Data Processing Addendum
Ledgy AG, a stock corporation formed under the laws of Switzerland, with
company number CHE-261.454.963 (“Ledgy”), and the customer (the
“Customer”) (each a “Party” and together the “Parties”), hereby agree as
follows:
1 Scope
1.1
This data processing addendum (the “Addendum”) applies exclusively to the
processing of personal data (the “Customer Personal Data”) by Ledgy on
behalf of the Customer where such processing is subject to European Union
(EU), United Kingdom (UK), or Swiss data privacy law. This Addendum,
including its annexes, forms part of, and is subject to, the provisions of the
agreement between the parties (the “Services Agreement”) in respect of the
performance of services (the “Services”) by Ledgy to the Customer that
include the processing of such Customer Personal Data.
1.2
The term “EU Data Privacy Law” means Regulation (EU) 2016/679 of the
European Parliament and of the Council of 27 April 2016 on the protection of
natural persons with regard to the processing of personal data and on the
free movement of such data, including any future revision therefor, and
repealing Directive 95/46/EC (General Data Protection Regulation or GDPR).
The term “UK Data Privacy Law” means all laws relating to data protection,
the processing of personal data, privacy and/or electronic communications in
force from time to time in the UK, including the GDPR to the extent that it
forms part of the United Kingdom’s local law as a result of Section 3 of the
European Union (Withdrawal Act) 2018 and the Data Protection Act 2018.
The term “Swiss Data Privacy Law” means the Revised Federal Data
Protection Act, including any future revision thereof. EU Data Privacy Law, UK
Data Privacy Law and Swiss Data Privacy Law are collectively referred to as
“Data Privacy Law”.
1.3
Terms such as “processing”, “Personal Data”, “Controller”, “Processor”,
“Data Subject”, “Sub-Processors” and “Data Breach” shall have the meaning
ascribed to them in Data Privacy Law, as applicable to the processing.
2 Binding Character of this Addendum
The Parties hereby agree to be bound by the provisions and obligations set
forth in this Addendum in respect of all their data protection obligations and
agree that any data protection and data processing obligations as agreed to
previously amongst the Parties shall be deleted and repealed in its entirety
and be replaced with this Addendum.
Any changes to this Addendum shall be made in accordance with the
provisions of the applicable Services Agreement.
3 Details of Processing
The processing carried out by Ledgy will be as follows:
3.1 Subject matter of processing
Equity management services by means of an online software application (the
“Application”) and the fulfillment of contractual obligations under the
Services Agreement and this Addendum.
3.2 Duration of processing
For the duration of the Services Agreement until terminated or once
processing by Ledgy of any Customer Personal Data is no longer required for
the performance of its relevant obligations under the Services Agreement or
Addendum.
3.3 Purpose of processing
The provision of the Services.
3.4 Categories of Personal Data
Equity data: Shareholder information (including their General Personal Data),
any personal data that may be included in the company information, share
ledger transaction history, legal documents or other cap table details.
General Personal Data: data about an identified or identifiable Data Subject,
including, but not limited to name, surname, title, date of birth, country of
origin, telephone number, email, postal address.
Any other personal data requested by the Customer through its use of the
Services and Application, provided always that the Customer should
not use the Services or Application to process special category data.
3.5 Categories of Data Subjects
Shareholders and any other natural persons who access and use your
account (e.g., advisors).
4 Roles of the Parties
The Customer and Ledgy hereby agree that for the purposes of this
Addendum, the Customer shall be the Controller and Ledgy shall be the
Processor.
5 Ledgy’s obligations
Ledgy, acting as Processor, shall:
5.1
only process Customer Personal Data on documented instructions from the
Customer, unless required to do so by applicable laws to Ledgy (provided
that Ledgy first informs the Customer of that legal requirement before
processing, unless that law prohibits this on important grounds of public
interest). The Services Agreement, this Addendum along with the Customer's
use of the Services constitute the Customer's documented instructions to
Ledgy for the purpose of providing the Services. Ledgy shall immediately
inform the Customer if instructions given by the Customer, in the opinion of
Ledgy, contravene Data Privacy Law.
5.2
ensure that all personnel who have access to Customer Personal Data have
committed themselves to appropriate obligations of confidentiality;
5.3
maintain appropriate technical and organizational measures to protect the
Customer Personal Data. The Parties acknowledge that security
requirements are constantly changing and that effective security requires
frequent evaluation and regular improvements of outdated security
measures. Ledgy will, therefore, evaluate the measures on an on-going basis
and will tighten, supplement and improve these measures as it deems
necessary or appropriate in its sole discretion. An overview of the current
technical and organizational measures can be found on Annex 1 of this
Addendum;
5.4
assist the Customer, to the extent possible, to fulfill the Customer’s
obligations in responding to requests for exercising of Data Subject rights set
out in the applicable Data Privacy Law;
5.5
assist the Customer in complying with Article 35 (Data protection impact
assessment) and Article 36 (Prior consultation) of the GDPR (or the
respective definitions in the Swiss and UK Data Privacy Law) in respect of
any new type of processing proposed, in accordance with Data Privacy Law.
6 The Customer’s obligations
The Customer, acting as the Controller, hereby warrants and represents:
6.1
that all processing of Customer Personal Data will be in compliance with all
Data Privacy Law, and that the processing of the Customer Personal Data by
Ledgy in accordance with this Addendum will not breach Data Privacy Law;
6.2
that Customer Personal Data provided to Ledgy are accurate and will be
updated to ensure continued accuracy as and when required;
6.3
that it has notified Data Subjects of any applicable period for which Customer
Personal Data or any element of Customer Personal Data will be stored by
Ledgy;
6.4
that the Customer has the right to provide Customer Personal Data to Ledgy
and has provided Data Subjects with all necessary information and data
protection notices on or in connection with the collection of such Customer
Personal Data from data subjects including, but not limited to, the supply of
Customer Personal Data to Ledgy and details of the purposes for which such
Customer Personal Data will be processed by Ledgy including, if applicable,
as set out in Ledgy’s retention policy;
6.5
Customer warrants and represents:
6.5.1
that the Customer will not provide Ledgy with nor request Ledgy to process
the types and categories of Personal Data listed, defined, or referenced to in
Articles 8–10 of the GDPR or respective definitions in the UK and the Swiss
Data Privacy Law, and
6.5.2
that the Customer will not provide Ledgy with nor pass to Ledgy personal
data for which Ledgy has no knowledge of, is unaware of, or which is not
explicitly provided for under this Addendum, and that where applicable, the
Customer will not enter any personal data into free text fields embedded in
relevant Ledgy products and/or Services and will not incorporate any
personal data outside of the scope of Personal Data as contemplated in the
Services Agreement and this Addendum into any attachments that are to be
uploaded into Ledgy’s Application;
6.6
that the Customer shall, and shall procure its employees, contractors, and/or
agents to keep the login credentials used to access to the Services secure
and shall be liable for the access to the Services through such login
credentials. The Customer further shall promptly notify Ledgy of any
unauthorized use of any login credentials, or other breaches of security,
including loss, theft or unauthorized disclosure of login credentials.
7 Sub-processors
7.1
The Customer hereby provides its prior, general authorisation for Ledgy to
appoint Sub-Processors to process the Customer Personal Data in connection
with the provision of the Services.
7.2
Ledgy shall:
7.2.1
enter into an agreement with each Sub-Processor containing obligations
which are materially similar to those set out in this Addendum to the extent
applicable to the nature of the services provided by such Sub-Processor;
7.2.2
remain responsible for the acts and omissions of any such Sub-Processor as
if they were the acts and omissions of Ledgy.
7.3
A list of Ledgy’s current Sub-Processors is set out at Annex 2. The Customer
may request an up-to-date list of Sub-Processors at any time.
7.4
Ledgy will notify the Customer prior to transferring any Customer Personal
Data to a new Sub-Processor. The Customer will notify Ledgy in writing
within 30 days after being notified of such new Sub-Processor if it objects to
the processing of its Customer Personal Data by the new Sub-Processor. In
such event the parties will, acting reasonably, try to come to an agreement
over the transfer of the Customer Personal Data to the applicable Sub-
Processor. Where agreement is not possible the Customer shall be entitled
to terminate the Services Agreement.
8 Audit Rights
8.1
Ledgy shall maintain complete, accurate and up to date written records of all
categories of processing activities carried out on behalf of the Customer.
8.2
Such records shall include all information necessary to demonstrate Ledgy’s
compliance with this Addendum. Ledgy shall make copies of such records
referred to at clause 8.1 available to the Customer promptly on request.
8.3
Ledgy shall promptly make available to the Customer such information as is
required to demonstrate Ledgy’s compliance with its obligations under the
Data Privacy Law. If the Customer can reasonably show that the
documentation made available to it does not provide sufficient information
for the Customer to confirm Ledgy’s compliance with the terms of this
Addendum, Ledgy shall permit the Customer or an accredited third-party
auditor to conduct an audit to confirm such compliance. Such audit shall
take place during Ledgy’s regular hours of business, not more than once in
any 12 month period, and on not less than 4 weeks prior written notice. The
Customer and its auditors (if any) shall enter into confidentiality agreements
with Ledgy and shall comply with all Ledgy’s reasonable requirements to
minimise disruption to Ledgy’s business.
9 Personal Data Breach
Ledgy shall, without undue delay:
(a) notify the Customer after it (or any of the Sub-Processors’ or Ledgy’s
personnel) becomes aware of a Personal Data Breach in respect of any
Customer Personal Data;
(b) provide all information as the Customer requires (to the extent that it is
available to Ledgy) to report the circumstances to a supervisory
authority and to notify affected data subjects under Data Privacy Law;
and
(c) provide the Customer with reasonable assistance in responding to and
mitigating the Personal Data Breach.
10 Overseas Transfers
Ledgy may transfer Customer Personal Data outside of the European
Economic Area, United Kingdom or Switzerland as required to process the
Customer Personal Data for the purpose under this Addendum, provided that
Ledgy shall ensure that all such transfers are made in accordance with
applicable Data Privacy Law, including by way of entering into standard data
protection clauses adopted by the EU Commission (where the EU GDPR
applies to the transfer) together with any applicable additional clauses
required for transfers out of the United Kingdom or Switzerland, as
applicable.
11 Liability
The Customer acknowledges that Ledgy is reliant on the Customer for
instructions as to the extent to which Ledgy is entitled to use and process
the Customer Personal Data. Consequently, Ledgy will not be liable for losses
(including indirect losses, loss or corruption of data, loss of reputation,
goodwill and profits), actions, proceedings and liabilities of whatsoever
nature incurred by Ledgy or for which Ledgy may become liable due to any
claim brought by a Data Subject or Supervisory Authority arising from the
Customer’s instructions or use of the Services or Application in breach of the
Data Privacy Law.
12 Order of Precedence
To the extent of any conflict between this Addendum and any parts of the
Services Agreement, this Addendum shall prevail, govern, and supersede.
13 Survival
This Addendum and the obligations hereunder shall survive the termination
or expiry of the Services Agreement however effected or arising, and shall
continue until Ledgy no longer processes any Customer Personal Data. The
Customer Personal Data will be returned to the Customer and deleted by
Ledgy in accordance with the Services Agreement.
Annex 1 - Technical and Organisational Measures
This annex to the Data Processing Addendum outlines the technical and
organizational measures implemented by Ledgy AG (“Ledgy”, "Processor" or
the “data processor”) in compliance with its data protection obligations as a
data processor.
These measures aim to ensure the security and protection of personal data
processed on behalf of ‘Customer’ ("Controller") in accordance with
applicable data protection laws, including the Federal Act on Data Protection
(FADP) and the General Data Protection Regulation (GDPR).
Organizational Security Measures
Security Management
- Security Governance: Ledgy has a dedicated team with regular
involvement from senior leadership to oversee information security.
Responsibilities of the team include defining policies, enforcing
security practices, and monitoring overall security. - Risk Management: A structured program for ongoing identification,
measurement, and management of IT-related risks is in place and
overseen by relevant personnel and senior leadership. - Roles and Responsibilities: Responsibilities for processing personal
data are clearly defined in line with security policies. - Resource/Asset Management: Ledgy maintains registers of IT
resources used for personal data processing, including hardware,
software, and network. Designated personnel are responsible for
maintaining and updating the registers.
Incident Response and Business Continuity
Incidents Handling / Personal Data Breaches:
- ncident procedures are in place to ensure effective responses to
security incidents, including those involving personal data. - Ledgy promptly reports any security incident leading to the loss,
misuse, or unauthorized access to personal data to affected data
controller(s).
Business Continuity: Ledgy has established procedures and controls
to ensure the required level of IT system continuity and availability for
processing personal data in case of an incident or data breach.
- Multiple Availability Zones to provide improved redundancy and
fault tolerance. - Periodic Disaster Recovery and/or Business Continuity exercises
are conducted.
Human Resource Security
- Verification: Ledgy verifies and validates all candidates prior to
hiring, including background checks, to assess their suitability and
manage risk. - Policy Compliance: Ledgy ensures that all employees understand
their responsibilities and obligations regarding personal data
processing and compliance with security policies. - Onboarding and Offboarding: Ledgy maintains clear procedures for
management of access rights for new joiners and during termination.
Processes are also defined for transferring rights and responsibilities
during internal reorganizations or other changes in employment. - Training: Ledgy trains employees about security controls and
requirements relevant to their work. Employees are regularly educated
on data protection requirements and legal obligations through
awareness campaigns and monthly training on general security topics.
Technical Security Measures
Access Control and Authentication
- Least Privilege: Access control rights are specifically assigned to
roles involved in personal data processing, following the principle of
least privilege. Access is granted following the "need-to-know"
principle to limit access to personal data to those who require it.
Periodic reviews of all access levels are conducted. - Authentication: An access control system applicable to all IT system
users is implemented, allowing for user account creation, approval,
review, and deletion. Multi-factor authentication (MFA) is enforced
where possible. - Unique Accounts: The use of common user accounts is prohibited,
and if necessary, users with common accounts have the same roles
and responsibilities. - Passwords: Where passwords are used, they are required to be at
least 16 characters long, meet strong password control parameters
(length, complexity, non-repeatability), and are never transmitted over
the network unprotected.
Logging and Monitoring
- Log Creation: Log files are enabled for systems and applications used
in personal data processing, tracking data access (view, modification,
deletion) and other security and system events. - Log Monitoring: Ledgy has implemented comprehensive logging and
monitoring mechanisms to track data access and system activities.
Ledgy personnel also perform periodic reviews and analysis of logs to
identify and mitigate security incidents and anomalies.
Data Protection and Security
- Data Protection: Database(s) and application servers run in separate
environments and separate systems to ensure data protection.
Personal data is only processed as required to fulfill the service’s
intended purpose. - Data Access Controls: Database access is highly restricted to
database administrators and only granted on a need-to-know basis. - Data Disposal: Stored personal data is only stored in cloud storage
where secure deletion assurance is provided by the cloud hosting
provider. Policies are in place prohibiting the storage of personal data
on paper or local drives to prevent data loss through these methods. - Data Encryption: Stored data is encrypted at rest using AES-256.
When accessed through the Internet, communication is encrypted
using TLS 1.2 or better. - Backup Security: Ledgy manages a backup/snapshot service hourly,
which is tested periodically. Backup and data restore procedures are
defined, documented, and linked to specific roles and responsibilities.
Secure System Architecture
- Perimeter Controls: Network traffic to and from the IT system is
monitored and controlled using firewalls and/or security groups and
other network security technologies. A Web-Application Firewall (WAF)
is used to monitor web traffic and help prevent abuses. - Network Segmentation: The production service environment is
divided into multiple zones and VPCs depending on the security
requirements of individual services.
Application and System Lifecycle
- Secure SDLC: Ledgy adheres to a structured Software Development
Lifecycle (SDLC) throughout its software and system development
practices. Security is integrated throughout the phases of the
development lifecycle. - Change Management: Ledgy ensures that IT system changes are
recorded and monitored by designated personnel, subjected to
appropriate testing, and approved prior to release. - Vulnerability Management: Software, system components, and 3rd
party dependencies are subjected to regular reviews to proactively
identify and track potential security vulnerabilities, which are then
tracked until addressed. - Security Testing: System components are subjected to periodic and
ongoing security testing, including penetration tests, security scans,
and code analysis. Findings are tracked until addressed.
Physical and Environmental Security
Data Centers: Ledgy hosts all Customer Data in Google Cloud
Platform (GCP). Ledgy regularly reviews Google’s physical and
environmental controls for relevant data centers, as audited by
Google’s third-party auditors. Such controls include, but are not limited to:
- Physical access to the facilities is controlled at the building ingress points;
- Visitors are required to present ID and sign in;
- Physical access to servers is managed by access control devices;
- Physical access privileges are reviewed regularly;
- Facilities utilize monitor and alarm procedures;
- Fire detection and protection systems;
- Power back-up and redundancy systems; and Climate control systems.
Last updated: October 23, 2023.
and
transaction
data,
uploaded
documents
Germany
(AWS)
address,
content of the
emails