Effective Date: Jan 1, 2023
Last Updated on: Feb 28, 2025
The Unified Controllership Platform is a platform provided by Consark to enable finance teams to be at the forefront of business. The Unified Controllership Platform (“UCP software application”), a software application, is an intelligent platform for professional services automation and comprises simple workflows, insightful analytics, and customisable dashboards. Among other features, the Unified Controllership Platform includes a range of tools for the Chief Compliance Officers, Chief Accounting Officers, Financial Controllers, Chief Financial/Executive Officers to perform various functions including, but not limited to, compliance (direct tax, indirect tax), accounting (reliable and intelligent reporting of financial book closure, accounting reconciliations – AR/AP, GAAP compliance), risk (a virtual controls management framework for risk assurance management – IcoFR/SOX, process assurance management, controllership bots, data workflows) and transactions (valuations, due diligences, transaction support, deal advisory – fund raise/M&A) (“Services”). By using the website www.consark.ai (“Consark website”) and/or the Unified Controllership Platform software application and the Services associated with it, You are agreeing to be bound by the following terms and conditions (“Terms of Use & Service”).
The Consark website and the UCP software application are the property of Consark. By using the Consark website and/or the UCP software application, You agree to these Terms of Use & Service, if You do not agree, do not use the website and/or the software application. Any new features or tools which are added to the current UCP software application and/or Services will also be subject to the Terms of Use & Service.
As used in these Terms of Use & Service, “we”, “us”, “our” and “Consark” means Consark Inc., Consark LLP, Consark Advisory Services LLP or any of its affiliates or subsidiaries, and “You” means the Consark User, i.e., Consark’s customer (company/entity) as well as the person(s) authorised by Consark’s customer for using the Consark website and/or the UCP software application and its associated Services.
Consark reserves the right, at its sole discretion, to change, modify, add, or remove portions of these Terms of Use & Service, at any time. It is Your responsibility to check these Terms of Use & Service periodically for changes. Your continued use of the Consark website and the UCP software application following the posting of changes will mean that You accept and agree to the changes. As long as You comply with these Terms of Use & Service, Consark grants You a personal, non-exclusive, non-transferable, limited privilege to use the Consark website and the UCP software application.
This Terms of Use & Service shall coexist with the End User License Agreement (EULA), which can be found at https://new.consark.ai/policies/eula.
- ACCOUNT TERMS
- To access and use the UCP software application and the Services associated with it, You must register a Consark account (“Account”). To complete Your Account registration, You must provide us with Your name, contact number, postal address, and a valid email address. Consark’s customer and the person(s) authorised by Consark’s customer will individually as well as collectively be the contracting party(ies) for the purposes of this Terms of Use & Service. The person authorised by the customer will be the authorised user to use the corresponding Account and access rights to the said user are given based on the customer’s instructions to Consark. There may be multiple users for the same customer, with different or the same access rights, hence multiple Accounts can be created for the same customer. It is Your responsibility to ensure that every Account created is only used by the corresponding user and not by anyone else, and that such use is lawful and responsible.
- You acknowledge that for the provision of certain Services, Consark’s employees may also have to be added as users to your Account. You provide your express consent towards the addition of Consark’s employees to your Account when the need demands.
- You acknowledge that Consark will use Your email address as the primary method of communication with You. You must monitor the email address You provide to Consark and the email address must be capable of both sending and receiving messages. Your email communications with Consark can only be authenticated if they come from Your registered email address, therefore, should there be any change in the use of Your email address, You should update such change with Consark and provide Your new email address accordingly.
- Consark stores Your password in an encrypted format. You are responsible for keeping Your password secure. Consark cannot and will not be liable for any loss or damage from Your failure to maintain the security of Your Account and password.
- You agree not to reproduce, duplicate, copy, sell, resell, or exploit any portion of the Consark website, UCP software application, and Service, use of the Consark website, UCP software application, and Services, or access to the Consark website, UCP software application, and Services, without the express written permission of Consark. You also agree not to cache our displayed data in any form. You agree not to access the Consark website, UCP software application, and Services or monitor any material or information from the Consark website, UCP software application, and Services using any robot, spider, scraper, or other automated means. You may also not tamper with or circumvent any security technology included with the Consark website, UCP software application, and Services. Violation of this Clause will result in immediate Account termination.
- PRIVACY
- Your use of our Services is subject to Consark’s Privacy Policy, which is available at https://new.consark.ai/policies/privacypolicy.
- RULES GOVERNING USAGE OF SERVICES
- The Consark website and UCP software application are provided “AS IS”. Except where prohibited in these Terms of Use & Service or by applicable law, we reserve the right to modify the Services or any part thereof for any reason, without notice and at any time.
- You shall be solely responsible for Your use of the UCP software application and shall use the UCP software application lawfully and responsibly.
- Consark does not pre-screen the materials uploaded/stored by You in our server or the materials obtained by You from Your clients/customers/contacts through the Information workflow feature of the UCP software application that you then store in our server. Therefore, You agree to defend, indemnify and hold harmless Consark and its affiliates, directors and employees, against any and all damages, actions, proceedings, claims, demands, costs, losses, liabilities, expenses, etc., arising out of Your use, uploading, and/or storage of Your materials and/or Your clients’/customers’/contacts’ materials in the UCP software application and its associated servers, including any infringement or breach of trust or contract caused by such action of Yours.
- You acknowledge that when using the Information workflow feature of the UCP software application seeking for information/files/documents from a requestee, the requestee is sent an email on the email address provided by You to Consark and the said email comprises of the link to access the UCP software application wherein the requested information/files/documents can be uploaded. You further acknowledge that the said link to access the UCP software application by the requestee is not password protected and therefore You agree to take entire responsibility to keep the link safe. You represent and warrant that You shall be responsible for providing the accurate email address of the requestee to Consark and that should there be any untoward disclosure of information and/or breach in security of the information, You shall defend, indemnify and hold harmless Consark and its affiliates, directors and employees against any and all damages, actions, proceedings, claims, demands, costs, losses, liabilities, expenses, etc., arising out of the same.
- You acknowledge that the UCP software application provides You the option of either using its servers for storage of Your/Your clients’/customers’/contacts’ information or the option of linking Your personal cloud storage platform to the UCP software application whereby the information collected can be stored directly in your personal cloud storage drive. You agree that in the latter case, Consark does not have any liability as regards loss or misuse of data, or regards the security of the data stored.
- You acknowledge and agree that the nature of information and/or document/file collected by You using the Information workflow feature of the UCP software application and subsequently stored by You, either on Consark’s servers or Your personal cloud storage platform, is solely at Your discretion without Consark having any knowledge, influence or involvement whatsoever in the matter, and therefore, You undertake to be responsible, lawful and collect and store only relevant and legal information/data as may be expedient and necessary. You agree to defend, indemnify and hold harmless Consark, its affiliates, directors and employees against any and all damages, actions, proceedings, claims, demands, costs, losses, liabilities, expenses, etc., arising from Your breach of the aforesaid.
- Consark reserves the right to provide our Services to Your competitors and makes no promise of exclusivity. You further acknowledge and agree that Consark’s employees and contractors may also be Consark Users and that they may compete with You, although they may not use Your Confidential Information (as defined in Clause 5) in doing so.
- In the event of a dispute regarding Account ownership, we reserve the right to request documentation to determine or confirm Account ownership. Documentation may include, but is not limited to, a government issued photo ID or confirmation of Your status as an employee of the entity.
- You may neither use the Consark website, UCP software application, and Services for any illegal or unauthorised purpose nor may You, in the use of the aforementioned, violate any laws in Your jurisdiction.
- You acknowledge that Consark may monitor Your activities on the Consark website and/or UCP software application through plugins at Consark’s discretion, in accordance with applicable laws, and You consent to such monitoring. In addition, upon notice from Consark, You shall provide Consark with such information, access, and assistance as we may reasonably require.
- PAYMENT TERMS
- Payment terms are governed by the agreement entered into between Consark and you.
- Consark may require a valid payment method on file with us in future, to pay for all incurred and recurring fees. You agree to allow Consark to charge applicable fees to any valid payment method that You authorise until the Term of the UCP software application and/or Services is terminated and any and all outstanding fees have been paid in full.
- For the avoidance of doubt, all sums payable by You to Consark under these Terms of Use & Service will be paid free and clear of any deductions or withholdings whatsoever. Other than Taxes charged by Consark to You and remitted to the appropriate tax authorities on Your behalf, any deductions or withholdings that are required by law will be borne by You and paid separately to the relevant taxation authority. Consark will be entitled to charge the full amount of fees stipulated under these Terms of Use & Service to Your authorised payment method ignoring any such deduction or withholding that may be required.
- Consark reserves our right to not provide any refunds.
- CONFIDENTIALITY
- “Confidential Information” will include, but will not be limited to, any and all information associated with a party’s business and not publicly known, including specific business information, technical processes and formulas, software, customer lists, prospective customer lists, names, addresses and other information regarding customers and prospective customers, product designs, sales, costs (including any relevant processing fees), price lists, and other unpublished financial information, business plans and marketing data, and any other confidential and proprietary information, whether or not marked as confidential or proprietary. Consark’s Confidential Information includes all information that You receive relating to us, or to the Services, that is not known to the general public including information related to our security program and practices.
- Each party agrees to use the other party’s Confidential Information solely as necessary for performing its obligations under these Terms of Use & Service and in accordance with any other obligations in these Terms of Use & Service including this Clause 5. Each party agrees that it will take all reasonable steps, at least substantially equivalent to the steps it takes to protect its own proprietary information, to prevent the duplication, disclosure or use of any such Confidential Information, other than (i) by or to its employees, agents and subcontractors who must have access to such Confidential Information to perform such party’s obligations hereunder, who each will treat such Confidential Information as provided herein, and who are each subject to obligations of confidentiality to such party that are at least as stringent as those contained herein; or (ii) as required by any law, regulation, or order of any court of proper jurisdiction over the parties and the subject matter contained in these Terms of Use & Service, provided that, if legally permitted, the receiving party will give the disclosing party prompt written notice and use commercially reasonable efforts to ensure that such disclosure is accorded confidential treatment. Confidential Information will not include any information that the receiving party can prove: (A) was already in the public domain, or was already known by or in the possession of the receiving party, at the time of disclosure of such information; (B) is independently developed by the receiving party without use of or reference to the other party’s Confidential Information, and without breaching any provisions of these Terms of Service; or (C) is thereafter rightly obtained by the receiving party from a source other than the disclosing party without breaching any provision of these Terms of Service.
- LIMITATION OF LIABILITY AND INDEMNIFICATION
- You expressly understand and agree that, to the extent permitted by applicable laws, Consark and its suppliers will not be liable for any direct, indirect, incidental, special, consequential or exemplary damages, including but not limited to, damages for loss of profits, goodwill, use, data or other intangible losses arising out of or relating to the use of or inability to use the Consark website, UCP software application, Service or these Terms of Use & Service (however arising, including negligence).
- You agree to indemnify and hold us and (as applicable) our parent, subsidiaries, affiliates, officers, directors, agents, and employees, harmless from any claim or demand, including reasonable attorneys’ fees, made by any third party due to or arising out of (a) Your breach of these Terms of Use & Service or the documents it incorporates by reference (including the EULA and Privacy Policy); (b) or Your violation of any law or the rights of a third party; or (c) any aspect of the transaction between You and a third party or authority, including but not limited to fraudulent transactions, alleged or actual violation of applicable laws, or Your breach of the Terms of Use & Service.
- You will be responsible for any breach of the Terms of Use & Service by Your affiliates, agents, colleagues, employees, or subcontractors and will be liable as if it were Your own breach.
- Your use of the Consark website, UCP software application and its associated Services is at Your sole risk. The Consark website, UCP software application and its associated Services are provided on an “as is” and “as available” basis without any warranty or condition, express, implied, or statutory.
- Consark does not warrant that the Consark website, UCP software application and its associated Services will be uninterrupted, timely, secure, or error-free.
- Consark does not warrant that the results that may be obtained from the use of the Consark website, UCP software application and its associated Services will be accurate or reliable.
- Consark does not warrant that the Consark website, UCP software application and its associated Services will meet Your expectations, or that any errors in the Services will be corrected.
- INTELLECTUAL PROPERTY AND OWNERSHIP
- Consark owns all right, title, and interest in and to the Consark website, UCP software application and its associated Services and all related technology and intellectual property rights. Subject to the terms of this Terms of Use & Service and the EULA, Consark grants to You a limited, royalty-free, revocable, non-exclusive, non-sublicensable, non-transferrable license to download/install/use (where applicable) the Consark website, UCP software application and its associated Services during the Term. Solely to the extent that applicable law requires the exercise of intellectual property rights owned by Consark or its licensors for You to access or use the Consark website, UCP software application and its associated Service, Consark grants to You a limited, royalty-free, revocable, non-exclusive, non-sublicensable and non-transferrable license to exercise such intellectual property rights subject to the terms of this Terms of Use & Service and EULA, during the Term.
- You will not use the Consark website, UCP software application or its associated Services in any manner or for any purpose other than as expressly permitted by this Terms of Use & Service and EULA. You will not and/or will not attempt to (a) modify, distribute, alter, tamper with, repair, or otherwise create derivative works of the Consark website, UCP software application or its associated Services, or (b) sublicense the Consark website, UCP software application or its associated Services. These license restrictions will continue to apply following the termination of Your use of the UCP software application and its associated Services.
- Consark acknowledges that You are the owner of the materials You upload onto the Services. We do not claim any ownership in the materials You upload, however, we do require a license to those materials. You accordingly grant Consark a non-exclusive, transferable, sub-licensable, royalty-free, worldwide right and license to host, run, copy, store, reproduce, make available, display, and translate, the materials provided by You in connection with the Services. You represent, warrant, and agree that You have all necessary rights in the materials to grant this license.
- You agree that Consark can, at any time, review and delete any or all of the materials submitted by You to the UCP software application and its associated Services, although Consark is not obligated to do so.
- TERM AND TERMINATION
- The term of these Terms of Use & Service will begin on the date of Your completed registration for use of the Services and continue until terminated by us or by You, as provided below (the “Term”).
- You may delete Your Account and terminate the Terms of Use & Service at any time by writing to us from your registered email address.
- Without limiting any other remedies, we may suspend or terminate Your Account or the Terms of Use & Service for any reason, without notice and at any time (unless otherwise required by law), including if we suspect that You are in breach of the terms of this Terms of Use & Service. Termination of the Terms of Use & Service will be without prejudice to any rights or obligations which arose prior to the date of termination.
- Upon termination of the Services by either party for any reason:
- Consark will cease providing You access to the UCP software application and also cease providing You with the Services and You will no longer be able to access Your Account;
- unless otherwise provided in the Terms of Use & Service, You will not be entitled to any refunds of any fees, pro rata or otherwise;
- any outstanding balance owed to Consark for Your use of the UCP software application and its associated Services through the effective date of such termination will immediately become due and payable in full; and
- Your account will be permanently deleted including all the information and data You have provided, from the UCP software application.
This Data Processing Agreement (“DPA”) forms part of the Terms of Use & Service (“Agreement”) between a Customer (as defined in the Agreement) and “Consark.ai Inc.” under which the Processor provides the Controller with the software and services (the “Services”). The Controller and the Processor are individually referred to as a “Party” and collectively as the “Parties”.
The Parties seek to implement this DPA to comply with the requirements of EU GDPR (defined hereunder) in relation to Processor’s processing of Personal Data (as defined under the EU GDPR) as part of its obligations under the Agreement.
This DPA shall apply to Processor’s processing of Personal Data, provided by the Controller as part of Processor’s obligations under the Agreement.
Except as modified below, the terms of the Agreement shall remain in full force and effect.
- Definitions
Terms not otherwise defined herein shall have the meaning given to them in the EU GDPR or the Agreement. The following terms shall have the corresponding meanings assigned to them below:
- “Data Transfer” means a transfer of the Personal Data from the Controller to the Processor, or between two establishments of the Processor, or with a Sub-processor by the Processor.
- “EU GDPR” means the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (General Data Protection Regulation).
- “Standard Contractual Clauses” means the contractual clauses attached hereto as Schedule 1 pursuant to the European Commission’s Implementing Decision (EU) 2021/914 of 4 June 2021 on Standard Contractual Clauses for the transfer of Personal Data to processors established in third countries which do not ensure an adequate level of data protection.
- “Controller” means the natural or legal person, public authority, agency, or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be provided for by Union or Member State law.
- “Processor” means a natural or legal person, public authority, agency, or other body which processes personal data on behalf of the controller.
- “Sub-processor” means a processor/ sub-contractor appointed by the Processor for the provision of all or parts of the Services and Processes the Personal Data as provided by the Controller.
- Purpose of this Agreement
This DPA sets out various obligations of the Processor in relation to the Processing of Personal Data and shall be limited to the Processor’s obligations under the Agreement. If there is a conflict between the provisions of the Agreement and this DPA, the provisions of this DPA shall prevail.
- Categories of Personal Data and Data Subjects
The Controller authorizes permission to the Processor to process the Personal Data to the extent of which is determined and regulated by the Controller. The current nature of the Personal Data is specified in Annex I to Schedule 1 to this DPA.
- Purpose of Processing
The objective of Processing of Personal Data by the Processor shall be limited to the Processor’s provision of the Services to the Controller and or its Client, pursuant to the Agreement.
- Duration of Processing
The Processor will Process Personal Data for the duration of the Agreement, unless otherwise agreed upon in writing by the Controller.
- Data Controller’s Obligations
- The Data Controller shall warrant that it has all necessary rights to provide the Personal Data to the Data Processor for the Processing to be performed in relation to the agreed services. To the extent required by Data Privacy Laws, Data Controller is responsible for ensuring that it provides such Personal Data to Data Processor based on an appropriate legal basis allowing lawful processing activities, including any necessary Data Subject consents to this Processing are obtained, and for ensuring that a record of such consents is maintained. Should such consent be revoked by the Data Subject, the Data Controller is responsible for communicating the fact of such revocation to the Data Processor.
- The Data Controller shall provide all natural persons from whom it collects Personal Data with the relevant privacy notice.
- The Data Controller shall request the Data Processor to purge Personal Data when required by the Data Controller or any Data Subject whom it collects Personal Data unless the Data Processor is otherwise required to retain the Personal Data by applicable law.
- The Data Controller shall immediately advise the Data Processor in writing if it receives or learns of any:
- Complaint or allegation indicating a violation of Data Privacy Laws regarding Personal Data;
- Request from one or more individuals seeking to access, correct, or delete Personal Data;
- Inquiry or complaint from one or more individuals relating to the collection, processing, use, or transfer of Personal Data; and
- Any regulatory request, search warrant, or other legal, regulatory, administrative, or governmental process seeking Personal Data
- Data Processor’s Obligations
- The Processor will follow written and documented instructions received, including email, from the Controller, its affiliate, agents, or personnel, with respect to the Processing of Personal Data (each, an “Instruction”).
- The Processing described in the Agreement and the relating documentation shall be considered as Instruction from the Controller.
- At the Data Controller’s request, the Data Processor will provide reasonable assistance to the Data Controller in responding to/ complying with requests/ directions by Data Subject in exercising their rights or of the applicable regulatory authorities regarding Data Processor’s Processing of Personal Data.
- In relation to the Personal Data, Data Processor shall obtain consent (where necessary) and/or provide notice to the Data Subject in accordance with Data Protection Laws to enable shared Personal Data to be provided to, and used by, the other Party as contemplated by this Agreement.
- Where shared Personal Data is transferred outside the Data Processor’s territorial boundaries, the transferor shall ensure that the recipient of such data is under contractual obligations to protect such Personal Data to the same or higher standards as those imposed under this Addendum and the Data Protection Laws.
- The processor shall inform the controller if, in its opinion, a processing instruction infringes applicable legislation or regulation.
- As A Data Processor, taking into account the nature of the processing and the information available to the Data Processor, the Data Processor shall assist the data controller in conducting any necessary Data Protection Impact Assessments (DPIAs), as required under GDPR.
- Data Secrecy
- To Process the Personal Data, the Processor will use personnel who are
- Informed of the confidential nature of the Personal Data, and
- Perform the Services in accordance with the Agreement.
- The Processor will regularly train individuals having access to Personal Data in data security and data privacy in accordance with accepted industry practice and shall ensure that all the Personal Data is kept strictly confidential.
- The Processor will maintain appropriate technical and organizational measures for protection of the security, confidentiality, and integrity of the Personal Data as per the specifications as per the standards mutually agreed in writing by the Parties.
- To Process the Personal Data, the Processor will use personnel who are
- Audit Rights
- Upon Controller’s reasonable request, the Processor will make available to the Controller, information as is reasonably necessary to demonstrate Processor’s compliance with its obligations under the EU GDPR or other applicable laws in respect of its Processing of the Personal Data.
- When the Controller wishes to conduct the audit (by itself or through a representative) at Processor’s site, it shall provide at least fifteen (21) days’ prior written notice to the Processor; the Processor will provide reasonable cooperation and assistance in relation to audits, including inspections, conducted by the Controller or its representative.
- The Controller shall bear the expense of such an audit.
- Mechanism of Data Transfers
Any Data Transfer for the purpose of Processing by the Processor in a country outside the European Economic Area (the “EEA”) shall only take place in compliance as detailed in Schedule 1 to the DPA. Where such model clauses have not been executed at the same time as this DPA, the Processor shall not unduly withhold the execution of such template model clauses, where the transfer of Personal Data outside of the EEA is required for the performance of the Agreement.
- Sub-processors
- The Controller acknowledges and agrees that the Processor, may engage a third-party Sub-processor(s) in connection with the performance of the Services, provided such Sub-processor(s) take technical and organizational measures to ensure confidentiality of Personal Data shared with them; The current Sub-processors engaged by the Processors and approved by the Controller are listed in Annex III of Schedule 1 hereto. The processor shall notify the controller at least thirty (30) calendar days in advance of any intended changes or additions to its Sub-processors listed in Annex III by emailing notice of the intended change to Customer. In accordance with Article 28(4) of the GDPR, the Processor shall remain liable to Controller for any failure on behalf of a Sub-processor to fulfil its data protection obligations under the DPA in connection with the performance of the Services.
- If the Controller has a concern that the Sub-processor(s) Processing of Personal Data is reasonably likely to cause the Controller to breach its data protection obligations under the GDPR, the Controller may object to Processor’s use of such Sub-processor and the Processor and Controller shall confer in good faith to address such concern.
- Personal Data Breach Notification
- The Processor shall maintain defined procedures in case of a Personal Data Breach (as defined under the GDPR) and shall without undue delay notify Controller if it becomes aware of any Personal Data Breach unless such Data Breach is unlikely to result in a risk to the rights and freedoms of natural persons.
- The Processor shall provide the Controller with all reasonable assistance to comply with the notification of Personal Data Breach to Supervisory Authority and/or the Data Subject, to identify the cause of such Data Breach and take such commercially reasonable steps as reasonably required to mitigate and remedy such Data Breach.
- No Acknowledgement of Fault by Processor. Processor’s notification of or response to a Personal Data Breach under this DPA will not be construed as an acknowledgement by Processor of any fault or liability with respect to the data incident.
- Return and Deletion of Personal Data
- The Processor shall at least thirty (30) days from the end of the Agreement or cessation of the Processor’s Services under the Agreement, whichever occurs earlier, shall return to the Controller all the Personal Data, or if the Controller so instructs, the Processor shall have the Personal Data deleted. The Processor shall return such Personal Data in a commonly used format or in the current format in which it was stored at discretion of the Controller, soon as reasonably practicable following receipt of Controller’s notification.
- In any case, the Processor shall delete Personal Data including all the copies of it as soon as reasonably practicable following the end of the Agreement.
- Technical and Organizational Measures
Having regard to the state of technological development and the cost of implementing any measures, the Processor will take appropriate technical and organizational measures against the unauthorized or unlawful processing of Personal Data and against the accidental loss or destruction of, or damage to, Personal Data to ensure a level of security appropriate to: (a) the harm that might result from unauthorized or unlawful processing or accidental loss, destruction or damage; and (b) the nature of the data to be protected [including the measures stated in Annex II of Schedule 1]
SCHEDULE 1
ANNEX I
- LIST OF PARTIES
Data exporter(s):
- Name : Customer (As set forth in the relevant Order Form).
Address: As set forth in the relevant Order Form.
Contact person’s name, position, and contact details: As set forth in the relevant Order Form.
Activities relevant to the data transferred under these Clauses: Recipient of the Services provided by Consark.ai Inc. in accordance with the Agreement.
Signature and date: Signature and date are set out in the Agreement.
Role Controller/ Processor): Controller
Data importer(s):
- Name:Consark.ai Inc.
Address: #447 Broadway, 2ⁿᵈ Floor Suite #11, New York, NY 10013, USA
Contact person’s name, position, and contact details: Anand Krishnakumar, Data Protection Officer, reachable at security at Consark dot ai
Activities relevant to the data transferred under these Clauses: Provision of the Services to the Customer in accordance with the Agreement.
Signature and date: Signature and date are set out in the Agreement.
Role (controller/processor): Processor.
- DESCRIPTION OF TRANSFER
- Categories of data subjects whose personal data is transferred
- Customer’s authorized users of the Services.
Categories of personal data transferred
- Name, Address, Date of Birth, Age, Education, Email, Gender, Image, Job, Language, Phone, Related person, Related URL, User ID, Username.
Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialized training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.
- No sensitive data collected.
The frequency of the transfer (e.g., whether the data is transferred on a one-off or continuous basis).
- Continuous basis
Nature of the processing
Processing of data in accordance with services rendered
Purpose(s) of the data transfer and further processing
The purpose of the transfer is to facilitate the performance of the Services more fully described in the Agreement and accompanying order forms.
The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period
The period for which the Customer Personal Data will be retained is more fully described in the Agreement, Addendum, and accompanying order forms.
For transfers to (sub-) processors, also specify subject matter, nature, and duration of the processing
- The subject matter, nature, and duration of the Processing more fully described in the Agreement, Addendum, and accompanying order forms.
- COMPETENT SUPERVISORY AUTHORITY
- Data exporter is established in an EEA country.
- The competent supervisory authority is as determined by application of Clause 13 of the EU SCCs.
ANNEX II
TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA
Description of the technical and organisational security measures implemented by Consark.ai Inc. as the data processor/data importer to ensure an appropriate level of security, taking into account the nature, scope, context, and purpose of the processing, and the risks for the rights and freedoms of natural persons.
- Security
- Security Management System.
- Organization. Consark.ai Inc. designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program.
- Policies. Management reviews and supports all security related policies to ensure the security, availability, integrity and confidentiality of Customer Personal Data. These policies are updated at least once annually.
- Assessments. Consark.ai Inc. engages a reputable independent third-party to perform risk assessments of all systems containing Customer Personal Data at least once annually.
- Risk Treatment. Consark.ai Inc. maintains a formal and effective risk treatment program that includes penetration testing, vulnerability management and patch management to identify and protect against potential threats to the security, integrity or confidentiality of Customer Personal Data.
- Vendor Management. Consark.ai Inc. maintains an effective vendor management program
- Incident Management. Consark.ai Inc. reviews security incidents regularly, including effective determination of root cause and corrective action.
- Standards. Consark.ai Inc. operates an information security management system that complies with the requirements of SOC II and ISO/IEC 27001:2022 standards.
- Personnel Security.
- Consark.ai Inc. personnel are required to conduct themselves in a manner consistent with the company’s guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. Consark.ai Inc. conducts reasonably appropriate background checks on any employees who will have access to client data under this Agreement, including in relation to employment history and criminal records, to the extent legally permissible and in accordance with applicable local labor law, customary practice and statutory regulations.
- Personnel are required to execute a confidentiality agreement in writing at the time of hire and to protect Customer Personal Data at all times. Personnel must acknowledge receipt of, and compliance with, Consark.ai Inc.’s confidentiality, privacy and security policies. Personnel are provided with privacy and security training on how to implement and comply with the Information Security Program. Personnel handling Customer Personal Data are required to complete additional requirements appropriate to their role (e.g., certifications). Consark.ai Inc.’s personnel will not process Customer Personal Data without authorization.
- Access Controls
- Access Management. Consark.ai Inc. maintains a formal access management process for the request, review, approval and provisioning of all personnel with access to Customer Personal Data to limit access to Customer Personal Data and systems storing, accessing or transmitting Customer Personal Data to properly authorized persons having a need for such access. Access reviews are conducted periodically to ensure that only those personnel with access to Customer Personal Data still require it.
- Infrastructure Security Personnel. Consark.ai Inc. has, and maintains, a security policy for its personnel, and requires security training as part of the training package for its personnel. Consark.ai Inc.’s infrastructure security personnel are responsible for the ongoing monitoring of Consark.ai Inc.’s security infrastructure, the review of the Services, and for responding to security incidents.
- Access Control and Privilege Management. Consark.ai Inc.’s and Customer’s administrators and end users must authenticate themselves via a Multi-Factor authentication system or via a single sign on system in order to use the Services
- Internal Data Access Processes and Policies – Access Policy. Consark.ai Inc.’s internal data access processes and policies are designed to protect against unauthorized access, use, disclosure, alteration or destruction of Customer Personal Data. Consark.ai Inc. designs its systems to only allow authorized persons to access data they are authorized to access based on principles of “least privileged” and “need to know”, and to prevent others who should not have access from obtaining access. Consark.ai Inc. requires the use of unique user IDs, strong passwords, two factor authentication and carefully monitored access lists to minimize the potential for unauthorized account use. The granting or modification of access rights is based on: the authorized personnel’s job responsibilities; job duty requirements necessary to perform authorized tasks; a need to know basis; and must be in accordance with Consark.ai Inc.’s internal data access policies and training. Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for accountability. Where passwords are employed for authentication (e.g., login to workstations), password policies follow industry standard practices. These standards include password complexity, password expiry, password lockout, restrictions on password reuse and re-prompt for password after a period of inactivity
- Data Center and Network Security
- Data Centers.
- Infrastructure. Consark.ai Inc. has AWS & Microsoft Azure as its data centers.
- Resiliency. Multi Availability Zones are enabled on AWS & Microsoft Azure and Consark.ai Inc. conducts Backup Restoration Testing on regular basis to ensure resiliency.
- Server Operating Systems. Consark.ai Inc.’s servers are customized for the application environment and the servers have been hardened for the security of the Services. Consark.ai Inc. employs a code review process to increase the security of the code used to provide the Services and enhance the security products in production environments.
- Disaster Recovery. Consark.ai Inc. replicates data over multiple systems to help to protect against accidental destruction or loss. Consark.ai Inc. has designed and regularly plans and tests its disaster recovery programs.
- Security Logs. Consark.ai Inc.’s systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into, Consark.ai Inc.’s systems.
- Vulnerability Management. Consark.ai Inc. performs regular vulnerability scans on all infrastructure components of its production and development environment. Vulnerabilities are remediated on a risk basis, with Critical, High and Medium security patches for all components installed as soon as commercially possible.
- Data Centers.
- Networks and Transmission.
- Data Transmission. Transmissions on production environment are transmitted via Internet standard protocols.
- External Attack Surface. AWS Security Group which is equivalent to virtual firewall is in place for Production environment on AWS. Similar Microsoft Defender service is in place for & Microsoft Azure.
- Incident Response. Consark.ai Inc. maintains incident management policies and procedures, including detailed security incident escalation procedures. Consark.ai Inc. monitors a variety of communication channels for security incidents, and Consark.ai Inc.’s security personnel will react promptly to suspected or known incidents, mitigate harmful effects of such security incidents, and document such security incidents and their outcomes.
- Encryption Technologies. Consark.ai Inc. makes HTTPS encryption (also referred to as SSL or TLS) available for data in transit.
- Data Storage, Isolation, Authentication, and Destruction. Consark.ai Inc. stores data in a multi-tenant environment on AWS servers. Data, the Services database and file system architecture are replicated between multiple availability zones on AWS & Microsoft Azure. Consark.ai Inc. logically isolates the data of different customers. A central authentication system is used across all Services to increase uniform security of data. Consark.ai Inc. ensures secure disposal of Client Data through the use of a series of data destruction processes.
- Security Management System.
ANNEX III
LIST OF SUB-PROCESSORS
The controller has authorized the use of the following sub-processors:
Name of Sub- Processor | Description of Processing | Location of Other Processor |
Amazon Web Services | Hosting the Production Environment | US & India |
Microsoft Azure | Hosting the Staging Environment | US & India |