13.08 Customer Encrypted Data: |
1. The Customer as the Data Controller own their own business data and have the right to access their own data at any time and for any purpose. The Application Service Provider as the Data Processor shall use its best endevours to assist the Customer to access the Customers own business data. |
2. When the Application Service Provider sends out the service fee invoice on the first of each month, that invoice includes a link to the Customer Encrypted Data (CED) dashboard. The Customer may use that link to selectively cause any set of business data to be downloaded to a local computer using encryption. This procedure has no operational benefit and so it is classified as additional to the financial statement. |
3. To comply with Data Protection regulations, all business data is always encrypted when at rest and when being communicated. Business data downloaded by the Customer is in the form of a password protected encrypted ZIP file - a ZIP file utility is needed to access the business data. A person is appointed by the Customer to be shown the monthly password needed to view the business data. |
4. This procedure may be used to replace legacy download services that are no longer compliant with Data protection regulations. A Customer as the Data Controller takes fully responsibility for the life cycle and security of all downloaded business data. This includes reportable data breach notification to the Information Commissioners Office. |