Processor Agreement

This processor agreement applies to the processing of personal data by Digi Hosting on behalf of its customers and has been drafted in accordance with the General Data Protection Regulation (AVG).

1. Introduction and scope

This agreement governs the rights and obligations of Digi Hosting (hereinafter "the Processor") and the customer (hereinafter "the Processor") with respect to the processing of personal data. This agreement applies when Digi Hosting processes personal data on behalf of the customer, in the context of the provision of web hosting services and related services.

2. Processing of personal data

Digi Hosting processes the following categories of personal data:

  • Contact and identification information (such as name, e-mail address);

  • IP addresses;

  • Domain names;

  • User names;

  • Membership information;

  • Analysis and usage data;

  • Order history and contract information;

  • Communication and support requests;

  • Images;

  • Any other personal data stored by the customer.

Processing will only take place based on written instructions from the customer, unless laws or regulations require otherwise.

3. Purposes of processing.

Personal data is processed solely for the purpose of providing the agreed services, including web hosting, email services, domain registration, technical support, backups and security measures.

4. Obligations of Digi Hosting.

Digi Hosting undertakes to:

  • Process personal data only as instructed by the customer;

  • Ensure confidentiality by requiring its employees to maintain secrecy;

  • Implement appropriate technical and organizational security measures (see Appendix 1);

  • Assisting the client with data subject requests, data breach notifications, and conducting DPIAs;

  • Return or delete data upon completion of services, at the client's request, unless legal retention obligations require otherwise.

5. Subprocessors

Digi Hosting uses carefully selected sub-processors for the performance of its services. These sub-processors also comply with the requirements of the AVG.

The following sub-processors are used:

Subprocessor Function Location
Hetzner Online GmbH Data Center Germany, Finland
OVHCloud Data Center France
OpenProvider Domain registration

Netherlands

CBA Lochristi Accounting

Belgium

Bill To Box Accounting

Belgium

Digi Hosting remains responsible for the actions of these sub-processors. The customer will be informed in advance of any intended change of sub-processors.
6. Data breaches and incidents

If a security breach occurs that results in loss, theft or unauthorized access to personal data, Digi Hosting will notify the customer immediately and no later than 72 hours, with all relevant information.

7. Rights of data subjects

Digi Hosting will cooperate with customer requests regarding the exercise of rights of data subjects, such as inspection, correction, deletion or data portability, insofar as this is within the capabilities of the service.

8. Duration and termination

This processor agreement is valid as long as Digi Hosting processes personal data on behalf of the customer. After termination of the agreement, the personal data will be deleted or returned at the request of the customer, unless storage is required by law.

Security measures

This appendix forms an integral part of the Processor Agreement between the Controller and Digi Hosting. It outlines the technical and organizational security measures taken by Digi Hosting to protect the processing of personal data in accordance with the requirements of the General Data Protection Regulation (AVG).

1. Organization of information security
  • Security Ownership
    Digi Hosting has appointed an information security officer in charge of coordinating, implementing and monitoring applicable security measures and procedures. This officer is supported by a management-level internal governing body that oversees the security policy.

  • Security roles and responsibilities
    Digi Hosting employees who have access to personal data are subject to strict confidentiality obligations. These obligations are emphasized at the start of employment and periodically brought to their attention.

  • Risk management
    Digi Hosting systematically conducts risk assessments prior to processing personal data or commissioning new services. The risk management procedure focuses on identifying, prioritizing and mitigating potential risks. Backup facilities are structurally embedded in the services.

  • Document Management
    Security documentation is retained in accordance with legal and contractual retention obligations, even if these documents have formally expired.

2. Asset Management
  • Inventory of information assets
    Digi Hosting maintains a detailed inventory of all data carriers on which personal data is stored. Access to this inventory is reserved solely for authorized and written personnel.

  • Management of information carriers

    • Digi Hosting classifies personal data to ensure appropriate access restrictions and protection levels.

    • Employees must obtain prior explicit consent for processing personal data on portable devices, outside company facilities or via remote access.

3. Security of personnel
  • Awareness and training
    All Digi Hosting employees are instructed regarding their security responsibilities. They receive periodic training and education on relevant procedures and recognizing current threats.

4. Physical and environmental security
  • Access security to facilities
    Physical access to locations where personal data is processed is restricted to authorized individuals based on identification and access control.

  • Security of information carriers
    Physical data carriers containing personal data are stored in secure areas with access restrictions.

  • Protection against calamities
    Digi Hosting uses industry-standard facilities to protect against disruptions due to power outages, fire, flooding and other risks.

  • Data removal
    Personal data is destroyed in accordance with industry-standard procedures once it is no longer necessary for the purposes of processing.

5. Operational security
  • Policies and procedures
    Digi Hosting has current documentation of its security policies, including procedures and responsibilities of employees with access to personal data.

  • Recovery procedures

    • Reserve copies of personal data are stored in geographically separate locations.

    • Access to this data is strictly regulated and documented.

  • Malware Protection
    Measures have been implemented to protect against malicious software, including virus scanners and network filters.

  • Logging
    Access and usage activities related to systems processing personal data are recorded in log files, including user ID, time, access status and relevant actions.

  • Encryption
    Data transmission over the Internet is based on encryption techniques in accordance with current standards.

6. Access Control
  • Policy
    Digi Hosting maintains an access control policy that defines which employees have access to which systems and data.

  • Authorization management

    • Inactive access data is automatically deactivated after a period of inactivity.

    • Only authorized personnel may grant, modify or revoke permissions.

    • Each user has a unique login identifier.

  • Minimal access
    Access to personal data is limited to employees for whom it is necessary as part of their duties.

  • Session management and password protection

    • Sessions are automatically terminated upon inactivity or upon leaving the workstation.

    • Passwords are stored in a manner that guarantees irreversible encryption.

  • Authentication

    • Access to information systems is granted based on strong authentication procedures.

    • Passwords are regularly renewed, and expired or deactivated accesses are not reused.

    • Unauthorized access attempts are detected and logged.

    • Password management meets industry standards.

  • Network Security
    Network architecture and access rights are designed to prevent unauthorized access to personal data.

7. Incident Management
  • Reporting and recording of security incidents

    • Digi Hosting records all security incidents including the nature, duration, impact, data involved, and measures taken.

    • In the event of a data breach, notification will be made to the Controller without undue delay, and at the latest within 72 hours.

  • Transparency in data disclosure
    Data access is logged indicating nature, recipient and time.

8. Continuity Management
  • Emergency Procedures
    Digi Hosting maintains comprehensive emergency and disaster recovery plans for all data processing sites.

  • Redundancy and recovery
    The redundant storage structure and recovery procedures are in place so that personal data can be restored to the last known complete state prior to an incident.

These security measures are periodically evaluated and adapted to the current state of the art and risk assessment, with a view to continuing protection of the Personal Data of the Processing Controller.

These terms and conditions are subject to printing errors.

Last modified: March 8, 2025