Data Protection Addendum


Data Protection Addendum

Last updated: February 01, 2024


This Data Protection Addendum (“Addendum“) between LYIK Technologies Private Limited (“LYIK”) and the Customer (as defined in the Agreement) forms part of the LYIK Technologies Private Limited. Terms of Service set forth at https://www.lyik.com/TermsandConditions or such other written or electronic agreement incorporating this Addendum, in each case governing Customer’s access to and use of the Services (the “Agreement”).

Customer enters into this Addendum on behalf of itself and any Affiliates authorized to use the Services under the Agreement and who have not entered into a separate contractual arrangement with LYIK. For the purposes of this Addendum only, and except where otherwise indicated, references to “Customer” shall include Customer and such Affiliates.

The Parties hereby agree that the terms and conditions set out below shall be added as an Addendum to the Agreement.

  • Defenitions

    In this Addendum, the following terms shall have the meanings set out below and cognate terms shall be construed accordingly:

    • “Affiliate" means an entity that owns or controls, is owned or controlled by or is or under common control or ownership with either Customer or LYIK (as the context allows), where control is defined as the possession, directly or indirectly, of the power to direct or cause the direction of the management and policies of an entity, whether through ownership of voting securities, by contract or otherwise;
    • "Customer Personal Data" means any Personal Data provided by or made available by Customer to LYIK Technologies Private Limited or collected by LYIK Technologies Private Limited on behalf of Customer which is Processed by LYIK Technologies Private Limited to perform the Services;
    • "Controller to Processor SCCs" means the standard contractual clauses for cross-border transfers published by the European Commission on June 4, 2021 governing the transfer of European Area Personal Data to Third Countries as adopted by the European Commission, the Swiss Federal Data Protection and Information Commissioner (“Swiss FDPIC”) relating to data transfers to Third Countries (collectively “EU SCCs”); (ii) the international data transfer addendum (“UK Transfer Addendum”) adopted by the UK Information Commissioner’s Office (“UK ICO”) for data transfers from the UK to Third Countries; or (iii) any similar such clauses adopted by a data protection regulator relating to Personal Data transfers to Third Countries, including without limitation any successor clauses thereto;
    • "Data Protection Laws" means any local, state, or national law regarding the processing of Personal Data applicable to LYIK Technologies Private Limited in the jurisdictions in which the Services are provided to Customer, including, without lßimitation, privacy, security, and data protection law;
    • “EU Area” means the European Union, European Economic Area, United Kingdom, and Switzerland;
    • “EU Area Law” means (i) Directive 95/46/EC and, from May 25, 2018, Regulation (EU) 2016/679 ("EU GDPR") together with applicable legislation implementing or supplementing the same or otherwise relating to the processing of Personal Data of natural persons; (ii) the Data Protection Act 1998 of the United Kingdom and the EU GDPR as saved into United Kingdom Law by virtue of section 3 of the United Kingdom’s European Union (Withdrawal) Act 2018 (the “UK GDPR”); (iii) the swiss Federal Data Protection Act of 19 June 1992 and its Ordinance (“Swiss DPA”); (iv) any other law relating to the data protection, security, or privacy of individuals that applies in the EU Area; or (v) any successor or amendments thereto (including, without limitation, implementation of the EU GDPR by Member States into their national law);
    • "Services" means the services to be supplied by LYIK Technologies Private Limited to Customer or Customer’s Affiliates pursuant to the Agreement; and
    • “Third Country” means countries that, where required by applicable Data Protection Laws, have not received an adequacy decision from an applicable authority relating to cross-border data transfers of Personal Data, including regulators such as the European Commission, UK ICO, or Swiss FDPIC.
    • The terms “Business”, “Business Purpose”, “commercial purpose”, “Contractor”, "Controller", "Data Subject", "Personal Data", "Personal Data Breach", "Process", "Processor", “Sell”, “Service Provider”, “Share”, “Subprocessor”, "Supervisory Authority", and “Third Party” have the same meanings as described in applicable Data Protection Laws and cognate terms shall be construed accordingly. Capitalized terms not otherwise defined in this Addendum shall have the meanings ascribed to them in the Agreement.

  • Roles of the Parties

    The Parties acknowledge and agree that with regard to the Processing of Customer Personal Data, and as more fully described in Annex 1 hereto, Customer acts as a Business or Controller, and LYIK Technologies Private Limited acts as a Service Provider or Processor. This Addendum shall apply solely to the Processing of Customer Personal Data by LYIK Technologies Private Limited acting as a Processor, Subprocessor, or Third Party (as specified in Annex 1). The Parties expressly agree that Customer shall be solely responsible for ensuring timely communications to Customer's Affiliates or the relevant Controller(s) who receive the Services, insofar as such communications may be required or useful in light of applicable Data Protection Laws to enable Customer's Affiliates or the relevant Controller(s) to comply with such Laws.

  • Description and Purpose of Personal Data Processing

    In Annex 1 to this Addendum, the Parties have mutually set out their understanding of the subject matter and details of the Processing of the Customer Personal Data to be Processed by LYIK Technologies Private Limited pursuant to this Addendum. The Parties may make reasonable amendments to Annex 1 on mutual written agreement and as reasonably necessary to meet those requirements. Annex 1 does not create any obligation or rights for any Party. The purpose of Processing under this Addendum is the provision of the Services pursuant to the Agreement and any Order Form(s).

  • Data Processing Terms

    Customer shall comply with all applicable Data Protection Laws in connection with the performance of this Addendum and the Processing of Customer Personal Data. In connection with its access to and use of the Services, Customer shall Process Customer Personal Data within such Services and provide LYIK Technologies Private Limited with instructions in accordance with applicable Data Protection Laws. As between the Parties, Customer shall be solely responsible for compliance with applicable Data Protection Laws regarding the collection of and transfer to LYIK Technologies Private Limited of Customer Personal Data. Customer agrees not to provide LYIK Technologies Private Limited with any data concerning a natural person's health, religion or any special categories of data as defined in Article 9 of the GDPR. LYIK Technologies Private Limited shall comply with all applicable Data Protection Laws in the Processing of Customer Personal Data and LYIK Technologies Private Limited shall:

    • Process the Customer Personal Data for the purposes of the Agreement and for the specific purposes in each case as set out in Annex 1 to this Addendum and otherwise solely on the documented instructions of Customer, for the purposes of providing the Services and as otherwise necessary to perform its obligations under the Agreement. The Agreement, this Addendum, and Customer’s use of the Services’ features and functionality are Customer’s written instructions to LYIK Technologies Private Limited in relation to Processing Customer Personal Data, including as follows:
      • LYIK Technologies Private Limited shall use, retain, disclose, or otherwise Process Customer Personal Data only on behalf of Customer and for the specific business purpose of providing the Services and in accordance with Customer’s instructions, including as described in the Agreement. LYIK Technologies Private Limited shall not Sell or Share Customer Personal Data, nor use, retain, disclose, or otherwise Process Customer Personal Data outside of its business relationship with Customer or for any other purpose (including LYIK's commercial purpose) except as required or permitted by law. LYIK Technologies Private Limited shall immediately inform Customer (a) if LYIK Technologies Private Limited determines that it is no longer able to meet its obligations under Data Protection Laws or (b) if, in LYIK's opinion, an instruction infringes applicable Data Protection Laws. Customer reserves the right to take reasonable and appropriate steps to ensure Graphite’s Processing of Customer Personal Data is consistent with Customer’s obligations under Data Protection Law and discontinue and remediate unauthorized use of Customer Personal Data;
      • LYIK Technologies Private Limited shall have rights to process Customer Personal Data solely (i) to the extent necessary to (a) perform the Business Purposes and its obligations under the Agreement; (b) operate, manage, test, maintain and enhance the Services including as part of its business operations; (c) to disclose aggregate statistics about the Services in a manner that prevents individual identification or re-identification of Customer Personal Data, including without limitation any individual device or individual person; and/or (d) protect the Services from a threat to the Services or Customer Personal Data; or (ii) if required by court order of a court or authorized governmental agency, provided that prior notice first be given to Customer; (iii) as otherwise expressly authorized by Customer;
      • LYIK Technologies Private Limited will not combine Customer Personal Data which LYIK Technologies Private Limited Processes on Customer’s behalf, with Personal Data which it receives from or on behalf of another person or persons, or collects from its own interaction with individual, provided that Graphite may combine personal information to perform any Business Purpose permitted or required under the Agreement to perform the Services
    • Implement and maintain measures designed to ensure that LYIK Technologies Private Limited personnel authorized to process the Customer Personal Data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality unless disclosure is required by law or professional regulations;
    • Implement and maintain the technical and organizational measures set out in the Agreement, and, taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, implement and maintain any further commercially reasonable and appropriate administrative, technical, and organizational measures designed to ensure a level of security appropriate to the risk of the Processing of Customer Personal Data in accordance with Article 32 of the GDPR, and specifically:
      • pseudonymization and encryption of Customer Personal Data;
      • ensuring ongoing confidentiality, integrity, availability and resilience of LYIK's processing systems and services that process Customer Personal Data;
      • restoring availability and access to Customer Personal Data in a timely manner in the event of a physical or technical incident; and
      • regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing of the Customer Personal Data.
    • Customer hereby agrees that LYIK Technologies Private Limited is generally authorized to engage and appoint Sub-processors, and specifically the Sub-processors listed in Annex 2 hereto, subject to LYIK's:
      • notifying Customer at least thirty (30) calendar days in advance of any intended changes or additions to its Sub-processors listed in Annex 2 by emailing notice of the intended change to Customer
      • including data protection obligations in its contract with each Sub-processor that are materially the same as those set out in this Addendum; and
      • remaining liable to Customer for any failure by each Sub-processor to fulfill its obligations in relation to the Processing of the Customer Personal Data.
    • In relation to any notice received under section 4.2(d)(i), Customer shall have a period of 30 (thirty) days from the date of the notice to inform LYIK Technologies Private Limited in writing of any reasonable objection on data protection grounds to the use of that Sub-processor. The parties will then, for a period of no more than 30 (thirty) days from the date of Customer's objection, work together in good faith to attempt to find a commercially reasonable solution for Customer which avoids the use of the objected-to Sub-processor. Where no such solution can be found, either Party may (notwithstanding anything to the contrary in the Agreement) terminate the relevant Services immediately on written notice to the other Party, without damages, penalty or indemnification whatsoever (but without prejudice to any fees incurred by Customer prior to termination);
    • To the extent legally permissible, promptly notify Customer in case of any legally binding requests (i.e., disclosures required by law, court order, or subpoena) for disclosure of Customer Personal Data by LYIK. In case if it is not legally binding then Customer Personal Data would not be disclosed and LYIK Technologies Private Limited will notify the Customer of such request rejection. A record of all legally binding disclosure requests relating to Customer Personal Data shall be maintained.
    • To the extent legally permissible, promptly notify Customer of any communication from a Data Subject regarding the Processing of Customer Personal Data, or any other communication (including from a Supervisory Authority) relating to any obligation under the applicable Data Protection Laws in respect of the Customer Personal Data. LYIK Technologies Private Limited will not respond to any such request or complaint unless expressly authorized to do so by Customer or is otherwise required to respond under applicable Data Protection Laws. Taking into account the nature of the Processing, LYIK Technologies Private Limited will reasonably assist Customer (or the relevant Controller) by appropriate technical and organizational measures, insofar as this is possible, for the fulfillment of Customer's, Customer's Affiliates' or the relevant Controller(s)' obligation to respond to requests for exercising the data subject's rights laid down in Chapter Ill GDPR. Customer agrees to pay LYIK Technologies Private Limited for time and for out of pocket expenses incurred by LYIK Technologies Private Limited in connection with the performance of its obligations under this Section 4.2(e);
    • Upon LYIK's becoming aware of a Personal Data Breach involving Customer Personal Data, notify Customer without undue delay, of any Personal Data Breach involving Customer Personal Data, such notice to include, to the extent reasonably available to LYIK, all timely information reasonably required by Customer (or the relevant Controller) to comply with its data breach reporting obligations under the applicable Data Protection Laws. LYIK Technologies Private Limited shall further take all such measures and actions as are necessary to remedy or mitigate the effects of such Security Incident and shall keep Customer reasonably informed of developments concerning Customer Personal Data;
    • To the extent required by the applicable Data Protection Laws, provide reasonable assistance to Customer, Customer's Affiliates' or the relevant Controller(s)' with its obligations pursuant to Articles 32 to 36 of the GDPR taking into account the nature of the Processing and information available to LYIK; Customer agrees to pay LYIK Technologies Private Limited for time and for out of pocket expenses incurred by LYIK Technologies Private Limited in connection with any assistance provided in connection with Articles 35 and 36 of the GDPR;
    • Cease Processing the Customer Personal Data upon the termination or expiry of the Agreement, and at option of Customer, Customer's Affiliates or the relevant Controller(s) either return or delete (including by ensuring such data is in non-readable format) all copies of the Customer Personal Data Processed by LYIK, unless (and solely to the extent and for such period as) applicable law requires LYIK Technologies Private Limited to retain some or all of the Customer Personal Data. Any such Customer Personal Data retained shall remain subject to the obligations of confidentiality set forth in the Agreement; and
    • LYIK Technologies Private Limited shall maintain the necessary records in support of demonstrating compliance with its obligations (as specified in the applicable contract) for the processing of Customer Personal Data carried out on behalf of the Customer.
    • Make available to Customer all information reasonably necessary to demonstrate compliance with this Addendum and allow for and contribute to audits, including inspections, by Customer, or an independent third party auditor mandated by Customer, provided that Customer gives LYIK Technologies Private Limited reasonable prior notice of its intention to audit, conducts its audit during LYIK's normal business hours, and takes all reasonable measures to prevent unnecessary disruption to LYIK's operations. For the purposes of demonstrating compliance with this Addendum under this Section 4.2(i), the Parties agree that in the first instance, once per year during the term of the Agreement (except if and when required by instruction of a competent Supervisory Authority or where Customer believes a further audit is necessary due to a Personal Data Breach concerning Customer Personal Data suffered by LYIK), LYIK Technologies Private Limited will provide to Customer responses to cybersecurity and other assessments and only where Customer cannot establish LYIK's compliance with this Addendum from LYIK's responses shall Customer request to inspect LYIK's processing operations. Customer agrees to pay LYIK Technologies Private Limited for time and for out of pocket expenses incurred by LYIK Technologies Private Limitedin connection with assistance provided in connection with such audits, responses to cybersecurity and other assessments.
  • Restricted Transfers

    The parties agree that when the transfer of Customer Personal Data from Customer and/or any of its Affiliates (as exporter) to LYIK Technologies Private Limited(as importer) is a Restricted Transfer and EU Area Law applies, the transfer shall be subject to the appropriate Controller to Processor SCCs, which shall be deemed incorporated into and form part of this Addendum as follows:

    • In relation to Customer Personal Data that is protected by the EU GDPR and processed by LYIK Technologies Private Limited on behalf of and under the instruction of Customer, the EU SCCs will apply completed as follows:
      • Module Two will apply (controller to processor transfers);
      • In Clause 7, the optional docking clause will apply;
      • In Clause 9, Option 2 will apply, and the time period for prior notice of sub-processor changes shall be as set out in Section 4.2(d) of this Addendum;
      • In Clause 11, the optional language will not apply;
      • In Clause 17, Option 1 will apply, and the EU SCCs will be governed by Irish law;
      • In Clause 18(b), disputes shall be resolved before the courts of the Republic of Ireland;
      • Annex I of the EU SCCs shall be deemed completed with the information set out in Annex 1 to this Addendum; and
      • Annex II of the EU SCCs shall be deemed completed with the information set out in Section 4 of Annex 1 to this Addendum.
    • In relation to Customer Personal Data that is protected by the Swiss DPA, the EU SCCs shall apply in accordance with Section 5.1(a) of this Addendum, but with the following modifications:
    • In relation to Customer Personal Data that is protected by the UK GDPR, the EU SCCs shall apply in accordance with Section 5.1(a) of this Addendum, but as modified and interpreted by the Part 2: Mandatory Clauses of the UK Addendum, which shall be incorporated into and form an integral part of this Addendum. Any conflict between the terms of the EU SCCs and the UK Addendum shall be resolved in accordance with Section 10 and Section 11 of the UK Addendum. In addition, tables 1 to 3 in Part 1 of the UK Addendum shall be completed respectively with the information set out in Annex I of this Addendum, and table 4 in Part 1 of the UK Addendum shall be deemed completed by selecting both “Importer” and “Exporter”.
      • Any references in the EU SCCs to “Regolation (EU) 2016/679” shall be interpreted as references to the Swiss DPA and the equivalent articles or sections therein;
      • Any references to “EU”, “Union”, “Member State”, and “Member State law” shall be interpreted as references to Switzerland and Swiss law, as the case may be;
      • Any references to the “competent supervisory authority” and “competent courts” shall be interpreted as references to the relevant data protection authority and courts in Switzerland; and
      • The Controller to Processor SCCs shall be governed by the laws of Switzerland and disputes shall be resolved before the competent Swiss Courts.
    • LYIK Technologies Private Limited shall not participate in any other Restricted Transfers of Customer Personal Data (whether as an importer or an exporter of the Customer Personal Data) unless the Restricted Transfer is made in compliance with applicable Data Protection Law and pursuant to the relevant Standard Contractual Clauses implemented between the relevant exporter and importer of the Customer Personal Data, as necessary in order to comply with applicable Data Protection Law

  • Precedence

    The provisions of this Addendum are supplemental to the provisions of the Agreement. In the event of any inconsistency between the provisions of this Addendum and the provisions of the Agreement, the provisions of this Addendum shall prevail. In the event that any provision of this Addendum and/or the Agreement contradicts, directly or indirectly, the Controller to Processor SCCs, the Controller to Processor SCCs will control.

  • Indemnity

    To the extent permissible by law, Customer shall (a) defend LYIK Technologies Private Limited and its Affiliates (collectively, “Indemnified Parties”) from and against any and all claims, demands, suits, or proceedings made or brought against any of the Indemnified Parties by any third party (each, a “Claim”), and (b) indemnify and hold harmless the Indemnified Parties from and against any and all losses, damages, liabilities, fines and administrative fines, penalties, settlements, and costs and expenses of any kind (including, without limitation, reasonable legal, investigatory and consultancy fees and expenses) incurred or suffered by any of the Indemnified Parties, in each case arising from any breach by Customer of this Addendum or of its obligations under applicable Data Protection Laws. LYIK Technologies Private Limited may participate in the defense and/or settlement of a Claim under this Section 7.1 with counsel of its choosing at its own expense.

  • Severability

    The Parties agree that, if any section or sub-section of this Addendum is held by any court or competent authority to be unlawful or unenforceable, it shall not invalidate or render unenforceable any other section of this Addendum.

  • Miscellaneous

    The Addendum considers the following and follows:
    1. Privacy by Design and default
    2. Achieving security of Processing
    3. Notification of breaches involving Customer Personal Data to the relevant Supervisory Authority
    4. Notification of breaches involving Customer Personal Data to Customer
    5. Conducting Privacy Impact Assessment where appropriate and required by applicable Data Protection Law
    6. Assurance of LYIK's assistance by if prior consultations with relevant Supervisory Authorities are needed and required by applicable Data Protection Laws.
    LYIK Technologies Private Limited shall comply with all statutory and regulatory requirements, ISO 27001:2013, ISO 27701:2019 and EU GDPR In the event a Data Subject wishes to exercise its data subject rights under applicable Data Protection Law, including, but not limited to, a data subject’s right of access, correction and/or erasure of its Personal Data in LYIK's control, the Data Subjects can submit such request done by contacting LYIK's Data Protection Officer (DPO) below. Also for raising concerns and/or any complaints related to the Customer Personal Data that can be done by contacting the Data Protection Officer below: Name: Suveer Nagendra Email ID: [email protected] There are no Temporary files getting generated during processing.

Annex 1 to Data Protection Addendum

Description of Processing Activities for Customer Personal Data


    This Annex includes certain details of the Processing of Customer Personal Data by LYIK Technologies Private Limited in connection with the Services.

    • List of Parties

      Data Exporter
      Name:Customer (as defined in the Agreement)
      Address:As set forth in the relevant Order Form.
      Contact person’s name, position and contact details:As set forth in the relevant Order Form.
      Activities relevant to the data transferred under these Clauses:Recipient of the Services provided by LYIK Technologies Private Limited in accordance with the Agreement.
      Signature and date:Signature and date are set out in the Agreement.
      Role (controller/processor):Controller

      Data Importer
      Name:LYIK Technologies Private Limited.
      Address:No.65, Chaithanya Deepa, C.V.Raman Nagar, Bhuvaneshwari Nagar, Bangalore North, Bangalore, Karnataka, IN - 560093
      Contact person’s name, position and contact details:Suveer Nagendra
      [email protected]
      Activities relevant to the data transferred under these Clauses:Provision of the Services to the Customer in accordance with the Agreement.
      Signature and date:Signature and date are set out in the Agreement.
      Role (controller/processor):Processor
    • Competent Supervisory Authority
      Identify the competent supervisory authority/ies in accordance (e.g. in accordance with Clause 13 SCCs)As determined by application of Clause 13 of the EU SCCs.
    • Processing Information
      Categories of data subjects whose personal data is transferredCustomer’s authorized users of the Services
      Categories of personal data transferred Processed automatically by the Services:
      · Names
      · email IDs
      Processed where and to the extent provided by Customer or its authorized users in connection with audit services provided by LYIK:
      · address
      · date of birth
      · past employment details
      Categories of personal data transferred Processed automatically by the Services:
      · Names
      · email IDs
      Processed where and to the extent provided by Customer or its authorized users in connection with audit services provided by LYIK:
      · address
      · date of birth
      · past employment details
      Sensitive personal data transferredNone
      Frequency of the transfer Continuous
      Sensitive personal data transferredNone
      Nature of the processingThe nature of the processing is more fully described in the Agreement and accompanying order forms but will include the following basic processing activities: The provision of Services to Customer. In order to provide people data, LYIK Technologies Private Limited receives identifying Customer Personal Data to permit LYIK Technologies Private Limited to query, cleanse, standardize, enrich, (when required) send additional data to feed providers, and to store the query information.
      Purpose of the data transfer and further processingThe purpose of the transfer is to facilitate the performance of the Services more fully described in the Agreement and accompanying order forms.
      For processing involving California consumers, please select the Business Purpose(s) for Processing Personal Data
      ☐ N/A
      ☐ Auditing related to counting ad impressions to unique visitors, verifying positioning and quality of ad impressions, and auditing compliance with this specification and other standards
      ☒ Helping to ensure security and integrity to the extent the use of the consumer’s personal information is reasonably necessary and proportionate for these purposes
      ☒ Debugging to identify and repair errors that impair existing intended functionality.
      ☐ Short-term, transient use, including, but not limited to, non personalized advertising shown as part of a consumer’s current interaction with the business, provided that the consumer’s personal information is not disclosed to another third party and is not used to build a profile about the consumer or otherwise alter the consumer’s experience outside the current interaction with the business
      ☒ Performing services on behalf of the business, including maintaining or servicing accounts, providing customer service, processing or fulfilling orders and transactions, verifying customer information, processing payments, providing financing, providing analytic services, providing storage, or providing similarservices on behalf of the business.
      ☐ Providing advertising and marketing services, except for cross-context behavioral advertising, to the consumer provided that, for the purpose of advertising and marketing, a service provider or contractor shall not combine the personal information of opted-out consumers that the service provider or contractor receives from, or on behalf of, the business with personal information that the service provider or contractor receives from, or on behalf of, another person or persons or collects from its own interaction with consumers.
      ☒ Undertaking internal research for technological development and demonstration.
      ☒ Undertaking activities to verify or maintain the quality or safety of a service or device that is owned, manufactured, manufactured for, or controlled by the business, and to improve, upgrade, or enhance the service or device that is owned, manufactured, manufactured for, or controlled by the business.
      ☒ To retain and employ another service provider or contractor as a subcontractor where the subcontractor meets the requirements for a service provider or contractor under CCPA.
      ☒ To build or improve the quality of the services it is providing to the business even if this Business Purpose is not specified in the written contract required by CCPA provided that Service Provider does not use the Customer Personal Data to perform Services on behalf of another person.
      ☒ To prevent, detect, or investigate data security incidents or protect against malicious, deceptive, fraudulent, or illegal activity, even if this Business Purpose is not specified in the written contract.
      Period for which the personal data will be retained or criteria used to determine that periodThe period for which the Customer Personal Data will be retained is more fully described in the Agreement, Addendum, and accompanying order forms.
      Subprocessor transfers – subject matter, nature, and duration of processingThe subject matter, nature, and duration of the Processing more fully described in the Agreement, Addendum, and accompanying order forms.
    • Technical and Organisational Security Measures

      Description of the technical and organisational security measures implemented by LYIK Technologies Private Limited as the data processor/data importer to ensure an appropriate level of security, taking into account the nature, scope, context, and purpose of the processing, and the risks for the rights and freedoms of natural persons.

        Security
      • Security Management System.
        • Organization. LYIK Technologies Private Limited designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program.
        • Policies. Management reviews and supports all security related policies to ensure the security, availability, integrity and confidentiality of Customer Personal Data. These policies are updated at least once annually.
        • Assessments. LYIK Technologies Private Limited engages a reputable independent third-party to perform risk assessments of all systems containing Customer Personal Data at least once annually.
        • Risk Treatment. LYIK Technologies Private Limited maintains a formal and effective risk treatment program that includes penetration testing, vulnerability management and patch management to identify and protect against potential threats to the security, integrity or confidentiality of Customer Personal Data.
        • Vendor Management. LYIK Technologies Private Limited maintains an effective vendor management program
        • Incident Management. LYIK Technologies Private Limited reviews security incidents regularly, including effective determination of root cause and corrective action.
        • Standards. LYIK Technologies Private Limited operates an information security management system that complies with the requirements of ISO/IEC 27001:2013 standard.
      • Personnel Security.
        • LYIK Technologies Private Limitedpersonnel are required to conduct themselves in a manner consistent with the company’s guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. LYIK Technologies Private Limited conducts reasonably appropriate background checks on any employees who will have access to client data under this Agreement, including in relation to employment history and criminal records, to the extent legally permissible and in accordance with applicable local labor law, customary practice and statutory regulations.
        • Personnel are required to execute a confidentiality agreement in writing at the time of hire and to protect Customer Personal Data at all times. Personnel must acknowledge receipt of, and compliance with, LYIK's confidentiality, privacy and security policies. Personnel are provided with privacy and security training on how to implement and comply with the Information Security Program. Personnel handling Customer Personal Data are required to complete additional requirements appropriate to their role (e.g., certifications). LYIK's personnel will not process Customer Personal Data without authorization.
      • Access Controls
        • Access Management. LYIK Technologies Private Limited maintains a formal access management process for the request, review, approval and provisioning of all personnel with access to Customer Personal Data to limit access to Customer Personal Data and systems storing, accessing or transmitting Customer Personal Data to properly authorized persons having a need for such access. Access reviews are conducted periodically to ensure that only those personnel with access to Customer Personal Data still require it.
        • Infrastructure Security Personnel. LYIK Technologies Private Limited has, and maintains, a security policy for its personnel, and requires security training as part of the training package for its personnel. LYIK's infrastructure security personnel are responsible for the ongoing monitoring of LYIK's security infrastructure, the review of the Services, and for responding to security incidents.
        • Access Control and Privilege Management. LYIK's and Customer’s administrators and end users must authenticate themselves via a Multi-Factor authentication system or via a single sign on system in order to use the Services
        • Internal Data Access Processes and Policies – Access Policy. LYIK's internal data access processes and policies are designed to protect against unauthorized access, use, disclosure, alteration or destruction of Customer Personal Data. LYIK Technologies Private Limited designs its systems to only allow authorized persons to access data they are authorized to access based on principles of “least privileged” and “need to know”, and to prevent others who should not have access from obtaining access. LYIK Technologies Private Limited requires the use of unique user IDs, strong passwords, two factor authentication and carefully monitored access lists to minimize the potential for unauthorized account use. The granting or modification of access rights is based on: the authorized personnel’s job responsibilities; job duty requirements necessary to perform authorized tasks; a need to know basis; and must be in accordance with LYIK's internal data access policies and training. Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for accountability. Where passwords are employed for authentication (e.g., login to workstations), password policies follow industry standard practices. These standards include password complexity, password expiry, password lockout, restrictions on password reuse and re-prompt for password after a period of inactivity
      • Data Center and Network Security
        • Data Centers
          • Infrastructure. LYIK Technologies Private Limited has AWS as its data center. s
          • Resiliency. Multi Availability Zones are enabled on AWS and LYIK Technologies Private Limited conducts Backup Restoration Testing on a regular basis to ensure resiliency.
          • Server Operating Systems. LYIK's servers are customized for the application environment and the servers have been hardened for the security of the Services. LYIK Technologies Private Limited employs a code review process to increase the security of the code used to provide the Services and enhance the security products in production environments.
          • Disaster Recovery. LYIK Technologies Private Limited replicates data over multiple systems to help to protect against accidental destruction or loss. LYIK Technologies Private Limited has designed and regularly plans and tests its disaster recovery programs.
          • Security Logs. LYIK's systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into, LYIK's systems.
          • Vulnerability Management. LYIK Technologies Private Limited performs regular vulnerability scans on all infrastructure components of its production and development environment. Vulnerabilities are remediated on a risk basis, with Critical, High and Medium security patches for all components installed as soon as commercially possible.
        • Networks and Transmission
          • Data Transmission. Transmissions on production environment are transmitted via Internet standard protocols. s
          • External Attack Surface. Azure Security Group which is equivalent to virtual firewall is in place for the Production environment on Azure.
          • Incident Response. LYIK Technologies Private Limited Maintains incident management policies and procedures, including detailed security incident escalation procedures. LYIK Technologies Private Limited Monitors a variety of communication channels for security incidents, and LYIK's security personnel will react promptly to suspected or known incidents, mitigate harmful effects of such security incidents, and document such security incidents and their outcomes.
          • Encryption Technologies. LYIK Technologies Private Limited Makes HTTPS encryption (also referred to as SSL or TLS) available for data in transit.
        • Data Storage, Isolation, Authentication, and Destruction. LYIK Technologies Private Limited Stores data in a multi-tenant environment on Azure servers. Data, the Services database and file system architecture are replicated between multiple availability zones on Azure. LYIK Technologies Private Limited Logically isolates the data of different customers. A central authentication system is used across all Services to increase uniform security of data. LYIK Technologies Private Limited Ensures secure disposal of Client Data through the use of a series of data destruction processes.
        Security
      • Security Management System.
      • Personnel Security.
      • Access Controls
      • Data Center and Network Security

Annex 2

LYIK's Sub-processors


Name of Sub-procesorDescription of ProcessingLocation of Sub-processor
Microsoft Azure Running the Production environment including the Application and DatabasesIndia
Google WorkspaceEmail servicesIndia
SendgridEmail ServicesUSA
ZOHOInvoicing SolutionsIndia
AtlassianWork ManagementUSA
GithubCode Version ControlUSA
SlackMessagingUSA

Contact Us

If you have any questions, You can contact us:

  • By email: [email protected]

  • By visiting this page on our website: www.lyik.com

  • By phone number: +91 94481 84644

  • By mail: LYIK Technologies Private Limited, No.65, CHAITHANYA DEEPA, Bhuvaneshwari Nagar, C.V.Raman.Nagar Post, Bangalore Karnataka, India, 560093