Bordr, LLC respects the privacy of its customers, suppliers and partners. We have therefore formulated and implemented a policy on complete transparency regarding the processing of personal data, its purpose(s) and the possibilities to exercise your legal rights in the best possible way. For employees, we have formulated a separate privacy policy, available upon employment and upon request.
Website
Identification, Financial, Date of Birth, Educational and employment history, Copy of ID, Location, Social Security Number, Contracts
Customers
Consent
Identification, Financial, Date of Birth, Educational and employment history, Copy of ID, Location, Contracts
Customers, Employees, Contractors, Suppliers, Partners
Legitimate interest
Storage and exchange of documents
Not applicable
Not applicable
Legitimate interest
Delivery of goods and services
Identification, Financial, Date of Birth, Educational and employment history, Copy of ID, Location, Social Security Number, Contracts
Customers, Suppliers
Performance of a contract
Financial and business administration
Identification, Financial
Customers, Employees, Contractors, Suppliers, Partners
Legitimate interest
Marketing
Identification
Customers
Consent
Bordr, LLC processes personal data for one or more of the following purposes:
The following business processes describe how we may collect, store or otherwise process the types of personal information set out in the table above:
We may have to share your data with third parties, including third-party service providers. We require third parties to respect the security of your data and to treat it in accordance with the law.
We may transfer your Personal Data outside USA. If we do, you can expect a similar degree of protection in respect of your Personal Data.
We will only share your Personal Data with third parties in accordance with the GDPR and as outlined in the legal justification table above.
We share your personal data with the following enterprise third parties. We also share your data with SME third parties, details of which are available upon request. You will be notified when we have engaged with a new third party recipient of your personal data.
Function
Document storage service, CRM, Task management or work planning
Business process
Software tools and applications
Data categories
Identification, Financial, Date of Birth, Educational and employment history, Copy of ID, Software tools and applications
Data subjects
Customers, Suppliers, Partners
Security measures
N/A
Function
Document storage service
Business process
Digital storage of documents
Data categories
Identification, Financial, Date of Birth, Educational and employment history, Copy of ID, Social Security Number, Contracts, Software tools and applications
Data subjects
Customers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Appointment scheduling tool
Business process
Administration
Data categories
Identification, Software tools and applications
Data subjects
Customers, Employees, Contractors, Suppliers, Partners
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Marketing tool
Business process
Marketing
Data categories
Software tools and applications
Data subjects
Customers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Email provider, Document storage service, Office software
Business process
Administration
Data categories
Identification, Financial, Contracts, Software tools and applications, Business data
Data subjects
Customers, Employees, Contractors, Suppliers, Partners
Security measures
N/A
Function
Task management or work planning
Business process
Delivery of goods or services, Software tools and applications
Data categories
Software tools and applications, Business data
Data subjects
Employees, Contractors
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Document storage service
Business process
Digital storage of documents
Data categories
Identification, Financial, Date of Birth, Educational and employment history, Copy of ID, Social Security Number, Contracts, Software tools and applications
Data subjects
Customers, Suppliers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Delivery of goods or services
Data categories
Software tools and applications
Data subjects
Customers
Security measures
N/A
Function
Password manager
Business process
Administration
Data categories
Identification, Software tools and applications, Technical data
Data subjects
Employees
Security measures
N/A
Function
Other software suite
Business process
Software tools and applications
Data categories
Software tools and applications
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Application hosting
Business process
Delivery of goods or services
Data categories
Software tools and applications
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Customer service software
Business process
Software tools and applications
Data categories
Identification, Software tools and applications
Data subjects
Customers
Security measures
N/A
Function
Other software suite
Business process
Delivery of goods or services
Data categories
Identification, Date of Birth, Location, Software tools and applications
Data subjects
Customers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Marketing tool
Business process
Marketing
Data categories
Software tools and applications
Data subjects
Customers
Security measures
N/A
Function
Marketing tool
Business process
Marketing
Data categories
Software tools and applications
Data subjects
Customers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Application hosting
Business process
Software tools and applications
Data categories
Software tools and applications
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Delivery of goods or services, Software tools and applications
Data categories
Identification, Date of Birth, Copy of ID, Location, Software tools and applications
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Software tools and applications
Data categories
Identification, Date of Birth, Copy of ID, Software tools and applications
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Delivery of goods or services, Software tools and applications
Data categories
Identification, Financial, Date of Birth, Educational and employment history, Copy of ID, Location, Software tools and applications, Business data
Data subjects
Customers, Employees, Contractors, Suppliers, Partners
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Document storage service, Other software suite
Business process
Delivery of goods or services, Software tools and applications
Data categories
Identification, Financial, Date of Birth, Educational and employment history, Copy of ID, Location
Data subjects
Customers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Payment software
Business process
Administration
Data categories
Identification
Data subjects
Partners
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Software tools and applications
Data categories
Software tools and applications
Data subjects
Employees
Security measures
N/A
Function
Email provider
Business process
Data categories
Identification, Contracts, Software tools and applications
Data subjects
Customers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Task management or work planning
Business process
Delivery of goods or services
Data categories
Identification, Financial, Copy of ID, Contracts, Software tools and applications
Data subjects
Customers, Suppliers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Accountancy software, Bookkeeping software
Business process
Administration
Data categories
Software tools and applications, Business data
Data subjects
Customers, Employees, Contractors, Suppliers, Partners
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Marketing tool
Business process
Marketing
Data categories
Identification, Software tools and applications, Business data
Data subjects
Customers, Partners
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Marketing tool
Business process
Data categories
Identification, Software tools and applications
Data subjects
Customers
Security measures
N/A
Function
Office software
Business process
Administration
Data categories
Identification, Software tools and applications, Business data
Data subjects
Employees, Contractors
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Payment processing software
Business process
Administration
Data categories
Identification, Financial, Location, Software tools and applications
Data subjects
Customers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Website hosting
Business process
Website
Data categories
Identification, Financial, Software tools and applications
Data subjects
Customers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Payment software
Business process
Administration
Data categories
Identification, Financial
Data subjects
Customers, Employees, Contractors, Suppliers, Partners
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Delivery of goods or services, Software tools and applications
Data categories
Identification, Date of Birth, Copy of ID, Software tools and applications
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Delivery of goods or services
Data categories
Identification, Date of Birth, Software tools and applications
Data subjects
Customers, Suppliers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Marketing tool
Business process
Marketing
Data categories
Software tools and applications
Data subjects
Customers
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Software tools and applications
Data categories
Software tools and applications
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite, Task management or work planning, Office software
Business process
Administration, Software tools and applications
Data categories
Software tools and applications, Business data
Data subjects
Employees, Contractors
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite, Task management or work planning, Office software
Business process
Administration, Software tools and applications
Data categories
Software tools and applications, Business data
Data subjects
Employees, Contractors
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Software tools and applications
Data categories
Software tools and applications, Technical data
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Software tools and applications
Data categories
Software tools and applications, Technical data
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Software tools and applications
Data categories
Software tools and applications, Technical data
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Software tools and applications
Data categories
Software tools and applications, Technical data
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Software tools and applications
Data categories
Software tools and applications, Technical data
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
Function
Other software suite
Business process
Software tools and applications
Data categories
Software tools and applications, Technical data
Data subjects
Employees
Security measures
Physical security such as access controls, clean desk policy and CCTV; Access controls and prevention of unauthorised access on the basis of roles and strong authentication methods; All data is encrypted at rest and access is only permitted via encrypted channels (e.g. SSL); Data is minimized and regularly deleted according to national retention periods.
The third parties we have engaged for the abovementioned business process may transfer your personal information to outside of USA. Bordr, LLC’s third party processors take all necessary measures to ensure the confidentiality, availability and integrity of personal data and to comply with the GDPR with regards to international data transfers. The international nature of its compliance certifications, as well as far-reaching technical security measures (including but not limited to encryption of the personal data, making the data illegible to an unauthorised recipient) are sufficient to ensure that the data subjects continue to benefit from the fundamental rights they are entitled to under the GDPR.
Bordr, LLC relies on processing agreements with these sub-processors that include the model clauses (or “Standard Contractual Clauses”) which have been tested on the adequacy of its protection with regards to the specific sub-processing activities carried out in this particular subprocessing relationship.
Additional security measures are taken to safeguard the international data transfers:
Your data is protected by Bordr, LLC and its processors in pursuance to all legal requirements set by the relevant data processing laws. Bordr, LLC has taken technical and organizational security measures to protect your data and requires its data processors to meet the same requirements. Bordr, LLC has signed processing agreements with its processors to ensure an adequate level of data protection.
The following security measures are taken by Bordr, LLC to protect your personal data in the course of the listed business processes:
Staff
Bordr, LLC staff members are required to conduct themselves in a manner consistent with Bordr, LLC’s guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards.All staff members undergo appropriate background checks prior to hiring and sign a confidentiality agreement outlining their responsibility in protecting customer data.
We continuously train staff members on best security practices, including how to identify social hacks, phishing scams, and hackers.
Access controls
Bordr, LLC maintains your data privacy by allowing only authorized individuals access to information when it is critical to complete tasks for you. Bordr, LLC staff members will not process customer data without authorization.
Data hosting
As a rule, data is hosted within USA, but it is possible that we might transfer personal data to countries within the EEA, to the UK or in exceptional circumstances outside of those areas. We ensure that we comply with the GDPR and the DPA when sending data overseas by relying on data processing agreements containing standard contractual clauses with our subprocessors or by taking additional measures to secure this data transfer, such as anonymisation.
Physical security
The data centres on which personal data is hosted are secured and monitored 24/7 and physical access to facilities is strictly limited to select staff.
All devices which are used to access personal data for which we are responsible are secured with antivirus software, firewalls, encryption and access management. We regularly update operating systems and software to ensure vulnerabilities cannot be exploited.
We carry out regular vulnerability scanning of our website and have engaged credentialed external auditors to verify the adequacy of our security and privacy measures.
Each data subject has the right to information on and access to, and rectification, erasure and restriction of processing of their personal data, as well as the right to object to the processing and the right to data portability.
You can exercise these rights by contacting us at the following email address: info@bordr.com. Each request must be accompanied by a copy of a valid ID, on which you put your signature and state the address where we can contact you. Ensure that you write “Data Request” in the subject line of your email.
Within one month of the submitted request, you will receive an answer from us. We will not charge you for submitting your request unless the request is manifestly unfounded or otherwise unreasonable in its nature. Depending on the complexity and the number of the requests this period may be extended to two months.
The collected data are used and retained for the duration determined by law. You may, at any time, request your data to be deleted from any Bordr, LLC account, system or other data processing medium in accordance with the process described above.
These conditions are governed by USA legislation. The court in the district where the collector has its place of business has the sole jurisdiction if any dispute regarding these conditions may arise, save when a legal exception applies.
For questions about this privacy policy, product information or information about the website itself, please contact: info@bordr.com.
Third party headquarter address
N/A
The primary location of processing is the N/A.
Personal data collected by Airtable may be stored and processed in any country where Airtable or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Airtable’s Privacy Policy
N/A
Third party headquarter address
N/A
The primary location of processing is the N/A.
Personal data collected by Google Workspace may be stored and processed in any country where Google Workspace or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Google Workspace’s Privacy Policy
N/A
Third party headquarter address
Level 6, 341 George Street, Sydney, Australia
The primary location of processing is the N/A.
Personal data collected by Jira (Atlassian) may be stored and processed in any country where Jira (Atlassian) or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Jira (Atlassian)’s Privacy Policy
https://www.atlassian.com/legal/privacy-policy
Third party headquarter address
N/A
The primary location of processing is the N/A.
Personal data collected by Browser Flow may be stored and processed in any country where Browser Flow or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Browser Flow’s Privacy Policy
N/A
Third party headquarter address
N/A
The primary location of processing is the N/A.
Personal data collected by 1 Password may be stored and processed in any country where 1 Password or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see 1 Password’s Privacy Policy
N/A
Third party headquarter address
N/A
The primary location of processing is the N/A.
Personal data collected by Helpscout may be stored and processed in any country where Helpscout or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Helpscout’s Privacy Policy
N/A
Third party headquarter address
470 Kilda Road, Melbourne VIC 3004, Australia
The primary location of processing is the N/A.
Personal data collected by eSignatures may be stored and processed in any country where eSignatures or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see eSignatures’s Privacy Policy
https://esignatures.io/legal/privacy-policy-20200307.pdf
Third party headquarter address
N/A
The primary location of processing is the N/A.
Personal data collected by Facbook Ads may be stored and processed in any country where Facbook Ads or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Facbook Ads’s Privacy Policy
N/A
Third party headquarter address
Meta Platforms Ireland Ltd. 4 Grand Canal Square Grand Canal Harbour Dublin 2 Ireland
The primary location of processing is the N/A.
Personal data collected by Facebook Analytics may be stored and processed in any country where Facebook Analytics or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Facebook Analytics’s Privacy Policy
https://www.facebook.com/privacy/explanation/
Third party headquarter address
Sabino de Arana 60 Barcelona
The primary location of processing is the N/A.
Personal data collected by iLovePDF may be stored and processed in any country where iLovePDF or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see iLovePDF’s Privacy Policy
https://www.ilovepdf.com/nl/hulp/privacy
Third party headquarter address
14 rue Charles V 75004 Paris, France
The primary location of processing is the N/A.
Personal data collected by Mindee may be stored and processed in any country where Mindee or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Mindee’s Privacy Policy
https://mindee.com/privacy-policy
Third party headquarter address
Borsigstr. 27 10115 Berlin Germany
The primary location of processing is the N/A.
Personal data collected by n8n may be stored and processed in any country where n8n or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see n8n’s Privacy Policy
https://n8n.io/legal/privacy
Third party headquarter address
54 Ingham Ave Five Dock NSW 2046, Australia
The primary location of processing is the N/A.
Personal data collected by Paperform may be stored and processed in any country where Paperform or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Paperform’s Privacy Policy
https://paperform.co/privacy/
Third party headquarter address
N/A
The primary location of processing is the N/A.
Personal data collected by Porkbun may be stored and processed in any country where Porkbun or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Porkbun’s Privacy Policy
N/A
Third party headquarter address
2800 E Commerce Center Place, Tucson, AZ 85706, United States of America
The primary location of processing is the N/A.
Personal data collected by Quickbooks may be stored and processed in any country where Quickbooks or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Quickbooks’s Privacy Policy
https://www.intuit.com/privacy/statement/
Third party headquarter address
4555 Turner Square NW Edmonton, Canada T6R 3E4
The primary location of processing is the N/A.
Personal data collected by Rewardful may be stored and processed in any country where Rewardful or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Rewardful’s Privacy Policy
https://www.rewardful.com/privacy
Third party headquarter address
N/A
The primary location of processing is the N/A.
Personal data collected by SendInBlue may be stored and processed in any country where SendInBlue or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see SendInBlue’s Privacy Policy
N/A
Third party headquarter address
6th Floor Tea Building, 56 Shoreditch High Street, London, United Kingdom, E1 6JJ
The primary location of processing is the N/A.
Personal data collected by Wise may be stored and processed in any country where Wise or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Wise’s Privacy Policy
https://wise.com/gb/about/security
Third party headquarter address
Unknown
The primary location of processing is the N/A.
Personal data collected by TemplateTo may be stored and processed in any country where TemplateTo or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see TemplateTo’s Privacy Policy
https://templateto.com/privacy-policy
Third party headquarter address
Unknown
The primary location of processing is the N/A.
Personal data collected by Prometheus may be stored and processed in any country where Prometheus or its affiliates, subsidiaries, or service providers operate facilities.
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
For more information, see Prometheus’s Privacy Policy
Unknown
Country where data is processed or sent to
Portugal
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
Country where data is processed or sent to
Portugal
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
Country where data is processed or sent to
Portugal
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
Country where data is processed or sent to
USA
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
Country where data is processed or sent to
USA
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
Country where data is processed or sent to
Portugal
Safeguards (art. 45 GDPR)
Standard Contractual Clauses
Additional safeguards (Schrems II)
Bordr, LLC’s third party processors take all necessary measures to ensure the confidentiality, availability and integrity of personal data and to comply with the GDPR with regards to international data transfers. The international nature of its compliance certifications, as well as far-reaching technical security measures (including but not limited to encryption of the personal data, making the data illegible to an unauthorised recipient) are sufficient to ensure that the data subjects continue to benefit from the fundamental rights they are entitled to under the GDPR.
Bordr, LLC relies on processing agreements with these sub-processors that include the model clauses (or “Standard Contractual Clauses”) which have been tested on the adequacy of its protection with regards to the specific sub-processing activities carried out in this particular subprocessing relationship.
Additional security measures are taken to safeguard the international data transfers: