EXHIBIT D – INFORMATION SECURITY
1. DEFINITIONS
1.1 For the purposes of this Exhibit and unless the context provides otherwise, capitalized terms used shall have the meanings given below:
“Access” means with respect to Jumio Personnel, actual access to any Customer premises, systems, Customer Data or other information, property or assets of Customer or its Affiliates, whether by physical presence or by any electronic means;
“Customer Confidential Information” means the Confidential Information belonging to Customer or its Affiliates;
“Customer Data” means all Customer Confidential Information, User Information and all other data, records, files, content or information, in any form or format accessed, collected, received, stored or maintained by Jumio or any of its Affiliates from or on behalf of Customer or any of its Affiliates, or otherwise in connection with the Agreement and the provision of the Services or the parties’ performance of or exercise of rights under or in connection with the Agreement and derived from the foregoing, even if anonymized;
“Jumio Personnel” means all officers, employees, staff, other workers, agents, contractors and consultants of Jumio, its Affiliate or any Permitted Sub-Contractor who are engaged in the provision of the Services from time to time.
[***];
“Permitted Sub-Contractor” means any subcontractor (including an Affiliate of Jumio) to whom Jumio is permitted to subcontract any part of the Services in accordance with the Agreement;
“Security Incident” shall mean any actual, suspected or threatened incident of accidental, unauthorized or unlawful access to, acquisition, processing, use or disclosure of or any theft, loss of or damage to or alteration or destruction of Customer Data or other information belonging to any other person in connection with the Agreement;
2. PERMITTED PURPOSE & GENERAL SECURITY OBLIGATIONS
2.1 Jumio has implemented and shall maintain a written information security program that includes policies and procedures that contain administrative, technical, and physical safeguards that are appropriate to its size and complexity, the nature and scope of its activities, and the sensitivity of Customer Data and shall otherwise comply in all respects with the Customer’s information security requirements set forth in this Exhibit. Such safeguards shall be reasonably designed to (i) ensure the security and confidentiality of Customer Data; (ii) protect against any anticipated threats or hazards to the security or integrity of Customer Data; and (iii) protect against unauthorized access to or use of Customer Data that could result in substantial harm or inconvenience to any person. Except as expressly authorized under the Agreement, Jumio shall only Access, collect, use, store, and transmit the Customer Data as permitted under Applicable Law for the purpose of providing the Services (“Permitted Purpose”).
2.2 At all times, Jumio shall, and shall cause Jumio Personnel to, perform the Services and operate and maintain the Jumio Service delivery facilities and systems with the highest level of care, skill and diligence in accordance with: (i) best industry practice; (ii) all Applicable Laws; (iii) the terms of the Agreement including the security requirements set out or referred to in this Exhibit; and (iv) the security standards set forth in ISO 27001 (Information Security Requirements Specifications) and, if applicable, the controls set forth in Jumio’s Statement on Standards for Attestation Engagements (SSAE) No. 18 audit reports for Reporting on Controls at a Service Organization, Service Organization Controls (SOC) Type 1, 2, or 3 audit reports (together the “Security Standards”).
3. SECURITY REVIEW PROCESS
Upon the Customer’s request, to confirm Jumio’s compliance with the Agreement and Security Standards, Jumio shall promptly and accurately complete a written information security questionnaire provided by the Customer, or a third party on the Customer’s behalf, regarding Jumio’s business practices and information technology environment in relation to the Services being provided by Jumio pursuant to the Agreement and Jumio shall fully cooperate with such inquiries. Jumio shall, provide evidence of an industry standard review process satisfactory to the Customer (such as the SFG Shared Assessment SIG, Cloud Security Alliance CAIQ, SSAE 18 SOC).
4. SYSTEM, INFRASTRUCTURE & PHYSICAL SECURITY
4.1 Jumio shall provide and shall procure that any Permitted Sub-Contractors shall provide a secure environment implementing security measures meeting or exceeding the Security Standards.
25