Skip to content

Commit 3fe5782

Browse files
committed
Record new changes of Mailjet Data Processor Agreement
This version was recorded after extracting from snapshot mongo://contrib/open-terms-archive/snapshots/671001532f8e914a04197b10
1 parent 1e95269 commit 3fe5782

File tree

1 file changed

+30
-90
lines changed

1 file changed

+30
-90
lines changed

Mailjet/Data Processor Agreement.md

Lines changed: 30 additions & 90 deletions
Original file line numberDiff line numberDiff line change
@@ -231,161 +231,101 @@ Physical Access Control
231231

232232
To prevent unauthorized persons from gaining access to data processing systems with which personal data is processed or used:
233233

234-
* Badge Check
234+
* Sinch Email leverages industry-leading data center and cloud infrastructure providers. Access to all data centers is strictly controlled. All data centers are equipped with 24x7x365 surveillance and biometric access control systems. Additionally, all providers have industry standard certifications.
235235

236-
Sinch Email leverages industry-leading data center and cloud infrastructure providers. Access to all data centers is strictly controlled. All data centers are equipped with 24x7x365 surveillance and biometric access control systems. Additionally, all providers have industry standard certifications.
236+
* Data centers are equipped with at least N+1 redundancy for power, networking, and cooling infrastructure.
237237

238-
* Badge Check
239-
240-
Data centers are equipped with at least N+1 redundancy for power, networking, and cooling infrastructure.
241-
242-
* Badge Check
243-
244-
Within a region, data processing occurs across at least three distinct availability zones. Services are designed to withstand the failure of an availability zone without customer disruption.
238+
* Within a region, data processing occurs across at least three distinct availability zones. Services are designed to withstand the failure of an availability zone without customer disruption.
245239

246240

247241
System Access Control
248242
---------------------
249243

250244
To prevent data processing systems from being used without authorization:
251245

252-
* Badge Check
253-
254-
Administrative access to Sinch Email systems and services follows the principle of least privilege. Access to systems is based on job role and responsibilities. Sinch Email utilizes unique usernames/identifiers that are not permitted to be shared or re-assigned to another person.
255-
256-
* Badge Check
257-
258-
VPN and multi-factor authentication is used for access to internal support tools and product infrastructure.
259-
260-
* Badge Check
261-
262-
Network access control lists (ACLs) and security groups are used to limit ingress and egress traffic from production infrastructure.
246+
* Administrative access to Sinch Email systems and services follows the principle of least privilege. Access to systems is based on job role and responsibilities. Sinch Email utilizes unique usernames/identifiers that are not permitted to be shared or re-assigned to another person.
263247

264-
* Badge Check
248+
* VPN and multi-factor authentication is used for access to internal support tools and product infrastructure.
265249

266-
Intrusion detection systems (IDS) are used to detect potential unauthorized access.
250+
* Network access control lists (ACLs) and security groups are used to limit ingress and egress traffic from production infrastructure.
267251

268-
* Badge Check
252+
* Intrusion detection systems (IDS) are used to detect potential unauthorized access.
269253

270-
Network protections have been deployed to mitigate the impact of distributed denial of service (DDoS) attacks.
254+
* Network protections have been deployed to mitigate the impact of distributed denial of service (DDoS) attacks.
271255

272-
* Badge Check
273-
274-
Onboarding and offboarding processes are documented and followed consistently to ensure access is properly managed to internal and externally hosted tools and systems. Where possible, third-party services leverage single sign-on (SSO) functionality which allows for centralized management and enforces multi-factor authentication.
256+
* Onboarding and offboarding processes are documented and followed consistently to ensure access is properly managed to internal and externally hosted tools and systems. Where possible, third-party services leverage single sign-on (SSO) functionality which allows for centralized management and enforces multi-factor authentication.
275257

276258

277259
Data Access Control
278260
-------------------
279261

280262
To ensure authorized users entitled to use data processing systems have access only to the data to which they have a right of access, and that personal data cannot be read, copied, modified or removed without authorization in the course of processing or use and after storage:
281263

282-
* Badge Check
283-
284-
Sinch Email utilizes a password management system that enforces minimum password length, complexity, expiration time, and minimum last used.
285-
286-
* Badge Check
287-
288-
Employee workstations automatically lock after a prolonged period of inactivity. Systems log out users after a prolonged period of inactivity.
289-
290-
* Badge Check
291-
292-
Logs are centrally stored and indexed. Critical logs, such as security logs, are retained for at least one year.
293-
294-
* Badge Check
264+
* Sinch Email utilizes a password management system that enforces minimum password length, complexity, expiration time, and minimum last used.
295265

296-
The Sinch Email patch management process ensures that systems are patched at least once every month. Monitoring, alerting, and routine vulnerability scanning occurs to ensure that all product infrastructure is patched consistently.
266+
* Employee workstations automatically lock after a prolonged period of inactivity. Systems log out users after a prolonged period of inactivity.
297267

298-
* Badge Check
268+
* Logs are centrally stored and indexed. Critical logs, such as security logs, are retained for at least one year.
299269

300-
Industry-standard antivirus software is utilized to ensure internal assets that access personal data are protected against known viruses. Antivirus software is updated regularly.
270+
* The Sinch Email patch management process ensures that systems are patched at least once every month. Monitoring, alerting, and routine vulnerability scanning occurs to ensure that all product infrastructure is patched consistently.
301271

302-
* Badge Check
272+
* Industry-standard antivirus software is utilized to ensure internal assets that access personal data are protected against known viruses. Antivirus software is updated regularly.
303273

304-
Sinch Email utilizes firewall devices to segregate unwanted traffic from entering the network. A DMZ is utilized using firewalls to further protect internal systems protecting sensitive data.
274+
* Sinch Email utilizes firewall devices to segregate unwanted traffic from entering the network. A DMZ is utilized using firewalls to further protect internal systems protecting sensitive data.
305275

306276

307277
Data Transmission Control
308278
-------------------------
309279

310280
To ensure that personal data cannot be read, copied, modified or removed without authorization during electronic transmission or transport:
311281

312-
* Badge Check
282+
* Customer data is stored encrypted-at-rest through the use of AES-256 encryption on block devices.
313283

314-
Customer data is stored encrypted-at-rest through the use of AES-256 encryption on block devices.
284+
* Customer backups are encrypted-in-transit and at rest using strong encryption.
315285

316-
* Badge Check
286+
* Sinch Email supports TLS 1.2 to encrypt network traffic between the client application and Sinch Email infrastructure.
317287

318-
Customer backups are encrypted-in-transit and at rest using strong encryption.
288+
* Sinch Email is alerted to encryption issues through periodic risk assessments and third-party penetration tests. Sinch Email performs third-party penetration tests on an annual basis, or as needed due to changes in the business.
319289

320-
* Badge Check
321-
322-
Sinch Email supports TLS 1.2 to encrypt network traffic between the client application and Sinch Email infrastructure.
323-
324-
* Badge Check
325-
326-
Sinch Email is alerted to encryption issues through periodic risk assessments and third-party penetration tests. Sinch Email performs third-party penetration tests on an annual basis, or as needed due to changes in the business.
327-
328-
* Badge Check
329-
330-
Sinch Email operates a bug bounty program, encouraging the responsible disclosure of vulnerabilities from community researchers.
290+
* Sinch Email operates a bug bounty program, encouraging the responsible disclosure of vulnerabilities from community researchers.
331291

332292

333293
Input Control
334294
-------------
335295

336296
To ensure that it is possible to check and establish whether and by whom personal data have been input into data processing systems, modified or removed:
337297

338-
* Badge Check
339-
340-
Systems are monitored for security events to ensure quick resolution.
298+
* Systems are monitored for security events to ensure quick resolution.
341299

342-
* Badge Check
343-
344-
Logs are centrally stored and indexed. Critical logs, such as security logs, are retained for at least one year. Logs can be traced back to individual unique usernames with timestamps to investigate nonconformities or security events.
300+
* Logs are centrally stored and indexed. Critical logs, such as security logs, are retained for at least one year. Logs can be traced back to individual unique usernames with timestamps to investigate nonconformities or security events.
345301

346302

347303
Availability Control
348304
--------------------
349305

350306
To ensure personal data is protected from accidental destruction or loss:
351307

352-
* Badge Check
353-
354-
Account data is backed up at least daily. Incremental/point-in-time recovery is available for all primary databases. Backups are encrypted-in-transit and at rest using strong encryption.
308+
* Account data is backed up at least daily. Incremental/point-in-time recovery is available for all primary databases. Backups are encrypted-in-transit and at rest using strong encryption.
355309

356-
* Badge Check
310+
* Sinch Email patch management process ensures that systems are patched at least once every month. Monitoring, alerting, and routine vulnerability scanning occurs to ensure that all product infrastructure is patched consistently.
357311

358-
Sinch Email patch management process ensures that systems are patched at least once every month. Monitoring, alerting, and routine vulnerability scanning occurs to ensure that all product infrastructure is patched consistently.
312+
* When necessary, Sinch Email patches infrastructure in an expedited manner in response to the disclosure of critical vulnerabilities to ensure system uptime is preserved.
359313

360-
* Badge Check
361-
362-
When necessary, Sinch Email patches infrastructure in an expedited manner in response to the disclosure of critical vulnerabilities to ensure system uptime is preserved.
363-
364-
* Badge Check
365-
366-
Customer environments are logically separated at all times. Customers are not able to access accounts other than those given authorization credentials for.
314+
* Customer environments are logically separated at all times. Customers are not able to access accounts other than those given authorization credentials for.
367315

368316

369317
Certification/assurance of processes and products
370318
-------------------------------------------------
371319

372320
To ensure internal IT and IT security governance and management as well as assurance of processes and products
373321

374-
* Badge Check
375-
376-
ISO 27001 certification
377-
378-
* Badge Check
379-
380-
ISO 27701 certification
381-
382-
* Badge Check
322+
* ISO 27001 certification
383323

384-
SOC 2 Type 2 report (Mailgun & Mailjet brands only)
324+
* ISO 27701 certification
385325

386-
* Badge Check
326+
* SOC 2 Type 2 report (Mailgun & Mailjet brands only)
387327

388-
SOC 2 Type 1 report (Email on Acid brand only)
328+
* SOC 2 Type 1 report (Email on Acid brand only)
389329

390330

391331
ANNEX 3

0 commit comments

Comments
 (0)