Overslaan naar inhoud

Terms & conditions

MintT SA - TVA n° BE0544.636.885

Social quarter: Avenue Louise 251 - 1000 Bruxelles

Quai Paul Verlaine 2, bx 2 - 6000 Charleroi

BELGIQUE

RPM Bruxelles

Phone: +32 (0)2 319 53 39

Email: contact@mintt.care

Website: https://mintt.odoo.com/



The services and materials specified in the offer sent to and accepted by the Client (the "Offer") shall be provided by MintT SA, a company incorporated under Belgian law with its registered office at Avenue Louise 251, 1000 Brussels, Belgium and registered with the Crossroads Bank for Enterprises under number 0544.636.885 ("MintT"), in accordance with these General Terms and Conditions. The Client's full contact details are included in the Offer. The Client and MintT are hereinafter individually referred to as a "Party" and collectively as the "Parties". 


  1. PRECEDENCE

In the event of a conflict between the provisions of the Contract (consisting of the Offer, these General Terms and Conditions and the appendices), the provisions that govern shall be determined according to the following priority: (a) Offer, (b) General Terms and Conditions and (c) appendices. For the purposes of the foregoing, an omission shall not of itself be deemed to give rise to a conflict or inconsistency. 

Any existing or future purchase order or similar document or contract issued by the Client ("Purchase Order") shall be deemed to be entered into in accordance with the terms of the Contract (with or without reference to the Contract) and shall be subject to the provisions of these General Terms and Conditions, even if not expressly stated or if excluded by the Purchase Order. No term of any Purchase Order shall apply to the Contract, notwithstanding any statement to the contrary in the Purchase Order. 


2. OBJECT

2.1  MintT undertakes to provide the Client, who accepts, with the services and to lease and/or sell (as the case may be) the products specified in the Offer, in accordance with the terms and conditions of these General Terms and Conditions.


2.2 The Client declares that it is aware of the technical characteristics of the services and products and that it considers these suitable for its needs. 


3.  GRANT OF LICENCE

3.1 MintT grants to the Client, who accepts, a non-exclusive, personal, non-transferable, non-sublicensable right to use the services, including the MyISA dashboard (“Dashboard”) and the documentation (including the MyISA user guide) during the term of the Contract ("Licence"). The Licence is granted to the Client only, and shall not be deemed to be granted to any subsidiary or affiliate of the Client. 

3.2  The Client shall comply with any and all documentation containing procedures, guidelines and/or recommendations relating to the use of MintT's services or products and any changes thereof notified to the Client from time to time.


4. RESTRICTIONS D’USAGE

4.1  The Client undertakes that each authorised user will keep confidential a secure password for their use of the services.

4.2  The Client may not, in the course of using the services, access, store, distribute or transmit viruses, or any content that is illegal or causes damage to any person or property. MintT reserves the right, without liability to the Client, to remove - to the extent possible - any content that violates the provisions of this Section 4.2.

4.3  The Client shall not :


​(a)  except where permitted by any applicable law, the application of which cannot be excluded by mutual agreement of the Parties:


​​(i) and except to the extent expressly permitted under the Contract, attempt to copy, modify, duplicate, create derivative works from, republish, upload, display, ​transmit, or distribute all or part of the software made available as part of the services in any form or format; or 

​​(ii) attempt to reverse compile, disassemble, reverse engineer or otherwise reduce the software or any part thereof to a human-perceivable form; or 


​(b)  access all or part of the services in order to develop a competing product or service; or


​(c)  use the services to provide services to third parties;


​(d)  license, sell, rent, transfer, assign, distribute, display, disclose, or otherwise commercially exploit, or otherwise make the services available to third parties;


​(e)  attempt to obtain, or assist a third parties in obtaining, access to the services other than as provided for under the Contract; or


​(f) use the services in a way that may be contrary to the Belgian law of 21 March 2007 regulating the installation and use of surveillance cameras or a corresponding ​local law in another country where the Client is established. 


4.4  The Client shall use reasonable efforts to prevent unauthorised access to or use of the devices and, in the event of unauthorised access or use, shall promptly notify MintT.

4.5  If the Client's use of the services does not comply with the Contract, MintT may, at its sole discretion and without prejudice to its right to claim damages, deactivate the litigious access(es) or terminate the Contract pursuant to Section 17.

4.6  Any APIs (Application Programming Interfaces) made available by MintT may be subject to additional terms and conditions of use or restrictions on use.

4.7 In case the Offer allows interfacing or integration with a Third Party Platform (as defined in Section 16 below), the data provided by the services may not be used by the Third Party Platform to be correlated with other data or used for functionalities other than those directly provided by MintT's services (unless expressly authorised in the Offer and subject to the additional fee specified in the Offer). 


5. FEES – FEES REVISION 

5.1 In consideration for the Hand-on Period (if any), services and products, the Client shall pay to MintT the total fees set out in the Offer, in accordance with Section 6. MintT shall be entitled to charge the Client, at the then prevailing rates, for any reasonable additional costs (such as travel expenses) incurred by MintT in installing, maintaining or modifying any product or service as a result of the Client's failure to comply with its contractual obligations (including obligations relating to the supply of electricity or the adaptation of the covered areas to the required conditions).

5.2 Unless otherwise expressly stated in the Offer, all fees and prices are expressed in euros (EUR) and exclude VAT and applicable taxes.

5.3  The applicable prices and fees may be adjusted by MintT at any time after the Initial Period, provided that the Client is informed thereof at least three (3) months before the expiry of the Initial Period or the then current Additional Period (as defined in article 17), as applicable. In the event of an increase in rates (such increase being only applicable as from the next Additional Period), the Client is entitled to terminate the Contract without additional charge no later than one (1) month prior to the expiry of the Initial Period or the then current Additional Period, as applicable.

5.4  Without prejudice to other possible adjustment mechanisms, all prices and fees may be indexed annually in the month of the anniversary of the date of entry into force of the Contract specified in the Offer, according to the following formula:


New price =    initial price x new index

​ ​ ​ initial index

If the Client is established in Belgium, the following formula will apply instead of the above formula: 

New price = (initial price) x (0,2 + 0,8 (new index))

​ initial index

In the formulas: the initial index is the "Agoria Digital" wage cost index (national average) of the month preceding the month of the entry into force of the Contract; the new index is the "Agoria Digital" wage cost index (national average) of the month preceding the month of the Contract anniversary. 


6. INVOICING – PAYMENT TERMS

6.1  Unless expressly stated otherwise in the Offer, the Client shall pay all invoiced amounts within 15 calendar days of the date of receipt of the invoice. Unless expressly stated otherwise in the Offer, the fees are payable annually before the beginning of the applicable year.

6.2  Any dispute relating to all or part of an invoice must be sent to MintT by registered letter with acknowledgement of receipt within 15 calendar days of the date of receipt of the relevant invoice. After this period, the Client is irrevocably deemed to have accepted the invoiced amount. A dispute does not discharge the Client from its payment obligations in relation to the undisputed amounts.

6.3 In the event of late payment, MintT is automatically entitled and without the need for a formal notice of default to an interest of ten percent (10%) per year on such unpaid amount, pro rata temporis from the date on which payment is due until the date of actual payment, with a minimum of 150 euros and without prejudice to any other right or remedy under the Contract or applicable law. 

6.4  MintT may suspend or terminate the Contract at its sole discretion, and without the need for legal action, if the Client has not paid any sum due within 15 calendar days of written notice of such non-payment, without prejudice to any other rights or remedies of MintT under the Contract or applicable law.


7. PRODUCTS

7.1 Delivery


7.1.1.  MintT shall use its best efforts to deliver the products to the Client in accordance with the delivery date agreed by the Parties. Such delivery date is indicative only and non-binding.


7.1.2.  If a delay in delivery is caused by force majeure or by any act or omission of the Client, the delivery period shall be extended by such period of time as is reasonable  under the circumstances.


7.1.3.  MintT will deliver the products to the Client at the address indicated in the Offer.


7.1.4. Immediately after delivery of the products, the Client shall inspect the products and notify MintT in writing without delay - and in any event not later than two (2) working days after delivery - of any claims for apparent defects and non-conformity in terms of specifications or quantity deviations. In the absence of such notification, all products delivered shall be deemed to be conform to the applicable specifications and shall be deemed irrevocably accepted by the Client. 


7.2 Installation


7.2.1.  The Client undertakes to provide, at its own expense, in the rooms on the Client's premises where the sensors are (to be) installed ("Sensor Spaces"), sufficient free and suitable space to allow their installation, in accordance with the reasonable conditions required by MintT. In particular, the Client is responsible for the following non-exhaustive items: sufficient space; power supply; network connection (Local Area Network with Internet access or direct Internet access); maintaining temperature and humidity.


7.2.2.  If the installation of the products is performed by MintT (or any person appointed by MintT), as specified in the Offer, the Client shall immediately inform MintT if technical or other systems (water, gas, electricity, etc.) could be damaged during the installation of the products. Notwithstanding any provision to the contrary, MintT shall not be liable for any damage arising from the Client's failure to comply with its obligations.


7.2.3. If the installation of the products is performed by the Client (or any person appointed by the Client), the Client will be responsible for all costs arising from the installation of the products (including installation costs and any damage to the products). MintT undertakes to: 


​​a) procure, configure and deliver the products for plug and play installation by the Client; and 

​b) test and validate that the installed products are accessible from the Dashboard. 


7.3  Title and ownership


The property of the products purchased by the Client under the Contract remains with MintT until the purchase price of the products is paid in full. However, from the date of delivery, the Client is responsible for all costs arising from theft, loss, destruction or damage to the products. The property of the products rented by the Client under the Contract remains with MintT.

7.4 Uninstallation and return of products 


The uninstallation and/or return of the products will be at the sole expense of the Client (at MintT's then current rates), except for the return of items covered by the limited warranty provided below. All costs and liability for claims, delivery, loss or damage, including, if applicable, installation, uninstallation and storage, shall be borne by the Client until the products are returned to and in the possession of MintT. 


7.5  Client’s obligations


In the event of a purchase of products, the Client shall allow MintT access to the Sensor Spaces to inspect the products and allow MintT to provide the Client with products maintenance or repair service in accordance with Section 7.6, upon reasonable advance notice and subject to the Client's reasonable confidentiality, security, health and safety requirements. 

In the case of leasing of products, after receipt of the products, the Client shall: (i) keep the products in good condition and return them upon expiry or termination of the Contract; (ii) not transfer, move or alter the products; (iii) keep the products free of all security interests, liens and other encumbrances; (iv) exercise due and proper care in the operation, use and maintenance of the products and keep the products in good and functional condition; (v) be solely responsible for all risks and assume all risks and pay or reimburse MintT for all costs arising from the theft or other loss, destruction or damage of the products, however caused, until the products are returned to MintT; (vi) grant MintT access to the Sensor Spaces to inspect the products and allow it to provide products maintenance or repair service, upon reasonable advance notice and subject to the Client's reasonable confidentiality, security, health and safety requirements; (vii) grant MintT access to the Sensor Spaces to uninstall and retrieve the products where applicable; and (viii) maintain in effect during the term of the Contract, at the Client's expense, comprehensive and general insurance covering the products. Such insurance cover shall be obtained from reputable insurance companies. Upon reasonable request by MintT, the Client shall provide valid certificates of insurance. 


7.6 Limited guarantees 


MintT warrants that for a period of one year from the date of delivery of the product to the Client (in the case of a purchase) or for the term of the Contract (in the case of a lease), the unmodified products will be free from defects in material, workmanship and design. If a defect in material, workmanship and/or design is reported to MintT during the aforementioned warranty period, MintT will, at its discretion, repair or replace the product or reimburse the Client for the defective product. In the event of repair or replacement, MintT will fulfil its repair/replacement obligation within a reasonable and mutually agreed period of time. 

No employee, representative, licensor or agent of MintT is authorized to make any modification, extension or addition to these limited warranties. 

Subject to the foregoing, the products are provided on an "as is" basis, and all other conditions, representations and warranties, express or implied, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose (even if given for that purpose), or arising from a course of dealing, usage, or trade usage, are excluded to the fullest extent permitted by applicable law. 

Any modification or alteration of the products may result in the inability to use the services. MintT is not responsible for any interruption of the services caused by the Client's modification or alteration of the products. 


7.7  Repair and replacement


In the event of a product failure, the Client will contact MintT at contact@mintt.care to obtain a Return Material Authorization (RMA) number. The replacement part may be refurbished or replaced with similar products at MintT's option. MintT cannot guarantee that new replacement units will be supplied.


8.  MintT Platform and Dashboard - Accessibility and support for potential issues

8.1  MintT will take all reasonable steps to make the services available to the Client 7 days a week, 24 hours a day, except in the case of scheduled or emergency maintenance and without accepting any obligation of result in this respect.


8.2 MintT regularly maintains the MyISA platform and Dashboard. Wherever possible, MintT will inform the Client of any maintenance (planned or unplanned) that may affect the services, even if no interruption of service is to be expected.


8.3 Error Reporting 


MintT will be available to receive reports of errors, faults or malfunctions in the services ("Errors") from 9:00 a.m. to 5:00 p.m., Belgian local time (CET), on each business day ("Normal Business Hours"). Errors experienced by the Client shall be reported by an Authorised Contact of the Client by e-mail to support@mintt.care or via another communication channel specified by MintT. Each Error report will be accompanied or followed by sufficient information to enable MintT to reproduce and verify the Error. MintT shall use its best efforts to reproduce and verify reported Errors and to provide either (a) a bug fix, patch or other modification or addition which, when made or added to the services, corrects an Error, or (b) a procedure or routine which, when observed in the regular operation of the service, eliminates the adverse practical effects of an Error on the Client ("Error Correction"), in accordance with the initial response times and other terms set out herein, depending on the severity of the Errors: 

“Severity 1” is an emergency production situation where the service is totally unusable or fails catastrophically and there is no workaround; 

“Severity 2” is a detrimental situation (and there is no workaround) where (a) performance degrades significantly resulting in a serious impact on usability, (b) the service is usable but materially incomplete; or (c) one or more key functions or commands are inoperable; 

“Severity 3” is a situation in which the service is usable, but does not provide a function in the most convenient manner; and  

“Severity 4” is a minor problem or documentation error.


8.4  Error correction


Severity 1 Error. MintT will endeavour, where possible, to commence work to verify the Error within four (4) hours during Normal Business Hours of receiving the Error report from the Client. After verification, MintT will use commercially reasonable efforts to correct the Error with an Error Correction within two (2) business days. MintT will provide Client with periodic reports (at mutually agreed times) on the status of the Error Correction.  

Severity 2 Error. MintT will endeavour, where possible, to commence work to verify the Error within one (1) business day during Normal Business Hours following receipt of the Error report from the Client. After verification, MintT will use commercially reasonable efforts to correct the Error with an Error Correction within three (3) business days. MintT will provide Client with periodic reports (at mutually agreed times) on the status of the Error Correction.  

Severity 3 Error. MintT will endeavour, where possible, to commence work to verify the Error within five (5) working days during Normal Business Hours following receipt of the Error report from the Client. After verification, MintT will use commercially reasonable efforts to include Error Correction in a subsequent update. MintT will provide Client with periodic reports (at mutually agreed times) on the status of the Error Correction.  

Severity 4 Error. MintT will consider the request to include an Error Correction in a subsequent software update. 


9. MintT obligations in relation to the services 


9.1 MintT shall, at its expense, use all reasonable commercial efforts to correct any problems in the provision of the services, or provide the Client with an alternative means of achieving the expected performance under the Contract. This shall be the Client's sole and exclusive remedy for any breach of this Section.  


9.2 MintT does not warrant that the Client's use of the services will be uninterrupted or error-free; nor does it warrant that the services will meet the Client's requirements. 


9.3 MintT is not responsible for delays, delivery failures or any other loss or damage resulting from the use of communications networks and facilities (such as the Internet). 


9.4 MintT shall not be liable for incomplete, incorrect or improper performance of the services caused by the use of the services by the Client or authorized users contrary to MintT's instructions, or by the modification or alteration of the services by any party other than MintT's duly authorized service providers or agents .  


10. Client’s obligations 

10.1 The Client undertakes to provide MintT with (i) all necessary cooperation in connection with the Contract and (ii) the necessary access to information required by MintT. 

10.2 The Client is solely responsible for the protection of its computer systems and assumes full responsibility for all adverse consequences of the erroneous, illegal or unauthorised use of the MintT network or platform and/or services by himself or by third parties.  

10.3 The Client shall ensure that authorised users use the services in accordance with the Contract and shall be liable for any breach by an authorised user. 

10.4 The Client is solely responsible for procuring and maintaining its network connections and telecommunications links from its systems to the services. 


11. LIMITATION OF LIABILITY


11.1  MintT's obligations in relation to the provision of the services are obligations of means and not obligations of result.

11.2 MintT cannot be held liable for interruptions of services due to causes beyond its control, such as problems caused by the Client's equipment or use of the services or products contrary to instructions, attributable to the Client or to third parties. 

11.3  Without prejudice to the more restrictive liability provisions set out in the Contract, MintT shall in no event be liable for any loss of data, lost revenue, lost profits, damage to reputation, business interruption or any indirect, incidental, consequential, special, punitive, exemplary or other similar type of damage arising out of or in connection with the Contract, including but not limited to the use of the services or materials, or the inability to use the same.

11.4 Without prejudice to the more restrictive liability provisions set out in the Contract, and except in the case of death or physical injury, MintT’s maximum aggregate liability to the Client arising out of or in connection with the Contract, including the use or inability to use the services and/or products, shall in no event exceed a sum equal to the total amounts actually paid by the Client to MintT under the Contract for the service and/or product concerned during the 12 months-period immediately preceding the event giving rise to liability. 

11.5  MintT further excludes any liability related to the use of the services and/or products in combination with any software, hardware, data and/or materials not provided by MintT. In particular, MintT excludes any liability for data passing through Third Party Platforms (as defined in Section 16 below).

11.6 The existence of more than one claim will not enlarge or extend the limits set forth in this Section 11. The Client guarantees that the personal data has been collected in accordance with all directly applicable European Union regulations, including but not limited to Regulation (EU) 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation – "GDPR"), as well as any implementing acts of the GDPR, Belgian law, and Belgian Royal Decrees implementing the GDPR, including the Law of 30 July 2018 on the protection of natural persons with regard to the processing of personal data, and (ii) any similar applicable legislation of countries outside the European Union ("Privacy Law"). The Client further guarantees that it is authorized under the Privacy Law to allow MintT to process such personal data. This includes, without limitation, the Client's compliance with its obligations to process personal data on a valid legal basis and to provide the mandatory information under the Privacy Law to the data subjects. The Client also indemnifies MintT against any claim or complaint made by a data subject in connection with the services and the processing of the Client’s personal data.

11.7 Complaints must be reported by the Client to MintT within five calendar days of the occurrence of the incident. Upon expiry of this period, MintT can consider the Client's complaint inadmissible and MintT will have no further obligation or responsibility with regard to said incident. 


12. INDEMNITY

12.1  The Client shall defend, indemnify and hold harmless MintT, its officers, directors, employees, agents and subcontractors from and against any and all claims, actions, proceedings, losses, damages, expenses and costs (including, without limitation, court costs and reasonable legal fees) arising out of or in connection with the Client's use of the services.

12.2 MintT will provide reasonable cooperation to the Client in the defence and settlement of any claim, at the Client's expense. 


13. PROPERTY - INTELLECTUAL PROPERTY RIGHTS 

13.1 MintT's services and products, the Dashboard, the ISA platform, the documentation, the content of MintT's websites, are the property of MintT or its licensors and are protected by copyright, trademarks, database rights, software and computer program rights, trade secrets, other intellectual, industrial and/or other property rights that may exist in the world ("Intellectual Property Rights"). All Intellectual Property Rights developed by MintT in the course of providing the services to the Client are the exclusive property of MintT. 

13.2  The right to use the services only gives the Client a personal and non-transferable right to use the services for a specified period of time as specified in the Contract.


14. CONFIDENTIALITY

14.1  Any information disclosed by one Party (the "Disclosing Party") to the other Party (the "Recipient") of a technical, financial, legal, strategic or commercial nature and which is not public, in the framework of contractual negotiation or performance of the Contract, shall be deemed to constitute "Confidential Information", as well as any copy, analysis, summary or abstract of Confidential Information. MintT's Confidential Information include, but are not limited to, details of the services, the results of any performance test of the services, software source and object codes, data models, algorithms, anonymised data observed and generated by MintT during the performance of the Contract.

14.2  Both during the term of the Contract and after termination or expiration of the Contract (for so long as the Confidential Information remains confidential and for a minimum period of five (5) years from the termination or expiration of the Contract, regardless of cause), the Recipient shall keep the Disclosing Party's Confidential Information confidential and, except as required by applicable law (i) may not disclose the Disclosing Party's Confidential Information to third parties without the Disclosing Party's prior written consent, except to those persons who must necessarily have knowledge of the Confidential Information to enable the Recipient to perform its obligations under the Contract and (ii) may not use the Disclosing Party's Confidential Information for any purpose other than the performance of the Recipient's obligations under the Contract. The Client agrees that MintT may disclose certain Client Confidential Information to MintT's subcontractors for the purpose of providing the services, as the case may be.

14.3  The Recipient shall use the same degree of care as it applies to protect its own confidential information of a similar nature, but no less than a reasonable degree of care, to prevent the unauthorised disclosure, publication or dissemination of the Disclosing Party's Confidential Information.

14.4  MintT is permitted to use Client’s Confidential Information to provide the services. MintT is further permitted to use anonymised Client’s Confidential Information to improve its services and/or software, for statistical and research and development purposes, and to develop any other services and/or software (including for the purposes of algorithm training, service adaptation and machine learning). The resulting information will be considered derivative Confidential Information that belong to MintT. MintT may transfer the anonymous data observed and generated during the performance of the Contract to third parties, use or market them as long as MintT does not violate its confidentiality obligations and as long as these data do not contain personal data. MintT is under no obligation to transfer or disclose its Confidential Information to the Client. The Client has no rights to the resulting creations, software, data or observations.

14.5 The Recipient agrees to immediately notify the Disclosing Party in the event that it becomes aware of any unlawful obtaining, use or disclosure of the Disclosing Party's Confidential Information. 

14.6  The Recipient shall be entitled to disclose the Disclosing Party's Confidential Information to third parties to the extent required by law or court order, provided that the Recipient (i) gives prior written notice to the Disclosing Party (if permitted) and (ii) co-operates with the Disclosing Party in seeking to limit, prevent or legally avoid such disclosure, or in requiring that such disclosure be subject to confidentiality obligations.

14.7 The Recipient undertakes, at the first request of the Disclosing Party and at the latest on the date of termination of the contractual relationship, to immediately cease all use of the Confidential Information. 


15. PROTECTION OF PERSONAL DATA

15.1  Personal data of the MyISA platform administrator

15.1.1  MintT processes as controller the personal data of the MyISA platform administrator (appointed by the Client) for the purpose of managing and administering access to the MyISA platform. Such processing is done on the basis of MintT's legitimate interests (i.e. to perform its contractual obligations towards the Client and to identify and manage the administrator appointed to manage the MyISA platform). Information on how MintT processes such personal data are included in APPENDIX A - ADMINISTRATOR INFORMATION NOTICE which is also available at https://mintt.care/legaldocs/NoticeAdmin-UK.

15.1.2 The Client undertakes to provide a copy of the contents of the APPENDIX A - ADMINISTRATOR INFORMATION NOTICE to the administrator appointed within the Client to manage access to the MyISA platform and services, as well as any updates or modifications provided by MintT to the Client. 

15.2 Processing of personal data by MintT as processor, on behalf of the Client 

15.2.1  In the context of the performance of the Contract, MintT processes personal data on behalf of the Client and acts as processor, with the Client acting as controller.

15.2.2 APPENDIX B - DATA PROCESSING AGREEMENT contains the applicable contractual clauses completed on the basis of the standard contractual clauses between controllers and processors under Article 28(7) of Regulation (EU) 2016/679 of the European Parliament and of the Council of 4 June 2021 (COMMISSION IMPLEMENTING DECISION (EU) 2021/915). The Parties undertake to sign the APPENDIX B - DATA PROCESSING AGREEMENT at the same time as the Contract.

15.2.3  The Client warrants that the personal data have been collected in accordance with any directly applicable European Union regulation, including without limitation Regulation (EU) 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation - "GDPR") as well as any act derived from the GDPR, Belgian law and Belgian Royal Decree implementing the GDPR, including the law of 30 July 2018 on the protection of natural persons with regard to the processing of personal data and (ii) any similar applicable legislation of countries outside the European Union ("Privacy Law"). The Client further warrants that it is authorised by the Privacy Law to allow MintT to process such personal data. This includes, but is not limited to, the Client's compliance with its obligations to process personal data in accordance with a valid legal basis and to provide the information required under the Privacy Law to the persons concerned. The Client further indemnifies MintT against any claim or complaint made by a data subject in relation to the services and the processing of Client's personal data.


16.  Third party products

MintT's products may contain or be accompanied by certain third party products that are provided to the Client under different terms and conditions than the Contract, or that require MintT to provide the Client with a separate user agreement, certain notices and/or other related information. The Client's use of a third party product for which MintT may have identified a separate user agreement, notices or other related information will be subject to the terms and conditions contained therein. The Contract does not apply to such third party products. In addition, MintT may, via certain APIs (Application Programming Interfaces), allow the Client to integrate all or part of the services into a third party management platform ("Third Party Platform").


17. Term and Termination of the Contract 

17.1  The Contract comes into force on the date specified in the Offer. Unless otherwise expressly stated in the Offer, the initial period of the Contract is 36 months (the "Initial Period"). After the expiry of the Initial Period, the Contract shall be automatically renewed for successive periods of three (3) years (the "Additional Periods") unless either Party gives written notice to the other Party at least three (3) months prior to the expiry of the Initial Period or the then current Additional Period, as applicable.

17.2 The Client is entitled to terminate the Contract in the event that the Client does not agree to substantial change(s) to these General Terms and Conditions, notified to the Client by MintT at least thirty (30) calendar days before the announced date of entry into force of such changes. The Client must notify MintT, in writing by registered mail, of its objections to the substantial changes to the General Terms and Conditions, as well as its intention to terminate the Contract, within thirty (30) calendar days of the notification of such changes by MintT. Section 5.3 shall apply in connection with an adjustment of fees. 

17.3 The Client has the right to terminate the Contract, without having to justify any particular reason, by paying a compensation equivalent to six (6) months of service. 

17.4 Either Party may terminate the Contract without liability to the other Party and without the need for legal action:  

​(a) if the other Party materially breaches any provision of the Contract and (if capable of being cured) fails to cure the breach within thirty (30) calendar days of ​written notice to that Party of the breach; or 

​(b) in the event of a decision or order for the dissolution or bankruptcy of the other Party, or circumstances authorising a competent court to decide on the dissolution ​of the other Party; or

​(c) if the other Party ceases or threatens to cease its activity. 

17.5 if the other Party ceases or threatens to cease its activity. 

​(a) the Client returns the leased products (if any); and

​(b) the Recipient shall delete all Confidential Information of the Disclosing Party (with written confirmation), except for routine back-ups and copies necessary for the ​defence of the rights of the Parties (which shall remain subject to the confidentiality obligations of the Contract) no later than thirty (30) calendar days after the end ​of the Contract .

17.6  The Client shall not be relieved of its obligation to pay all sums due under the Contract prior to the date of suspension, expiration or termination of the Contract.


18. REFERENCE

The Client authorises MintT to refer to the Client's name in its customers list. The Client further agrees that MintT may refer to the fact that it uses MintT's services in its marketing materials and on its websites. The Client grants MintT a non-exclusive, royalty-free license to use the Client's brand and logo in MintT's marketing materials. MintT shall comply with all reasonable written instructions given by the Client in relation to such use. This licence is granted to MintT during the term of the Contract only. 


19.  MISCELLANEOUS

19.1  The Contract shall be governed by and construed in accordance with the laws of Belgium, without giving effect to any other choice of law or conflict of laws rules (Belgian, foreign or international) that would result in the designation of the law of a jurisdiction other than Belgium as the applicable law.

19.2  Any dispute relating to the validity, interpretation, performance or termination of the Contract and/or the services shall be submitted to the exclusive jurisdiction of the French-speaking courts of Brussels (Belgium).

19.3  The Contract contains the entire agreement between the Parties with respect to the subject matter to which it refers and contains everything that the Parties have negotiated and agreed upon in connection with this Contract. It replaces and annuls any agreement, communication, offer, proposal or correspondence, whether oral or written, previously exchanged or entered into between the Parties and relating to the same subject matter. No amendment or modification of the Contract shall be effective unless it is in writing and signed by duly authorised representatives of the Parties.

19.4  Nothing in the Contract is intended to create or does create a partnership between the Parties, or authorises one Party to act as agent for the other Party. Neither Party has the authority to act for and on behalf of the other Party or otherwise bind the other Party.

19.5  The Client may not, without the prior written consent of MintT, assign, transfer, obtain remuneration for, subcontract or otherwise monetise to third parties all or part of its rights or obligations under the Contract.

19.6  MintT may, at any time, assign, transfer, obtain remuneration for, subcontract or otherwise monetise all or part of its rights or obligations under the Contract to third parties. MintT may also subcontract the performance of its obligations under the Contract, in which case MintT shall remain fully liable to the Client for the performance of the subcontracted parts of the services.

19.7 MintT shall be free to assign or transfer the Contract in whole or in part or its rights and/or obligations under the Contract to its subsidiaries or to third parties, in such form and structure as MintT deems appropriate. This paragraph applies to any type of transfer of rights or obligations under the Contract, whether as an individual asset or as part of a transfer of a business unit or branch of activity, including, without limitation, in the event of a merger, demerger, contribution of a business unit or branch of activity, liquidation, bankruptcy or transformation of MintT. 

19.8  Any waiver of a right must be made expressly and in writing.

19.9  If any provision (or part of a provision) of the Contract is declared invalid, unenforceable or illegal by a competent court or administrative authority, the remaining provisions shall remain in force. In the event that any such invalid, illegal or unenforceable provision affects the entire nature of the Contract, each of the Parties shall forthwith endeavour to negotiate in good faith a legally valid replacement provision. If no agreement on such a provision has been reached within thirty (30) days, either Party shall have the right to terminate the Contract upon thirty (30) days' written notice.

19.10 MintT shall not be liable for any delay or failure to perform any of its obligations under the Contract resulting from force majeure. If MintT is affected by an event of force majeure, it shall notify the Client as soon as possible of the nature, severity and likely impact on MintT's ability to perform its obligations under the Contract. Notwithstanding the foregoing, MintT shall use all reasonable endeavours to continue to perform its obligations under the Contract for the duration of the force majeure event. 

Annexes

LIST OF APPENDICES:

A. ANNEXE A –  ADMINISTRATOR INFORMATION NOTICE

B. ANNEXE B –  DATA PROCESSING AGREEMENT



ANNEXE A – ADMINISTRATOR INFORMATION NOTICE

 

MintT –  Data protection information notice for the administrator of the MyISA platfor

1. Introduction.  The purpose of this data protection notice (the "Notice") is to inform you about the way in which MintT SA (a company incorporated under Belgian law, with its registered office at Avenue Louise 251, 1000 Brussels, registered with the Crossroads Bank for Enterprises under number 0544.636.885, "MintT") processes certain personal data about you as administrator of the MyISA platform.

2. Controller. MintT is controller of your personal data as described in this Notice.

3. Categories of personal data processed . The personal data collected and processed include the following data: name, surname, employer's name; user name (e-mail address) and password; access and modification logs; and access and modification rights.

4. Purposes of processing . Personal data are processed for the purpose of managing and administering access to the MyISA platform (insofar as you are the designated administrator by your employer).

5. Legal basis for processing. MintT relies on its legitimate interests to carry out the processing (i.e. to perform its contractual obligations to your employer and to identify and manage the administrator appointed to run the MyISA platform).

6. Transfer of your personal data to third parties. Generally, MintT will not transfer your personal data to third parties, except for those transfers that are (i) permitted by applicable law or (ii) referred to in this section or elsewhere in this Notice. Personal data is transferred to external service providers and subcontractors (in relation to data hosting) in relation to whom MintT has taken appropriate measures for the protection of your personal data, in accordance with applicable law, and exclusively for the processing purposes described in this Notice. Insofar as this involves the transfer of your personal data to countries outside the European Economic Area which are not considered by the European Commission to provide an adequate level of protection of personal data, MintT will ensure that measures are put in place in accordance with the applicable legislation, such as the signing of European Commission standard contractual clauses.

7. Security. MintT has put in place appropriate technical and organisational measures to protect your personal data against accidental or unauthorised destruction, loss, modification, deterioration, use, access, disclosure or any other unlawful or unauthorised processing. To guarantee such security, MintT uses, among other things, encryption of the communication between servers.

8. Duration of retention of personal data. MintT will delete your personal data after a maximum of six months following (i) the end of your appointment as administrator by your employer or (ii) the deactivation of the MyISA platform services at your employer's premises.

9. Your rights. You have the right to access your personal data as collected and processed by MintT and to request rectification of inaccuracies or deletion in certain limited cases or in the event the data are unnecessary. In general, you also have the right to withdraw your consent at any time when processing is based on your consent. Such withdrawal of consent does not affect the lawfulness of the processing based on consent carried out prior to the withdrawal. In some cases, you also have the right to portability of your personal data. You have the right to lodge a complaint with a supervisory authority, in particular in the Member State of the European Union where you are normally resident, work or where the breach is alleged to have occurred, if you consider that the processing of your personal data constitutes a breach of the applicable law. To exercise your rights, you may (i) contact your employer who will forward your request to MintT, (ii) contact MintT by sending a written and signed request to MintT at the e-mail address privacy@mintt.care or to the postal address MintT SA - Avenue Louise 251, 1000 Brussels, Belgium, together with a copy of your identity card or any other document proving that you are the person concerned by the personal data. 

10. Contacts. MintT SA - Avenue Louise 251, 1000 Brussels, Belgium - E-mail: privacy@mintt.care. 

Data Protection Officer (DPO): The Privacy Office, Hochstrasse 81, 4700 Eupen, Belgium - Email: mailto: DPO@mintt.care 



ANNEXE B –  DATA PROCESSING AGREEMENT

 

Contractual clauses between controllers and processors under Article 28(7) of the GDPR ;

 

SECTION I

 

Clause 1 - Purpose and scope

a)  The purpose of these Standard Contractual Clauses (the Clauses) is to ensure compliance with Article 28(3) and (4) of Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).

b)  The controllers and processors listed in Annex I have agreed to these Clauses in order to ensure compliance with Article 28(3) and (4) of Regulation (EU) 2016/679 and/or Article 29(3) and (4) of Regulation (EU) 2018/1725.

c)  These Clauses apply to the processing of personal data as specified in Annex II.

d)  Annexes I to IV are an integral part of the Clauses.

e)  These Clauses are without prejudice to obligations to which the controller is subject by virtue of Regulation (EU) 2016/67.

f)  These Clauses do not by themselves ensure compliance with obligations related to international transfers in accordance with Chapter V of Regulation (EU) 2016/679 and/or Regulation (EU) 2018/1725.

Clause 2 - Invariability of the Clauses

a)  The Parties undertake not to modify the Clauses, except for adding information to the Annexes or updating information in them.

b)  This does not prevent the Parties from including the standard contractual clauses laid down in these Clauses in a broader contract, or from adding other clauses or additional safeguards provided that they do not directly or indirectly contradict the Clauses or detract from the fundamental rights or freedoms of data subjects.

Clause 3 - Interpretation

a)  Where these Clauses use the terms defined in Regulation (EU) 2016/679 or Regulation (EU) 2018/1725 respectively, those terms shall have the same meaning as in that Regulation.

b)  These Clauses shall be read and interpreted in the light of the provisions of Regulation (EU) 2016/679 or Regulation (EU) 2018/1725 respectively.

c)  These Clauses shall not be interpreted in a way that runs counter to the rights and obligations provided for in Regulation (EU) 2016/679 or in a way that prejudices the fundamental rights or freedoms of the data subjects.

Clause 4 - Hierarchy

In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties existing at the time when these Clauses are agreed or entered into thereafter, these Clauses shall prevail.

[Clause 5 - Optional (not retained)]


SECTION II - OBLIGATIONS OF THE PARTIES

Clause 6 -  Description of processing(s)

The details of the processing operations, in particular the categories of personal data and the purposes of processing for which the personal data is processed on behalf of the controller, are specified in Annex II. 

Clause 7 - Obligations of the Parties

7.1. Instructions

a)  The processor shall process personal data only on documented instructions from the controller, unless required to do so by Union or Member State law to which the processor is subject. In this case, the processor shall inform the controller of that legal requirement before processing, unless the law prohibits this on important grounds of public interest. Subsequent instructions may also be given by the controller throughout the duration of the processing of personal data. These instructions shall always be documented.

b) The processor shall immediately inform the controller if, in the processor’s opinion, instructions given by the controller infringe Regulation (EU) 2016/679 or the applicable Union or Member State data protection provisions.

7.2. Purpose limitation

The processor shall process the personal data only for the specific purpose(s) of the processing, as set out in Annex II, unless it receives further instructions from the controller.

7.3.  Duration of the processing of personal data

Processing by the processor shall only take place for the duration specified in Annex II.

7.4.  Security of processing 

a) The processor shall at least implement the technical and organisational measures specified in Annex III to ensure the security of the personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects. 

b)  The processor shall grant access to the personal data undergoing processing to members of its personnel only to the extent strictly necessary for implementing, managing and monitoring of the contract. The processor shall ensure that persons authorised to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.

7.5.  Sensitive data

If the processing involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (“sensitive data”), the processor shall apply specific restrictions and/or additional safeguards.

7.6.  Documentation and compliance

a)  The Parties shall be able to demonstrate compliance with these Clauses.

b)  The processor shall deal promptly and adequately with inquiries from the controller about the processing of data in accordance with these Clauses.

c)  The processor shall make available to the controller all information necessary to demonstrate compliance with the obligations that are set out in these Clauses and stem directly from Regulation (EU) 2016/679. At the controller’s request, the processor shall also permit and contribute to audits of the processing activities covered by these Clauses, at reasonable intervals or if there are indications of non-compliance. In deciding on a review or an audit, the controller may take into account relevant certifications held by the processor.

d)  The controller may choose to conduct the audit by itself or mandate an independent auditor. Audits may also include inspections at the premises or physical facilities of the processor and shall, where appropriate, be carried out with reasonable notice.

e)  The Parties shall make the information referred to in this Clause, including the results of any audits, available to the competent supervisory authority/ies on request.

7.7.  Use of sub-processors

a)  The processor has the controller’s general authorisation for the engagement of sub-processors from an agreed list. The processor shall specifically inform in writing the controller of any intended changes of that list through the addition or replacement of sub-processors at least one month in advance, thereby giving the controller sufficient time to be able to object to such changes prior to the engagement of the concerned sub-processor(s). The processor shall provide the controller with the information necessary to enable the controller to exercise the right to object.

b)  Where the processor engages a sub-processor for carrying out specific processing activities (on behalf of the controller), it shall do so by way of a contract which imposes on the sub-processor, in substance, the same data protection obligations as the ones imposed on the data processor in accordance with these Clauses. The processor shall ensure that the sub-processor complies with the obligations to which the processor is subject pursuant to these Clauses and to Regulation (EU) 2016/679 and/or Regulation (EU) 2018/1725.

c)  At the controller’s request, the processor shall provide a copy of such a sub-processor agreement and any subsequent amendments to the controller. To the extent necessary to protect business secret or other confidential information, including personal data, the processor may redact the text of the agreement prior to sharing the copy.

d)  The processor shall remain fully responsible to the controller for the performance of the sub-processor’s obligations in accordance with its contract with the processor. The processor shall notify the controller of any failure by the sub-processor to fulfil its contractual obligations.

e)  The processor shall agree a third party beneficiary clause with the sub-processor whereby - in the event the processor has factually disappeared, ceased to exist in law or has become insolvent - the controller shall have the right to terminate the sub-processor contract and to instruct the sub-processor to erase or return the personal data.

7.8.  International transfers

a)  Any transfer of data to a third country or an international organisation by the processor shall be done only on the basis of documented instructions from the controller or in order to fulfil a specific requirement under Union or Member State law to which the processor is subject and shall take place in compliance with Chapter V of Regulation (EU) 2016/679 or Regulation (EU) 2018/1725.

b)  The controller agrees that where the processor engages a sub-processor in accordance with Clause 7.7. for carrying out specific processing activities (on behalf of the controller) and those processing activities involve a transfer of personal data within the meaning of Chapter V of Regulation (EU) 2016/679, the processor and the sub-processor can ensure compliance with Chapter V of Regulation (EU) 2016/679 by using standard contractual clauses adopted by the Commission in accordance with of Article 46(2) of Regulation (EU) 2016/679, provided the conditions for the use of those standard contractual clauses are met.

Clause 8 -  Assistance to the controller

a)  The processor shall promptly notify the controller of any request it has received from the data subject. It shall not respond to the request itself, unless authorised to do so by the controller.

b)  The processor shall assist the controller in fulfilling its obligations to respond to data subjects’ requests to exercise their rights, taking into account the nature of the processing. In fulfilling its obligations in accordance with (a) and (b), the processor shall comply with the controller’s instruction.

c)  In addition to the processor’s obligation to assist the controller pursuant to Clause 8(b), the processor shall furthermore assist the controller in ensuring compliance with the following obligations, taking into account the nature of the data processing and the information available to the processor:

​1)  the obligation to carry out an assessment of the impact of the envisaged processing operations on the protection of personal data (a ‘data protection impact assessment’) where a type of ​processing is likely to result in a high risk to the rights and freedoms of natural persons;

​2) the obligation to consult the competent supervisory authority/ies prior to processing where a data protection impact assessment indicates that the processing would result in a high risk in ​the absence of measures taken by the controller to mitigate the risk;  ​

​3) the obligation to ensure that personal data is accurate and up to date, by informing the controller  without delay if the processor becomes aware that the personal data it is processing is ​inaccurate or has become outdated;

​4) the obligations in Article 32 of Regulation (EU) 2016/679.  ​

d)  The Parties shall set out in Annex III the appropriate technical and organisational measures by which the processor is required to assist the controller in the application of this Clause as well as the scope and the extent of the assistance required.

Clause 9 -  Notification of personal data breach

In the event of a personal data breach, the processor shall cooperate with and assist the controller for the controller to comply with its obligations under Articles 33 and 34 of Regulation (EU) 2016/679 or under Articles 34 and 35 of Regulation (EU) 2018/1725, where applicable, taking into account the nature of processing and the information available to the processor.

9.1.  Data breach concerning data processed by the controller

In the event of a personal data breach concerning data processed by the controller, the processor shall assist the controller:

a)  in notifying the personal data breach to the competent supervisory authority/ies, without undue delay after the controller has become aware of it, where relevant/(unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons);

b)  in obtaining the following information which, pursuant to Article 33(3) of Regulation (EU) 2016/679, shall be stated in the controller’s notification, and must at least include:

​1)  the nature of the personal data including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal ​data records concerned;

​2)  the likely consequences of the personal data breach;

​3)  the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.

Where, and insofar as, it is not possible to provide all this information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay.

c)  in complying, pursuant to Article 34 of Regulation (EU) 2016/679, with the obligation to communicate without undue delay the personal data breach to the data subject, when the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons.

9.2.  Data breach concerning data processed by the processor

In the event of a personal data breach concerning data processed by the processor, the processor shall notify the controller without undue delay after the processor having become aware of the breach. Such notification shall contain, at least:

a) a description of the nature of the breach (including, where possible, the categories and approximate number of data subjects and data records concerned);

b) the details of a contact point where more information concerning the personal data breach can be obtained;

c) its likely consequences and the measures taken or proposed to be taken to address the breach, including to mitigate its possible adverse effects.

Where, and insofar as, it is not possible to provide all this information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay.

The Parties shall set out in Annex III all other elements to be provided by the processor when assisting the controller in the compliance with the controller’s obligations under Articles 33 and 34 of Regulation (EU) 2016/679.


SECTION III -  FINAL PROVISIONS 

Clause 10 -  Non-compliance with the Clauses and termination

a) Without prejudice to any provisions of Regulation (EU) 2016/679 and/or Regulation (EU) 2018/1725, in the event that the processor is in breach of its obligations under these Clauses, the controller may instruct the processor to suspend the processing of personal data until the latter complies with these Clauses or the contract is terminated. The processor shall promptly inform the controller in case it is unable to comply with these Clauses, for whatever reason.

b) The controller shall be entitled to terminate the contract insofar as it concerns processing of personal data in accordance with these Clauses if:

​1) the processing of personal data by the processor has been suspended by the controller pursuant to point (a) and if compliance with these Clauses is not restored within a reasonable time and in any event within one month following suspension;

​2) the processor is in substantial or persistent breach of these Clauses or its obligations under Regulation (EU) 2016/679 and/or Regulation (EU) 2018/1725;

​3) the processor fails to comply with a binding decision of a competent court or the competent supervisory authority/ies regarding its obligations pursuant to these Clauses or to Regulation (EU) 2016/679 and/or Regulation (EU) 2018/1725.

c) The processor shall be entitled to terminate the contract insofar as it concerns processing of personal data under these Clauses where, after having informed the controller that its instructions infringe applicable legal requirements in accordance with Clause 7.1 (b), the controller insists on compliance with the instructions.

d)  Following termination of the contract, the processor shall, at the choice of the controller, delete all personal data processed on behalf of the controller and certify to the controller that it has done so, or, return all the personal data to the controller and delete existing copies unless Union or Member State law requires storage of the personal data. Until the data is deleted or returned, the processor shall continue to ensure compliance with these Clauses.

 

ANNEXE I - List of parties

Controller :  

​Identity and contact details of the data controller and, where applicable, of the controller’s data protection officer, included in the signed Offer Pre-Installation Form. 

Processor :  

MintT SA, a company incorporated under Belgian law with its registered office at Avenue Louise 251, 1000 Brussels, Belgium and registered with the Crossroads Bank for Enterprises under ​number 0544.636.885  

Data Protection Officer: The Privacy Office, Hochstrasse 81, 4700 Eupen, Belgium - Email: DPO@mintt.care 

Name, function and contact details of the contact person: Sabine Mersch - TPO <sme@tpo.solutions>


ANNEXE II -  Description of the processing

Categories of data subjects whose personal data is processed: 

​Client staff using the interface, residents and/or patients, visitors  

Categories of personal data processed : 

  • Relating to the Client's staff members using the interface: surname, first name, professional email address, interface usage logs,  
  • Relating to residents and/or patients : 3D data 
  • Relating to visitors : 3D data 

Sensitive data processed (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures: Not applicable.

Nature of the processing : 

​Capture of raw sensor data, transformation into 3D data, storage of 3D data, consultation for moderation and annotation purposes, provision to the client, anonymisation.

Purpose(s) for which the personal data is processed on behalf of the controller : 

​User access management and administration, platform support and sensor maintenance, 3D data generation, event detection, event notification, event moderation, event moderation ​verification, alert notification, alert management, alert acknowledgement, intervention acknowledgement, real-time image viewing 

Duration of the processing :  

​One month. 

For processing by (sub-)processors, also specify subject matter, nature and duration of the processing: 

​Digital Ocean: Storage of 3D data and logs. The data is processed for a period of one month from the time of capture. 

​Ecritel: HDS storage of 3D data and logs. The data is processed for a period of one month from the time of capture. 


 

ANNEXE III -  Technical and organisational measures including technical and organisational measures to ensure the security of the data

 

1.  Control of the organisation

The processor (MintT SA) has implemented and maintains appropriate technical and organisational measures to prevent unauthorised or unlawful processing of personal data and the accidental loss, destruction or damage of personal data.

1.1.  Policies and procedures

The processor (MintT SA) has adopted and implemented information security policies and standards. 

Individual measures :

  • Compilation, updating and implementation of guidelines on the processing of personal data.  
  • The organisation has a safety charter

1.2.  Awareness raising and training

All staff (employees and contractors) undergo mandatory annual training on information security and data confidentiality.  

Individual measures :

  • Information sessions on data protection are organised 
  • Information is regularly sent on new data protection processes that are important for the respective users according to their role 
  • Information sessions on data security are organised 
  • Safety is regularly brought to the attention of the staff by means of e-mail reminders. 

1.3.  Human resources security

All staff members sign a confidentiality agreement.

Individual measures :

•  The staff signed their employment contract with a specific confidentiality clause.

1.4.  Secure archiving

All documents, after the retention period, are archived or destroyed according to the data management and retention schedule.  

Individual measures :

  • An archive management process has been defined. 
  • Specific access arrangements to archived data have been put in place, as the use of an archive is specific and exceptional. 
  • Obsolete archives are securely destroyed. 
  • The longevity of digital information is sufficiently guaranteed. 
  • The archived data is only accessible to a specific department responsible for accessing it.

1.5.  Deletion/destruction of data

Documents and records are not kept longer than necessary. Documents and records are destroyed after the retention period so as not to breach regulatory requirements.  

Individual measures : 

  • A secure data destruction procedure, including data retention periods, has been put in place. 
  • Data is safely disposed of from the devices before they are discarded or sent to a third party for repair or at the end of the rental contract. 
  • We only use audited or certified data erasure software.

 

2.  Logical access control

The processor (MintT SA) has procedures in place to prevent unauthorised access to personal data. Access to information systems is based on the principles of "least privilege" and "need to know".

2.1.  Policies and procedures

The processor (MintT SA) has established an access control policy and related processes, objectives and procedures relevant to managing risk and improving information security to produce results consistent with our overall policies and objectives. 

Individual measures : 

  • An access control policy has been established, including purpose, audience, objectives. 
  • This access control policy includes procedures, expected consequences for individuals and security measures. 
  • The access control policy is reviewed regularly, at least once a year. 

2.2.  Separation of data

The processor (MintT SA) identifies, classifies, labels and processes the data and applies data protection mechanisms appropriate to the level of confidentiality and sensitivity.  

Individual steps : 

  • Several different classes of information have been defined 
  • Documents and e-mails containing confidential data are specifically marked. 
  • Obligation to place a visible and explicit notice on each page of paper or electronic documents containing sensitive data, in accordance with Art. 9 GDPR 
  • The servers hosting the databases are not used for other functions, such as browsing websites, accessing e-mail, etc. 
  • Databases are not stored in publicly accessible locations such as web folders, a temporary partition, etc. 
  • All systems handling sensitive data as defined in Article 9 of the GDPR are implemented in a dedicated (isolated) environment. 

2.3.  User access management

The processor (MintT SA) grants access privileges to the information systems on the basis of the "need to know" and "least privilege" principles.  

Individual steps : 

  • Users must authenticate themselves before they can access personal data. 
  • Individual user IDs are associated with users and shared access IDs are limited. If this is unavoidable, shared access credentials should be approved by management and recorded where appropriate. 
  • In the systems, tasks and areas of responsibility are segregated in order to limit users' access to only those data that are strictly necessary for the performance of their work. 
  • A user is immediately deleted if he/she is no longer authorised to access a room or an IT resource, and/or when he/she leaves the organisation. 
  • An annual review of access rights is carried out to identify and remove unused accounts and to realign the rights and roles of each user. 
  • Only qualified persons are allowed to access the administration tools and interfaces. 
  • Access is provided to users based on the concept of least privilege. 
  • Server administration operations must be performed via a dedicated service or an endpoint service that requires strong authentication 
  • Physical and logical access to diagnostic and configuration ports must be controlled. 
  • Appropriate measures are in place to ensure the secure administration of IT systems and Active Directory servers in particular. 
  • The use of administrator accounts is limited to IT staff. 

2.4.  Password management

The processor (MintT SA) has put in place the following procedures to prevent unauthorised access to personal data. 

Individual measures : 

  • MintT complies with the recommendations of the CNIL regarding passwords, particularly during the first access or following a password reset.  
  • When activating the application, the default passwords must be changed and the default accounts are disabled. 
  • Use of policies requiring certain criteria for password creation, such as character length, characters, etc. 
  • Specific password policy for administrators.  
  • Change passwords when an administrator leaves the organisation or in case of suspected compromise. 
  • Each application has a separate account. 

2.5.  Vulnerability management

Vulnerabilities are properly identified, detected, classified and prioritised, and are subject to remediation, validation and continuous monitoring.  

Individual measures : 

  • The "install updates automatically" function for all critical operating systems is always enabled. 
  • Protection against attacks on databases via SQL code injection, scripts. 
  • Systems to detect and prevent attacks on critical systems or servers are also used. 

2.6.  Confidentiality controls

The organisation collects, uses, stores, shares and protects personal information in connection with the services it provides.  

Individual approaches : 

  • Consent is obtained from individuals if cookies, other than those strictly necessary, are used. 
  • Personal data is not transmitted via a URL, such as IDs or passwords. 

2.7. Asset management 

The organisation's assets are inventoried, classified according to their sensitivity and an information owner is assigned.  

Individual measures : 

  • Limitation of the number of components implemented. Components are monitored and updated. 


3. Access registration 

 

Access to the organisation's assets is monitored to detect violations of IT security policies and to record events or other security incidents. ​

3.1.  Logging and monitoring

The organisation records and reviews all significant activity on all its information systems.  

Individual measures : 

  • A logging system is in place based on the ANSSI's "Security recommendations for the implementation of a logging system". 
  • Priority information and consultation of staff representatives, especially those whose activities are logged. 
  • Procedures describing how data accesses should be logged and regular review of the logs to detect any anomalies. 
  • Prohibition on the use of log information for purposes other than ensuring the correct use of the information processed.


4.  Security incident management system

 

The processor (MintT SA) follows the security incident management system to minimise the damage caused by information security incidents and to monitor and learn from information security incidents. 

4.1.  Policies and procedures

The processor (MintT SA) has processes in place to discover, manage and prevent future incidents. 

Individual measures : 

  • Use of defined procedures to notify the data protection authority of any data security breach. 

4.2.  Incident response

The processor (MintT SA) has developed, established and regularly reviewed an effective incident response plan that clearly specifies the roles, responsibilities and activities that must be followed when responding to an information security incident.  

Individual steps : 

  • Inform the controller as soon as possible of any anomaly or security incident. 
  • Once a security event has been reported and recorded, it is evaluated to determine the best course of action. 
  • Policy for managing incidents and personal data breaches and raising awareness of what users should do in the event of a security incident. 
  • In the event of a security incident, the measures specified by CERT-FR are applied. Assignment of owners, clear actions, time scales for an information security event or incident.


5.  Disclosure control

 

The processor (MintT SA) has controls in place to ensure that the information exchanged is protected against interception, copying, modification, misdirection and destruction.

5.1.  Policies and procedures

The organisation has established, documented, regularly reviewed and updated policies to ensure the protection of information in the networks and the information processing facilities that support them. 

Individual measures :

  • A policy that makes regular software updates and patch management mandatory has been established and implemented.  

5.2.  Disclosure control

The organisation ensures the correct and secure operation of information processing facilities, the protection of software integrity and the guarantee of the confidentiality and integrity of electronic communications. 

Individual measures : 

  • Workstations automatically log out of a session after a set period of inactivity to prevent unauthorised access. 
  • The allowed communication ports are limited to those necessary for the correct use of the applications installed on the workstation. 
  • Regular updating of anti-virus software 
  • Administrator rights are not given to users who do not have computer security skills. 
  • Confidential data is handled and disposed of securely. 
  • Implementing measures to protect against theft, including visible marking of equipment and mitigation of its effects, including automatic locking and encryption. 
  • Only the necessary Internet Protocols (IP) are allowed.

5.3. Mobile devices 

The organisation has taken certain precautionary measures to minimise the risk of compromise and ensure the security of information and infrastructure. 

Individual measures : 

  • Mobile device management framework for secure teleworking and mobile device use. 
  • Disabling the auto-run function to prevent unauthorised dissemination, alteration, deletion or destruction of information contained in the media. 
  • Annual awareness-raising of users on the specific risks associated with the use of mobile tools 
  • Controlled backup and synchronisation of mobile devices to protect against loss of stored data. 
  • Targeted use of hard drive encryption in laptops. 
  • Automatically logging smartphones out of a session after a certain period of inactivity to prevent unauthorised access and authentication to unlock them. 
  • When used in public places, use of a privacy filter on the screens of mobile devices. 

5.4.  Operating system

The organisation ensures that the operating system (OS) maintains confidentiality, integrity and availability. OS security protects systems and data from threats, viruses, worms, etc.  

Individual measures : 

  • Use of up-to-date operating systems. 
  • Installation of critical operating system updates without delay, with automatic weekly checks.

5.5.  Network protection

The organisation ensures the confidentiality, integrity and availability of the network infrastructure and provides controlled access to network resources and services based on business and security requirements.  

Individual measures 

  • Maximum restriction of Internet access by blocking non-essential services, such as peer to peer, etc. 
  • The WIFI network is protected 
  • Use of OTP authentication of users 
  • Use of remote access servers with secure VPN access 
  • Incoming/outgoing data flows are filtered and limited to necessary flows (firewall and proxy configuration and servers) 
  • Use of SSH or direct physical access to devices. 
  • Users do not have unfiltered access to the Internet 
  • Wireless networks or wifi are encrypted using a security algorithm (WPA2)  
  • Use of the recommendations published by the ANSSI for securing websites, TLS and Wi-Fi.  
  • Scanning network devices to find network devices and their details such as device status, response time and IP address. 
  • Information of users when their content is analysed. 
  • Use of a DMZ network for servers accessible from the Internet and firewalls to separate the networks. 

5.6. Encryption

The organisation designs and implements processes for the management, generation, distribution, storage, archiving, destruction, revocation and change of keys used in cryptographic systems.  

Individual steps : 

  • Use of the TLS protocol (replacing SSL) to ensure encryption and authentication for all online data exchange. 
  • No use of unsecured servers 
  • Use of the TLS protocol on all websites, using only the most recent version and verifying its correct implementation. 
  • All web pages and servers use TLS in their communications 
  • Removable media and mobile devices are encrypted before being shared. 
  • Use of an encrypted online email service when sharing sensitive documents by email based on the recommendations of CNIL sheet 17. 
  • Use of the HTTPS protocol to guarantee confidentiality and authentication of the recipient server for file transfers. 
  • When sending data over the network, the confidentiality of secrets (encryption keys, passwords, etc.) is enhanced by sending them over a separate channel. 
  • The use of public key algorithms to guarantee the confidentiality and integrity of communications, as well as the authentication of the sender. 
  • Protect secret keys with restrictive access rights and a secure password. 
  • Use of a key management and certification procedure.  
  • Understanding and application of the main principles of cryptology and encryption defined by the CNIL must be respected. 
  • Checking the use and validity of the electronic certificate and ensuring that it is valid 
  • The encryption solution used: the GNU Privacy Guard software, which uses asymmetric cryptography. 

 

6.  IT Services Continuity Management

 

The organisation ensures that IT services supporting critical business processes and the processing of personal data will continue even in the event of a major breakdown.

6.1.  Policies and procedures

The organisation ensures that documented plans, response and recovery procedures are developed and approved. 

Individual steps : 

  • An IT services continuity plan is applied and contains a list of the people involved. 
  • The responsible persons who will be notified in case of cyber security incidents are identified 
  • The business continuity management plan takes into account the guidelines issued by the SGDSN.

6.2.  Backup

The organisation ensures the backup and recovery of critical business and personal data in order to maintain the availability and integrity of data in the event of a business interruption.  

Individual measures : 

  • Data is not stored on the workstation 
  • The use of cloud services installed by default on a device as a backup or synchronisation tool is prohibited. 
  • Daily incremental backups and full backups at regular intervals are performed and verified.   
  • The backup data is protected with the same stringent controls as those used to protect the database itself. 
  • When backups are sent over the network, they are encrypted along with the transmission channel. 
  • Data backups are stored in different locations.  
  • Backup plans and the restoration of backed-up data are tested regularly. 
  • Use of redundant storage and data storage virtualisation (RAID) technology for better performance and availability.

6.3.  IT services continuity management controls

The organisation implements controls to facilitate IT services continuity management to ensure resilience of assets and services.  

Individual measures : 

  • Backup power supply in place to ensure full protection of critical IT equipment.

 

7.  Supply chain risk management

 

All contractual and/or commercial relationships with third parties having access to the organisation's information or information processing facilities shall include agreed information security provisions to ensure compliance with the organisation's information security requirements. 

7.1.  Policies and procedures

The organisation has developed and established policies and procedures for managing supply chain risks.  

Individual measures : 

  • Recording of all maintenance work in a register 
  • Safety clause in maintenance contracts with service providers 
  • Signature of a contract (DPA) with the processors, which defines the subject, duration and purpose of the processing and the obligations of each party.  
  • The contract includes confidentiality clauses for data shared with third parties and subcontractors. 
  • The contract include clauses on minimum standards for user authentication. 
  • The contract also contains provisions for the return of data and/or their destruction at the end of the contract. 
  • The contract contains rules for the management and reporting of incidents. 
  • The contract contains the obligations of the processor under Article 28 of the GDPR. 
  • Verification of the presence of guarantees on the actual geographical location of the data or without ensuring the legitimacy of data transfers outside the European Economic Area.  
  • ISO 27001 certification procedure being implemented and specific national regulations being followed. 

7.2.  Safety checks

The organisation ensures that suppliers have acceptable levels of data protection and information security in place to protect and maintain the confidentiality, integrity and availability of information.  

Individual measures : 

  • Identified manager who manages third parties and supervises their work 
  • Checking the IT security policies of service providers before signing a contract with them. 
  • Verification that data is encrypted according to its sensitivity or, at least, that procedures or technologies are in place. 
  • Audit of the encryption of data transmissions (e.g. HTTPS connection, VPN, etc.). 
  • Audit network security controls, access logs and audits, access provisioning and deprovisioning, authentication, privilege access management, etc. 
  • Verification of compliance with Article 28 of the GDPR - Obligations of the processor 

 

8.  Physical access control

 

The organisation uses industry best practices to protect itself against physical and logical attacks as well as natural disasters, such as fire, earthquakes, floods, etc. 

8.1.  Physical security controls

The organisation has adequate controls in place to protect assets, information systems and employees from physical and environmental threats.  

Individual measures : 

  • Installation and regular testing of burglar alarms  
  • Installation of smoke detectors and fire-fighting equipment, checked once a year.  
  • Securing keys and codes for access to the premises. 
  • A risk analysis of the building areas is carried out  
  • Maintaining and regularly updating a list of persons who have access to the building or premises. 
  • Application of the rules and methods for controlling visitor access, visitors are accompanied out of the public reception area by a person from your organisation. 
  • Protection of IT equipment with fire prevention system, uninterrupted power supply, air conditioning, humidity control. 
  • Annual maintenance of the air conditioning and inverters. 
  • Only authorised personnel have access to restricted areas.  
  • Regularly reassess and update access rights to restricted areas, removing them if necessary. 

 

9.  Purchase, development and maintenance of hardware and software

 

The organisation ensures that security requirements are identified and agreed before - and that appropriate information security controls are in place during - the purchase, development and maintenance of hardware and software. 

9.1.  Application security

Systems planning is carried out and requirements have been defined prior to the selection, development, deployment and implementation of any IT system.  

Individual measures : 

  • Automatic security updates are enabled and performed automatically. 
  • Prohibition of downloading/installing applications from the Internet or from unsecured sources. 
  • Security control of the software and hardware used in the organisation's IT system. 
  • Applications are updated when critical security flaws have been identified and fixed. 

9.2.  Development of secure software

The organisation has established a Secure Software Development Life Cycle (SSDLC) for planning, requirements analysis, design, development and testing.  

Individual steps : 

  • Privacy and security are integrated from the design stage during the development of applications, which influences the choice of architecture (decentralised or centralised), functionalities (fast anonymisation, data minimisation), technologies (encryption), etc. 
  • Minimisation of free text entries or comment fields when developing applications and services. 
  • Software development and testing is carried out in a separate IT environment from the production environment. Use of dummy or anonymous data. 
  • Use of fictitious personal data during the development and test phases. 
  • Security by Design or Secure Software Development Life Cycle (SSDLC) during application development. 
  • When developing software, priority is given to data acquisition and recording techniques that minimise data collection 
  • The data formats are adapted to the chosen retention period. 
  • User profiles are created during the development of applications. 
  • The CNIL article on free text entries and comment areas is consulted during the development of applications. 
  • Depending on the application, use of signatures in the executable code to ensure that no changes have been made to the code.

 


ANNEXE IV -  List of sub-processors

 

1. Digital Ocean LLC,  a corporation organized and existing under the laws of the State of New York, having its principal place of business at 101 Avenue of the Americas, 10th Floor, New York, NY 10013.

Contact: https://www.digitalocean.com/support/

Description of the processing: Data hosting. 

2. Ecritel, a company constituted and existing under the laws of France, having its registered office at 84 rue Villeneuve, 92110 Clichy, France, and registered with the RCS Nanterre under the company number 332 484 021, Siret 332 484 021 000 99. 

Contact: https://www.ecritel.fr/fr/solutions/ecritel-medical-hosting-hds/

Description of the processing: Data hosting. 

You have other questions for us?

Don't hesitate to contact us. We will answer your questions with pleasure. 

Ask your questions​​​​​​