ProcessorTalenom Redovisning AB
Personal data is processed and stored to produce the services provided by the Processor in a contractual relationship between the Processor and the Controller. Personal data is processed and stored to fulfil statutory requirements and obligations related to the processing of personal data,
Categories of data subjects and categories of personal data:
Controller’s employees: payroll and personnel administration (payroll adminstration)
Follow-up of receivables from the Controller’s private customers (accounting)
Partner of a limited liability company: management of the joint-stock company (joint-stock company)
Member register associations: management of associations and invoicing (associations and organizations)
Personal data processed are:
In addition to their own data, the Controller adds the personal data of their personnel and customers to the Processor’s electronic services. Personal data may be added based on electronic and/or physical material provided by the Controller.
In addition, personal data is collected from public authorities, insurance companies, trade union membership fee associations, credit granting services and from other parties whose data is to be processed in services provided by the Processor, such as salary calculations.
Users’ data is automatically collected to develop the services and products provided by the Processor and to develop customer service, for example by using cookies from browsers in the Processor’s electronic products and online services.
The Processor may disclose the Controller’s personal data within the framework of the applicable legislation and in accordance with the terms between the Processor and the Controller. Register data may be disclosed to public authorities, insurance companies, trade unions, or unemployment insurance funds. The Processor has a statutory obligation to disclose personal data to authorities that on a legal basis submit a written request for it. Personal data will not be transferred outside the European Union (“EU”) or the European Economic Area (“EEA”) unless the Controller has given their prior written consent. Data transfers requested by the Controller to be made to areas outside the EU or EEA are carried out in accordance with the requirements of the standard contractual clauses regarding data transfer in the EU General Data Protection Regulation.
Data is disclosed to the Client’s auditor without a separate power of attorney for the execution of the agreement between the Controller and the auditor. In the case of other partners of the Controller, such as lawyers and consultants, a separate written consent is requested from the Controller for the disclosure of data. In connection with the release of written material, a certificate of disclosure of the data is drawn up, which contains basic information on the material disclosed, to whom it has been disclosed and when. The certificate is saved in the Controller specific folders for possible proof later. In connection with the release of digital material, personal user IDs are created for the Controller company’s partners in the Processor’s information system. The Controller’s partner will have access to the material with these codes. The Controller’s request to obtain login credentials to the System and to provide access to the Controller’s Data also includes the Controller’s consent to share the Controller’s Data with the respective partners. Information is disclosed to public authorities, insurance companies, trade unions or unemployment insurance funds without the Controller’s authorization or consent, if it has been stipulated by law on the disclosure of the information. The processing of digital material is monitored with the help of transaction data in information systems, i.e. log data that is saved and monitored automatically or manually. In addition, log data can be used for evidence of events if necessary.
Register data processed electronically is protected by technical firewalls, passwords, the possibility of identification of the Controller’s employees in two steps when logging in to the Processor’s financial administration system and other generally adopted technical means in the information security industry. The data transfer between the Controller and the Data Processor is encrypted with TLS (Transport Layer Security) technology, in the software and applications currently used by The Processor or provided to its customers. The data is backed up regularly, and the backups are stored in a different location from the original data.
The Processor protects the Controller’s information against unauthorized access and disclosure. Only appointed employees of the Processor and employees of companies working on behalf of and on behalf of the Processor have access to the data contained in the register based on separately granted user rights. User rights are monitored and dangerous combinations of rights have been prohibited in the user rights management policy. Whether they arise is monitored in the context of the management of user rights. In particular, the user rights of the main users of the different systems are regularly checked and removed when the user no longer needs the rights. The user rights of employees who have left the Processor are removed from all systems when the employment ends.
The Controller’s data is only processed by the Processor’s employees whose job description requires the processing of the data in question. Processing of personal data on other grounds is prohibited for the Processor’s employees, even if the Processor’s employees have technical access to the Controller data due to their duties and for business reasons. The Processor’s entire staff and external persons who work on behalf of the Processor are bound by confidentiality regarding all information and personal data regarding the Controller’s financial administration. The non-disclosure agreement is written into the employment contracts of the Processor’s employees, including the sanctions caused by breaches of the duty of confidentiality. The non-disclosure agreement, including sanctions caused by breaches of professional secrecy, has been written into agreements concluded with third parties.
Employees who process the Controller’s data are regularly trained. The legal grounds for processing data at work are an essential part of the training. The data protection and information security knowledge of the Processor’s personnel is regularly maintained in various ways, for example by arranging regular information meetings for the entire personnel of the company regarding data protection and information security. In addition, mandatory training in data protection and information security is organized annually for employees. Employees must pass a test in the subject area with a passing grade. The Processor has designed a data protection policy that every new employee of the Processor gets to know when they start their service. The regular information security training sessions provide information about the information security policy and where it can be read. Workers are reminded that they are bound by the policy. The information security policy describes the general rules on information security and data protection that oblige employees, whether they are technical rules, information security processes or procedures and instructions to be applied in daily work. The Controller’s data is processed in information systems located in serverhalls in Finland or in cloud services within the EU. In the server halls in Finland, the most important production systems have been duplicated into two (2) physically separated serverhalls to ensure the security, data storage and continuity of the service under both normal and exceptional conditions. These machine halls are operated in safety procedures, access control and monitoring certified by the service provider. Manually maintained materials are located in premises to which access control has prevented unauthorised persons. Video surveillance is used in the most important premises for the purpose of investigating and detecting possible breaches of physical security. The processor carries out internal evaluations and allows third parties to carry out evaluations that cover both the technical security of critical information systems and the processes and instructions related to the administrative aspect of information security and data protection.
The Controller is responsible for ensuring that adequate technical and organizational data protection measures are implemented and maintained.
The Processor removes the Controller’s personal data to the extent required by law when the Controller leaves the Processor. The data is deleted when five (5) years have passed from the end of the customer relationship. After deletion in the operational information systems, the data will be automatically deleted from the backup copies within six (6) months.
The controller describes in a separate documentation which matters the data subjects must be informed about. In accordance with sections 15–22 of the EU General Data Protection Regulation, the data subject has the right to:
access such personal data that has been registered about him or her in the Processor’s system. The exercise of certain of the data subject’s rights is limited by some other mandatory legislation, according to which the Processor has the right and obligation to justifiably refuse to rectify, delete, restrict the processing of the data or transfer them from one system to another. An example of such legislation is the Accounting Act, which stipulates that supporting documents related to the payroll calculation must be stored, regardless of the rights that the data subject has under the General Data Protection Regulation. In situations where the data subject wishes to check or change data in a personal data file belonging to the Controller, the data subject must submit a request for verification or change of the data to the Controller. The Controller then completes the implementation of the control or change request together with the Processor for the personal data. In such a situation, the controller must submit the written request for verification to the e-mail address mentioned below. The request for verification and amendment must state which personal data you want to check and the name of the register to which the request relates. The request should be sent by e-mail to: firstname.lastname@example.org. Data subjects may exercise their right of access under the Personal Data Act free of charge only once a year.
The Controller may, in a separate documentation, provide more detailed instructions to the Processor on the processing of the data. The Processor stores the instructions in a customer-specific file folder, as part of the Controller’s instructions.
The notification must be made to the Controller without undue delay after a personal data breach has been discovered. The notification must describe the nature of the personal data breach and the measures taken in the manner required by legislation.
The Controller will notify the data subject if the personal data breach is likely to result in a high risk to the rights and freedoms of the data subject. The notification must describe the nature of the personal data breach and the measures taken in the manner required by law.
The Controller’s obligation is to submit a notification to the relevant public authority within 72 hours of discovery if it is likely that the personal data breach will result in a high risk to the rights and freedoms of a natural person. The Processor assists the Controller in drawing up a notification upon separate request. The notification is made in accordance with the instructions of the Data Protection Ombudsman.
Name of the Processor: Talenom Redovisning AB
Data Protection Officer: Jimmy Dahmén Tel. 08 505 736 75 E-mail: email@example.com Address: Holländargatan 13, 111 36 Stockholm or Box 842, 101 36 Stockholm Tel. 08 505 736 10 (switchboard)
The Controller has given his general consent to the use of subcontractors. A list of subcontractors is provided on request.
Talenom account and credit cards will be released soon. Sign up now to get priority access as well as updates on Talenom’s financial services.
By submitting, you agree to us contacting you.
Talenom Tili ja Talenom Kortti julkaistaan pian. Ilmoittaudu nyt saadaksesi Talenomin uudet palvelut käyttöösi ensimmäisten joukossa. Pidämme sinut sähköpostitse ajan tasalla.
Ilmoittautumalla hyväksyt sen, että voimme olla yhteydessä sinuun. Voit milloin tahansa perua kyseiset viestintäasetukset. Lisätietoa ilmoittautumisen perumisesta, tietosuojakäytännöistä ja siitä, miten olemme sitoutuneet suojelemaan ja kunnioittamaan yksityisyyttäsi, saat tietosuojakäytännöstämme.
Genom att skicka in samtycker du till att vi kontaktar dig. Du kan hitta mer information om avregistrering, sekretesspraxis och hur vi är angelägna om att skydda och respektera din integritet i vår integritetspolicy.
Genom att skicka in dina uppgifter samtycker du till att vi kontaktar dig. Du kan hitta mer information om avregistrering, integritetsskyddsrutiner och hur vi arbetar för att skydda och respektera din integritet i vår integritetspolicy.
Voit milloin tahansa perua kyseiset viestintäasetukset. Lisätietoa tilauksen peruuttamisesta, tietosuojakäytännöistä ja siitä, miten olemme sitoutuneet suojelemaan ja kunnioittamaan yksityisyyttäsi, saat tietosuojakäytännöstämme.
Al enviar, aceptas que nos comuniquemos contigo.
Puedes encontrar más información sobre cómo darte de baja, las prácticas de privacidad y cómo nos comprometemos a proteger y respetar tu privacidad en nuestra Política de privacidad.