Data Processing Agreement

Last updated: January 1, 2025

Introduction

This Data Processing Agreement ("DPA") describes how IT Strategy Group processes personal data when providing our consulting services. This agreement supplements our Privacy Policy and service agreements.

This DPA applies when we process personal data on behalf of our clients in the course of providing our services.

Definitions

Personal Data

Any information relating to an identified or identifiable natural person.

Data Controller

The entity that determines the purposes and means of personal data processing (typically our client).

Data Processor

The entity that processes personal data on behalf of the Data Controller (IT Strategy Group).

Data Subject

The natural person whose personal data is processed.

Nature and Purpose of Processing

We process personal data solely for the purpose of providing our consulting services, which may include:

  • Digital transformation consulting
  • Platform engineering and development
  • Cloud migration and modernization
  • Systems analysis and optimization
  • Technical documentation and training

Categories of Data Subjects

Depending on the nature of our services, we may process personal data relating to:

  • Client employees and contractors
  • End users of client systems
  • Customer data within client systems
  • Third-party contacts and stakeholders

Types of Personal Data

The categories of personal data we may process include:

  • Identity data (names, titles, contact information)
  • Professional information (job roles, company affiliations)
  • Technical data (IP addresses, system identifiers)
  • Usage data (system logs, analytics data)
  • Communications data (emails, support tickets)

Data Processing Obligations

IT Strategy Group commits to:

  • Process personal data only as instructed by the client
  • Ensure authorized personnel are bound by confidentiality
  • Implement appropriate technical and organizational measures
  • Assist with data subject rights requests
  • Notify clients of any data breaches without undue delay
  • Delete or return data upon completion of services

Security Measures

We implement comprehensive security measures to protect personal data:

Technical Safeguards

  • Encryption in transit and at rest
  • Multi-factor authentication
  • Network security controls
  • Regular security updates and patches
  • Secure development practices

Organizational Measures

  • Access controls and role-based permissions
  • Employee security training
  • Incident response procedures
  • Regular security assessments
  • Vendor security evaluations

Sub-Processors

We may engage sub-processors to assist in providing our services. When we do:

  • We ensure they provide adequate data protection guarantees
  • We impose the same data protection obligations via contract
  • We remain fully liable for sub-processor performance
  • We maintain a list of authorized sub-processors

International Data Transfers

If personal data is transferred outside the jurisdiction where it was collected, we ensure:

  • Appropriate safeguards are in place
  • Standard contractual clauses are implemented
  • Adequacy decisions are respected
  • Client consent is obtained when required

Data Subject Rights

We assist clients in responding to data subject requests, including:

  • Access requests
  • Rectification of inaccurate data
  • Erasure requests
  • Restrictions on processing
  • Data portability requests
  • Objections to processing

Data Breach Notification

In the event of a personal data breach, we will:

  • Notify the client without undue delay (within 72 hours when possible)
  • Provide detailed information about the breach
  • Assist with breach assessment and notification obligations
  • Take immediate steps to contain and remedy the breach
  • Cooperate with regulatory investigations

Data Retention and Deletion

Upon termination of our services, we will:

  • Return or securely delete all personal data as instructed
  • Provide confirmation of data deletion
  • Ensure sub-processors also delete or return data
  • Retain data only if required by law

Audits and Compliance

We support compliance efforts by:

  • Providing documentation of our security measures
  • Allowing reasonable audits and inspections
  • Maintaining records of processing activities
  • Participating in data protection impact assessments

Contact Information

For questions about data processing or to exercise data subject rights, please contact us:

IT Strategy Group - Data Protection

Email: info@itsginfo.com

Website: https://itsginfo.com

Skip to main content