Legal and Privacy Information

Below should be everything you need to know.

Idera’s GDPR Commitment

Idera, Inc., together with its subsidiaries CopperEgg Corporation, Uptime Software, Inc. and Precise Software Solutions, Inc. (collectively, “Idera”) is committed to the General Data Protection Regulation (“GDPR”), which will go into effect on May 25, 2018. The GDPR regulation contains the most significant changes to European data privacy legislation in the last 20 years. It is designed to give European Union (“EU”) citizens more control over their data and seeks to unify a number of existing privacy and security laws under one comprehensive law. The GDPR applies to all companies that do business with EU citizens or process data of EU citizens regardless of the location of the company that is processing such data. To that end, the GDPR applies to Idera.

Our customers can trust that Idera has made GDPR a priority and has devoted significant and strategic resources toward our efforts to adhere to GDPR.

Like many other global software companies, Idera is in the process of rolling out its company-wide GDPR policy program starting on May 25, 2018. Idera appreciates that its customers have requirements under the GDPR, which are directly impacted by their use of Idera’s products and services, and Idera is committed to helping its customers fulfill their requirements under the GDPR and local law.

Idera will keep you inform through its website about its commitment to the GDPR requirements; however, should you have any questions or concerns, please do not hesitate to contact our legal department at compliance@idera.com.

Questions about GDPR?

If you have questions about Idera, Inc. or any of its subsidiaries CopperEgg Corporation, Uptime Software, Inc. and Precise Software Solutions, Inc. (collectively, “Idera”) IDERA 's GDPR commitment or if you would like to submit an inquiry about your personal data, please fill out and submit this form. An Idera IDERA representative will be in touch shortly.

First Name*:
Last Name*:
Email Address*:
Comments/Questions*:

Frequently Asked Questions about GDPR Compliance1

Idera, Inc., together with its subsidiaries, CopperEgg Corporation, Uptime Software, Inc., AquaFold, Inc, Precise Software Solutions, Inc. (collectively, the “Company”) prepare this document to help you clarify some common confusions around the General Data Protection Regulation (“GDPR”). The Company recognizes the importance of the evolving legal and regulatory landscape around information security and data privacy and remains firmly committed to GDPR readiness.

  • Does my data need to be stored in Europe?

    No. The GDPR does not contain any obligation to store information in Europe. However, transfers of European personal data outside the European Economic Area (EEA) generally require that a valid transfer mechanism be in place to protect the data once it leaves the EEA. The GDPR does not invalidate or override the EU Model Clauses or the EU-U.S. and Swiss-U.S. Privacy Shield Framework, which are both legally valid mechanisms to ensure the legal transfer of personal data into and out of the EEA.

  • Does the GDPR apply to company that is established outside the European Union?

    Yes. The GDPR applies to all companies regardless of where it is located to the extent the company process personal data in the context of (A) offering goods and services (whether paid or not) to people in the EEA; or (B) monitoring the behavior of people in the EEA, for example by placing cookies on the devices of EEA individuals.

  • Is it required to have consent from individuals to process their personal data?

    Consent is only one of the legal bases a company can use for the processing of personal data. For example, the company can process personal data (A) when necessary for the performance of a contract to which the data subject (the individual whose data is processed) is a party; (B) when there is a legal obligation to do so (such as the submission of employee data to a tax authority); and (C) sometimes even on the basis of legitimate interests, such as commercial and marketing goals. The legitimate interest must, however, outweigh any detriment to the privacy of the data subject.

  • What is the difference of ‘data controller’ and ‘data processor’?

    Data Controller is the owner of their information and decides how that information should be used. Data Processor is an entity who processes the personal data of the Data Controller and carries out instructions of the Data Controller with regard to this data. Generally speaking, when the Company collects data from a customer in order to create an account, the Company will be the Data Controller. Formal definitions from the GDPR full text may be found at http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf

  • As an owner of the data (e.g. data subject) located in the EEA, do I have the absolute right to be forgotten? Putting another way, is the Company obligated to delete all my personal data upon my request?

    No. The right to erasure (or right to be forgotten) is not absolute. The Company may refuse to honor the request if continued processing is necessary for compliance with a legal obligation which requires processing by Union or Member State law to which the Company is subject. In addition, the Company can refuse to honor the request for the establishment, exercise or defense of legal claims. Therefore, several relevant factors have to be taken into account when considering a request for deletion of personal data by the data subject. Note, however, that data subjects have an absolute right to prevent their personal data from being processed for direct marketing purposes.

  • Does the GDPR require encryption of all personal data?

    No. The GDPR does not mandate specific security measures. Instead, the GDPR requires organizations to take technical and organizational security measures which are appropriate to the risks presented. Encryption at rest and pseudonymization may be appropriate depending on the circumstances, but they are not mandated by the GDPR in every instance. The following are kinds of security actions considered “appropriate to the risk” (1) the pseudonymization and encryption of personal data (as mentioned); (2) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (3) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; and (4) a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.

1NOTE: The above information is provided by the Company for informational purposes only and is not intended to serve as legal advice. You should contact your attorney to obtain advice with respect to any particular GDPR question, issue or problem.

Frequently Asked Questions about GDPR Compliance2 *Applicable only for CopperEgg customers

Idera, Inc., together with its subsidiaries, CopperEgg Corporation, Uptime Software, Inc., AquaFold, Inc, Embarcadero Technologies, Inc., Sencha, Inc., Precise Software Solutions, Inc., Embarcadero Technologies Europe Ltd., Gurock Software GmbH and Ranorex GmbH (collectively, the “Company”) prepare this document to help you clarify some common confusions around the General Data Protection Regulation (“GDPR”). The Company recognizes the importance of the evolving legal and regulatory landscape around information security and data privacy and remains firmly committed to GDPR readiness.

  • Does my data need to be stored in Europe?

    No. The GDPR does not contain any obligation to store information in Europe. However, transfers of European personal data outside the European Economic Area (EEA) generally require that a valid transfer mechanism be in place to protect the data once it leaves the EEA. The GDPR does not invalidate or override the EU Model Clauses or the EU-U.S. and Swiss-U.S. Privacy Shield Framework, which are both legally valid mechanisms to ensure the legal transfer of personal data into and out of the EEA. The Company ensures that its customers can comply by offering its customers a data processing agreement (“DPA”) that incorporates the Model Clauses as approved by the European Commission.

  • What is a DPA or Data Processing Agreement?

    The DPA is an agreement that will govern the processing of personal data that customer uploads or otherwise provides to CopperEgg in connection with the services and the processing of any personal data that CopperEgg uploads or otherwise provides to customer in connection with the services. The DPA is incorporated into the main Agreement that customer has in place with CopperEgg. CopperEgg will process personal data in accordance with its obligations pursuant to the CopperEgg DPA.

  • Is it required for me as a customer of CopperEgg to have a DPA with CopperEgg?

    If you have determined that you qualify as a data controller under the GDPR (please see the definition of data controller and data processor below), and need a data processing agreement in place with vendors that process personal data on your behalf, we want to help make things easy for you. Our GDPR compliant DPA is attached and ready for your acceptance (e.g. signature) here. Please email your signed copy to compliance@copperegg.com.

  • What happens if I don’t have a current agreement with CopperEgg?

    The DPA is an addendum to and is incorporated into reference in the main Agreement between CopperEgg and its customers. The customer entity signing the DPA must be the same as the customer entity party to the main Agreement. If the customer entity signing CopperEgg DPA is not a party to the main Agreement directly with CopperEgg, but is instead a customer indirectly of CopperEgg services, this DPA is not valid and is not legally binding. Such entity should contact the CopperEgg customer to discuss whether any amendment to its agreement with such CopperEgg customer may be required.

  • Does the GDPR apply to company that is established outside the European Union?

    Yes. The GDPR applies to all companies regardless of where it is located to the extent the company process personal data in the context of (A) offering goods and services (whether paid or not) to people in the EEA; or (B) monitoring the behavior of people in the EEA, for example by placing cookies on the devices of EEA individuals.

  • Is it required to have consent from individuals to process their personal data?

    Consent is only one of the legal bases a company can use for the processing of personal data. For example, the company can process personal data (A) when necessary for the performance of a contract to which the data subject (the individual whose data is processed) is a party; (B) when there is a legal obligation to do so (such as the submission of employee data to a tax authority); and (C) sometimes even on the basis of legitimate interests, such as commercial and marketing goals. The legitimate interest must, however, outweigh any detriment to the privacy of the data subject.

  • What is the difference of ‘data controller’ and ‘data processor’?

    Data Controller is the owner of their information and decides how that information should be used (e.g. CopperEgg customer). Data Processor is an entity who processes the personal data of the Data Controller and carries out instructions of the Data Controller with regard to this data (e.g CopperEgg). Formal definitions from the GDPR full text may be found at http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf

  • Does the GDPR require encryption of all personal data?

    No. The GDPR does not mandate specific security measures. Instead, the GDPR requires organizations to take technical and organizational security measures which are appropriate to the risks presented. Encryption at rest and pseudonymization may be appropriate depending on the circumstances, but they are not mandated by the GDPR in every instance. The following are kinds of security actions considered “appropriate to the risk” (1) the pseudonymization and encryption of personal data (as mentioned); (2) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (3) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; and (4) a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.

  • Subprocessors for CopperEgg

    Vendors handling customer data:
    AWS - Hosted servers
    Authorize.NET - Credit card transactions
    Chargify - Financial transaction processing and billing
    Clickatell
    Twilio

2NOTE: The above information is provided by the Company for informational purposes only and is not intended to serve as legal advice. You should contact your attorney to obtain advice with respect to any particular GDPR question, issue or problem.

Idera Security Statement

Idera Inc., together with its US subsidiaries, Uptime Software, Inc., AquaFold, Inc, Embarcadero Technologies, Inc., CooperEgg Corporation, Sencha, Inc. and Precise Software Solutions, Inc. (collectively, “Company”), is committed to respecting and protecting the privacy of its customers, partners and website visitors (collectively “You” or “Your”). For more information about our Privacy Statement, please go to https://www.idera.com/legal/privacystatement.

The security of your personal information is very important to the Company. We use robust security measures, which encompass both technical and organizational security controls, to prevent data loss, information leaks, or other unauthorized data processing operations. For example, the Company requires that its processors and sub-processors (collectively, “Vendors”) have implemented and maintain a security program in accordance with industry standards, specifically the Company Vendors shall include the following security program:

  • I - Physical Access Control: Unauthorized persons shall be prevented from gaining physical access to premises, buildings or rooms where personal data processing systems are located. Vendors have implemented the following controls (without limitation):

    1. prevent unauthorized individuals from gaining access to the processor’s premises.
    2. restrict access to data centers were data servers are located.
    3. use video surveillance and intrusion detection devices to monitor access to data processing facilities.
    4. ensure that individuals who do not have access authorization (e.g. technicians, cleaning personnel) are accompanied at all times when accessing data processing facilities.
  • II – System Access Control: Data processing systems must be prevented from being used without authorization. Vendors have implemented the following controls (without limitation):

    1. implement measures to prevent unauthorized personnel from accessing data processing systems.
    2. provide dedicated user IDs for every authorized personnel accessing data processing systems for authentication purposes.
    3. assign passwords to all authorized personnel for authentication purposes.
    4. ensure that all data processing systems are password protected to prevent unauthorized persons accessing any personal data: (a) after boot sequences; and (b) when left unused for a short period.
    5. ensure that access control is supported by an authentication system.
    6. have implemented a password policy that prohibits the sharing of passwords, outlines processes after a disclosure of a password, and requires the regular change of passwords.
    7. ensure that passwords are always stored in encrypted form.
    8. implement a proper procedure to deactivate user accounts when a user leaves the processor (or processor function).
    9. implement a proper process to adjust administrator permissions when an administrator leaves the processor (or processor function).
  • III – Data Access Control: Persons entitled to use a data processing system shall gain access only to the data to which they have a right of access, and personal data must not be read, copied, modified or removed without authorization in the course of processing or use and after storage. Vendors have implemented the following controls (without limitation):

    1. ensure that personal data cannot be read, copied, modified or removed without authorization during processing or use and after storage.
    2. grant data access only to authorized personnel and assigns only the minimum data permissions necessary for those personal to fulfil their duties.
    3. ensure that the personnel who use the data processing systems can access only the data to which they have a right of access.
    4. restrict access to files and programs based on a "need-to-know-basis”.
    5. store physical media containing personal data in secured areas.
    6. have measures in place to prevent use/installation of unauthorized hardware and/or software.
    7. have established rules for the safe and permanent destruction of data that are no longer required.

In addition, the Company requires its Vendors (i) to maintain a list of subprocessors that may process the Personal Data of Vendor’s, and make available such list to the Company; (ii) to require all subprocessors to abide by substantially the same obligations as Vendor under the Company Data Processing Agreement for Vendors.

The Company incorporates encryption, incident management, network and system integrity, and availability and resilience requirements into its security program.

The Company uses standard security protocols mechanisms to exchange the transmission of sensitive data such as credit card details. When you enter sensitive personal information such as your credit card number on our site, we encrypt it using secure socket layer (SSL) technology.

In the event that your personal information is acquired, or is reasonably believed to have been acquired, by an unauthorized person and applicable law requires notification, the Company will notify you by e-mail or mail. The Company will give you notice promptly, consistent with the reasonable needs of law enforcement and/or the Company to determine the scope of the breach and to investigate and restore the integrity of the data system.

If you have additional questions about privacy, please contact us at compliance@idera.com.

Idera Notice of Certification Under the EU-US Privacy Shield Framework and Swiss-US Privacy Shield Framework

Effective for Idera, Inc. and its subsidiaries on April 23, 2018.

Idera, Inc. and its United States subsidiaries, CopperEgg Corporation, Uptime Software, Inc., AquaFold, Inc, Embarcadero Technologies, Inc., Sencha, Inc. and Precise Software Solutions, Inc. (collectively, “Idera”), participate in the EU-US Privacy Shield Framework and Swiss-US Privacy Shield Framework as set forth by the US Department of Commerce regarding the collection, use, and retention of personal information transferred from European Union member countries and Switzerland to the United States, respectively. Idera has certified with the Department of Commerce that it adheres to the Privacy Shield Principles. If there is any conflict between the terms in this privacy policy and the Privacy Shield Principles, the Privacy Shield Principles shall govern. To learn more about the Privacy Shield principles, please visit https://www.privacyshield.gov/welcome.

In compliance with the EU-US and Swiss-US Privacy Shield Principles, Idera commits to resolve complaints about your privacy and our collection or use of your personal information. European Union or Swiss individuals with inquiries or complaints regarding this privacy policy should first contact Idera at compliance@idera.com.

Idera has further committed to refer unresolved privacy complaints covering non-Human Resource data under the Privacy Shield Principles to an independent dispute resolution mechanism, the BBB EU Privacy Shield, operated by the Council of Better Business Bureaus. If you do not receive timely acknowledgment of your complaint, or if your complaint is not satisfactorily addressed, please visit https://www.bbb.org/EU-privacy-shield/for-eu-consumers/ for more information and to file a complaint. If your concern continues to be unresolved, you may pursue binding arbitration through the Privacy Shield Arbitration Panel. To learn more about the Privacy Shield Panel, please visit https://www.privacyshield.gov/article?id=F-The-Arbitration-Panel.

Please note that Idera also receives some data via other compliance mechanisms, including data processing agreements based on the EU Standard Contractual Clauses.

In regard to Human Resource data, Idera commits to cooperate with the panel established by the EU data protection authorities (DPAs) and the Swiss Federal Data Protection and Information Commissioner, as applicable and comply with the advice given by them with regard to human resources data transferred from the European Union and Switzerland, as applicable in the context of the employment relationship. For more information about Idera Human Resource data and the Human Resource Privacy Policy, please contact humanresources@idera.com. As an employee, you can always review Idera Human Resource Privacy Policy here.

As explained in our Privacy Statement we sometimes provide personal information (such as name, email address, purchases, and billing information) to third parties to perform services on our behalf, or in response to contractual requirements. If we transfer personal information received under the Privacy Shield to a third party, the third party’s access, use, and disclosure of the personal data must also be in compliance with our Privacy Shield obligations, and we will remain liable under the Privacy Shield for any failure to do so by the third party unless we prove we are not responsible for the events giving rise to such failure to comply with the Privacy Shield obligations.

European Union individuals and Swiss individuals have rights to access personal data about them, and to limit use and disclosure of their personal data. With our Privacy Shield certification, Idera has committed to respect those rights. If you wish to access, to limit use, or to limit disclosure, please access your customer account after you enter your customer log in information and revise the information that you entered into our system or contact us at compliance@idera.com and we will assist you through this process.

Idera is subject to the investigatory and enforcement powers of the US Federal Trade Commission. Idera may be required to disclose personal information that we handle under the Privacy Shield in response to lawful requests by public authorities, including to meet national security or law enforcement requirements.

If you have any questions about our handling of your personal data under Privacy Shield, or about our privacy practices generally, please contact us at compliance@idera.com or at our mailing address below. We will work with you to address your inquiry in a timely manner.

Idera Inc.
Attn: Legal Department
2950 North Loop Freeway West
Suite 700
Houston, Texas 77092