DATA PROCESSING TERMS
These DATA PROCESSING TERMS (the “Terms”), shall apply for all ad serving by Extreme Reach, Inc. ("Service Provider" on any websites, applications, digital properties, CTV, OTT (collectively, “Digital Property”) owned, operated, controlled, or represented by you and/or your affiliates (“PUBLISHER”). Service Provider and PUBLISHER are collectively referred to as the “Parties” and individually as a “Party.”
These Terms shall apply where PUBLISHER sells or otherwise provides digital advertising inventory to certain advertisers (the “Advertiser”) for the placement of advertisements on its Digital Properties; and the Advertiser and/or its agencies have engaged Service Provider to serve digital advertisements and collect certain advertising campaign performance data on behalf of the Advertiser (the "Services"); and Advertiser places Service Provider’s pixels and/or other code or technology (the “Pixel(s)”) on Advertiser’s advertisements being served on the Digital Property to collect campaign performance data.
ATTACHMENT 1 – EUROPEAN STANDARD CONTRACTUAL CLAUSES
Where required by applicable data protection law, Extreme Reach shall not Process or transfer any data (nor permit any data to be Processed or transferred) in a territory outside the EEA or UK (collectively, “Europe”) unless it has taken such measures as are necessary to ensure that the transfer is in accordance with applicable data protection law. In particular, where such data is to be transferred outside of Europe to Extreme Reach or another recipient who is not located in a territory which has been considered adequate under applicable data protection law, the European Standard Contractual Clauses (2021/914) (“SCCs”) shall be incorporated into this Agreement as follows:
Annexes to the SCCs
ANNEX 1: DETAILS OF PROCESSING
Data exporter(s): Identity and contact details of the data exporter(s) and, where applicable, of its/their data protection officer and/or representative in the European Union
Name: the legal entity named on this account; Address: address of the Data Exporter listed in this account Contact person’s name, position and contact details: contact listed on this account Activities relevant to the data transferred under these Clauses: Controller owns, operates, controls or represents various Digital Properties Date: date of acceptance of these Terms Role (controller/processor): Controller |
Data importer(s): Identity and contact details of the data importer(s), including any contact person with responsibility for data protection
Name: Extreme Reach, Inc. Address: 3 Allied Drive, Suite 130, Dedham, MA 02026 Contact person’s name, position and contact details: Stephen K. Robinson, General Counsel and Chief Privacy Officer, srobinson@extremereach.com Activities relevant to the data transferred under these Clauses: Serving ads on the Digital Properties and associated analytics and measurement of such advertisements Date: date of acceptance of these Terms Role (controller/processor): Processor | |||
B. DESCRIPTION OF TRANSFER
Categories of data subjects whose personal data is transferred:
Consumers to whom advertising impressions are served.
Categories of personal data transferred:
Information related to a consumer’s device, such as IP Address, and, where combined or linked to IP address, Device Type, Browser Type and User Agent strings.
Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.
N/A
The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis).
Data are transferred on a continuous basis (on advertising creatives including the importer’s technology)
Nature and purpose of the Processing
As Processor: The importer acts as Processor in relation to the following activities: The personal data are transferred to enable the importer to provide Extreme Reach Services as described on the Agreement Cover Page to Service Recipients in connection with advertising campaigns on the Roku Platform or purchased through OneView. The data transferred is further processed in order to enable the importer to provide reports on the service to the exporter, its affiliates or its advertisers.
The restrictions as set out in Section 4 of the Agreement shall apply.
The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period
As Processor: Extreme Reach shall retain the personal data for as long as it is required to provide the Services to the applicable Advertiser.
For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing
See Annex 3. The duration of processing by sub-processors is concurrent with the importer’s duration of processing as described in this Annex 1.
C. COMPETENT SUPERVISORY AUTHORITY
Identify the competent supervisory authority/ies in accordance with Clause 13:
Dutch Data Protection Authority (Autoriteit Persoonsgegevens)
Annexes to the SCCs
ANNEX 2
TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA
Description of the technical and organisational measures implemented by the data importer(s) (including any relevant certifications) to ensure an appropriate level of security, taking into account the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons.
The technical and organizational measures implemented by Extreme Reach (including any relevant certifications) to maintain an appropriate level of security taking into account the nature, scope, context and purposes of the processing, and the risks for the rights and freedoms of natural persons, are as follows:
Type of measure | Terms |
Measures of pseudonymisation and encryption of personal data | Description of technical measures in place to prevent re-identification: Extreme Reach has implemented data minimisation and privacy-by-design into its services development process to prevent personal data from being directly linkable to a data subject. Extreme Reach only works with pseudonymized identifiers and has management and organizational controls in place to prohibit internal teams, and subprocessors, from re-identifying data processing in connection with the Agreement. If and when directly identifiable information were to be processed in connection with the services for addressability purposes, Extreme Reach will ensure that industry standard cryptographic techniques are immediately applied to such data, including but not limited to, hashing, to help ensure data cannot be reidentified by unauthorised parties. Advertising identifiers used by Extreme Reach to track devices and deliver ads are not persistent; they are designed to deprecate within a reasonable time frame. When activating/monetizing audiences, sensitive or directly identifiable personal data is not processed, but instead segment codes/deal codes are exchanged by the parties. Extreme Reach does not process any characteristics about data subjects in connection with the services. The data importer uses, as far as possible, encryption for the transport of personal data. |
Measures for ensuring ongoing confidentiality of processing systems and services | Description of measures in place to secure information stored on systems: Extreme Reach has implemented and maintains a written information security program aligned to industry practices, and has implemented measures to ensure the integrity, availability and security of personal information, including regular vulnerability scans and endpoint protection. Extreme Reach limits the risk that personal data will be exposed by implementing a data retention schedule to systems that store personal data processed under the agreement. Personnel agree to confidentiality terms and must complete security and privacy training |
Measures for ensuring ongoing integrity of processing systems and services | Extreme Reach has implemented and maintains an information security program that contains services administrative, technical and physical safeguards appropriate to protect against anticipated threats to, confidentiality and integrity of, and the unauthorized or accidental destruction, loss, access, acquisition, alteration or use of, personal data, and that meets (i) reasonable security practices applicable to Extreme Reach’s industry; and (ii) any security requirements under the laws applicable to the company under applicable law. These safeguards include software development, change management, system access, physical security, and other policies and processes that protect the integrity of systems and services. |
Measures for ensuring ongoing availability and resilience of processing systems and services | Extreme Reach maintains personal data availability and resilience through a variety of technical, physical, and administrative measures. Examples of these measures include: fault tolerant infrastructure with geographically distinct availability zones for redundant data; secured and monitored operational sites; and, business continuity planning and testing, incident response and review, vendor review, and other related policies and processes. |
Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident | See response above. Further measures include regular backups and recovery testing. |
Processes for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures in order to ensure the security of the processing | At least once annually, security measures relevant to the processing of personal data are reviewed and tested for alignment with industry best practices. Security compliance has been integrated into Extreme Reach’s product development practices, and Extreme Reach privacy, security and engineering teams collaborate regularly to ensure those standards are kept up to date. Extreme Reach engages with independent third parties to assess the effectiveness of security controls. |
Measures for user identification and authorization | As part of Extreme Reach’s security program, Extreme Reach maintains a System Access and Password policy that governs standards for user access, including user provisioning and authorization. Extreme Reach has in place procedures that comply with applicable law to authenticate requests from data subjects who have submitted rights requests. Extreme Reach has operational and technical controls in place to ensure access to systems that process personal data is only granted to authorized employees with a “need to know”. Extreme Reach has in place industry standard policies to ensure that unauthorized current and former personnel cannot improperly access systems that process personal data. |
Measures for the protection of Data during storage | Extreme Reach does not process any sensitive personal information related to the services, and personal data processing is limited in scope, pseudonymized (i.e., cookie ID, user agent information, etc.) and cannot be directly identified with a natural person by ER. Personal data is only stored for as long as necessary for Advertiser’s legitimate business purposes and is subject to a data retention schedule. Personal data minimization procedures are in place with regard to personal data stored on Extreme Reach’s systems. |
Measures for ensuring physical security of locations at which personal data are processed | Facilities involved in the processing of personal data are accessible only by authorized personnel. Technical controls are in place to secure processing facilities including access controls, two-factor authentication, firewalls, and anti-malware. Personal data can only be accessed by personnel who have a need-to-know and whose access to such information is required in order to deliver advertising services under the Agreement. Extreme Reach provides personnel who access personal data with appropriate information security and data protection training. Extreme Reach maintains appropriate physical security measures at each facility where personal data is processed, including authentication of all personnel who access data centers, IT equipment having physical barriers designed to prevent access by unauthorized individuals, and manned reception areas or logging of visitor entry/exit dates and times. |
Measures for certification/assurance of processes and products | Extreme Reach participates in industry certification and self-regulatory programs such as DAA, IAB TCF 2.0, and the IAB CCPA Compliance Framework. Extreme Reach is accredited by the MRC for CTV, Desktop, Mobile, and App Impressions. |
Measures for ensuring data minimisation | Procedures are embedded in the system development process to minimize personal data collected and processed by ER where legally required (e.g., truncation of IP address, stripping of personal data when an impression will be monetized using contextual ad-targeting, no data collection from unconsented or improperly consented impressions). Extreme Reach has a dedicated technical privacy specialist whose role focus is at least partly dedicated to reviewing the implementation of data minimization across the organization. |
Measures for ensuring accountability | Extreme Reach performs a data mapping exercise that complies with Article 30 of GDPR and has created a record of processing activity to ascertain the scope of personal data processing activities performed by the organization. Extreme Reach has implemented a privacy program that is appropriate to the scope and nature of personal data processed that includes a personal data breach policy, data protection and legitimate interest assessments (where appropriate), appointment of a data protection officer (DPO), and data protection controls such as privacy by design. The foregoing measures are regularly reviewed (at least once annually) and updated to ensure alignment with applicable law and industry standards. |
Measures for allowing data portability and ensuring erasure | Extreme Reach has implemented and maintains procedures to ensure data portability and erasure that comply with data protection laws. ER has designated a data protection leader who is responsible for ensuring all requests from data subjects are reviewed and documented, including requests for erasure and copies of personal data, and that data subject requests are carried out timely and in accordance with law. |
ANNEX 3
SUB-PROCESSOR LIST
PUBLISHER hereby authorizes the use of the following Sub-Processors:
Name of Sub-Processor | Address of Sub-Processor | Contact person’s name, position and contact details | Description of Processing by the Sub-Processor |
AWS | 410 Terry Ave. N Seattle, WA 98109 | Storage/hosting |