Adendo de Processamento de Dados

In order that you as a service user and data controller (referred to as “Controller” or “you” or “User”) may use or continue to use our a) Tattoo Simulator and Try on History; b) maintain your presence on our Find Tattoo Artists directory; and c) use our auxiliary services (“Services”) offered by us, Convinced Creations Company Limited, 9th Floor, Amtel Building, 148 Des Voeux Road Central, Central, Hong Kong and data processor (referred to as “Tatship” or “Processor”), you agree that certain Personal Data you submit as part of your use of our Services and these data processing terms (“Terms”) shall apply (notwithstanding any other terms and conditions applicable to the delivery of the Services to the contrary) in order to address the compliance obligations imposed upon Tatship and its Users pursuant to applicable Data Protection Law and in particular, Regulation (EU) 2016/679 (“GDPR”) and Hong Kong's Personal Data (Privacy) Ordinance (“PDPO”).

These Terms shall constitute a separate agreement, or they may be incorporated by reference in the relevant Services agreement, as the case may be.

  1. DEFINITIONS

    1. In this Agreement, capitalised words shall have the meaning as set out below or, as the case may be, elsewhere in this Agreement:
      1. “Affiliate” means any entity that directly or indirectly controls, is controlled by, or is under common control with, a party from time to time during the Term.
      2. “Data Protection Law” means the data privacy laws applicable to the processing in connection with the Services, including, where applicable, the GDPR or the PDPO or similar law, or the applicable data privacy laws of any other relevant jurisdiction.
      3. “User(s)” means any user of Tatship.
      4. “Contractual Clauses” means the standard contractual clauses of the European Commission for the transfer of personal data across borders, as amended or replaced from time to time, or any equivalent set of contractual clauses approved for use under Data Protection Law; and
      5. “Personal Data” means the personal data processed by Processor in connection with the Services on behalf of users during the Term and may include Financial Data, Personal Data, and Special Categories Data as specifically required and transferred by the user. The processing may include activities auxiliary to Tatship services, such as administrative and other services. This will include names and other information about data subjects included in User materials.
      6. The words “data subject”, “personal data”, “processing” and variations, “controller” and “processor” shall have the meaning attributed to them in Data Protection Law.
  2. APPOINTMENT

    1. Tatship is designated by its Users, Affiliates and Business Affiliates (collectively “Instructing Parties”) to provide and manage various services, including the Services on their behalf. Accordingly, Personal Data may contain personal data in relation to which User and its Instructing Parties are controllers. Tatship confirms that it is authorised to communicate to User any instructions or other requirements on behalf of User in respect of processing of Personal Data connection with the Services.
    2. Processor is appointed by User to process Personal Data on behalf of User and/or the Instructing Parties, as the case may be, as is necessary to provide the Services or as otherwise agreed by the parties in writing.
  3. DURATION

The Terms shall commence on the Effective Date and shall continue in full force and effect until such time as all Services have ceased and all Personal Data in the Processor’s possession or within its reasonable control has been returned or destroyed (the “Term”).

  1. DATA PROTECTION COMPLIANCE

    1. In relation to its processing of Personal Data, save as otherwise required by law, Tatship agrees to:
      1. process Personal Data only as required in connection with the Services and in accordance with User and its Instructing Parties documented lawful instructions from time to time;
      2. inform User and its Instructing Parties if, in Tatship`s opinion, an instruction infringes Data Protection Law;
      3. ensure that all personnel authorised by Tatship to process Personal Data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality;
      4. implement appropriate technical and organisational measures to appropriately safeguard Personal Data having regard to the nature of the personal data which is to be protected and the risk of harm which might result from any Security Breach (as defined below), at a minimum the measures set out in the Schedule;
      5. promptly inform User and its Instructing Parties of any data subject requests under Data Protection Law or regulatory or law enforcement requests relating to Personal Data. Tatship shall not acknowledge or otherwise respond to the subject access request except with User and its Instructing Parties prior written approval, which shall not be unreasonably withheld;
      6. provide such assistance as User and its Instructing Parties may reasonably require in order to ensure Tatship’s compliance with Data Protection Law in relation to data security, data breach notifications, data protection impact assessments and prior consultations with a competent authority;
      7. at User and its Instructing Parties choice, without delay delete or return all Personal Data to User and its Instructing Parties, and delete existing copies of all Personal Data in the Processor’s possession or within its reasonable control (including those held by a Sub processor); and
      8. make available to User and its Instructing Parties information reasonably necessary to demonstrate Tatship compliance with these Terms and allow for, and contribute to, audits and inspections carried out by User and its Instructing Parties.
  2. SUBPROCESSORS

    1. Processor will sub-contract, outsource, assign, novate or otherwise transfer obligations under these Terms or engage any subcontractors involved in the processing of Personal Data (each a “Sub processor”) only with User’s prior written consent and subject to sub clause 5.2.
    2. When engaging a Sub processor, Processor will:
      1. carry out reasonable due diligence;
      2. enter into a contract on terms, as far as practicable, same as those in these Terms, and which may include Contractual Clauses to provide adequate safeguards with respect to the processing of Personal Data; and
      3. inform User of any intended changes concerning the addition or replacement of a Sub processor from time to time. If User objects to any such change on reasonable grounds, then acting in good faith the parties will work together to resolve such objection.
  3. SECURITY INCIDENTS

    1. “Security Breach” means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored or otherwise processed.
    2. Processor will notify User without undue delay if Processor is aware of any Security Breach.
    3. Processor will investigate the Security Breach and take reasonable action to identify, prevent and mitigate the effects of the Security Breach. Processor will take such further action as User may reasonably request in order to comply with Data Protection Law.
    4. Processor may not release or publish any filing, communication, notice, press release, or report concerning any Security Breach (“Notices“) without User`s prior written approval; such approval shall not be unreasonably withheld.
  4. INTERNATIONAL DATA TRANSFERS

    1. “Security Breach” means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored or otherwise processed.
    2. Tatship will notify User without undue delay if Tatship becomes aware of any Security Breach within 24 hours of discovering such Breach and provide User with:
      1. a detailed description of the Security Incident;
      2. the type of data that was the subject of the Security Incident;
      3. the identity of each affected person, and
      4. the steps Tatship takes in order to mitigate and remediate such Security Incident, in each case as soon as such information can be collected or otherwise becomes available.
    3. Tatship shall use its best efforts to immediately mitigate and remedy any Security Incident and prevent any further Security Incident(s) at its sole expense.
    4. Tatship agrees that User shall have the sole right to determine (i) whether notice of the Security Incident is to be provided to any individuals, regulators, law enforcement agencies, consumer reporting agencies or others as required by law or regulation, or otherwise in User’s discretion, (ii) the contents of such notice, and (iii) whether any type of remediation may be offered to affected persons, as well as the nature and extent of any such remediation.
    5. In the event of a Security Incident involving Personal Data in Tatship’s possession or otherwise caused by or related to Tatship’s acts or omissions, and without limiting User’s other rights and remedies, Tatship will pay all costs and expenses of (i) any disclosures and notification required by applicable law or as otherwise determined as appropriate in User’s reasonable discretion, (ii) monitoring and reporting on the impacted individuals’ or entities’ credit records if determined in User’s reasonable discretion as reasonable to protect such individuals, and (iii) all other costs incurred by User in responding to, remediating and mitigating damages caused by such Security Incident.
    6. Tatship will investigate the Security Breach and take reasonable action to identify, prevent and mitigate the effects of the Security Breach. Tatship will take such further action as the User may reasonably request in order to comply with Data Protection Law.
    7. Tatship may not release or publish any filing, communication, notice, press release, or report concerning any Security Breach (“Notices“) without User`s prior written approval; such approval shall not be unreasonably withheld.
  5. AUDIT

  6. Users may, on an annual basis or more frequently as reasonably requested by User, at User’s expense, conduct an audit to verify that Tatship is operating in accordance with this PDPO. Such audit(s) may include a review of all aspects of Tatship’s performance, including, but not limited to, Tatship’s general controls and security practices and procedures. Tatship will cooperate with User in conducting any such audit, and will allow User reasonable access, during normal business hours and upon reasonable notice, to all pertinent records, documentation, computer systems, data, personnel, and areas used to Process the User Data areas as User reasonably requests to complete such audit. User will take reasonable steps to prevent the audit from materially impacting Tatship’s operations.

  7. Tatship shall correct any deviations from Security Best Practices that are identified in any security audit as soon as practicable, but in no event more than five days after receiving notice from User outlining any deviations (provided, however, that if five days is not a practicable cure period, then Tatship may instead present a remediation plan to User within such five day period that sets forth an achievable and reasonable timeframe, and Tatship must thereafter diligently proceed to correct any deviations in accordance with such plan).

  8. INTERNATIONAL DATA TRANSFERS

    1. Tatship will ensure that no Personal Data are transferred out of either:
      1. the by the User approved data environment; or

      2. any territory in which restrictions are imposed on the transfer of Personal Data across borders under Data Protection Laws,

      3. without the prior written consent of the User.

      4. Tatship will ensure that Contractual Clauses or other applicable transfer mechanisms, are in place to ensure adequate level of data protection.

  9. INDEMNITY

Notwithstanding any provisions of the relevant Services agreement to the contrary, Processor shall and hereby agrees to indemnify User and Instructing Parties and their officers, employees, agents and subcontractors (each an “Indemnified Party”) from and against any claims, losses, demands, actions, liabilities, fines, penalties, reasonable expenses, damages and settlement amounts (including reasonable legal fees and costs) incurred by any Indemnified Party as a result of any gross negligence or wilful breach by Processor of these Terms.

  1. MISCELLANEOUS

    1. Clause and other headings in these Terms are for convenience only and shall not affect the meaning or interpretation of these Terms.
    2. To the extent of any conflict, these Terms shall prevail over any Services agreement or other agreement.
    3. Nothing in these Terms will exclude or limit the liability of either party which cannot be limited or excluded by applicable law. Subject to the foregoing sentence, (i) these Terms, including any appendices, constitutes the entire agreement between the parties pertaining to the subject matter hereof and supersedes all prior agreements, understandings, negotiations and discussions of the parties relating to its subject matter; and (ii) in relation to the subject matter of these Terms neither party has relied on, and neither party will have any right or remedy based on, any statement, representation or warranty, whether made negligently or innocently, except those expressly set out in these Terms.
    4. User shall agree to any amendment to these Terms that may be required from time to time for us and Instructing Parties to comply with any amended Data Protection Laws.
    5. All notices of termination or breach must be in English, in writing and addressed to the other party’s primary contact person or legal department. Notice will be treated as given on receipt, as verified by a valid receipt or electronic log. Postal notices will be deemed received 48 hours from the date of posting by recorded delivery or registered post.
    6. The provisions of these Terms are severable. If any phrase, clause or provision is invalid or unenforceable in whole or in part, such invalidity or unenforceability shall affect only such phrase, clause or provision, and the rest of these Terms shall remain in full force and effect.
    7. These Terms are governed by the law of Hong Kong and the parties submit to the exclusive jurisdiction of the courts of Hong Kong in relation to any dispute (contractual or non-contractual) concerning these Terms save that either party may apply to any court for an injunction or other relief to protect its property or confidential information.
  2. SCHEDULE

    1. Categories of data subjects whose personal data is transferred

    Data subjects whose Personal Data is uploaded by data exporter to, or otherwise received directly or indirectly from data exporter (including from a Permitted User on data exporter’s behalf) by or through the Services, or provided by data exporter to Tatship to input into the Services.

    1. Categories of personal data transferred

    The data exporter may transfer Personal Data to Tatship, the extent of which is determined and controlled by the data exporter in its sole discretion. Such Personal Data may include any category of Personal Data the data exporter or its Permitted Users may enter into the Services.

    1. Sensitive data transferred

    The data exporter may transfer Personal Data to Tatship, the extent of which is determined and controlled by the data exporter in its sole discretion. Such Personal Data may include any category of Personal Data the data exporter or its Permitted Users may enter into the Services.

    1. The frequency of the transfer

    Continuously, for the length of the Agreement between the Parties.

    1. Nature of the processing

    User Personal Data transferred will be processed to (i) provide the Services to the data exporter and fulfil the data importer’s obligations under the Agreement; and (ii) comply with applicable law.

    1. Purpose(s) of the data transfer and further processing

    User Personal Data transferred will be processed to (i) provide the Services to the data exporter and fulfil the data importer’s obligations under the Agreement; and (ii) comply with applicable law.

    1. The period for which the personal data will be retained

    User Personal Data will be retained for the length of time necessary to provide Services under the Agreement and in accordance with Tatship’s data retention processes and as otherwise required by applicable law.

    1. For transfers to (sub-)processors, also specify subject matter, nature and duration of the processing

    Tatship’s sub-processors will process User Personal Data to assist Tatship in providing the Services pursuant to the Agreement, for as long as needed for Tatship to provide the Services.

    1. Subprocessors

    Tatship currently uses sub processors to provide core infrastructure and other services. Prior to engaging any subprocessor, Tatship evaluates their privacy, security, and confidentiality practices, and executes an agreement with the subprocessor governing applicable privacy and security obligations, including an appropriate data transfer mechanism where required. Tatship may use the following sub processors for hosting User data and providing or supporting the core infrastructure that helps deliver the Tatship services: Amazon Web Services (AWS) (Amazon Web Services, Inc. 410 Terry Avenue North, Seattle, WA 98109-5210, USA)

    1. Security measures
      1. Tatship represents, warrants, and undertakes that it has established and for so long as Tatship Processes Personal Data it will at all times enforce, an ongoing program of Security Policies, Security Procedures, and Security Technical Controls, which reasonably ensures delivery of Security Best Practices, and which includes, without limitation, the following:
    2. Information Security
      1. a privacy and security incident management program;
      2. a privacy and security awareness program;
      3. business continuity and disaster recovery plans, including regular testing; and
      4. procedures to conduct periodic independent security risk evaluations to identify critical information assets, assess threats to such assets, determine potential vulnerabilities, and provide for timely and appropriate remediation.
    3. Physical Access
      1. physical protection mechanisms for all information assets and information technology to ensure such assets and technology are stored and appropriately protected;
      2. appropriate facility and room entry controls to limit physical access to systems that store or process User Data;
      3. processes to ensure access to facilities and rooms are monitored and is restricted on a “need to know” basis; and
      4. controls to physically secure all User Data and to securely destroy such information when it is no longer needed in accordance with this Agreement.
    4. Logical Access
      1. appropriate mechanisms for user authentication and authorization in accordance with a “need to know” policy;
      2. controls and auditable logs to enforce and maintain rigorous access restrictions for employees, and subcontractors;
      3. timely and accurate administration of user account and authentication management;
      4. processes to ensure Tatship-supplied defaults for passwords and security parameters are appropriately managed (e.g., changed periodically etc.);
      5. mechanisms to encrypt or hash all passwords or otherwise ensure all passwords are not stored unsecured in clear text; and
      6. processes to immediately revoke accesses of inactive accounts or terminated/transferred users.
    5. Security Architecture and Design
      1. a security architecture that reasonably ensures delivery of Security Best Practices;
      2. documented and enforced technology configuration standards;
      3. regular testing of security systems and Security Best Practices;
      4. a system of effective firewall(s) and intrusion detection technologies necessary to protect User Data; and
      5. database and application layer design processes that ensure web applications are designed to protect the information data that is Processed through such systems.
    6. System and Network Management
      1. mechanisms to keep security patches current;
      2. monitor, analyse, and respond to security alerts;
      3. appropriate network security design elements that provide for segregation of data from other third-party data;
      4. use and regularly update anti-virus software; and
      5. the integrity, resilience and availability of any software or services utilised to Process the User Data.
      6. Failure by Tatship to comply with Security Best Practices or its obligations hereunder shall constitute a breach of the Agreement.
    7. Minimum technical measures
      1. Firewalls which are properly configured and using the latest software;
      2. user access control management;
      3. unique passwords of sufficient complexity and regular expiry on all devices;
      4. secure configuration on all devices;
      5. regular software updates, if appropriate, by using patch management software;
      6. timely decommissioning and secure wiping (that renders data unrecoverable) of old software and hardware;
      7. real-time protection anti-virus, anti-malware and anti-spyware software;
      8. https;
      9. encryption of all portable devices ensuring appropriate protection of the key;
      10. encryption of personal data in transit by using suitable encryption solutions;
      11. multi-factor authentication for remote access;
      12. intrusion detection and prevention systems;
      13. appropriate and proportionate monitoring of personnel; and
      14. data backup and disaster recovery measures and procedures.
      15. Minimal organisational measures
      16. Vet all personnel including staff, contractors, vendors and suppliers (including Sub processors) on continuous basis;
      17. non-disclosure agreements used with all personnel;
      18. regular training of all personnel on confidentiality, data processing obligations, identification of Security Breaches and risks;
      19. apply principle of least authority, including a restricted or strictly controlled transit of data and material outside of office;
      20. physical security on premises including reception or front desk, security passes, clean desk policy, storage of documents in secure cabinets, secure disposal of materials, etc.;
      21. apply appropriate policies, as appropriate.
  3. CROSS BORDER DATA TRANSFER MECHANISMS

    1. In the event the Services are covered by more than one Transfer Mechanism, the transfer of personal data will be subject to a single Transfer Mechanism in accordance with the following order of precedence:
    2. Tatship’s binding corporate rules as set forth in this Schedule
    3. the applicable Standard Contractual Clauses as set forth in this Schedule
    4. other applicable data Transfer Mechanisms permitted under Applicable Data Protection Law.
  4. BINDING CORPORATE RULES

    1. The parties agree that Tatship will process personal data within the Tatship Services in accordance with the data protection policies that are approved by European data protection authorities after significant consultation with those authorities and enable multinational businesses, such as Tatship, to make intra-organizational transfers of personal data across borders in compliance with EU data protection law.
    2. The parties further agree that, with respect to the Tatship Services, the Binding Corporate Rules will be the lawful Transfer Mechanism of User Account Data, User Content, and User Usage Data from the EEA, Switzerland, or the United Kingdom.
  5. STANDARD CONTRACTUAL CLAUSES

    1. The parties agree that the 2021 Standard contractual clauses for international transfers as publish and available at https://commission.europa.eu/law/law-topic/data-protection/international-dimension-data-protection/standard-contractual-clauses-scc_en will apply to personal data that is transferred via the Services from the European Economic Area or Switzerland, either directly or via onward transfer, to any country or recipient outside the European Economic Area or Switzerland that is:
      1. not recognized by the Information Commissioner’s Office or European Commission (or, in the case of transfers from Switzerland, the competent authority for Switzerland) as providing an adequate level of protection for personal data and
      2. not covered by the above Binding Corporate Rules. For data transfers from the European Economic Area that are subject to the 2021 Standard Contractual Clauses, the 2021 Standard Contractual Clauses will be deemed entered into (and incorporated into this Addendum by this reference) and completed as follows:
        1. Module One (Controller to Controller) of the 2021 Standard Contractual Clauses will apply where Tatship is processing User Account Data and
        2. User is a controller of User Usage Data and Tatship is processing User Usage Data.
        3. Module Two (Controller to Processor) of the 2021 Standard Contractual Clauses will apply where User is a controller of User Content and Tatship is processing User Content.
        4. Module Three (Processor to Processor) of the 2021 Standard Contractual Clauses will apply where User is a processor of User Content and Tatship is processing User Content.
        5. Module Four (Processor to Controller) of the 2021 Standard Contractual Clauses will apply where User is a processor of User Usage Data and Tatship processes User Usage Data.
      3. For each Module, where applicable:
        1. Data Exporter: User.
        2. Contact details: The email address(es) designated by User in User’s account via its notification preferences.
        3. Data Exporter Role: The Data Exporter’s role is set forth in this Agreement.
        4. Signature and Date: By entering into the Agreement, Data Exporter is deemed to have signed these Standard Contractual Clauses incorporated herein, as of the Effective Date of the Agreement.
        5. Data Importer: Tatship.
        6. Contact details: Tatship’s Support Team - [email protected].
        7. Data Importer Role: The Data Importer’s role is set forth in this Agreement.
        8. Signature and Date: By entering into the Agreement, Data Importer is deemed to have signed these Standard Contractual Clauses, incorporated herein, including their Annexes, as of the Effective Date of the Agreement.
    2. The categories of data subjects are described in this Agreement
    3. The Sensitive Data transferred is described in this Agreement.
    4. The frequency of the transfer is a continuous basis for the duration of the Agreement.
    5. The nature of the processing is described in this Agreement.
    6. The purpose of the processing is described in this Agreement.
    7. The period for which the personal data will be retained is this Agreement.
    8. The Supervisory Authority shall be the Office of the Privacy Commissioner for Personal Data, Unit 1303, 13/F, Dah Sing Financial Centre, 248 Queen's Road East, Wanchai, Hong Kong.
    9. For transfers to sub-processors, the subject matter, nature, and duration of the processing is set forth below.
    10. The Schedule Security Measures of this Agreement serves as Annex of the Standard Contractual Clauses.
    11. Conflict. To the extent there is any conflict between the Standard Contractual Clauses, and any other terms in this Agreement, or the Privacy Policy, the provisions of the Standard Contractual Clauses will prevail.