Common use of Locations for processing Clause in Contracts

Locations for processing. 4.6.1 Censornet has the following office locations within the UK:  Basingstoke  Bristol  Lerwick, Shetland Datadog, Inc.: Headquarters - ▇▇▇ ▇▇▇ ▇▇▇▇▇▇, ▇▇▇▇ ▇▇▇▇▇, ▇▇▇ ▇▇▇▇, ▇▇ ▇▇▇▇▇, ▇▇▇. Lastline Inc.: ▇▇▇ ▇▇▇▇▇▇▇ ▇▇▇▇▇▇ ▇▇▇▇▇▇▇, ▇▇▇▇▇ ▇▇▇, ▇▇▇▇▇▇▇ ▇▇▇▇, ▇▇ ▇▇▇▇▇, ▇▇▇. Please note this Sub-processor is only used if the ‘Sandbox Level 2’ add on is purchased/used with EMS. specific EU/ESS Datacenter location, or a EU/ESS region (eg Western Europe, Northern Europe) depending on the Sub-Processor options provided at the time of provisioning the systems. Sorry App Limited: Building 1, Old Station Business Park, Petworth, West Sussex, ▇▇, ▇▇▇▇ ▇▇▇. Please note this Sub-processor is only used if Customers subscribe to system status updates/notifications. Twilio Inc.: ▇▇▇ ▇▇▇▇▇ ▇▇▇▇▇▇, Suite 300, San Francisco, CA 94105, USA. Please note this Sub-processor is only used if MFA is enabled on portal (USS) logins. Vade Secure Inc.: ▇▇▇ ▇▇▇▇▇▇▇ ▇▇▇▇▇▇, ▇▇▇▇▇ 2 – ▇▇▇ ▇▇▇▇▇▇▇▇▇, ▇▇ ▇▇▇▇▇, ▇▇▇. Please note this Sub-processor is only used if Email Security is purchased/used.  Customers, Clients and Prospects (including their staff)  Basic personal data (for example street name and building number or name (address), postal code, city, country, mobile phone number, first name, last name, initials, email address, domain and related data);  Authentication data (for example user name, password, audit trail);  Contact information (for example addresses, email, phone numbers, website address);  Device identification / Unique identification numbers (for example IP addresses, MAC addresses, logical tag);  Commercial Information (subscription (license) information, purchase history, payment history);  Location data (for example, geo-location network data);  Email activity (inbound and outbound email messages, including attachments);  Internet activity (for example browsing activity, cloud application activity);  Any other personal data identified in Article 4 of the GDPR. Web Security (WS)  All http and https web requests and associated metadata  Log data relating to http and https web requests. Log information includes  Metadata includes Active Directory (AD) usernames, IP addresses and MAC addresses AD usernames, IP addresses and MAC addresses Cloud Application Security (CASB)  All http and https cloud application requests and associated metadata  Metadata includes AD usernames, IP addresses, Real Names, MAC addresses, Email addresses and any captured application data  Log data relating to http and https cloud application requests. Log information includes AD usernames, IP addresses Real Names, MAC addresses, Email addresses and any captured application data. Cloud MFA (Cloud MFA)  User authentication requests and associated metadata. Metadata includes Usernames, UPNs, Common Names (Real Names) and IP addresses  Mobile phone numbers  Authentication log data. Log information includes Usernames, UPNs, Common Names (Real Names) and IP addresses MFA Powered by IntelliTrust (MFA)  User authentication requests and associated metadata. Metadata includes Usernames, UPNs, Common Names (Real Names) and IP addresses  Mobile phone numbers  Authentication log data. Log information includes Usernames, UPNs, Common Names (Real Names) and IP addresses Email Security (EMS)  Inbound and outbound email messages (including attachments) sent or received externally to or from the organization  Log data relating to inbound and outbound email messages sent or received externally. Log information includes IP addresses, To, From and Subject fields, server responses, and other metadata, but does not include the message body or any file attachments Email Back Up Emergency Inbox Compliant Email Archive (CEMA)  Inbound and outbound email messages (including attachments) sent or received externally to or from the organization  Inbound and outbound email messages (including attachments) sent or received externally to or from the organization  None Data processing operations are summarised as:  Receiving data, including collection and recording  Holding data, including storage, organisation and structuring  Updating data, including adaptation, alignment and combination  Computer processing of Personal Data, including data transmission, data retrieval, data access, and network access to allow data transfer if required  Protecting data, including restricting, encrypting, and security testing. Censornet and Censornet’s Sub-processors will use and otherwise process Personal Data only in accordance with and as described in the Master Services Agreement (MSA) and for Censornet’s legitimate business operations related to delivery of the Services to Customers.

Appears in 1 contract

Sources: Master Services Agreement

Locations for processing. 4.6.1 Censornet has the following office locations within the UK:  Basingstoke  Bristol  Lerwick, Shetland Datadog, Inc.: Headquarters - ▇▇▇ ▇▇▇ ▇▇▇▇▇▇, ▇▇▇▇ ▇▇▇▇▇, ▇▇▇ ▇▇▇▇, ▇▇ ▇▇▇▇▇, ▇▇▇. Lastline Inc.: ▇▇▇ ▇▇▇▇▇▇▇ ▇▇▇▇▇▇ ▇▇▇▇▇▇▇, ▇▇▇▇▇ ▇▇▇, ▇▇▇▇▇▇▇ ▇▇▇▇, ▇▇ ▇▇▇▇▇, ▇▇▇. Please note this Sub-processor is only used if the ‘Sandbox Level 2’ add on is purchased/used with EMS. specific EU/ESS Datacenter location, or a EU/ESS region (eg Western Europe, Northern Europe) depending on the Sub-Processor options provided at the time of provisioning the systems. Sorry App Limited: Building 1, Old Station Business Park▇▇▇ ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇, Petworth, West Sussex, ▇▇▇▇▇▇▇▇, ▇▇▇▇ ▇▇▇▇▇▇, ▇▇, GU28 0JF. Please note this Sub-processor is only used if Customers subscribe to system status updates/notifications. Twilio Inc.: ▇▇▇ ▇▇▇▇▇ ▇▇▇▇▇▇, Suite 300, San Francisco, CA 94105, USA. Please note this Sub-processor is only used if MFA is enabled on portal (USS) logins. Vade Secure Inc.: ▇▇▇ ▇▇▇▇▇▇▇ ▇▇▇▇▇▇, ▇▇▇▇▇ 2 – ▇▇▇ ▇▇▇▇▇▇▇▇▇, ▇▇ ▇▇▇▇▇, ▇▇▇. Please note this Sub-processor is only used if Email Security is purchased/used.  Customers, Clients and Prospects (including their staff)  Basic personal data (for example street name and building number or name (address), postal code, city, country, mobile phone number, first name, last name, initials, email address, domain and related data);  Authentication data (for example user name, password, audit trail);  Contact information (for example addresses, email, phone numbers, website address);  Device identification / Unique identification numbers (for example IP addresses, MAC addresses, logical tag);  Commercial Information (subscription (license) information, purchase history, payment history);  Location data (for example, geo-location network data);  Email activity (inbound and outbound email messages, including attachments);  Internet activity (for example browsing activity, cloud application activity);  Any other personal data identified in Article 4 of the GDPR. Web Security (WS)  All http and https web requests and associated metadata  Log data relating to http and https web requests. Log information includes  Metadata includes Active Directory (AD) usernames, IP addresses and MAC addresses AD usernames, IP addresses and MAC addresses Cloud Application Security (CASB)  All http and https cloud application requests and associated metadata  Metadata includes AD usernames, IP addresses, Real Names, MAC addresses, Email addresses and any captured application data  Log data relating to http and https cloud application requests. Log information includes AD usernames, IP addresses Real Names, MAC addresses, Email addresses and any captured application data. Cloud MFA (Cloud MFA)  User authentication requests and associated metadata. Metadata includes Usernames, UPNs, Common Names (Real Names) and IP addresses  Mobile phone numbers  Authentication log data. Log information includes Usernames, UPNs, Common Names (Real Names) and IP addresses MFA Powered by IntelliTrust (MFA)  User authentication requests and associated metadata. Metadata includes Usernames, UPNs, Common Names (Real Names) and IP addresses  Mobile phone numbers  Authentication log data. Log information includes Usernames, UPNs, Common Names (Real Names) and IP addresses Email Security (EMS)  Inbound and outbound email messages (including attachments) sent or received externally to or from the organization  Log data relating to inbound and outbound email messages sent or received externally. Log information includes IP addresses, To, From and Subject fields, server responses, and other metadata, but does not include the message body or any file attachments Email Back Up Emergency Inbox Compliant Email Archive (CEMA)  Inbound and outbound email messages (including attachments) sent or received externally to or from the organization  Inbound and outbound email messages (including attachments) sent or received externally to or from the organization  None Data processing operations are summarised as:  Receiving data, including collection and recording  Holding data, including storage, organisation and structuring  Updating data, including adaptation, alignment and combination  Computer processing of Personal Data, including data transmission, data retrieval, data access, and network access to allow data transfer if required  Protecting data, including restricting, encrypting, and security testing. Censornet and Censornet’s Sub-processors will use and otherwise process Personal Data only in accordance with and as described in the Master Services Agreement (MSA) and for Censornet’s legitimate business operations related to delivery of the Services to Customers.

Appears in 1 contract

Sources: Master Services Agreement