You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Mailjet/Data Processor Agreement.md
+30-90Lines changed: 30 additions & 90 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -231,161 +231,101 @@ Physical Access Control
231
231
232
232
To prevent unauthorized persons from gaining access to data processing systems with which personal data is processed or used:
233
233
234
-
*Badge Check
234
+
*Sinch Email leverages industry-leading data center and cloud infrastructure providers. Access to all data centers is strictly controlled. All data centers are equipped with 24x7x365 surveillance and biometric access control systems. Additionally, all providers have industry standard certifications.
235
235
236
-
Sinch Email leverages industry-leading data center and cloud infrastructure providers. Access to all data centers is strictly controlled. All data centers are equipped with 24x7x365 surveillance and biometric access control systems. Additionally, all providers have industry standard certifications.
236
+
* Data centers are equipped with at least N+1 redundancy for power, networking, and cooling infrastructure.
237
237
238
-
* Badge Check
239
-
240
-
Data centers are equipped with at least N+1 redundancy for power, networking, and cooling infrastructure.
241
-
242
-
* Badge Check
243
-
244
-
Within a region, data processing occurs across at least three distinct availability zones. Services are designed to withstand the failure of an availability zone without customer disruption.
238
+
* Within a region, data processing occurs across at least three distinct availability zones. Services are designed to withstand the failure of an availability zone without customer disruption.
245
239
246
240
247
241
System Access Control
248
242
---------------------
249
243
250
244
To prevent data processing systems from being used without authorization:
251
245
252
-
* Badge Check
253
-
254
-
Administrative access to Sinch Email systems and services follows the principle of least privilege. Access to systems is based on job role and responsibilities. Sinch Email utilizes unique usernames/identifiers that are not permitted to be shared or re-assigned to another person.
255
-
256
-
* Badge Check
257
-
258
-
VPN and multi-factor authentication is used for access to internal support tools and product infrastructure.
259
-
260
-
* Badge Check
261
-
262
-
Network access control lists (ACLs) and security groups are used to limit ingress and egress traffic from production infrastructure.
246
+
* Administrative access to Sinch Email systems and services follows the principle of least privilege. Access to systems is based on job role and responsibilities. Sinch Email utilizes unique usernames/identifiers that are not permitted to be shared or re-assigned to another person.
263
247
264
-
*Badge Check
248
+
*VPN and multi-factor authentication is used for access to internal support tools and product infrastructure.
265
249
266
-
Intrusion detection systems (IDS) are used to detect potential unauthorized access.
250
+
* Network access control lists (ACLs) and security groups are used to limit ingress and egress traffic from production infrastructure.
267
251
268
-
*Badge Check
252
+
*Intrusion detection systems (IDS) are used to detect potential unauthorized access.
269
253
270
-
Network protections have been deployed to mitigate the impact of distributed denial of service (DDoS) attacks.
254
+
* Network protections have been deployed to mitigate the impact of distributed denial of service (DDoS) attacks.
271
255
272
-
* Badge Check
273
-
274
-
Onboarding and offboarding processes are documented and followed consistently to ensure access is properly managed to internal and externally hosted tools and systems. Where possible, third-party services leverage single sign-on (SSO) functionality which allows for centralized management and enforces multi-factor authentication.
256
+
* Onboarding and offboarding processes are documented and followed consistently to ensure access is properly managed to internal and externally hosted tools and systems. Where possible, third-party services leverage single sign-on (SSO) functionality which allows for centralized management and enforces multi-factor authentication.
275
257
276
258
277
259
Data Access Control
278
260
-------------------
279
261
280
262
To ensure authorized users entitled to use data processing systems have access only to the data to which they have a right of access, and that personal data cannot be read, copied, modified or removed without authorization in the course of processing or use and after storage:
281
263
282
-
* Badge Check
283
-
284
-
Sinch Email utilizes a password management system that enforces minimum password length, complexity, expiration time, and minimum last used.
285
-
286
-
* Badge Check
287
-
288
-
Employee workstations automatically lock after a prolonged period of inactivity. Systems log out users after a prolonged period of inactivity.
289
-
290
-
* Badge Check
291
-
292
-
Logs are centrally stored and indexed. Critical logs, such as security logs, are retained for at least one year.
293
-
294
-
* Badge Check
264
+
* Sinch Email utilizes a password management system that enforces minimum password length, complexity, expiration time, and minimum last used.
295
265
296
-
The Sinch Email patch management process ensures that systems are patched at least once every month. Monitoring, alerting, and routine vulnerability scanning occurs to ensure that all product infrastructure is patched consistently.
266
+
* Employee workstations automatically lock after a prolonged period of inactivity. Systems log out users after a prolonged period of inactivity.
297
267
298
-
*Badge Check
268
+
*Logs are centrally stored and indexed. Critical logs, such as security logs, are retained for at least one year.
299
269
300
-
Industry-standard antivirus software is utilized to ensure internal assets that access personal data are protected against known viruses. Antivirus software is updated regularly.
270
+
* The Sinch Email patch management process ensures that systems are patched at least once every month. Monitoring, alerting, and routine vulnerability scanning occurs to ensure that all product infrastructure is patched consistently.
301
271
302
-
*Badge Check
272
+
*Industry-standard antivirus software is utilized to ensure internal assets that access personal data are protected against known viruses. Antivirus software is updated regularly.
303
273
304
-
Sinch Email utilizes firewall devices to segregate unwanted traffic from entering the network. A DMZ is utilized using firewalls to further protect internal systems protecting sensitive data.
274
+
* Sinch Email utilizes firewall devices to segregate unwanted traffic from entering the network. A DMZ is utilized using firewalls to further protect internal systems protecting sensitive data.
305
275
306
276
307
277
Data Transmission Control
308
278
-------------------------
309
279
310
280
To ensure that personal data cannot be read, copied, modified or removed without authorization during electronic transmission or transport:
311
281
312
-
*Badge Check
282
+
*Customer data is stored encrypted-at-rest through the use of AES-256 encryption on block devices.
313
283
314
-
Customer data is stored encrypted-at-rest through the use of AES-256 encryption on block devices.
284
+
*Customer backups are encrypted-in-transit and at rest using strong encryption.
315
285
316
-
*Badge Check
286
+
*Sinch Email supports TLS 1.2 to encrypt network traffic between the client application and Sinch Email infrastructure.
317
287
318
-
Customer backups are encrypted-in-transit and at rest using strong encryption.
288
+
* Sinch Email is alerted to encryption issues through periodic risk assessments and third-party penetration tests. Sinch Email performs third-party penetration tests on an annual basis, or as needed due to changes in the business.
319
289
320
-
* Badge Check
321
-
322
-
Sinch Email supports TLS 1.2 to encrypt network traffic between the client application and Sinch Email infrastructure.
323
-
324
-
* Badge Check
325
-
326
-
Sinch Email is alerted to encryption issues through periodic risk assessments and third-party penetration tests. Sinch Email performs third-party penetration tests on an annual basis, or as needed due to changes in the business.
327
-
328
-
* Badge Check
329
-
330
-
Sinch Email operates a bug bounty program, encouraging the responsible disclosure of vulnerabilities from community researchers.
290
+
* Sinch Email operates a bug bounty program, encouraging the responsible disclosure of vulnerabilities from community researchers.
331
291
332
292
333
293
Input Control
334
294
-------------
335
295
336
296
To ensure that it is possible to check and establish whether and by whom personal data have been input into data processing systems, modified or removed:
337
297
338
-
* Badge Check
339
-
340
-
Systems are monitored for security events to ensure quick resolution.
298
+
* Systems are monitored for security events to ensure quick resolution.
341
299
342
-
* Badge Check
343
-
344
-
Logs are centrally stored and indexed. Critical logs, such as security logs, are retained for at least one year. Logs can be traced back to individual unique usernames with timestamps to investigate nonconformities or security events.
300
+
* Logs are centrally stored and indexed. Critical logs, such as security logs, are retained for at least one year. Logs can be traced back to individual unique usernames with timestamps to investigate nonconformities or security events.
345
301
346
302
347
303
Availability Control
348
304
--------------------
349
305
350
306
To ensure personal data is protected from accidental destruction or loss:
351
307
352
-
* Badge Check
353
-
354
-
Account data is backed up at least daily. Incremental/point-in-time recovery is available for all primary databases. Backups are encrypted-in-transit and at rest using strong encryption.
308
+
* Account data is backed up at least daily. Incremental/point-in-time recovery is available for all primary databases. Backups are encrypted-in-transit and at rest using strong encryption.
355
309
356
-
*Badge Check
310
+
*Sinch Email patch management process ensures that systems are patched at least once every month. Monitoring, alerting, and routine vulnerability scanning occurs to ensure that all product infrastructure is patched consistently.
357
311
358
-
Sinch Email patch management process ensures that systems are patched at least once every month. Monitoring, alerting, and routine vulnerability scanning occurs to ensure that all product infrastructure is patched consistently.
312
+
* When necessary, Sinch Email patches infrastructure in an expedited manner in response to the disclosure of critical vulnerabilities to ensure system uptime is preserved.
359
313
360
-
* Badge Check
361
-
362
-
When necessary, Sinch Email patches infrastructure in an expedited manner in response to the disclosure of critical vulnerabilities to ensure system uptime is preserved.
363
-
364
-
* Badge Check
365
-
366
-
Customer environments are logically separated at all times. Customers are not able to access accounts other than those given authorization credentials for.
314
+
* Customer environments are logically separated at all times. Customers are not able to access accounts other than those given authorization credentials for.
367
315
368
316
369
317
Certification/assurance of processes and products
370
318
-------------------------------------------------
371
319
372
320
To ensure internal IT and IT security governance and management as well as assurance of processes and products
373
321
374
-
* Badge Check
375
-
376
-
ISO 27001 certification
377
-
378
-
* Badge Check
379
-
380
-
ISO 27701 certification
381
-
382
-
* Badge Check
322
+
* ISO 27001 certification
383
323
384
-
SOC 2 Type 2 report (Mailgun & Mailjet brands only)
324
+
* ISO 27701 certification
385
325
386
-
*Badge Check
326
+
*SOC 2 Type 2 report (Mailgun & Mailjet brands only)
0 commit comments