Real Time Digital Ad Auditing for All - Controls
Infrastructure security
CONTROL | STATUS |
---|---|
PII transmission controls for processor
The company encrypts PII in transit. |
✅ |
PII transmission controls for controller
The company implements technical controls to ensure data transmitted to third parties reaches its destination. |
✅ |
Data encryption utilized
The company's datastores housing sensitive customer data are encrypted at rest. |
✅ |
Remote access encrypted enforced
The company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection. |
✅ |
Data transmission encrypted
The company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks. |
✅ |
Production network access restricted
The company restricts privileged access to the production network to authorized users with a business need. |
✅ |
Production deployment access restricted
The company restricts access to migrate changes to production to authorized personnel. |
✅ |
Unique network system authentication enforced
The company requires authentication to the "production network" to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys. |
✅ |
Unique account authentication enforced
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys. |
✅ |
Network firewalls utilized
The company uses firewalls and configures them to prevent unauthorized access. |
✅ |
Network segmentation implemented
The company's network is segmented to prevent unauthorized access to customer data. |
✅ |
Network firewalls reviewed
The company reviews its firewall rulesets at least annually. Required changes are tracked to completion. |
✅ |
Network and system hardening standards maintained
The company's network and system hardening standards are documented, based on industry best practices, and reviewed at least annually. |
✅ |
Intrusion detection system utilized
The company uses an intrusion detection system to provide continuous monitoring of the company's network and early detection of potential security breaches. |
✅ |
Anti-malware technology utilized
The company deploys anti-malware technology to environments commonly susceptible to malicious attacks and configures this to be updated routinely, logged, and installed on all relevant systems. |
✅ |
Access requests required
The company ensures that user access to in-scope system components is based on job role and function or requires a documented access request form and manager approval prior to access being provisioned. |
✅ |
Organizational security
CONTROL | STATUS |
---|---|
Production inventory maintained
The company maintains a formal inventory of production system assets. |
✅ |
Countries and international organizations to which PII can be stored for processor
The company documents all countries where PII is stored. |
✅ |
Countries and international organizations to which PII can be transferred for controller
The company specifies and documents the countries and international organizations where PII is transferred. |
✅ |
Records of transfer of PII
The company documents transfers of PII to or from third parties and ensures cooperation with the requests from data subjects. |
✅ |
Data inventory
The company creates and maintains a PII data inventory. For controllers:
For processors:
|
✅ |
Access revoked upon termination
The company completes termination checklists to ensure that access is revoked for terminated employees within SLAs. |
✅ |
MDM system utilized
The company has a mobile device management (MDM) system in place to centrally manage mobile devices supporting the service. |
✅ |
Internal security procedures
CONTROL | STATUS |
---|---|
Password policy enforced
The company requires passwords for in-scope system components to be configured according to the company's policy. |
✅ |
Return, transfer or disposal of PII
The company returns, transfers, disposes PII in accordance to its policies and commitments. (SCC 8.5) |
✅ |
Identify lawful basis
The company documents the lawful basis for PII processing. |
✅ |
Limit collection
The company limits collection of PII to the minimum that is necessary for it's purposes. |
✅ |
PII minimization
The company ensures that it only collects and processes data which it needs for its purposes. |
✅ |
PII de-identification and deletion at the end of processing
The company deletes or de-identifies when no longer needed. |
✅ |
Retention of PII
The company does not retain PII longer than necessary for its purposes. |
✅ |
Disposal of PII
The company documents policies, procedures and mechanism for disposal of PII. |
✅ |
Appoint EU representative
The company shall appoint an EU based representative. |
✅ |
Appoint EU lead supervisory authority
If the company is operating in more than one EU state then identify a lead Data Protection Authority. |
✅ |
Customer data deleted upon leave
The company purges or removes customer data containing confidential information from the application environment, in accordance with best practices, when customers leave the service. |
✅ |
Required Contribution for Binding Arbitration Mechanism
Provide evidence that the company has made the required contribution to the International Centre for Dispute Resolution-American Arbitration Association (ICDR-AAA) DPF arbitral fund as identified in Annex I of the DPF Principles. Guidance: Visit the ICDR-AAA’s website at https://go.adr.org/dpf-annexi-fund.html to make the required contribution. |
✅ |
Annual Verification of DPF Compliance
Organizations must provide follow-up procedures for verifying that the attestations and assertions they make about their EU-U.S. DPF privacy practices are true and those privacy practices have been implemented as represented and in accordance with the Principles. Where the organization has chosen self-assessment, such verification must verify that: i. its privacy policy regarding personal information received from the EU is accurate, comprehensive, readily available, conforms to the Principles, and is completely implemented (i.e., is being complied with). ii. individuals are informed of any in-house arrangements for handling complaints and of the independent recourse mechanism(s) through which they may pursue complaints; iii. that it has in place procedures for training employees in its implementation, and disciplining them for failure to follow it; iv. that it has in place internal procedures for periodically conducting objective reviews of compliance with the above. An organization must verify such attestations and assertions either through self-assessment or outside compliance reviews as follows: i. A statement verifying that the self-assessment has been completed must be signed by a corporate officer or other authorized representative of the organization at least once a year and made available upon request by individuals or in the context of an investigation or a complaint about non-compliance. OR ii. A statement verifying that an outside compliance review has been successfully completed must be signed either by the reviewer or by the corporate officer or other authorized representative of the organization at least once a year and made available upon request by individuals or in the context of an investigation or a complaint about compliance. |
✅ |
Designate a DPF Contact
Designate an internal contact for questions or compliance related to the DPF and communicate that information in the company's Privacy Notice. |
✅ |
Internal Privacy Policy
Implement an Internal Privacy Policy which governs the use of personal information for employees, applicants, and contractors. Guidance: This will need to be submitted to the ITA if your DPF certification covers HR data. |
✅ |
Accuracy and quality
The company has a process to ensure that PII is complete, accurate, and up-to-date. |
✅ |
Appoint Data Protection Officer
If processing meets one of these conditions then appoint a Data Protection Officer
|
✅ |
DPF-Compliant Privacy Policy Statement
The company's Privacy Notice (i.e. Privacy Policy) must include the following elements to comply with DPF requirements: i. its participation in the EU-U.S. Data Privacy Framework (EU-U.S. DPF) and, as applicable the UK Extension to the EU-U.S. DPF, and/or the Swiss-U.S. Data Privacy Framework (Swiss-U.S. DPF) and provide ii. a link to, or the web address for, the Data Privacy Framework List iii. the types of personal data collected and, where applicable, the U.S. entities or U.S. subsidiaries of the organization also adhering to the DPF Principles iv. its commitment to subject to the DPF Principles all personal data received from the European Union and, as applicable the United Kingdom (and Gibraltar), and/or Switzerland in reliance on the relevant part(s) of the DPF program v. the purposes for which it collects and uses personal information vi. how to contact the organization with any inquiries or complaints, including any relevant establishment in the European Union and, as applicable, the United Kingdom, and/or Switzerland that can respond to such inquiries or complaints vii. the type or identity of third parties to which it discloses personal information, and the purposes for which it does so viii. the right of individuals to access their personal data ix. the choices and means the organization offers individuals for limiting the use and disclosure of their personal data x. the independent dispute resolution body designated to address complaints and provide appropriate recourse free of charge to the individual, and whether it is: (1) the panel established by the EU DPAs and, as applicable, the UK Information Commissioner’s Office (ICO) (and the Gibraltar Regulatory Authority (GRA)), and/or the Swiss Federal Data Protection and Information Commissioner (FDPIC), (2) an alternative dispute resolution provider based in the European Union and, as applicable, the United Kingdom, and/or Switzerland, or (3) an alternative dispute resolution provider based in the United States xi. that the company is subject to the investigatory and enforcement powers of the Federal Trade Commission (FTC), the U.S. Department of Transportation or any other U.S. authorized statutory body xii. the possibility, under certain conditions, for the individual to invoke binding arbitration xiii. the requirement to disclose personal information in response to lawful requests by public authorities, including to meet national security or law enforcement requirements xiv. the company's liability in cases of onward transfers to third parties. Guidance: For item x. Independent Dispute Resolution Body, the company only needs to designate one of these bodies and for most US-based companies (3) is the simplest to establish. |
✅ |
Incident management procedures followed
The company's security and privacy incidents are logged, tracked, resolved, and communicated to affected or relevant parties by management according to the company's security incident response policy and procedures. |
✅ |
Breach policy and procedure
The company establish policies and procedures to respond to data breaches including notification procedures. |
✅ |
Incident response policies established
The company has security and privacy incident response policies and procedures that are documented and communicated to authorized users. |
✅ |
Privacy impact assessment
The company performs a privacy impact assessment for processing or changes to processing, which represent a high risk to the rights and freedoms of data subjects. |
✅ |
Assist controllers with privacy obligations
The company's Data Processing Agreements (DPA) with the customers (controllers) commit to assisting them with privacy obligations. |
✅ |
Basis for PII transfer between jurisdictions
The company's Master Services Agreement (MSA) informs the customer of the legal basis for transfers between jurisdictions and allows customers to object to changes or terminate service. |
✅ |
Sub-processor changes
The company communicates the changes to sub-processors to the customer in writing with the opportunity to object. |
✅ |
Contracts with PII processors
The company implements a written contract with all PII processors, which includes their requirements. |
✅ |
Service infrastructure maintained
The company has infrastructure supporting the service patched as a part of routine maintenance and as a result of identified vulnerabilities to help ensure that servers supporting the service are hardened against security threats. |
✅ |
Continuity and Disaster Recovery plans established
The company has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel. |
✅ |
Continuity and Disaster Recovery plans tested annually
The company has a documented business continuity/disaster recovery (BC/DR) plan and tests it annually. |
✅ |
Data and privacy
CONTROL | STATUS |
---|---|
Data classification policy established
The company has a data classification policy in place to help ensure that confidential data is properly secured and restricted to authorized personnel. |
✅ |
Access, correction and/or erasure
Defined process and procedure for data subjects to access and correct their PII. Guidance: This is typically the data subject access request process. |
✅ |
Handling DSAR requests
Define and document procedures for handling Data Subject Access Requests (DSAR). |
✅ |
Identify basis for PII transfer between jurisdictions
The company identifies and documents its legal basis for transferring between jurisdictions. |
✅ |
Pseudonymization
The company determines any need for pseudonymization and implement it as needed. |
✅ |
Asset disposal procedures utilized
The company has electronic media containing confidential information purged or destroyed in accordance with best practices, and certificates of destruction are issued for each device destroyed. |
✅ |
Portable media encrypted
The company encrypts portable and removable media devices when used. |
✅ |
Process as per processor agreements
The company only processes PII for the purposes expressed in contract (SCCs 8.1 and 8.2). |
✅ |
Marketing and advertising use
The company does not use the PII collected for services for marketing and advertising without consent. Consent for marketing is not required for using services. |
✅ |
Infringing instruction
The company informs the customer if processing instructions are illegal. (SCC 8.1(b)) |
✅ |
Customer obligations
The company provides their customer with information sufficient for them to demonstrate their privacy compliance. (SCC 8.9(b)) |
✅ |
Records related to processing PII
The company maintains necessary privacy records. |
✅ |
Notification of PII disclosure requests
The company communicates legally binding disclosures for PII to the customer before disclosure where possible. (SCC 15.1-2) |
✅ |
Legally binding PII disclosures
The company rejects any non-binding PII disclosures. (SCC 15.2) |
✅ |
Disclosure of subcontractors used to process PII
The company discloses all PII sub processors to the customer. |
✅ |
Identity and document purpose
The company documents the purpose for which PII is processed. |
✅ |
Consent obtained
The company determines and documents when and how consent was obtained. |
✅ |
PII data subject notice
The company determines and documents requirements for notice to data subjects and the timing of the notice. |
✅ |
PII data subject information
The company provides data subjects clear and easily accessible information identifying the controller and describing the PII processing. |
✅ |
Modify or withdraw consent
The company provides a mechanism to modify or withdraw consent. Guidance: This is typically the data subject access request process. |
✅ |
Object to PII processing
The company provides a mechanism for data subjects to object to processing. Guidance: This is typically the data subject access request process. |
✅ |
PII controllers' obligations to inform third parties
Establish a process, policies and procedures for notifying sub processors of corrections, deletions or withdrawals of PII. |
✅ |
Copy of PII processed
Establish a process of providing a copy of PII to data subjects upon verified request. |
✅ |
Automated decision making
Identify and address obligations to data subjects resulting from decisions made from automated processing (if applicable). |
✅ |
Records of PII disclosure to third parties
The company should record disclosure of PII to third parties including what has been disclosed and what time. |
✅ |
Determine needs and perform transfer impact assessment
If processing includes:
|
✅ |
Independent Recourse Mechanism
The company shall make readily available an independent recourse mechanism by which each individual’s complaints and disputes are investigated and expeditiously resolved at no cost to the individual. Guidande: Register with JAMSADR or a similar service. https://www.jamsadr.com/dpf-registration-page |
✅ |
DPF Certification
Once the company has verified that it has the information needed to self-certify (https://www.dataprivacyframework.gov/s/article/Self-Certification-Information-dpf), it can submit the information to the International Trade Administration (ITA) via the "Self-Certify" page on the https://www.dataprivacyframework.gov/ website. |
✅ |