SUPPORT
Accenture’s Client Data Safeguards
June 14, 2021
SUPPORT
June 14, 2021
The following terms describe the technical and organizational measures, internal controls and information security routines that Accenture maintains to safeguard data provided by or on behalf of our clients in connection with a client service engagement (“Client Data”). These security measures are intended to protect Client Data when in Accenture’s environments (e.g., systems, networks, facilities) against accidental, unauthorized or unlawful access, disclosure, alteration, loss, or destruction. When Client Data includes personal data, our implementation of and compliance with these measures (and any additional security measures set out in the applicable client agreement) is designed to provide an appropriate level of security in respect of the processing of the personal data. Accenture may change these measures from time to time, without notice, so long as any such revisions do not materially reduce or degrade the protection provided for the Client Data.
STANDARD DATA SAFEGUARDS:
1. Organization of Information Security
a. Security Ownership. Accenture will appoint one or more security officers responsible for coordinating and monitoring the security rules and procedures.
b. Security Roles and Responsibilities. Accenture’s personnel with access to Client Data will be subject to confidentiality obligations.
c. Risk Management Program. Accenture will have a risk management program in place to identify, assess and take appropriate actions with respect to risks related to the processing of the Client Data in connection with the applicable agreement between the Parties.
2. Asset Management
a. Asset Inventory. Accenture will maintain an asset inventory of its infrastructure, network, applications and cloud environments. Accenture will also maintain an inventory of its media on which Client Data is stored. Access to the inventories of such media will be restricted to personnel authorized in writing to have such access.
b. Data Handling. Accenture will
3. Human Resources Security
a. Security Training. Accenture will
4. Physical and Environmental Security
a. Physical Access to Facilities. Accenture will implement and maintain procedures to limit authorized access to its facilities where information systems that process Client Data are located.
b. Physical Access to Components. Accenture will maintain records of the incoming and outgoing media containing Client Data, including the kind of media, the authorized sender/recipients, date and time, the number of media, and the types of Client Data they contain.
c. Component Disposal. Accenture will use industry standard (e.g., ISO 27001, CIS Sans 20, and/or NIST Cyber-Security Framework, as applicable) processes to delete Client Data when it is no longer needed.
5. Communications and Operations Management
a. Operational Policy. Accenture will maintain security documents describing its security measures and the relevant procedures and responsibilities of its personnel who have access to Client Data.
b. Mobile Device Management (MDM)/Mobile Application Management (MAM). Accenture will maintain a policy for its mobile devices that:
c. Data Recovery Procedures. Accenture will
d. Malicious Software. Accenture will have anti-malware controls to help avoid malicious software gaining unauthorized access to Client Data, including malicious software originating from public networks.
e. Data Beyond Boundaries. Accenture will
f. Event Logging.
6. Access Control
a. Access Policy. Accenture will maintain a record of security privileges of individuals having access to Client Data via its systems.
b. Access Authorization. Accenture will
c. Least Privilege. Accenture will
d. Integrity and Confidentiality. Accenture will instruct its personnel to disable administrative sessions when leaving premises or when computers are otherwise left unattended.
e. Authentication. Accenture will
f. Multi Factor Authentication. Accenture will implement Multi-Factor Authentication for internal access and remote access over virtual private network (VPN) to its systems.
7. Penetration Testing and Vulnerability Scanning of Accenture Systems.
a. At least annually, Accenture will perform penetration and vulnerability assessments on Accenture’s IT environments in accordance with Accenture’s internal security policies and standard practices.
b. Accenture agrees to share with Client summary level information related to such tests as conducted by Accenture to the extent applicable to the Services.
c. For clarity, as it relates to such penetration and vulnerability testing, Client will not be entitled to (i) data or information of other customers or clients of Accenture; (ii) test third party IT environments except to the extent Accenture has the right to allow such testing; (iii) any access to or testing of shared service infrastructure or environments, or (iv) any other Confidential Information of Accenture that is not directly relevant to such tests and the Services.
d. For any Accenture IT systems that are physically dedicated to Client, the Parties may agree to separate, written testing plans and such testing will not to exceed two tests per year.
8. Network and Application Design and Management. Accenture will
a. Have controls to avoid individuals gaining unauthorized access to Client Data in its systems.
b. Use email-based data loss prevention to monitor or restrict movement of sensitive data.
c. Use network-based web filtering to prevent access to unauthorized sites.
d. Use firefighter IDs or temporary user IDs for production access.
e. Use network intrusion detection and / or prevention in its systems.
f. Use secure coding standards.
g. Scan for and remediate OWASP vulnerabilities in its systems.
h. To the extent technically possible, expect that the Parties will work together to limit the ability of Accenture personnel to access non-Client and non-Accenture environments from the Client systems.
i. Maintain up to date server, network, infrastructure, application and cloud security configuration standards.
j. Scan its environments to ensure identified configuration vulnerabilities have been remediated.
9. Patch Management
a. Accenture will have a patch management procedure that deploys security patches for its systems used to process Client Data that includes:
10. Workstations
a. Accenture will implement controls for workstations it provides that are used in connection with service delivery/receipt incorporating the following:
11. Information Security Breach Management
a. Security Breach Response Process. Accenture will maintain a record of its own security breaches in its systems with a description of the breach, the time period, the consequences of the breach, the name of the reporter, and to whom the breach was reported, and the process for recovering data.
b. Service Monitoring. Accenture’s security personnel will review their own logs as part of their security breach response process to propose remediation efforts if necessary.
12. Business Continuity Management
a. Accenture will have processes and programs that are aligned to ISO 22301 to enable recovery from events that impact its ability to perform in accordance with the Agreement.
SUPPLEMENTARY MEASURES. In addition, in accordance with regulatory guidance following the European Court of Justice “Schrems II” decision, Accenture further commits to maintaining the following additional technical, organizational and legal/contractual measures with respect to Client Data, including personal data.
Technical Supplementary Measures:
1. The Client Data in transit between Accenture entities will be strongly encrypted with encryption that:
a. is state of the art,
b. secures the confidentiality for the required time period,
c. is implemented by properly maintained software,
d. is robust and provides protection against active and passive attacks by public authorities, including crypto analysis, and
e. does not contain back doors in hardware or software, unless otherwise agreed with the applicable Client.
2. The Client Data at rest and stored by any Accenture entities will be strongly encrypted with encryption that:
a. is state of the art,
b. secures the confidentiality for the required time period,
c. is implemented by properly maintained software,
d. is robust and provides protection against active and passive attacks by public authorities, including crypto analysis, and
e. does not contain back doors in hardware or software, unless otherwise agreed with the applicable Client.
Organizational Supplementary Measures:
1. The Client Data transfer between Accenture entities and the processing by any Accenture entities will be in accordance with:
a. Accenture’s internal policies and procedures to manage requests from public authorities to access personal data,
b. Accenture’s internal data access and confidentiality policies and procedures,
c. Accenture’s internal data minimization policies and procedures, and
d. Accenture’s internal data security and data privacy policies and procedures.
2. Accenture will maintain a documented log of requests for access to personal data received from public authorities and the response provided, along with the legal reasoning and the involved parties.
3. Accenture will regularly provide reports of public authority requests for personal data, if any, to Accenture’s Chief Compliance Officer.
Legal/Contractual Supplementary Measures: