Terms and conditions
Last updated: 28 August 2024
Teamtailor AB, 556936-6668 (“Teamtailor”, “us”, “our” or “we”) welcomes the company registering for use (“you”) of Aboard, our web-based HR platform (“Services”), available through www.aboardhr.com. These terms and conditions, including its referred appendices (together all referred to as “Agreement”) govern the use of the Services, unless you and Teamtailor enter into a separate agreement in writing. Any terms and conditions of any other document issued by you in connection with this Agreement which are in addition to, inconsistent with or different from the terms and conditions of this Agreement are of no force or effect, unless set out in the order form (“Order Form”).
In the event of any conflict or ambiguity between any provisions in this Agreement and any of its appendices, the terms and conditions shall prevail, unless relating to the processing of personal data, when the data processing agreement (“DPA”) shall prevail.
By creating a company account (“Company Account”), you agree to be bound by this Agreement, which constitutes a legally binding agreement between you and Teamtailor. You warrant that you have the legal authority to enter into this Agreement on behalf of the company you are creating an account for (“Company Account”).
Please read this Agreement carefully, before starting to use the Services.
Data Processing Agreement
About and summary
This DPA is part of and subject to the terms of the Agreement. It describes what responsibilities you and Teamtailor have when it comes to processing of Customer Personal Data under the Agreement. In sum, it states that:
We can only use Customer Personal Data to provide the Service to you, as described in the Agreement.
You are responsible for your own compliance with Applicable Data Protection Law when using the Service, and Teamtailor for complying with the parts of Applicable Data Protection Law that apply to a processor / service provider.
We will help you comply with many aspects of Applicable Data Protection Law. You have assessed how Teamtailor will be doing this, and are satisfied with the measures Teamtailor will take.
Specific processes will be used if either party thinks that different aspects of the processing should be updated or changed.
Definitions
These definitions are used:
Applicable Data Protection Law means any law about protecting information about physical persons, which applies to a party’s processing of Customer Personal Data under the Agreement. This can for example include: EU Regulation 2016/679 (GDPR); the UK General Data Protection Regulation (UK GDPR); the UK Data Protection Act of 2018; and/or the California Consumer Privacy Act (CCPA).
Customer Personal Data means data that is (i) subject to Applicable Data Protection Law; (ii) added to the Service by or on behalf of you under the Agreement; and (iii) which Teamtailor is only allowed to process on your behalf. Appendix 1 contains a more detailed description of Customer Personal Data and how it will be processed under the Agreement.
Data Subject Requests means requests from individuals whom Customer Personal Data refers to, to exercise their rights under Applicable Data Protection Law.
EU SCCs means the sets of standard contractual clauses published by the EU Commission on June 4, 2021.
Subprocessor means any processor that Teamtailor uses to process Customer Personal Data.
Supervisory Authority means a public authority that investigates and enforces compliance with an Applicable Data Protection Law.
Third Country Transfer means (i) where the GDPR applies, a transfer of Customer Personal Data to a country, territory or international organization outside of the EU/EEA that is not subject to an adequacy decision by the European Commission; (iii) where the UK GDPR applies, a transfer of Customer Personal Data from the UK to a country, territory or international organization that is not the subject of adequacy regulations under section 17A of the UK Data Protection Act of 2018.
TOMS means the technical and organizational measures that we maintain to make sure that Customer Personal Data is secure when processed in the Service. The TOMS are described in Appendix 2.
UK Transfer Addendum means the International Data Transfer Addendum to the EU SCC, published by the UK Information Commissioner’s Office on March 21, 2022.
Other terms have the meaning given to them in Applicable Data Protection Law. For example, the terms controller, processor, processing, data subject, and personal data breach have the meaning given to them in the GDPR. The terms sell, share, and service provider have the meaning given to them in the CCPA.
Your responsibilities
You decide and control which type of Customer Personal Data is processed in the Service, for which purposes and for how long. For this reason, you are the sole controller of the Customer Personal Data. As the sole controller, you are responsible for:
Making all contractual arrangements necessary for you to be able to act as the sole controller, for example with other entities in your company group.
Ensuring that there is a legal basis for all processing of the Customer Personal Data.
Ensuring that the data subjects get all information they are entitled to under Applicable Data Protection Law, for example through appropriate privacy notices.
Ensuring that the processing of Customer Personal Data otherwise fulfils the requirements in Applicable Data Protection Law.
Providing us with documented instructions on how to process the Customer Personal Data. You have done so by way of this DPA, and the rest of the Agreement.
Our responsibilities
We will act as your processor / service provider, and will not process, sell, retain, use, or disclose Customer Personal Data for any other purpose than providing the Service in accordance with your instructions, as described in this DPA and in the rest of the Agreement.
We will inform you if, in our opinion, instructions given by you infringe Applicable Data Protection Law.
The parties acknowledge and agree that our access to Customer Personal Data is not part of the payment exchanged by the Parties under the Agreement.
Security and confidentiality
You have assessed the risks involved with the processing of the Customer Personal Data in the Service, and concluded that the TOMS ensure a level of security that is appropriate to the risks involved.
We will make sure that all our employees (and similar representatives) who have access to Customer Personal Data commit to keep it confidential.
Personal data breaches
We will notify you about any personal data breach affecting Customer Personal Data. The notice will be sent without undue delay, and at least within 48 hours of Teamtailor becoming aware of the personal data breach. The notice will be sent to the email address that you have provided for your Admins in the Service.
If this information is available to us when sending the notice, the notice will include a description of:
The nature of the breach, i.e. what has happened to the Customer Personal Data.
What parts/type of Customer Personal Data is affected by the breach.
Which categories of data subjects, and approximate number of data subjects, are affected by the breach.
Our assessment of the likely consequences of the breach.
The measures that we have already taken and, if applicable, still plan to take to investigate and address the breach.
If we don’t have all of this information when first notifying you, we will execute the notification in phases - as relevant information becomes available.
If you decide to notify a personal data breach affecting Customer Personal Data to a Supervisory Authority, to the data subjects or the public, you will make reasonable efforts to provide us with advance copies of the notice(s), and give us an opportunity to provide any clarifications or corrections to them.
Subprocessors
We use subprocessors when providing the Service. A continuously up to date overview of the subprocessors we use, the function they perform in the Service, etc. is available in our List of Subprocessors.
You are aware of and instruct us to use the current subprocessors. You generally authorize us to use subprocessors when providing the Service, provided that we notify you before starting to use a new subprocessor or replacing an existing one, so that you can object to the change.
We will notify you about a new / replaced subprocessor, and you can object to the change, using the process for material changes, as described in the Section “Changes to the Services” in the terms and conditions of this Agreement.
In case of extraordinary circumstances, for example a subprocessor’s bankruptcy or irreparable material breach of contract, we reserve the right to replace the relevant subprocessor with a shorter notice period than described above, or without any prior notice to you - but without undue delay. In that case, you can object to the use of the new subprocessor within fourteen (14) calendar days of receiving our notice, as described above. If we aren’t able to solve the issue within fourteen (14) calendar days of your objection, either Party can terminate the Agreement without any cost, penalty or liability.
When engaging a subprocessor, we will make sure that the data protection obligations in this DPA are imposed on the subprocessor. If the subprocessor fails to fulfill these obligations, we will be liable towards you, in accordance with and subject to the limitations in this DPA.
Third Country Transfers
We are only allowed to make Third Country Transfers of Customer Personal Data when the Third Country Transfer is based on your written instruction and is executed in line with the transfer requirements in Applicable Data Protection Law. The transfer can for example be based on:
That the country in which the data importer is based is subject to an adequacy decision recognized by Applicable Data Protection Law.
That the data importer is subject to an adequacy decision recognized by Applicable Data Protection Law, and has fulfilled all additional requirements needed to rely on the adequacy decision - when applicable.
That the data importer enters into the EU SCC or UK Transfer Addendum.
You are aware of and instruct us to perform the Third Country Transfers that take place, or may take place, when we use our current subprocessors. If we notify you of the use of a new subprocessor as described above, and this will or may involve a Third Country Transfer, your continued use of the Service will be considered an instruction on us to execute the relevant Third Country Transfer.
Additional assistance
Provided that we are able to do so, considering the information about and access to Customer Personal Data that we have in providing the Service, we will assist you in:
Providing information relevant for your data protection impact assessment and consultation with a Supervisory Authority.
Keeping a record of the processing activities that we do on your behalf.
Responding to Data Subject Requests.
If you need our assistance with a Data Subject Request or any other process mentioned above, please contact our Customer Support and provide all information we need to understand the scope of the request, and assess what possibilities we have to assist in responding to it.
Audits
We will allow you to audit our compliance with our obligations as your data processor / service provider under the Agreement. This will, as a first option, be done by providing the information and documentation that you reasonably ask for. If you think it’s necessary, we will also allow you (or another party assigned by you, provided that the other party is accepted by us and keeps the information it accesses confidential) to inspect our processing of the Customer Personal Data.
You can request an audit once per year, for which each Party will cover its own costs. Additional audits (exceeding one per year) can also be requested, at your sole cost.
Unless an audit is requested by a Supervisory Authority (in which case the circumstances will be adjusted to the Supervisory Authority’s request), you need to provide written notice thirty (30) days in advance of the audit. The audit will be conducted during our normal business hours. It will not involve physical access to the servers on which the Service is hosted; not involve disclosure of commercially sensitive parts of the agreements with our subprocessors; and must be performed so that it doesn’t compromise the security of our systems or premises.
All audits need to be performed in a way that complies with Applicable Data Protection law. We will immediately inform you if we believe that your instruction in connection with an audit doesn’t fulfil this requirement.
Erasure and return of Customer Personal Data
When the Agreement is terminated, you should - within thirty (30) days of the termination of the Agreement - instruct us to return and/or destroy all Customer Personal Data from the Service. We will comply with this instruction as soon as reasonably practicable, and at least within sixty (60) days of the termination of the Agreement.
If you have not requested erasure or return of the Customer Personal Data within those thirty (30) days, we will delete all Customer Personal Data as soon as reasonably practicable, and at least within sixty (60) days of the termination of the Agreement.
Appendix 1 - Description of the processing
What processing will happen, and for which purposes?
Our Services are intended to be used by employers and employees for managing HR-related matters. Depending on which features and functionalities your Users decide to use from time to time, more granular purposes of processing personal data (such as employee onboarding, offboarding, absence tracking, documenting meetings, and other HR-related administrative tasks) will be relevant for your use of the Service.
We will also process the Customer Personal Data for purposes that are necessary to enable and support your use of the Service, such as logging, troubleshooting and investigating and managing incidents.
Who are the data subjects?
The Service is designed to process the personal data of Users, as defined in the terms and conditions of this Agreement. However, you fully decide and control whose personal data is actually processed in the Service.
What type of personal data will be processed?
The Service is designed to process personal data relevant for your management of your HR-related matters. This generally includes:
User Account information - such as email address and password.
Contact information - such as name, phone number, address, birthday, social security number, photo, employee ID, gender.
Information about individuals’ emergency contacts
Information related to individuals’ position in the organization - such as title, start- and end date, salary, manager, department and location.
Financial information - such as individuals’ salary and benefits.
Information related to individuals’ availability at work, health and family situation - such as planning and documentation of vacation, sick leave and parental leave.
Information related to individuals’ performance and challenges at work - such as notes and evaluations created by the individual’s manager.
Information created through interaction between employees - such as invitations to events, pictures and messages.
Additional types of personal data will be processed if you choose to activate an optional feature, such as the whistleblowing functionality.
However, you fully decide and control what personal data is actually processed in the Service.
For how long will Customer Personal Data be processed?
It is up to you to decide for how long different types of Customer Personal Data should be processed in the Service.
You can block the access to particular Customer Personal Data, and thereby exempt it from being processed for any other purpose than storage. This is done by using the archived mode in the Service.
If you want to delete Customer Personal Data, please contact help@aboardhr.com.
All our processing of Customer Personal Data will stop after the termination of the Agreement, as described under “Erasure and return of Customer Personal Data” in the DPA.
Where will Customer Personal Data be processed?
Teamtailor processes Customer Personal Data in Sweden.
Customer Personal Data will also be processed in the countries reflected in the List of Subprocessors .
Some of our subprocessors are based in a third country, or are the subsidiary of a company based in a third country, as described in greater detail in the Transfer Impact Assessment for Aboard, available on request.
Teamtailor will only make Third Country Transfers of the Customer Personal Data as described under “Third Country Transfers” in the main text of the DPA.
Appendix 2 - TOMS
The following document contains TOMs as implemented by the Supplier.
Measures to Ensure Confidentiality (Art. 32 para. 1 lit. b of the GDPR)
Physical access control
Personal Data is stored in physical data centers certified according to ISO 27001.
Physical access to the data center facilities is strictly controlled and limited to selected staff at the hosting provider.
Protection against environmental hazards such as heat, fire and water damage is in place.
There is no unauthorized physical access to data centers.
Logical access control
Logical access controls are designed to manage access to information and system functionality based on authority levels and job functions (granting access on a need-to-know and least privilege basis).
Supplier’s staff have unique IDs and passwords, MFA is used where possible
Granted system access is reviewed regularly and access is revoked/changed when employment terminates or changes in job functions occur.
The Supplier’s staff do not access or interact with customer data as part of normal operations.
Access is restricted to selected staff.
All endpoint devices use strong passwords, local firewalls, automatic time based locking and encrypted storage.
Separation of control
Personal Data is processed in dedicated systems that are not shared with other services, applications, or corporate entities.
Production and test environments are separated and do not share any data.
Within individual databases, data is segregated with logical access control.
Personal Data is not used for purposes other than what it has been collected for.
Human resource security
All employees and contractors are bound by confidentiality, non-disclosure provisions and undergo continuous security awareness training. Onboarding, offboarding procedures are in place. Segregation of duties is applied where it is practically possible.
Measures to Ensure integrity (Art. 32 para. 1 lit. b of the GDPR)
Transfer control
All communication, over the internet and on internal networks, are encrypted with at least TLS version 1.2.
Data stored in the Supplier application is encrypted at rest with at least file-system level encryption.
Sensitive data is encrypted with AES-256 encryption on application level before being stored in the database.
Change management
Change management procedures and tracking mechanisms are in place to test, approve and track all material changes to the Supplier’s platform.
Code deploys are automatically blocked if known vulnerabilities are found in code components used by the Supplier’s platform and/or if unsecure code patterns in the Suppliers code is identified.
All changes are peer reviewed.
System monitoring
Application and infrastructure events are logged, monitored and automatically analysed to record and detect divergent user access and system activity.
Logs are protected from loss and manipulation.
Measures to Ensure Availability and Resilience (Art. 32 para. 1 lit. b of the GDPR)
Resilience
The Supplier’s infrastructure and components are designed to withstand intermittent and as well as high constant loads.
Vulnerability screening, patch management and anti-malware protection are implemented to prevent, identify and mitigate against identified security threats, viruses and other malicious code.
Measures to Quickly Restore the Availability of Personal Data after a Physical or Technical Incident (Art. 32 para. 1 lit. c of the GDPR)
Disaster recovery plan
Disaster recovery plans are designed to maintain service and/or recovery from foreseeable emergencies or disasters.
Backups are stored off-site and encrypted.
Restore tests are done at least every 6 months.
Incident management
Incident management procedures are in place to ensure a systematic approach to identify, mitigate, learn and report incidents related to our technology and information assets.
Procedures for periodical review, assessment, and evaluation (Art. 32 para. 1 lit. d of the GDPR; Art. 25 para. 1 of the GDPR)
The Supplier runs an information security program with dedicated staff responsible for the development, implementation and maintenance of the program.
Information risk assessments are used to systematically evaluate threats and vulnerabilities in terms of the impact they could imply and the probability to occur. Such assessments are performed at least annually or at major business changes.