Data Processing Information

1. Categories of data subject

Individual customers, guests and personnel of the Customer

2. Types of Personal Data

Anonymized CCTV data, gender, age, postcode, and customer type

3. Purposes of processing

Providing demographic statistics & maps of usage within the Customer’s facilities or event space

4. Security measures for Personal Data

The Provider shall implement appropriate Technical and Organisational measures as defined in Section 6 of this Schedule to ensure a level of security appropriate to the risk, including protection against unauthorised or unlawful processing and against accidental loss, destruction, or damage.

5. Third Party processors (Sub-processors) of Personal Data

Approved sub-processors of Personal Data

Sub-Processor Nola Technologies Pty Ltd

Types of Personal Data Anonymized CCTV data

Country of Sub Processor Australia

Data Processing Agreements in Place Data Processing Agreement 1/10/2024, International Data Transfer Agreement 1/10/2024

Data Anonymisation and Encryption:

Implement data anonymisation techniques to ensure that personal data cannot be linked back to an identifiable individual before processing.

Use strong encryption algorithms to protect data in transit and at rest.

Access Control:

Implement role-based access controls (RBAC) to ensure that only authorised personnel can access the data processing systems.

Use multi-factor authentication (MFA) for accessing systems that process or store sensitive data.

Data Backup and Recovery:

Regularly backup data to secure, encrypted storage solutions to prevent data loss.

Develop and test a data recovery plan to restore any lost data in a timely manner.

Network Security:

Deploy firewalls, intrusion detection systems(IDS), and intrusion prevention systems (IPS) to protect against unauthorised access and cyber threats.

Regularly update and patch network devices and software to mitigate vulnerabilities.

Monitoring and Logging:

Implement system monitoring to detect and respond to security incidents or anomalies.

Maintain logs of access to and actions on data processing systems, ensuring that logs are securely stored and analysed regularly.

Data Processing Policies and Procedures:

Adhere to: Information Security policy, Encryption and Key management policy and IT Policy covering data processing activities, including data anonymisation, access control, data transfer, andbreach response.

Regularly review and update these policies to reflect changes in regulations or operational practices.

Training and Awareness:

Provide regular training to employees on data protection principles, the importance of protecting personal data, and specific responsibilities under the DPA.

Raise awareness about potential data protection risks and the measures in place to mitigate them.

Data Protection Impact Assessments (DPIAs):

Conduct DPIAs for processing activities that are likely to result in a high risk to individuals’ rights and freedoms, particularly for new projects or technologies.

Use DPIAs to identify and mitigate risks in collaboration with Newport Live.

Vendor Management:

Assess and select vendors who comply with GDPR and UK data protection regulations or meet relevant data adequacy rating, especially those who may have access to or process the data on behalf of TwinLabs.

Include data protection requirements in contracts with vendors and conduct regular audits to ensure compliance.

Incident Response and Notification:

Establish an incident response plan to address data breaches or security incidents promptly.

Notify the Customer without undue delay after becoming aware of a personal data breach, in accordance with GDPR requirements.