LogoLogo
Web HomeTutorialsPortal
  • Bamboozle Wiki and Documents
  • Products
    • Cloud
      • Compute
        • Managing Virtual Machines
          • Supported guest operating systems
          • Creating virtual machines
          • Connecting to virtual machines
          • Managing virtual machine power state
          • Attaching ISO images to virtual machines
          • Reconfiguring virtual machines
            • Changing virtual machine resources
            • Configuring network interfaces of virtual machines
            • Configuring virtual machine volumes
          • Monitoring virtual machines
          • Shelving virtual machines
          • Rescuing virtual machines
          • Managing guest tools
            • Installing guest tools
            • Uninstalling guest tools
          • Troubleshooting virtual machines
          • Deleting virtual machines
          • Managing SSH keys
        • Managing security groups
          • Creating and deleting security groups
          • Managing security group rules
          • Changing security group assignment
        • Managing images
          • Uploading images
          • Creating volumes from images
          • Preparing templates
            • Preparing Linux templates
            • Preparing Windows templates
            • Enabling logging for virtual machines
        • Managing volumes
          • Creating and deleting volumes
          • Attaching and detaching volumes
          • Resizing volumes
          • Creating images from volumes
          • Cloning volumes
          • Managing volume snapshots
        • Managing virtual networks
        • Managing VPN connections
          • Creating VPN connections
          • Editing VPN connections
          • Restarting and deleting VPN connections
        • Managing virtual routers
          • Managing router interfaces
          • Managing static routes
      • Managed Kubernetes
        • Creating and deleting Kubernetes clusters
      • Object Storage
        • Instances
        • How-to
          • Access Storage with S3 SDKs
          • Access Object Storage with Cyberduck
          • Access Storage with Mountainduck
        • Addtional Ressources
          • Supported Amazon S3 features
    • Servers
      • Cloud Servers
      • Dedicated Servers
    • Cyber Protect
      • Welcome to Cyber Protect
      • Supported features by OS
      • Activating the account
        • Password requirements
        • Two-factor authentication
      • Accessing the Cyber Protect service
      • The Cyber Protect console
      • Installing the software
        • Which agent do I need?
        • System requirements for agents
        • Preparation
        • Linux packages
        • Proxy server settings
        • Installing the Protection Agents
          • Downloading protection agents
          • Installing protection agents in Windows
          • Installing protection agents in Linux
          • Installing protection agents in macOS
          • Granting the required system permissions to the Connect Agent
          • Changing the logon account on Windows machines
          • Dynamic installation and uninstallation of components
    • Business Email
      • Getting started
        • DNS Records
        • Setting up a Mail Client with IMAP
        • Setting up your Mailbox with macOS, iOS, ipadOS and Android Devices
        • Configure Microsoft Outlook for Business Email
        • Zimbra Connector for Microsoft Outlook User Guide
      • Web Mail Client
        • Webmail Login
        • Mail
          • Left Sidebar
          • Email Pane
          • Reading Pane
          • Keyboard Shortcuts
      • Zimbra Modern Desktop
    • Web Hosting
      • Linux Web Hosting
        • cPanel Overview
          • Getting Started in cPanel
          • Server Information for cPanel
        • Preferences
          • Account Preferences
          • Audit Log
          • Change Language
          • Contact Information
      • Windows Web Hosting
    • SSL Certificates
      • SSL Intermediate and ROOT CA Bundles
        • RapidSSL CA Bundle
  • Tutorials
    • Rocky Linux
      • Rocky Linux 9
        • Basic Server Setup with Rocky Linux 9
  • Billing
    • Payment Methods
    • Credit Card Refunds
  • Legal
    • Legal Documents
      • Terms & Conditions
      • Master Agreement for Datacenter IP Services
      • Privacy
      • Service Level Agreement (SLA)
        • Public & Private Cloud
        • IP Transit Service Level Agreement
      • GDPR
        • FAQ
        • Data Processing Agreement
          • Schedule 1: Description of the Processing and Subprocessors
          • Schedule 2: Controller-to-Controller Information for International Data Transfers
      • Supplier Code of Conduct
  • Security
    • Platform Security
    • Infrastructure Security
    • Certification Reports
  • Pricing
    • Overview
    • Cloud
      • Compute
      • Volumes & Snapshots
      • Load Balancers
      • VPN
      • Elastic IPs
      • Traffic
    • Billing Q&A
      • Colocation - 95th percentile billing
  • Other Technical Information
    • Peering
Powered by GitBook
LogoLogo

Copyright © 2024 Bamboozle Web Services, Inc. All Rights Reserved.

On this page

Was this helpful?

Export as PDF
  1. Legal
  2. Legal Documents
  3. GDPR
  4. Data Processing Agreement

Schedule 2: Controller-to-Controller Information for International Data Transfers

1. Retention Periods

Bamboozle retains Personal Data it collects as a Controller for as long as Bamboozle has a business purpose for it or for the longest time allowable by applicable law.

2. Information for International Transfers

For the purposes of the Standard Contractual Clauses:

  • Clause 11(a), Module 1: The parties do not select the independent dispute resolution option.

  • Clause 17, Module 1: The parties select Option 1. The Member State is: Netherlands.

  • Clause 18(b), Module 1: The Parties agree that those shall be the courts of Netherlands.

  • Annex I(A): The data exporter is Customer. The data importer is Bamboozle. Contact details for Customer is the email address(s) designated by Customer in Customer’s Bamboozle account. Contact detail for Bamboozle is: privacy@bamboozle.me.

  • Annex I(B): The parties agree that Schedule 1 describes the transfer.

  • Annex I©: The competent supervisory authority is the supervisory authority of: The Dutch Data protection Authority (Autoriteit Persoonsgegevens)

  • Annex II: The parties agree that Schedule 2.3 describes the technical and organizational measures applicable to the transfer.

For definitions of these terms please review our Privacy Policy (Section 1)

3. Technical and Organizational Measures

Technical and Organizational Security Measure
Evidence of Technical and Organizational Security Measure

Measures of pseudonymisation and encryption of personal data

Bamboozle’s databases that store Customer Personal Data are encrypted using the Advanced Encryption Standard (AES). Customer data is encrypted in transit between the Customer’s software application and Bamboozle using TLS v1.2.

Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident

Bamboozle uses a variety of tools and mechanisms to achieve high availability and resiliency. Bamboozle’s infrastructure spans multiple fault-independent availability zones in geographic regions physically separated from one another. Bamboozle’s infrastructure is able to detect and route around issues experienced by hosts or even whole data centers in real time and employ orchestration tooling that has the ability to regenerate hosts, building them from the latest backup. DigitalOcean also leverages specialized tools that monitor server performance, data, and traffic load capacity within each availability zone and colocation data center. If suboptimal server performance or overloaded capacity is detected on a server within an availability zone or colocation data center, these tools increase the capacity or shift traffic to relieve any suboptimal server performance or capacity overload. DigitalOcean is also immediately notified in the event of any suboptimal server performance or overloaded capacity.

Processes for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures in order to ensure the security of the processing

Measures for user identification and authorization

Access control policies require that access to DigitalOcean assets be granted based on business justification, with the asset owner’s authorization and limits based on “need to-know” and “least-privilege” principles. In addition, the policy also addresses requirements for access management lifecycle including access provisioning, authentication, access authorization, removal of access rights and periodic access reviews.Documentation of these requirements is recorded and provided to external auditors for security certification testing.

Measures for the protection of data during transmission Measures for the protection of data during storage

Bamboozle’s databases that store Customer Personal Data are encrypted using the Advanced Encryption Standard (AES). Customer data stored by Bamboozle is encrypted in transit between the Customer’s software application and Bamboozle using TLS v1.2.

Measures for ensuring physical security of locations at which personal data are processed

Bamboozle data centers are located in nondescript buildings that are physically constructed, managed, and monitored 24 hours a day to protect data and services from unauthorized access as well as environmental threats. All data centers are surrounded by a fence with access restricted through badge controlled gates. CCTV is used to monitor physical access to data centers and the information systems. Cameras are positioned to monitor perimeter doors, facility entrances and exits, interior aisles, caged areas, high-security areas, shipping and receiving, facility external areas such as parking lots and other areas of the facilities.

Measures for ensuring events logging

Logging of service, user and security events (web server logs, FTP server logs, etc.) is enabled and retained centrally. Bamboozle restricts access to audit logs to authorized personnel based on job responsibilities. Audit logging procedures are reviewed as part of external audits for security standards.

Measures for internal IT and IT security governance and management Measures for certification/assurance of processes and products

Measures for ensuring data minimisation Measures for ensuring data quality Measures for ensuring limited data retention Measures for ensuring accountability Measures for allowing data portability and ensuring erasure

Technical and organizational measures to be taken by the [sub]-processor to provide assistance to the controller and, for transfers from a processor to a [sub]-processor, to the Customer.

When Bamboozle engages a Subprocessor, DigitalOcean and the Subprocessor enter into an agreement with data protection obligations substantially similar to those contained in this Schedule. Each Subprocessor agreement must ensure that DigitalOcean is able to meet its obligations to Customer. In addition to implementing technical and organizational measures to protect personal data, sub-processors must (a) notify DigitalOcean in the event of a Security Incident so Bamboozle may notify Customer; (b) delete personal data when instructed by DigitalOcean in accordance with Customer’s instructions to DigitalOcean; © not engage additional sub-processors without DigitalOcean’s authorization; (d) not change the location where personal data is processed; or (e) process personal data in a manner which conflicts with Customer’s instructions to DigitalOcean.

PreviousSchedule 1: Description of the Processing and SubprocessorsNextSupplier Code of Conduct

Last updated 2 years ago

Was this helpful?

Bamboozle has developed and implemented a security control environment designed to protect the confidentiality, integrity, and availability of customers’ systems. The Customer Data Use Policy governs the requirements for use of customer data in accordance with several industry standards. Bamboozle conducts a variety of regular internal and external audits that are inclusive of security operations. For more information please visit:

DigitalOcean has developed and implemented a security control environment designed to protect the confidentiality, integrity, and availability of customers’ systems. DigitalOcean performs an annual internal review of all security management policies and procedures. External auditors perform an annual review of these policies and procedures. Bamboozle conducts a variety of regular internal and external audits that are inclusive of security operations. For more information please visit: .

More information about how Bamboozle processes personal data is set forth in the Privacy Policy available at: .

https://www.digitalocean.com/trust/certification-reports/
https://www.digitalocean.com/trust/certification-reports/
https://www.digitalocean.com/legal/privacy-policy/