processor) that is subject to reasonable confidentiality obligations.
6.4 Controller shall pay Processor reasonable costs of allowing or contributing to audits or inspections in accordance with Section 6.3 where Controller wishes to conduct more than one audit or inspection every 12 months. Processor will immediately refer to Controller any requests received from national data protection authorities that relate to the Processor’s Processing of Personal Data.
6.5 Processor undertakes to cooperate with Controller in its dealings with national data protection authorities and with any audit requests received from national data protection authorities. Controller shall be entitled to disclose this Data Processing Agreement or any other documents (including contracts with subcontractors) that relate to the performance of its obligations under this Data Processing Agreement (commercial information may be removed).
6.6 AI Feature Transparency: Upon written request, Recruit CRM shall provide the Controller with information regarding the processing of Personal Data through AI Features, including the identity of applicable sub-processors.
In respect of Customer data incidents Processor shall:
7.1 Notify Controller of a Personal Data Breach involving Processor or a subcontractor without undue delay (but in no event later than 72 hours after becoming aware of the incident).
7.2 Make reasonable efforts to identify the cause of such incident and take those steps as Processor deems necessary and reasonable in order to remediate the cause of the incident to the extent that it is within Workforce Cloud Tech, Inc. (Recruit CRM)’ reasonable control.
7.3 Provide reasonable information, cooperation and assistance to Controller in relation to any action to be taken in response to a Personal Data Breach under Data Protection Laws, including regarding any communication of the Personal Data Breach to Data Subjects and national data protection authorities.
The obligations contained in Section 7 should not apply to data incidents that are caused by Customer or Customer’s users.
8.1 Workforce Cloud Tech, Inc. (Recruit CRM) may transfer your Personal Data to countries other than the one in which you live, including transfers to the United States. To the extent that Personal Data is transferred abroad, Workforce Cloud Tech, Inc. (Recruit CRM) will ensure compliance with the requirements of the applicable laws in the respective jurisdiction in line with Workforce Cloud Tech, Inc. (Recruit CRM)'s obligations.
8.2 Workforce Cloud Tech, Inc. (Recruit CRM) and its associated entities have entered into Standard Contractual Clauses (“SCC”) among themselves as authorized by the European Commission under the GDPR for the transfer of personal data from Workforce Cloud Tech, Inc. (Recruit CRM) in the EEA, UK, and Switzerland to provide the Service in accordance with the Terms of Service.
8.3 Wherever Personal Data is transferred outside its country of origin, each party will ensure such transfers are made in compliance with the requirements of Data Protection Laws.
8.4 Where the Client is based in the European Economic Area (EEA), the parties acknowledge that the transfer of Personal Data by Client to Workforce Cloud Tech, Inc. (Recruit CRM will involve the transfer of data outside the EEA. From an EU data protection perspective and purposes of applicable regulation, Client will be the Data Exporter and Workforce Cloud Tech, Inc. (Recruit CRM) will be the Data Importer.
8.5 Where the Data Exporter is not based in the United States (“US”) or the EEA, the parties acknowledge that the transfer of Personal Data by the Data Exporter to Workforce Cloud Tech, Inc. (Recruit CRM) will involve onward transfer of Personal Data from the country in which Data Exporter is based to the EEA, the US and other jurisdictions where Workforce Cloud Tech, Inc. (Recruit CRM) and its Sub-Processors are registered.
8.6 Client acknowledges that in connection with the performance of the Services, Workforce Cloud Tech, Inc. (Recruit CRM), is a recipient of European Client Data in the United States. The parties acknowledge and agree the following:
If, for any reason, Workforce Cloud Tech, Inc. (Recruit CRM) cannot comply with its obligations under the Standard Contractual Clauses or is in breach of any warranties under the Standard Contractual Clauses, and Client intends to suspend the transfer of European Client Data to Workforce Cloud Tech, Inc. (Recruit CRM). or terminate the Standard Contractual Clauses, Client agrees to provide Workforce Cloud Tech, Inc. (Recruit CRM) with reasonable notice to enable Workforce Cloud Tech, Inc. (Recruit CRM) to cure such non-compliance and reasonably cooperate with Workforce Cloud Tech, Inc. (Recruit CRM) to identify what additional safeguards, if any, may be implemented to remedy such noncompliance. If Workforce Cloud Tech, Inc. (Recruit CRM) has not or cannot cure the non-compliance, Client may suspend or terminate the affected part of the Service in accordance with the Terms of Service without liability to either party (but without prejudice to any fees you have incurred prior to such suspension or termination).
For the technical and organizational measures (TOMs), reference is made to and Annex II of the Standard Contractual Clauses.
For sub-processing, reference is made to Annex III of the Standard Contractual Clauses. In event of objection by the Controller to the appointment or replacement of any sub processor, Processor will either not appoint or replace the sub processor or, if this is not possible, Controller may suspend or terminate the Service(s) (without prejudice to any fees incurred by Controller prior to such suspension or termination).
10.1 This Data Processing Agreement becomes effective upon signature. It shall continue to be in full force and effect as long as Processor is processing Personal Data according to Exhibit 1 Annex I and shall cease automatically thereafter.
10.2 The Controller may terminate the Data Processing Agreement as well as the Service Agreement for cause, at any time upon reasonable notice or without notice, as selected by Controller, if the Processor is in material breach of the terms of this Data Processing Agreement.
10.3 Where amendments are required to ensure compliance of this Data Processing Agreements with Data Protection Laws, the Parties shall agree on such amendments upon request of Controller and, for the avoidance of doubt, with no additional costs to Controller. Where the parties are unable to agree upon such amendments, either party may terminate the Service Agreement and this Data Processing Agreement with 90 days written notice to the other party.
The controller may export all Customer Data prior to the termination of the Customer's Account. In any event, following the termination of the Customer's Account, (i) subject to (ii) and (iii) below and the Service Agreement, Customer Data will be retained for a period of fourteen (14) days from such termination within which Controller may contact Processor to export Customer Data; (ii) where the Controller does not use custom mailbox and uses the e-mail feature, if available within the Service(s), e-mails forming part of Customer Data are automatically archived for a period of three (3) months; and (iii) logs are archived for a period of thirty (30) days in the log management systems, post which logs are retired to a restricted archived cold storage for a period of eleven (11) months (each a "Data Retention Period"). Beyond each Data Retention Period, Processor reserves the right to delete all Customer Data in the normal course of operation except as necessary to comply with Processor's legal obligations, maintain accurate financial and other records, resolve disputes, and enforce its agreements. Customer Data cannot be recovered once it is deleted.
12.1 In case of any conflict, the provisions of this Data Processing Agreement shall take precedence over the provisions of any other agreement with the Processor.
12.2 The limitation of liability stated in the Service Agreement apply to the breach of the Data Processing Agreement.
12.3 No Party shall receive any remuneration for performing its obligations under this Data Processing Agreement except as explicitly set out herein or in another agreement.
12.4 Where this Data Processing Agreement requires a "written notice" such notice can also be communicated per email to the other Party. Notices shall be sent to the contact persons set out in Exhibit 1 Annex I.
12.5 Any supplementary agreements or amendments to this Data Processing Agreement must be made in writing and signed by both Parties.
12.6 Should individual provisions of this Data Processing Agreement become void, invalid or non-viable, this shall not affect the validity of the remaining conditions of this agreement.
12.7 Amendments for AI Features: Recruit CRM may amend this Data Processing Agreement to reflect the introduction or modification of AI Features. Notice shall be provided to the Controller via email or in-app notification. Continued use of AI Features shall constitute acceptance of such amendments.
"Data Protection Laws" shall mean the data protection laws of the country in which Controller is established, including the GDPR, and any data protection laws applicable to Controller in connection with the Service Agreement. Where the Controller is not established in an EU Member State the California Consumer Privacy Act applies in addition.
"DP Losses” means all liabilities, including:
(i) administrative fines, penalties, sanctions, liabilities or other remedies imposed by a data protection authority or any other relevant Regulatory Authority;
(ii) compensation to a Data Subject ordered by a data protection authority to be paid by Processor;
(iii) the costs of compliance with investigations by a data protection authority or any other relevant Regulatory Authority.
"GDPR" shall mean the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the Processing of personal data and on the free movement of such data.
"Personal Data" mean any information relating to an identified or identifiable natural person as defined by the General Data Protection Regulation of the European Union ("GDPR" EC-2016/679) that is Processed by the Processor as part of providing the services to Controller as described in Exhibit 1.
"Service Agreement" shall mean the Terms of Service available at https://recruitcrm.io/legal/terms/ or a master services agreement executed between the Parties.
"Standard Contractual Clauses/EU Standard Contractual Clauses" the standard contractual clauses set forth in Exhibit 1 for the transfer of Personal Data from a Data Controller in the European Economic Area to Processors established in third countries in the form set out in the Annex of the Commission Implementing Decision (EU) 2021/914 of 4 June 2021, as amended by incorporating the description of the Personal Data to be transferred and the technical and organizational measures to be implemented as set out in the Appendix.
"Controller", "Data Subject", "Personal Data Breach", "Processor" and "Process"/”Processing” shall have the meaning given to them in the GDPR.
(i) the natural or legal person(s), public authority/ies, agency/ies or other body/ies (hereinafter 'entity/ies') transferring the personal data, as listed in Annex I.A (hereinafter each 'data exporter'), and
(ii) the entity/ies in a third country receiving the personal data from the data exporter, directly or indirectly via another entity also Party to these Clauses, as listed in Annex I.A (hereinafter each 'data importer') have agreed to these standard contractual clauses (hereinafter: 'Clauses').
(i) Clause 1, Clause 2, Clause 3, Clause 6, Clause 7;
(ii) Clause 8 - Clause 8.1(b), 8.9(a), (c), (d) and (e);
(iii) Clause 9 – Clause 9(a), (c), (d) and (e);
(iv) Clause 12 – Clause 12(a), (d) and (f);
(v) Clause 13;
(vi) Clause 15.1(c), (d) and (e);
(vii) Clause 16(e);
(viii) Clause 18 – Clause 18(a) and (b);
In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties, existing at the time these Clauses are agreed or entered into thereafter, these Clauses shall prevail.
The details of the transfer(s), and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred, are specified in Annex I.B.
The data exporter warrants that it has used reasonable efforts to determine that the data importer is able, through the implementation of appropriate technical and organisational measures, to satisfy its obligations under these Clauses.
The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I. B, unless on further instructions from the data exporter.
On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including the measures described in Annex II and personal data, the data exporter may redact part of the text of the Appendix to these Clauses prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand the its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information. This Clause is without prejudice to the obligations of the data exporter under Articles 13 and 14 of Regulation (EU) 2016/679.
If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to erase or rectify the data.
Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the data exporter and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a).
Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.
The data importer shall only disclose the personal data to a third party on documented instructions from the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union (in the same country as the data importer or in another third country, hereinafter 'onward transfer') if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if:
Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation.
(i) lodge a complaint with the supervisory authority in the Member State of his/her habitual residence or place of work, or the competent supervisory authority pursuant to Clause 13;
(ii) refer the dispute to the competent courts within the meaning of Clause 18.
(i) the specific circumstances of the transfer, including the length of the processing chain, the number of actors involved and the transmission channels used; intended onward transfers; the type of recipient; the purpose of processing; the categories and format of the transferred personal data; the economic sector in which the transfer occurs; the storage location of the data transferred;
(ii) the laws and practices of the third country of destination– including those requiring the disclosure of data to public authorities or authorising access by such authorities – relevant in light of the specific circumstances of the transfer, and the applicable limitations and safeguards;
(iii) any relevant contractual, technical or organisational safeguards put in place to supplement the safeguards under these Clauses, including measures applied during transmission and to the processing of the personal data in the country of destination.
(i) receives a legally binding request from a public authority, including judicial authorities, under the laws of the country of destination for the disclosure of personal data transferred pursuant to these Clauses; such notification shall include information about the personal data requested, the requesting authority, the legal basis for the request and the response provided; or
(ii) becomes aware of any direct access by public authorities to personal data transferred pursuant to these Clauses in accordance with the laws of the country of destination; such notification shall include all information available to the importer.
(i) the data exporter has suspended the transfer of personal data to the data importer pursuant to paragraph (b) and compliance with these Clauses is not restored within a reasonable time and in any event within one month of suspension;
(ii) the data importer is in substantial or persistent breach of these Clauses; or
(iii) the data importer fails to comply with a binding decision of a competent court or supervisory authority regarding its obligations under these Clauses.
In these cases, it shall inform the competent supervisory authority of such non- compliance. Where the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise.
These Clauses shall be governed by the law of one of the EU Member States, provided such law allows for third-party beneficiary rights. The Parties agree that this shall be the law of the Federal Republic of Germany.
Name: The Customer, as defined in the Workforce Cloud Tech, Inc. (Recruit CRM) Terms of Service or Master Service Agreement (on behalf of itself and Permitted Affiliates)
Address: The Customer's address, as set out in the Master Service Agreement or Service Order Form
Contact person’s name, position and contact details: The Customer's contact details, as set out in the Master Service Agreement or Service Order Form and/or as set out in the Customer’s Workforce Cloud Tech, Inc. (Recruit CRM) Account
Activities relevant to the data transferred under these Clauses: Processing of Personal Data in connection with Customer's use of the Workforce Cloud Tech, Inc. (Recruit CRM) Services under the Workforce Cloud Tech, Inc. (Recruit CRM) Terms of Service or Master Service Agreement.
Role (controller/processor): Controller
Name Workforce Cloud Tech, Inc. (Recruit CRM) Inc.
Address: 28 Mohawk Avenue, Norwood, NJ 07648.,
Activities relevant to the data transferred under these Clauses: Processing on behalf of the controller (providing services)
Signature and date:
Role (controller/processor): processor
You may submit Personal Data in the course of using the Services, the extent of which is determined and controlled by you in your sole discretion, and which may include, but is not limited to Personal Data relating to the following categories of Data Subjects:
Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.
Continuous (duration of the service agreement (main contract))
We will Process Personal Data as necessary to provide the Services pursuant to the Terms of Service or Master Service Agreement, as further specified in the Service Order Form, and as further instructed by you in your use of the Services.
Data will be retained during the term of the Agreement and for 14 days after.
For workflow automation, we use Workato to execute workflows. The data retention period in Workato can be customized as per your preference. It defaults to 90 days, which is also the maximum period for which data can be retained in Workato. Users also get the flexibility to opt not to store data for specific recipes if need be; however, this is not recommended as these records help with troubleshooting errors in recipes.
For transfers to (sub-)processors, also specify subject matter, nature and duration of the processing
For the purposes of the Standard Contractual Clauses, the supervisory authority that shall act as competent supervisory authority is either (i) where Customer is established in an EU Member State, the supervisory authority responsible for ensuring Customer's compliance with the GDPR; (ii) where Customer is not established in an EU Member State but falls within the extra-territorial scope of the GDPR and has appointed a representative, the supervisory authority of the EU Member State in which Customer's representative is established; or (iii) where Customer is not established in an EU Member State but falls within the extra-territorial scope of the GDPR without having to appoint a representative, the supervisory authority of the EU Member State in which the Data Subjects are predominantly located. In relation to Personal Data that is subject to the UK GDPR or Swiss DPA, the competent supervisory authority is the UK Information Commissioner or the Swiss Federal Data Protection and Information Commissioner (as applicable).
Processor maintains and enforces various policies, standards and processes designed to secure personal data and other data to which Processor employees are provided access, and updates such policies, standards and processes from time to time consistent with industry standards. Following is a description of some of the technical and organizational measures implemented by Processor as of the date of signature:
1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data; (iii) protect against unauthorized access to or use of the Personal Data; (iv) ensure the proper disposal of Personal Data, as further defined herein; and, (v) ensure that all employees and subcontractors of Processor, if any, comply with all of the foregoing. Processor shall designate an individual to be responsible for the information security program. Such individual shall respond to Controller inquiries regarding computer security and to be responsible for notifying Controller-designated contact(s) if a breach or an incident occurs, as further described herein.
1.2 Processor shall conduct formal privacy and security awareness training for all its employees as soon as reasonably practicable after the time of hiring and/or prior to being appointed to work on Personal Data and annually recertified thereafter. Documentation of security awareness training shall be retained by Processor, confirming that this training and subsequent annual recertification process have been completed.
1.3 Controller shall have the right to review an overview of Processor’s information security program prior to the commencement of Service and annually thereafter upon Controller request.
1.4 Processor shall not transmit any unencrypted Personal Data over the internet or any unsecured network, and shall not store any Personal Data on any mobile computing device, such as a laptop computer, USB drive or portable data device, except where there is a business necessity and then only if the mobile computing device is protected by industry-standard encryption software. Processor shall encrypt Personal Data in transit into and out of the Services over public networks using industry standard protocols.
1.5 In the event of any apparent or actual theft, unauthorized use or disclosure of any Personal Data, Processor shall immediately commence all reasonable efforts to investigate and correct the causes and remediate the results thereof, and without undue delay and within 72 hours following confirmation of any such event, provide Controller notice thereof, and such further information and assistance as may be reasonably requested. Upon Controller request, remediation actions and reasonable assurance of resolution of discovered issues shall be provided to Controller.
2.1 All Processor connectivity to Controller computing systems and/or networks and all attempts at same shall be only through Controller’s security gateways/firewalls and only through Controller-approved security procedures.
2.2 Processor shall not access and will not permit unauthorized persons or entities to access Controller computing systems and/or networks without Controller’s express written authorization and any such actual or attempted access shall be consistent with any such authorization.
2.3 Processor shall take appropriate measures to ensure that Processor’s systems connecting to Controller’s systems and anything provided to Controller through such systems does not contain any computer code, programs, mechanisms or programming devices designed to, or that would enable, the disruption, modification, deletion, damage, deactivation, disabling, harm or otherwise be an impediment, in any manner, to the operation of Controller’s systems.
2.4 Processor shall maintain technical and organisational measures for data protection including: (i) firewalls and threat detections systems to identify malicious connection attempts, to block spam, viruses and unauthorized intrusion; (ii) physical networking technology designed to resist attacks by malicious users or malicious code; and (iii) encrypted data in transit over public networks using industry standard protocols.
3.1 Erasure of Information and Destruction of Electronic Storage Media. All electronic storage media containing Personal Data must be wiped or degaussed for physical destruction or disposal, in a manner meeting forensic industry standards such as the NIST SP800-88 Guidelines for Media Sanitization, prior to departing Controller Work Area(s), with the exception of encrypted Personal Data residing on portable media for the express purpose of providing service to the Controller. Processor shall maintain commercially reasonable documented evidence of data erasure and destruction for infrastructure level resources.
3.2 Processor shall maintain authorization and authentication technologies and processes to ensure that only authorized persons access Personal Data, including: (i) granting access rights on the basis of the need-to-know-principle; (ii) reviewing and maintaining records of employees who have been authorized or who can grant, alter or cancel authorized access to systems; (iii) requiring personalized, individual access accounts to use passwords that meet complexity, length and duration requirements; (iv) storing passwords in a manner that makes them undecipherable if used incorrectly or recovered in isolation; (v) encrypting, logging and auditing all access sessions to systems containing Personal Data; and (vi) instructing employees on safe administration methods when computers may be unattended such as use of password protected screen savers and session time limits.
3.3 Processor shall maintain logical controls to segregate Personal Data from other data, including the data of other customers.
3.4 Processor shall maintain measures to provide for separate processing of data for different purposes including: (i) provisioning Controller within its own application-level security domain, which creates logical separation and isolation of security principles between customers; and (ii) isolating test or development environments from live or production environments.
4.1 Processor shall ensure that at least the following physical security requirements are met:
5.1 During the performance of Services under the Agreement, Processor shall engage, at its own expense and at least one time per year, a third party vendor (“Testing Company”) to perform penetration and vulnerability testing (“Security Tests”) with respect to Processor’s systems containing and/or storing Personal Data.
5.2 The objective of such Security Tests shall be to identify design and/or functionality issues in applications or infrastructure of the Processor systems containing and/or storing Personal Data, which could expose Controller’s assets to risks from malicious activities. Security Tests shall probe for weaknesses in applications, network perimeters or other infrastructure elements as well as weaknesses in process or technical countermeasures relating to the Processor systems containing and/or storing Personal Data that could be exploited by a malicious party.
5.3 Security Tests shall identify, at a minimum, the following security vulnerabilities: invalidated or un- sanitized input; broken or excessive access controls; broken authentication and session management; cross- site scripting (XSS) flaws; buffer overflows; injection flaws; improper error handling; insecure storage; common denial of service vulnerabilities; insecure or inconsistent configuration management; improper use of SSL/TLS; proper use of encryption; and anti-virus reliability and testing.
5.4 Within a reasonable period after the Security Test has been performed, Processor shall remediate the issues (if any) identified and subsequently engage, at its own expense, the Testing Company to perform a revalidation Security Test to ensure resolution of identified security issues. Results thereof shall be made available to the Controller upon request.
6.1 Processor, and all subcontracted entities (as appropriate) shall conduct at least annually an SSAE 18 (or equivalent) audit covering all systems and/or facilities utilized to provide the Service to the Controller and will furnish to Controller the results thereof promptly following Controller’s written request. If, after reviewing such audit results, Controller reasonably determines that security issues exist relating to the Service, Controller will notify Processor, in writing, and Processor will promptly discuss and where commercially feasible, address the identified issues. Any remaining issues shall be documented, tracked and addressed at such time as agreed upon by both Processor and the Controller.
Recruit CRM’s use of information received from Google APIs will adhere to Google API Services User Data Policy, including the Limited Use requirements.
| VENDOR | PURPOSE |
|---|---|
| Amazon Web Services, Inc. | Primary cloud infrastructure provider for Workforce Cloud Tech, Inc. (Recruit CRM), where all SaaS applications are hosted. Almost all data stored, processed and transmitted through Workforce Cloud Tech, Inc. (Recruit CRM) products and services resides on Amazon Web Services data centers. |
| SendGrid, Inc. | SendGrid is used by our products as an email service provider to deliver emails that are triggered programmatically from the products. |
| Twilio | Twilio provides a platform to programmatically initiate and receive calls or SMS. |
| New Relic, Inc. | New Relic provides analytics for Application Performance Monitoring (APM), Trap errors in production code and helps in troubleshooting. |
| Beamer | Beamer is used to provide specific in-product announcements. These are typically in the nature of new features or offers that we would roll out. |
| Google, Inc. | Regional Data Processing |
| Intercom | Conversation & Chat Functionality |
| Canny.io | Customer Feedback Management Tool |
| Nylas | Nylas is used to connect and sync mail, calendar, and contact data from any email service provider |
| AWS Cloudwatch & Elastic Search | This is primarily used for logging data. |
| Twilio | Twilio is used for calling, call recording, and texting. Text messages which are sent and received are also stored at Twilio’s end. |
| TextKernel USA LLC | TextKernel is an AI-powered resume parsing tool. Thus, any resumes submitted on Recruit CRM would be parsed through TextKernel to give you relevant recommendations from the existing candidate pool. |
| Mixpanel | Mixpanel is used for app tracking and gathering relevant insights. |
| OpenAI, L.L.C. | Integrated into Recruit CRM for generative AI capabilities such as note taking, call log summarization, job description generation, candidate summary generation, email drafting, and call transcripts. |
| Decodable | Decodable is a real-time stream processing platform. RecruitCRM powers its search functionality through Decodable. |
| Workato, Inc. | Workato is an automation and integration platform. It is used to create custom integrations, workflows, and data mappings between different apps and systems without coding or IT support. |
| Userpilot | Userpilot is a product experience software that gives non-technical teams the ability to create powerful contextual onboarding experiences |
| Heap | Heap automatically captures customer interactions and makes them actionable for anyone. |
| Singlestore | Singlestore is a real-time data analytics platform. Recruit CRM uses Singlestore to speed up its search queries. |
| Datadog, Inc. | Datadog is an observability and security platform for cloud applications. Recruit CRM uses it for application performance monitoring, real-user monitoring and to secure the application. |
| VONQ Inc. | VONQ is our job advertising and job distribution partner which allows you to advertise your jobs through Recruit CRM. VONQ offers job distribution through their network of 3000+ job boards via their own Marketplace and added Contracts. Added Contracts lets you add your own pre-purchased Job Boards to Recruit CRM. |
| Metabase, Inc. | Metabase is our advanced analytics partner which facilitates custom reporting. Metabase is an open-source business intelligence tool that connects with Recruit CRM's database, enabling you to query your data and visualize the results. |
| Unipile | The LinkedIn Messages feature in Recruit CRM is powered by our third-party provider, Unipile. By integrating your LinkedIn account, all LinkedIn messages are seamlessly synced to your Recruit CRM profile. |
| Geoapify | This is used for Location Services. |
| ContactOut Limited | ContactOut is used for Data Enrichment. |
| Bright Data, Inc. | Used for scraping external sites such as LinkedIn Profiles to get publicly available information. |
| Athina AI | Athina ai is a product experience software that gives non-technical teams the ability to create powerful contextual AI onboarding experiences. |
Looking for something?
Type your question in the search bar above to get started!