Loading...
CONTRACT 5830 License AgreementAgreement No. 5830 TimeClock Plus OnDemand License Agreement THIS TIMECLOCK PLUS ONDEMAND LICENSE AGREEMENT (the "Agreement") is entered into as of Dec 20, 2019 ("Effective Date"), by and between TimeClock Plus, LLC, a Delaware limited liability company with its principal office located at 1 Time Clock Drive, San Angelo, TX 76904 ("TCP"), and the City of EI Segundo with its principal office located at 350 Main Street, EI Segundo, CA WHEREAS, TCP and Client (the "Parties') desire to enter into this Agreement for the provision of hosted services by TCP to Client, as provided herein. NOW, THEREFORE, in reliance on the mutual covenants and promises, representations and agreements set forth herein, the Parties agree as follows: 1. Definitions. 1.1 "Active EmDlovee" means an Employee that has not been marked as either terminated or suspended within the TCP Services for whom Client is required to pay a fee under this Agreement. 1.2 "Afflllate" means any parent or subsidiary corporation, and any corporation or other business entity controlling, controlled by or under common control with a Party. 1.3 "Biometric Data" means any information based on an individual's retina or iris scan, fingerprint, voiceprint, or scan of hand or face geometry which is used to identify an individual, regardless of how it is captured, converted, stored or shared. 1.4 "Client Data" means all of Client's data processed or stored by or transmitted to TCP in connection with the TCP Services, including, without limitation, all Personal Data contained therein. 1.5 "Designated User" means an individual Employee who is authorized by Client to use the TCP Services on behalf of the Client, and whose Personal Data may be processed or stored by or transmitted to TCP in connection with the TCP Services. 1.6 "EmDlovee" means Client's individual employee, worker, consultant, substitute or contractor. 1.7 "Global Data Privacy Policy"' means TCP's Global Data Privacy Policy located at https://www.timeclockpius.com/privacy, as updated from time to time. 1.8 "Hardware SuDDort and Maintenance Agreement" means any agreement that extends services to current TimeClock Plus terminals, clocks, and biometric devices, and maintenance releases for related products purchased or licensed by the Client from TCP or a registered reseller. 1.9 "Initial Term" has the meaning set forth in Section 10. 1.10 "Monthly EmDlovee Fee" means TCP's then current fees applicable for each of Client's Employees based on the aggregated Permissions, to access and use the TCP Services measured over the course of each calendar month, as outlined on an invoice or Order Form. This 2019.12 WEIL_D.Mclntyre 1 Agreement No. 5830 fee may be prorated during the first month of the Initial Term, and may be prorated for the last month of the Initial Term. 1.11 "Order Form" means a written document mutually agreed upon and executed by the Parties for ordering products and/or services, and which expressly incorporates the terms of this Agreement. 1.12 "Permissions" means the permission(s) granted to Client's Employees to access features within TCP Services, as outlined on an invoice or Order Form. Permissions are applied within the TCP Services by Client's Designated Users. 1.13 "Personal Data" means any information that identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular Employee or Designated User. 1.14 "Suborocessor" means any third party entity that processes Personal Data on behalf of TCP and to which TCP discloses Personal Data for a business purpose pursuant to a written contract, provided that the contract prohibits such entity from retaining, using, or disclosing the Personal Data for any purpose other than for the specific purpose of performing the services identified in such contract. 1.15 " uuDorted Hardware" means any hardware purchased from TCP that is coverable under a TCP Support and Maintenance Agreement. 1.16 "TCP Services" means the hosted TimeClock Plus software application hosted by TCP in accordance with TCP's then -current hosting environment, any associated documentation, and any ancillary services described in this Agreement or an Order Form. 1.17 "TCP Technology" means the computer hardware, software and other tangible equipment and intangible computer code contained therein used by TCP in the provision of the TCP Services. 1.18 "Term" has the meaning set forth in Section 10. 1.19 "Use Fees" means the fees set forth on the applicable invoice or Order Form, including, but not limited to, Monthly Employee Fees and Hardware Support and Maintenance Agreement Fees. 2. Delivery of Services. 2.1 TCP Services. Subject to the terms and conditions of this Agreement and the Global Data Privacy Policy, TCP grants to Client, its Affiliates and their Designated Users a limited, non -transferable (except in compliance with Section 22), nonexclusive right and subscription license to access and use the TCP Services during the Term only for the internal business purposes of processing, storing and maintaining Client Data. TCP shall provide to Client the TCP Services during the Term in accordance with the terms and conditions of this Agreement, the Global Data Privacy Policy, and any additional terms outlined in an Order Form or Hardware Support and Maintenance Agreement, as applicable. 2.2 Client ResDonsibilities. Client's use of the TCP Services is subject to the terms of this Agreement, the Global Data Privacy Policy and any additional terms outlined in an Order Form or Hardware Support and Maintenance Agreement, as applicable. 2.2.1 Access. Client is responsible for maintaining the confidentiality of Client's account and password and for restricting access to its computer systems, and Client agrees to 2019.12 WEIL_D.Mclntyre 2 Agreement No. 5830 accept responsibility for all activities that occur under Client's account or password, including but not limited to any acts or omissions by Designated Users. Client shall inform each Designated User of the terms and conditions governing such Designated User's use of the TCP Services as set forth herein, and shall cause each Designated User to comply with such terms and conditions. Client acknowledges that TCP is not responsible for third party access to Client's account, including, without limitation, third party access that results from theft or misappropriation of Client's account. TCP reserves the right to refuse or cancel service or terminate accounts, in its sole discretion. 2.2.2 Restrictions on Use. Client acknowledges and agrees that Client will not use the TCP Services for the benefit of any third party. Client agrees not to, not to attempt to, nor allow any third party to: (i) use the TCP Services in any manner that could damage, disable, overburden, or impair TCP's servers or networks or interfere with any other party's use and enjoyment of the TCP Services; (ii) attempt to gain unauthorized access to any services, user accounts, computer systems, or networks through hacking, password mining, or any other means; (iii) copy, distribute, rent, lease, lend, sublicense or transfer the TCP Services, make the TCP Services available to any third party or use the TCP Services on a service bureau or time sharing basis, (iv) decompile, reverse engineer, or disassemble the TCP Services or otherwise attempt to reconstruct or discover any source code, underlying ideas, algorithms, file formats or programming interfaces of the TCP Services, (v) create derivative works based on the TCP Services; (vi) modify, remove, or obscure any copyright, trademark, patent or other notices or legends that appear on the TCP Services or during the use and operation thereof; (vii) publicly disseminate performance information or analysis (including benchmarks) relating to the TCP Services; (viii) use the TCP Services to develop a competitive product offering; or (ix) use the TCP Services in a manner which violates or infringes any laws, rules, regulations, third party intellectual property rights, or third party privacy rights. Client may not use any automated means, including agents, robots, scripts, or spiders, to access or manage the TCP Services, except solely to the extent as may be specifically enabled and authorized by TCP in writing. TCP may take any legal and technical measures to prevent the violation of this provision and to enforce this Agreement. 2.3 Third Partv Services. 2.3.1 Client may require the TCP Services to interoperate with platforms or other online services operated by third parties ("Third -Party Platforms") pursuant to an agreement between TCP and the operators of such Third -Party Platforms, an agreement between Client and the operators of such Third -Party Platforms, or through application programming interfaces ("APIs") or other means of interoperability which are generally made available by such operators. 2.3.2 Client hereby grants TCP the limited right to access such Third -Party Platforms with Client's credentials and on behalf of the Client in connection with the performance of the TCP Services. Client acknowledges and agrees that TCP's agreements with the operators of such Third -Party Platforms and the terms governing the use of APIs may be modified, suspended or terminated at any time, and TCP shall have no liability with respect to any such modification, suspension or termination. Client is responsible for ensuring that its use of the TCP Services in connection with any Third -Party Platform, and TCP's access to such Third -Party Platforms on Client's behalf, complies with all agreements and terms applicable to such Third -Party Platform. 2.4 Client Data. 2.4.1 General. Client hereby grants TCP a worldwide, royalty -free, non-exclusive, limited license to use, host, copy, transmit, display, modify and create derivative works of Client Data for the express purpose of providing the TCP Services. Client acknowledges and agrees that it will determine the means and purposes of processing Client Data, and that TCP acts solely as a service provider that processes Client Data on behalf of and at the direction of Client for the sole purpose of performing the TCP Services under this Agreement. Client is responsible for ensuring that all Designated Users who provide instructions to TCP on Client's behalf are authorized to do 2019.12_W ElL_D.McIntyre Agreement No. 5830 so. Client shall have sole responsibility for the accuracy, quality, content, legality and use of Client Data and the means by which any Personal Data is obtained from Designated Users and Employees and transferred to TCP, and Client is solely responsible for any transfer of Personal Data to any third party data controller or data processor (e.g., human resources or payroll application), and TCP shall have no liability in connection therewith. Client agrees to implement data protection -related procedures that will not be less protective than those imposed on TCP by this Agreement and the Global Data Privacy Policy. 2.4.2 restrictions on TCP's Processing of Client Data. TCP is expressly prohibited from processing any Client Data for any purpose other than for the specific purpose of performing the TCP Services, unless requested by Client or required by applicable law. TCP is expressly prohibited from selling Personal Data under any circumstances and for any purpose. No other collection, use, disclosure or transfer (except to Subprocessors in accordance with Section 2.4.3) of Client Data is permitted without the express prior written instruction of Client. TCP acknowledges and agrees that it understands and will comply with each of the restrictions and obligations set forth in this Section 2.4.2. 2.4.3 Suborocessors. TCP has appointed Subprocessors for the purpose of providing data hosting and security services. Client acknowledges and agrees that Subprocessors may process Client Data in accordance with the terms of this Agreement, the Global Data Privacy Policy and any Order Form. TCP's agreements with its Subprocessors impose data protection - related processing terms on such Subprocessors that are not less protective than the terms imposed on TCP in this Agreement and the Global Data Privacy Policy. The Global Data Privacy Policy contains an overview of the categories of Subprocessors involved in the performance of the relevant TCP Services. The appointment of a Subprocessor to perform part or all of the TCP Services hereunder shall not relieve TCP of any liability under this Agreement. Data Security. 3.1 Securitv Standards. 3.1.1 TCP shall implement reasonable security procedures consistent with industry standards to protect Client Data from unauthorized access, including without limitation (i) industry - standard encryption of data at rest within TCP's data centers; (ii) web application firewalls; (iii) virus detection and anti-virus software; (iv) authentication techniques, such as user names and passwords, or authorization formats, which limit access to particular TCP personnel; and (v) additional security controls consistent with SOC 2 Type II reporting standards. 3.1.2 The Parties shall implement administrative, technical and physical security procedures consistent with industry standards and applicable data protection laws to protect Client Data from unauthorized access, including by adopting access policies that prevent the internal sharing or inadvertent communication of login credentials. 3.1.3 Client is responsible for reviewing the information made available by TCP relating to data security and making an independent determination as to whether the TCP Services meet Client's requirements and obligations under applicable data protection laws. Client acknowledges that data security measures taken by TCP are subject to technical progress and development and TCP may update or modify such security measures from time to time, provided that such updates and modifications do not result in the degradation of the overall security of the TCP Services. 3.2 Securitv Breach Notifications. TCP will promptly report to Client any unauthorized access to Client Data within TCP's or its Subprocessors' systems upon discovery and in accordance with applicable data breach notification laws. TCP will use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access. TCP's notification of or 2019.12 WEIL_D.McIntyre 4 Agreement No. 5830 response to any security incident under this Section 3.2 shall not be construed as an acknowledgment by TCP of any fault or liability with respect to such security incident. 3.3 Data. Backuo and Detention. TCP shall undertake commercially reasonable efforts to backup Client Data with a restore point objective of twenty-four (24) hours. Client Data shall be backed up and retained in accordance with TCP's retention policy as set forth in the Global Data Privacy Policy. 4. Data Privacy. TCP will process Employee Personal Data in accordance with the terms of this Agreement, the Global Data Privacy Policy and all applicable data protection laws. Client must maintain its own data collection, disclosure, retention, and storage policies in compliance with applicable law. 4.1 Biometric Data. To the extent that Client collects, captures, stores, or otherwise uses Biometric Data relating to an individual, Client must (i) first inform the individual from whom Biometric Data will be collected, in writing and prior to collecting his or her Biometric Data, that Biometric Data is being collected, stored, and/or used; (ii) indicate, in writing, the specific purpose(s) (which may not be other than employment-related purposes) and length of time for which Biometric Data is being collected, stored, and/or used; and (iii) receive a written release from the individual (or his or her legally authorized representative) authorizing the Client, TCP, TCP's third -party service providers (who are subject to restrictions no less restrictive than those imposed on TCP herein) to collect, store, and/or use the Biometric Data and authorizing the Client to disclose such Biometric Data to TCP and TCP's third -party service providers. 4.2 Ieouests. Client agrees to adopt a commercially reasonable policy for managing data requests from Designated Users and Employees, which policy shall safeguard the rights of such data subjects and respect the original purpose of such data collection. Client, as the Party which determines the means and purposes for processing Client Data, shall be responsible for receiving, investigating, documenting, and responding to all Designated User and Employee requests for inspection or erasure of Personal Data. 4.3 Assistance. If Client receives a request from a Designated User or Employee to exercise such individual's rights under applicable data protection laws, and Client requires TCP's assistance to respond to such request in accordance with applicable data protection laws, TCP shall assist the Client by providing any necessary information and documentation that is under TCP's control. TCP shall be given reasonable time to assist the Client with such requests in accordance with applicable law. 4.4 Privacy Policy. Where required by law, Client agrees to adopt a privacy policy in alignment with this Agreement and all applicable laws governing the collection, use, transfer and retention of Personal Data. Client agrees to provide TCP, upon reasonable request, Client's adopted privacy policy. 5. Confidential Information. 5.1 Each Party (the "Neceivino Party") acknowledges that it will have access to certain confidential information of the other Party (the " DisciosinaPa ") concerning the Disclosing Party's business, plans, customers, software, technology and products, other information held in confidence by the Disclosing Party, and Personal Data. In addition, a Disclosing Party's confidential information will include (i) all information in tangible or intangible form that is marked or designated as confidential or that, under the circumstances of its disclosure, should be considered confidential, and (ii) the TCP Technology and related algorithms, logic, design, specifications, and coding methodology, and to the extent permitted by law, the terms and conditions of this Agreement, but not its existence (all of the foregoing being referred to as "Confidential Information"). 2019.12 WElL_D.McIntyre 5 Agreement No. 5830 5.2 The Receiving Party agrees that it will not use in any way, for its own account or the account of any third party, except as expressly permitted by, or required to achieve the purposes of, this Agreement, nor disclose to any third party (except as required by law or to that party's attorneys, accountants and other advisors as reasonably necessary), any of the Disclosing Party's Confidential Information, and will take reasonable precautions to protect the confidentiality of such Confidential Information in at least the same manner as is necessary to protect its own Confidential Information and in accordance with applicable data protection laws. To the extent that the Receiving Party is permitted to retransmit any Confidential Information it receives from the Disclosing Party, the mode of retransmission must be at least as secure as the mode by which the Disclosing Party transmitted the Confidential Information to the Receiving Party. 5.3 Information will not be deemed Confidential Information hereunder if such information: (i) is known to the Receiving Party prior to receipt from the Disclosing Party, whether directly or indirectly, from a source other than one having an obligation of confidentiality to the Disclosing Party; (ii) becomes known (independently of disclosure by the Disclosing Party) to the Receiving Party, whether directly or indirectly, from a source other than one having an obligation of confidentiality to the Disclosing Party; (iii) becomes publicly known or otherwise ceases to be secret or confidential, except through a breach of this Agreement by the Receiving Party; or (iv) is independently developed by the Receiving Party without use of or reference to the Confidential Information. 6. Cooperation With Authorities. If either Party is requested to disclose all or any part of any Confidential Information under a subpoena or inquiry issued by a court of competent jurisdiction or by a judicial or administrative agency or legislative body or committee, the Receiving Party shall (i) immediately notify the Disclosing Party of the existence, terms and circumstances surrounding such request; (ii) consult with the Disclosing Party on the advisability of taking legally available steps to resist or narrow such request and cooperate with the Disclosing Party on any such steps it considers advisable; and (iii) if disclosure of the Confidential Information is required or deemed advisable, exercise its best efforts to obtain an order, stipulation or other reasonably acceptable assurance that the Confidential Information or part thereof required to be disclosed shall retain its confidentiality and remain otherwise subject to this Agreement. Although TCP will not systematically monitor the Client Data, TCP reserves the right, upon prior written notice to Client, to remove access to Client Data to comply with applicable law, provided, however, that access to such Client Data will be restored upon a mutual determination of the Parties that such Client Data is in compliance with, or has been modified to be in compliance with, applicable law. Supplemental Services; Master Agreement. 7.1 TCP may provide to Client supplemental services in accordance with a Statement of Work or a separate services agreement. 7.2 Client may elect to purchase additional products and services via Order Forms from time to time. The Parties agree that this Agreement is a master agreement such that additional transactions will be governed by the terms and conditions hereof. Pricing for additional transactions shall be in accordance with TCP's then -current pricing schedule. Client agrees that, absent TCP's express written acceptance thereof indicated by execution by an officer of TCP, the terms and conditions contained in any purchase order or other document issued by Client to TCP for the purchase of additional services, shall not be binding on TCP to the extent that such terms and conditions are additional to or inconsistent with those contained in this Agreement. 8. Use Fees. 8.1 In consideration for the performance of the TCP Services, Client shall pay TCP the Use Fees. During the Term, Client will be billed in advance an amount equal to the annual charges as indicated in the applicable invoice or Order Form. All other charges for TCP Services received and expenses incurred during a month will be billed at the end of the month in which the TCP 2019.12 WEIL_D.Mclntyre Agreement No. 5830 Services were provided. Payment by Client for all Use Fees is due upon receipt of each TCP invoice, and in no event shall such payment be received by TCP later than thirty (30) days after the invoice, except in cases where a Net Terms Agreement has been authorized by TCP. All payments will be made to TCP at its offices in San Angelo, Texas, in U.S. dollars. 8.2 Subsequent to the Initial Term specified in an applicable Order Form or this Agreement, TCP may increase the Use Fees at any time effective thirty (30) days after providing notice to Client; provided, however, that any such increase will not occur more than once in a consecutive twelve (12) month period and such increase shall not exceed five percent (5)%. 8.3 TCP Services charges will be equal to the number of total Active Employees multiplied by the Monthly Employee Fee which is based on the aggregated Permissions for each Active Employee. Client is responsible for Monthly Employee Fees for the total number of Active Employees who are made active during any calendar month. Client may add additional Employees or Permissions as desired each month, by paying the Monthly Employee Fees on the next billing cycle. Client agrees to promptly update the status in the TCP Services for any Active Employee who has been terminated or suspended. 8.4 Employees added at any time during a calendar month will be charged in full for that billing period. Because Client is billed in advance for TCP Services, if Client increases its Active Employee count or increases Permissions during a calendar month, Client will receive an invoice reflecting the increased Active Employee count with overage charges incurred from the previous month and prorated over the number of months remaining in the Term. 8.5 Hardware Support and Maintenance charges will be equal to the percentage set forth in the applicable Hardware Support and Maintenance Agreement multiplied by the total purchase price of the Supported Hardware. 9. Taxes. As applicable, Client shall, in addition to the other amounts payable under this Agreement, pay all sales, use, value added or other taxes, whether federal, state or local, however named, arising out of the transactions contemplated by this Agreement, except that Client shall not be liable for taxes based on TCP's aggregate income. 10. Term; Guaranteed Payment. This Agreement commences on the Effective Date and, unless terminated earlier in accordance with Section 11, will remain in effect for the initial term of one 1 year(s) ("Initial Term"), and then shall automatically renew for subsequent one (1) year terms thereafter, unless either Party gives written notice of non -renewal at least ninety (90) days prior to the end of the then current term (the Initial Term and subsequent renewal terms being referred to as the "Term"). Any associated Hardware Support and Maintenance Agreement for Supported Hardware which is incorporated with the TCP Services shall also automatically renew for subsequent one (1) year terms thereafter. 11. Termination for Cause. A Party may terminate this Agreement for cause if (i) the other Party breaches any material term or condition of this Agreement and fails to cure such breach within thirty (30) days after receipt of written notice of the same, or in the case of failure to pay Use Fees, thirty (30) days; (ii) the other Party becomes the subject of a voluntary petition in bankruptcy or any voluntary proceeding relating to insolvency, receivership, liquidation or composition for the benefit of creditors; or (iii) the other Party becomes the subject of an involuntary petition in bankruptcy or any involuntary proceeding relating to insolvency, receivership, liquidation or composition for the benefit of creditors, and such petition or proceeding is not dismissed within sixty (60) days of filing. Notwithstanding the foregoing, if a material breach by Client, by its nature, cannot be cured, TCP may terminate this Agreement immediately. 12. Effect of Termination. Without prejudice to any right or remedy of a Party with respect to the other Party's breach hereunder, upon the effective date of any termination of this Agreement: 2019.12 WEIL_D.Mclntyre 7 Agreement No. 5830 12.1 TCP's obligation to provide the TCP Services shall immediately terminate; 12.2 after such termination and upon Client's reasonable request, no later than thirty (30) days from termination, TCP shall provide Client Data to Client in a SQL database file format; and 12.3 within thirty (30) days of such termination, each Party will destroy or return all additional Confidential Information of the other Party in its possession and will not make or retain any copies of such Confidential Information except as required to comply with any applicable legal or accounting record keeping requirement. 13. Intellectual Property Ownership. Subject to the limited rights expressly granted hereunder, TCP reserves all right, title and interest in and to the TCP Services and TCP Technology, including all intellectual property rights embodied therein, which shall remain the sole and exclusive property of TCP or its licensors. No rights are granted to Client hereunder other than as expressly set forth herein. This Agreement does not transfer from TCP to Client any ownership interest in the TCP Services or TCP Technology, and does not transfer from Client to TCP any ownership interest in Client Data. 14. Client Representations and Warranties. 14.1 Client represents and warrants that (i) it has the legal right to enter into this Agreement and perform its obligations hereunder, and (ii) the performance of Client's obligations and use of the TCP Services by Client, its Designated Users and Employees will not violate any applicable laws, including all applicable domestic and international data protection laws, or cause a breach of duty to any third party, including Employees. 14.2 Client represents and warrants that all Personal Data included in the Client Data has been collected from all Employees and Designated Users and will be transferred to TCP in accordance with all applicable data protection laws, including, but not limited to, the EU General Data Protection Regulation 2016/679 and the Illinois Biometric Information Privacy Act, to the extent applicable. Client acknowledges and agrees that (i) TCP is a service provider and processes Client Data solely on behalf of and at the direction of Client, and exercises no control whatsoever over the content of the Client Data passing through the TCP Services or that is otherwise transferred by Client to TCP, and (ii) it is the sole responsibility of Client to ensure that the Client Data passing through the TCP Services or that is otherwise transferred by Client to TCP complies with all applicable laws and regulations, whether now in existence or hereafter enacted and in force. 14.3 Client represents and warrants that its Affiliates' use of the TCP Services, if any, shall not relieve Client of any liability under this Agreement, and Client shall be responsible and liable for the acts and omissions of its Affiliates hereunder as if performed or omitted by Client. 14.4 In the event of any breach of any of the foregoing representations or warranties in this Section 14, in addition to any other remedies available at law or in equity, TCP will have the right to suspend immediately any TCP Services if deemed reasonably necessary by TCP to prevent any harm to TCP and its business. TCP will provide notice to Client and an opportunity to cure, if practicable, depending on the nature of the breach. Once cured, TCP will promptly restore the TCP Services. 15. TCP Representations and Warranties. TCP represents and warrants that (i) it has the legal right to enter into this Agreement and perform its obligations hereunder, and (ii) the performance of its obligations and delivery of the TCP Services to Client will not violate any applicable laws or regulations of the United States or cause a breach of any agreements between TCP and any third parties. 2019.12 WEIL_D.Mclntyre 8 Agreement No. 5830 16. Mutual Representations and Warranties. Each Party represents and warrants that it has implemented a comprehensive written information security program that includes appropriate administrative, technical and physical safeguards to: (i) ensure the safety and confidentiality of Personal Data; (ii) protect against unauthorized access to and use of Personal Data; (iii) protect against anticipated threats or hazards to the security or integrity of Personal Data, and (iv) comply with applicable data protection laws. 17. Limited Warranty. TCP represents and warrants that the TCP Services and related products as described with this Agreement will perform in accordance with all TCP published documentation, contract documents, contractor marketing literature, and any other communications attached to or referenced in this Agreement, and that the TCP Services will be free of errors and defects that materially affect the performance of the TCP Services ("Limited Warranty"). Client's sole and exclusive remedy for breach of the Limited Warranty shall be the prompt correction of non -conforming TCP Services at TCP's expense. 18. Warranty Disclaimer. EXCEPT FOR THE EXPRESS LIMITED WARRANTY SET FORTH IN SECTION 17 (LIMITED WARRANTY), THE TCP SERVICES ARE PROVIDED BY TCP ON AN "AS IS" BASIS, AND CLIENT'S USE OF THE TCP SERVICES IS AT CLIENT'S OWN RISK. TCP AND ITS SUPPLIERS DO NOT MAKE, AND HEREBY DISCLAIM, ANY AND ALL OTHER EXPRESS AND/OR IMPLIED WARRANTIES, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AGAINST HIDDEN DEFECTS, AND ANY WARRANTIES ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. TCP DOES NOT WARRANT THAT THE TCP SERVICES WILL BE UNINTERRUPTED OR ERROR -FREE. NOTHING STATED OR IMPLIED BY TCP WHETHER THROUGH THE TCP SERVICES OR OTHERWISE SHOULD BE CONSIDERED LEGAL COUNSEL. TCP HAS NO RESPONSIBILITY TO NOTIFY CLIENT OF ANY CHANGES IN THE LAW THAT MAY AFFECT USE OF THE TCP SERVICES. ANY ORAL STATEMENT OR IMPLICATION BY ANY PERSON CONTRADICTING THE FOREGOING IS UNAUTHORIZED AND SHALL NOT BE BINDING ON TCP. CLIENT ACKNOWLEDGES THAT IN ENTERING INTO THIS AGREEMENT, CLIENT HAS RELIED UPON CLIENT'S OWN EXPERIENCE, SKILL AND JUDGMENT TO EVALUATE THE TCP SERVICES AND THAT CLIENT HAS SATISFIED ITSELF AS TO THE SUITABILITY OF SUCH SERVICES TO MEET CLIENT'S BUSINESS AND LEGAL REQUIREMENTS. 19. Indemnification. 19.1 Client hereby acknowledges and agrees that TCP may not be aware of all rights available to Client's Designated Users or Employees under all data protection regimes. Client shall indemnify, defend and hold harmless TCP, its Affiliates, Subprocessors, officers, managers, directors, employees, agents, advisors and other representatives (the "TCP Indemnitees") from and against any lawsuit, liability, loss, cost or expense (including reasonable attorneys' fees) actually incurred or suffered by TCP Indemnitees of every kind and nature to the extent caused by or resulting from (i) any breach of a representation or warranty made by Client under this Agreement; or (ii) a third -party claim made against a TCP Indemnitee arising from or related to Client's failure to comply with any applicable domestic or foreign data protection laws or regulations. Client shall have the right to control any defense provided pursuant to this Section 19.1, provided, however, that Client shall not, without TCP's prior written consent, (A) enter into any settlement or compromise or consent to the entry of any judgment that does not include the delivery by the claimant or plaintiff to the applicable TCP Indemnitee of a written release from all liability in respect of such third party claim, or (B) enter into any settlement or compromise with respect to any third party claim that may adversely affect the applicable TCP Indemnitee other than as a result of money damages or other monetary payments that are indemnified hereunder. 19.2 TCP will indemnify, defend and hold harmless Client and its Affiliates (the "Client Indemnitees") from and against any lawsuit, liability, loss, cost or expense actually incurred or suffered by a Client Indemnitee of every kind and nature to the extent caused by or resulting from 2019.12 WEIL_D.Mclntyre 9 Agreement No. 5830 a third -party claim made against a Client Indemnitee that the TCP Technology infringes on any U.S. intellectual property right of a third party; provided, however, that TCP is notified in writing of such claim promptly after such claim is made upon Client. TCP shall have the right to control any defense provided pursuant to this Section 19.2. In no event shall Client settle any such claim without TCP's prior written approval. If such a claim is made or if the TCP Technology, in TCP's opinion, is likely to become subject to such a claim, TCP may, at its option and expense, either (i) procure the right to continue using the TCP Technology or portion thereof, or (ii) replace or modify the TCP Technology or portion thereof so that it becomes non -infringing. If TCP determines that neither alternative is reasonably practicable, TCP may terminate this Agreement with respect to the portion of the TCP Technology infringing or alleged to infringe. TCP shall have no liability or obligation under this Section 19.2 if the claim arises from (i) any alteration or modification to the TCP Technology other than by TCP, (ii) any combination of the TCP Technology with other programs or data not furnished by TCP, or (iii) any use of the TCP Technology prohibited by this Agreement or otherwise outside the scope of use for which the TCP Technology is intended. 20. Liability Limitation. Except for claims arising out of Section 19.2 (TCP's Intellectual Property Indemnity) and Section 5 (Confidential Information), in no event shall TCP's aggregate liability, if any, including liability arising out of contract, negligence, strict liability in tort or warranty, or otherwise, exceed the sum of amounts paid by Client to TCP during the six (6) months immediately prior to the date of the claim. 21. Notices. Any notice or communication required or permitted to be given hereunder may be delivered by hand, deposited with an overnight courier, sent by email (provided delivery is confirmed), or U.S. Mail (registered or certified only), return receipt requested, to the address set forth on the initial page hereof. 22. Assignment. This Agreement shall not be assigned by either Party without the prior written consent of the other Party, which shall not be unreasonably withheld; provided, however, that either Party may, without the prior consent of the other, assign all of its rights under this Agreement to (i) such Party's parent company or a subsidiary of such Party, (ii) a purchaser of all or substantially all of such Party's assets related to this Agreement, or (iii) a third party participating in a merger, acquisition, sale of assets or other corporate reorganization in which such Party is participating. This Agreement shall bind and inure to the benefit of the Parties and their respective successors and permitted assigns. 23. Continuing Obligations. Those clauses the survival of which is necessary for the interpretation or enforcement of this Agreement shall continue in full force and effect in accordance with their terms notwithstanding the expiration or termination hereof, such clauses to include the following: (i) any and all warranty disclaimers, limitations on or limitations of liability and indemnities granted by either Party herein; (ii) any terms relating to the ownership or protection of intellectual property rights or Confidential Information of either Party, or any remedy for breach thereof; and (iii) the payment of taxes, duties, or any money to either Party hereunder. 24. Marketing. During the Term hereof, Client agrees that TCP may publicly refer to Client, orally and in writing, as a customer of TCP. Any other reference to Client by TCP requires the written consent of Client. 25. Force Majeure. Except for the obligation to make payments, neither Party will be liable for any failure or delay in its performance under this Agreement due to any cause beyond its reasonable control, including acts of war, terrorism, acts of God, epidemic, earthquake, flood, embargo, riot, sabotage, labor shortage or dispute, governmental act or complete or partial failure of the Internet (not resulting from the actions or inactions of TCP), provided that the delayed Party: (i) gives the other Party prompt notice of such cause, and (ii) uses its reasonable commercial efforts to promptly correct such failure or delay in performance. 2019.12_W ElL_D.McIntyre 10 Agreement No. 5830 a. 1142 .- -, LLF-8T PYT-F-U VT AY aIM MI vl� MISNOMER= r, a M 5. w. 4 i A.. 114T,Hk'3.,%E-GT4ON4-7-rint�ention,aliv, Removed AGAINS TS E G-T�H-E,-R- A _..A.-1 €SENTAAT'IV- .. "l -i ASS"' ' ...1. I� wAt Rr T lM L-A - V CZ -E —W° TA--� n fes- TA-T1E—A ...A A*4ST--T-l-E- t E-1—T1�'�AR-T4� �AGRE-E -T- - A: 4l� PRE- —IRA �--4T4TL-E.0 T' ' RECn,V Ate" EY9'' FEES �A G _. W WG-�T CT W4- Intll�i 0"'TP PAR " TES AS AE CLASS -t tt W t IGt E SENTATIVE ,,N��.tntentionatly removed 29. Applicable Law; Jurisdiction; Limitations Period. This Agreement shall be construed under the laws of the State of T4xaBCalifornia, without regard to its principles of conflicts of law. To the extent permitted by law, no action, regardless of form, arising out of this Agreement may be brought by either Party more than one (1) year after the cause of action has arisen. 30. Counterparts; Facsimile Signatures. This Agreement may be executed in multiple counterparts, each of which, when executed and delivered, shall be deemed an original, but all of which shall constitute one and the same instrument. Any signature page of any such counterpart, or any email transmission thereof, may be attached or appended to any other counterpart to complete a fully executed counterpart of this Agreement, and any email transmission of any signature of a Party shall be deemed an original and shall bind such Party. 31. Miscellaneous. This Agreement constitutes the entire understanding of the Parties with respect to the subject matter of this Agreement and merges all prior communications, understandings, and agreements. This Agreement may be modified only by a written agreement signed by the Parties. In the case of any conflict between this Agreement and the Global Data Privacy Policy, the Global Data Privacy Policy shall control. The failure of either Party to enforce at any time any of the provisions hereof shall not be a waiver of such provision, or any other provision, or of the right of such Party thereafter to enforce any provision hereof. If any provision of this Agreement is declared invalid or unenforceable, such provision shall be deemed modified to the extent necessary and possible to render it valid and enforceable. In any event, the unenforceability or invalidity of any provision shall not affect any other provision of this Agreement, 2019.12 WEIL_D.Mclntyre 11 Agreement No. 5830 and this Agreement shall continue in full force and effect, and be construed and enforced, as if such provision had not been included, or had been modified as above provided, as the case may be. [Signature Page Follows] 2019.12_W E I L_D. Mc I ntyre 12 Accepted by: Client By: , Name: _Lt&� Title:culr ME T: cil" C, of El 8�gu-hdo F N F"Mr: for 0 1 TY ATTO R W EY Agreement No. 5830 TImeClock Plus, LLC By: Name: Derek L McIntyre Title: coo [SIGNATURE PAGE TO ONDEMAND LICENSE AGREEMENT] Agreement No. 5830 Addendum Insurance Reauirements Ai'x)aIONALTER MIS FOR T1 NI F'CLOC7 K PLUS AGIZEEMEN'r: 32. INSURANCE. 32.1 Before commencing uerformance under this Acreement. and at all other times this. Aa!reement is effective, Time lock P,lus will orocure and maintain the foHowino Woes of insurance, with coveraae limits, comolvina, at a minimum, with the ll,imits set forth below: Tvne of Insurance Limits (",onimercial general liability: $2.000,000 Technolovv Errors $1.000,000 and Omissions Liability Cvber Liability $1,000,000 Privaev Liabilitv $1.000,000 Workers comnensation Statutory reauirement w^ ^w wim . . . . . . . . . . . Such insurance will be on an "occurrencenot a "claims made." basis and will not be cancelable or subject to reduction excent uoon thirtv (301 days i)rlor written notice to CO. NUNN JMJ I[I"tWL011 All E[4j*!Mj1j6j 111#0 11[41 slag rw"Is Der occurrence. into City's s stems in the amount set forth above Der occurrence. 32.5 Privacv Liability Insurance to cover all security breach and notification cost resultina, in actuai or susoected loss of personal information or anv other records considered confidential for the Qtv's data located on service oroviders servers or on a cloud comqq!l[n�l orovider's systern in the amount set forth above Der occurrence. 2019.12WEI L—D. McIntyre 14 Agreement No. 5830 32.6 Each such liability Dolicv shall name the City of El Sequndio as an Additional Insured for such (lability of the City, and each such, first-oartv shall name the City as a Loss Payee. TimeClock Plus will furnish to: City duIv authenticated Certificates of Insurance evidencing maintenance of the insurance reauired under this Acireement and such other evidence of insurance or conies of policies as may be reasonably reouired by ON from time to time. Insurance must be. olaced with insurers with a current A.M. Best Company Rating i eauivalent to at least a Ratinq of "ANIL" 323 Should TimeClock Plus. for any reason, fail to obtain and maintain the Insurance reauired by this Aareement. Citv may obtain such coveraae at TimeClock Plus's exoense and deduct the cost of such Insurance from oavments due to TimeClock Plus under this Aareement or terminate. 2019.12W El L—D. McIntyre 15 TimeClock Plus, LLC 1 Time CUock Drive San Arngq�e1o, TX 76904 325 223-9500 8d0 74'9-84;3 sales@timeclockplus.com CUSTOMER City of El Segundo Sally Rodriguez (310) 524-2355 350 Main St EI Segundo, CA 90245-3813 ReeEntry DDIMARTINO I ZHOAG I UPS Ground I Quote aqI a 2 t 9 =Uto Date 1 484957 12/0,9/2019 Method of Shipment I PurchaseMethod of Pavment Order Net30 Stock No, Ordered Description I Unit Cost Annual Employee Licensing: ($6,000.00) 1025-12311 200 TimeClock Plus Professional Annual Clockable Employee License L Cyber 2019 Pricing ($36 Starting Year 2) Advanced Scheduler ($4,800.00) 1025-9013 200 Advanced Scheduler Annual Employee Licenses L Cyber 2019 Pricing ($28.80 Starting Year 3) Activation Package 1025-1130 1 TimeClock Plus Professional Initial Activation -Eden (Export Module) --Autolmport Module (Versions 5/6/7) - Benefits Status Monitor - Employee Access Builder (formerly CBEAB) MobileClock for Android and iOS (Unlimited Devices) -Job Costing Module - LDAP Authentication Module (6.0 and 7 0) -Shift Differential Cyber 2019 Pricing HID Proximity TouchScreen Ethernet Card Swipe Time Clock(s) ($15,633.00) 244-200 9 BIO RDT Touch 400 L Cyber 2019 Pricing Annual Hardware Maintenance and Support 1099-250 1 Hardware Maintenance (Expedited Depot Repair) (11/22/2019-11/21/2020) L Cyber 2019 Pricing Professional Services - Remote Implementation and Training ($5,000.00) 800-814 40 Dedicated Support Services (Per hour) L Cyber 2019 Pricing 7,362.00 2,31600 (579.00) 3,335.04 (3,335.04) 22500 (100.00) Valid for 11 days. Expires 12/20/2019. Product Total: Discount: S u btota I: S&H: Total: Total 12,0W00 (6;000,00) 5,760.00 (960.00) 7,362.00 (7,362.00) 20,844.00 (5,211.00) 3,335.04 (3,33504) 9,000.00 (4,000 00) 58,301.04 (26,868.04) 31,433.00 101.14 31.534.14 Agreement No. 5830 T*ImeClock /1° Plu fir, r�� f �j ��1 /1, f,t�� r �J, r ,��f�ail �,, u, a better sense of timesm a� 'a r n ec rya °° ° o M e i c egt, �r �,�o TimeClock Plus v7 Agreement No. 5830 Implementation Project Plan The following work packages are completed during an implementation of TimeClock Plus. Tasks within each work package will be assigned an expected delivery date and resource responsible for completing the task. Not all tasks may be necessary for every implementation and may be removed or altered as necessary. Weeks listed are for example only as timelines can changed based on the preferred approach. WEEK 1 Initiation Phase —Service Strategy 1) Kick Off Details: Kick off of the project is held to introduce the City of EI Segundo' Project Team and the TCP Project Team. This call is used to discuss and understand the scope of work to be performed and lay out expectations for communication and the overall project. The Kickoff Meeting should include the major stakeholders for the project including but not limited to an HR representative, Payroll personnel, IT Department representatives, or any other party familiar with the organization's business rules. Responsible Party: TCP Project Manager TCP Parties: TCP Project Manager, Program Manager, Director of Professional Services City of EI Segundo Parties: Project Lead, HR Mana efL Payroll Manager, IT Manager, Operations Manager Prerequisites: None WEEK 2 Discovery Phase — Service Strategy & Design 1) Discovery & Requirements Gathering Details: Requirements Gathering is performed by TCP Project Team through interviews with the City of EI Segundo to better understand the business requirements and analyze the configuration needs for TimeClock Plus. These requirements are documented and then signed off on by the City of EI Segundo in order to move to the Planning Phase. Any custom development or export requirements will be identified and development estimates provided. Development will be scheduled during the Planning Phase. The Discovery Meeting should include the same stakeholders from the Kickoff Meeting, though the scope of the data gathering will be limited for IT personnel if a hosted solution is selected. The City of EI Segundo will be responsible for gathering relevant documentation and files for Discovery. Responsible Party: TCP Project Managr TCP Parties: TCP Project Manager, Solutions Engineer, Implementation Specialist City of EI Segundo Parties: Project Lead, HR Mana ear Payroll Manager, IT Manager, Operations Manager Prerequisites: Kick Off Agreement No. 5830 2) Initiation & Discovery Phase Gate Details: This Phase Gate meeting is held to make sure that the Requirements are verified and accepted by the City of EI Segundo and that we are ready to move in to the Planning Phase. This meeting includes your Project Sponsor and Project Leader and the Project Manager from TimeClock Plus. Responsible Party: TCP Project Manama TCP Parties: TCP Project Manager City of EI Segundo Parties: Project Lead, HR ManaggL Pa yroli Manager„ qT Manager, Operations Manager Prerequisites: Dilscovery & Reouirements Gathering WEEK 3 Planning Phase — Service Design 1) Project Plan Creation and Sign -off Details: TCP Project Team and the City of EI Segundo Project Team will work together to build the timeline and strategy for the remainder of the project. Included in this plan will be any development items with projected time to delivery. After creating this plan will be verified and accepted by the TCP Professional Services and The City of EI Segundo Project Team. Responsible Party: TCP Project Manager TCP Parties: TCP Project Manager, Implementation Specialist City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager. IT Manager, Operations Manager Prerequisites: None 2) Communication Plan Creation and Sign -off Details: TCP Project Team and the City of EI Segundo Project Team will work together to build a Communication Plan that outlines the meetings, dates, and times required for completion of the Delivery Phase. After creation this plan will be verified and accepted by the TCP Professional Services Team and The City of EI Segundo Project Team. Responsible Party: TCP Proiect Manager and the Citv El Segundo" Project Team City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager, IT Manager, Operations Manager Prerequisites: None 3) Planning Phase Gate Details: This Phase Gate meeting is held to make sure that the Project and Communication Plans are verified and accepted by the City of EI Segundo and that we are ready to move in to the Delivery Phase. This meeting will include your Project Sponsor and Project Leader and the Project Manager and Implementation Specialist from TimeClock Plus. Responsible Party: TCP Project Manager TCP Parties: TCP Project Manager, Implementation Specialist City of EI Segundo Parties: Project Lead, HR Manager, Pavrojl Manager, IT Manager, Operations Manager Agreement No. 5830 Prerequisites: Project Plan and Communication Plan Creation/Sign Off WEEK 4-12 Delivery Phase — Service Design & Transition 1) Core Configurations Details: The Delivery Phase is performed by the TCP Project Team and the City of EI Segundo Project Team to complete the activities defined within the project plan. The Core Configurations will revolve around Data Imports, Adaptor Setup, and Company Defaults. The meetings in these phase are in line with the Communications Plan and cover all of the tasks outlined in the Project Plan. This will be the longest phase as configurations are made and verified to meet the established requirements and the organization's business rules. The City of EI Segundo is responsible for verifying configurations meet their business rules. Responsible Party: TCP Project Manager TCP Parties: TCP Project Manager, Implementation Specialist City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager, IT Manager, Operations Manager Prerequisites: Planning Phase Gate 1) Module Configurations Details: The TCP Project Team and the City of EI Segundo Project Team will complete the activities defined within the project plan. The Module Configurations will revolve around specific modules purchased by the City of EI Segundo (i.e. Job Costing, Advanced Scheduler, CBEAB). The City of EI Segundo is responsible for verifying configurations meet their business rules. Responsible Party: TCP Project Manama TCP Parties: TCP Project Manager. Implementation 'S ciahst City EI of Segundo Parties: Project Lead, HR Mana eg r Payroll Manapaer, IT Manager, Operations Manager Prerequisites: Core Configurations 2) Advanced Configurations Details: TCP Project Team and the City of EI Segundo Project Team will complete the activities defined within the project plan. The Advanced Configurations will revolve around Clock Configurations, Notifications, Global Rules, etc. The City of EI Segundo is responsible for verifying configurations meet their business rules. Responsible Party: TCP Project Manager TCP Parties: TCP Project Mana eg E jmplementation Specialist City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager, IT Manager, Operations Manager Prerequisites: Core/'Module Confjurations 3) Payroll Verification Details: TCP Project Team and the City of EI Segundo Project Team test hour exports for accuracy. This Step involves inputting test hours (via parallel Pilot Operations or manual entry), Agreement No. 5830 and then verifying the export from TCP to Eden. The City of EI Segundo is responsible for verifying exports meet their business needs. Responsible Party: TCP Project Manager TCP Parties: TCP Proiect Manager, Implementation Soecialist City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager, IT Manage__r Op rations Manager Prerequisites: Core/Module/Advanced Configurations 4) Training Details: The Implementation Specialist will provide requested Training sessions via remote sessions or onsite visits. These trainings can include Admin, Manager, Payroll, or Employee focuses. The City of EI Segundo is responsible for communicating training to their employees. Responsible Party: TCP Project Manager TCP Parties: TCP Project Manager, Implementation Specialist City of EI Segundo Parties: Project Lead, HR Manager, Payroll Manager, IT Manager, Operations Manager Prerequisites: Core/Module/Advanced Configurations `a) Go -Live (Pilau and Full Go Live) Details: After configurations, the City of EI Segundo testing acceptance, Eden payroll verification, and training are completed, we will hold a Go/No Go Meeting. If TCP and the City of EI Segundo verify we are prepared to move forward, we will perform v7 cutover for live the City of EI Segundo operations. The City of EI Segundo is responsible for communicating Pilot and Go - Live dates to employees. If rollout/phased implementation is preferred, we will adjust project plan and repeat above steps as necessary Responsible Party: TCP Proiect Manager TCP Parties: TCP Prolect Mana er implementation S eco ialist City of EI Segundo Parties: Project Lead, HR Manager,_ Payroll Manager, IT Manager, Operations Manager Prerequisites: Core/Module/Advanced Configurations, Pavroll "verification, and Training 6) Delivery Phase Gate Details: This Phase Gate meeting is held to make sure that the all Delivery Action Items are completed and accepted by the City of EI Segundo and that we are ready to move in to the Transition Phase. This meeting will include your Project Sponsor and Project Leader, and the Project Manager and Implementation Specialist from TimeClock Plus. Responsible Party: TCP Proiect Manager TCP Parties: TCP Proiect Manager, Implementation Specialist City of EI Segundo Parties: Project Lead, HR Manager, Payroll Manager, IT Manager, Operations Manager Prerequisites: Go Live Agreement No. 5830 WEEK 13-14 Transition Phase —Service Operations 1) Issues/Outstanding Items Wrap Up Details: TCP Project Team and City of EI Segundo Project Team will meet to review any outstanding issues or items that have been logged. During this time we will work on this log to finalize any items or prepare to transition these over to TCP dedicated support team. Responsible Party: TCP Project Manager TCP Parties: TCP Project Manager, Implementation Specialjst City of EI Segundo Parties: Project Lead, ISR Manager, Pavro�ll Manager, IT Manager, Operations Manager Prerequisites: None 2) Project Close/Transition Phase Gate Meeting Details: This Phase Gate meeting is held to make sure that the all main implementation items are completed and accepted by the City of EI Segundo and that we are prepared to finalize the TCP Implementation and transition contacts over to Customer Support. This meeting will include your Project Sponsor and Project Leader, and the Project Manager, Implementation Specialist, and a Customer Support representative from TimeClock Plus. Responsible Party: TCP Project Manager TCP Parties: TCP Project Manager, Implementation Specialist City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager, IT Manager, Oo rations Manager Prerequisites: ISSLies/Outstanding Items Wrap Up Typical Duration to Number of DSS Task Place of Performance Complete* Hours Kick Off Discovery & Requirements Gathering Project Plan and Communication Plan Creation and Sign off Agreement No. 5830 Appendix 2 — Stakeholder Register Customer Contacts Section: TimeClock Plus Contacts Section: TBD TBD TBD TBD Program 325.223.9500 Manager Director of Natalie Davis Professional Natalie. Davis (o)timecl'ockolus.com 325.223.9500 Services Derek Chief McIntyre, Operating Der'ek.Mclntvr'e tirneclockolus.corn 325.223.9500 PMP Officer Dillon Account Di;lIon.D,imartino@timeclocki)Ius.com 1, 800.749.8463 Dimartino Executive Agreement No. 5830 Appendix 3 —Training Plan Training Methodology: As part of Service Transition TimeClock Plus Professional Services will evaluate the training requirements specific to each department and work with the project team to develop a training plan that fulfills their unique business needs. The TimeClock Plus Trainer can utilize various methods as appropriate to deliver training. These methods include onsite classroom instruction, onsite one-on-one instruction, web -based trainings, shared webinars, pre-recorded videos, system manuals, and custom documentation if needed. To reduce costs for City of EI Segundo and to maintain flexibility, TimeClock Plus Professional Services uses a cascade model (train -the -trainer) for training, which involves educating smaller groups of individuals who then provide training to others within the organization. This train -the -trainer approach is particularly useful if a staggered training delivery process is needed due to trainees not being centrally located or having conflicting availability. The TimeClock Plus Project Manager will discuss the appropriate training process with the project team during project initiation and planning. Appendix 4 - Project Change Request Evaluated by Decided by Date Requested Date Evaluated Date Decided Agreement No. 5830 "9glllll IIIIIIIIIIIIIIIIII ';IIIIIII I�IIIIII'IIIIIIIIIIIU11 °�II111IIP9191""'111111 pll� 111111 ILII' III'1911111111�1' '�III�I °;iipllllll�l I� 111111IIIIIUIII� VIII11111 � Description ..._............... ......................... Justification Cause Priority ........................................ Evaluation - Completed by Approver/Approver Team Scope Schedule Cost Quality Risk -1.1 . _................................................................. _. Project management Evaluator's priority ........ __._.__................................ ___ Alternatives and recommendation Agreement No. 5830 Appendix 5 — Draft Work Breakdown Structure Title: TimeClock Plus ImWementation 1.1 Review Business Case/Needs Analysis 1.1.1 Review needs analysis information per the Pro. Svcs. Implementation Request/Request for Proposal 1.1.2 Schedule Project Kickoff Call 1.1.3 Create Features List 1.1.4 Create Technical Specifications per the Config. Form and Features List (use the template) 1.1.5 Determine TCP Features 1.2 Create Project Charter (Conditional based on project type) 1.3 Kick -Off Meeting 1.3.1 Identify/Validate the Project Team and Stakeholders 1.3.2 Create a Contact List of all Project Team Members and Stakeholders 1.3.3 Schedule Kickoff call with City of EI Segundo, IS & Sales 1.3.4 Create & send Agenda to City of EI Segundo & TCP project team 1.4 Hold kick-off meeting 1.4.1 Review Configuration Questionnaire 1.4.2 Review Features List 1.4.3 Review Project Charter 1.4.4 Review Project Lifecycle Framework 1.4.5 Review the Deliverables to be completed for this project 1.5 Obtain Project Charter Sign -off 2.2 TCP Core Software Discovery meeting 2.2.1 Review Clock Hardware Configurations 2.2.2 Review Badge Parsing or Biometric Requirements for TCP 2.2.3 Review Employee Clock Interactions 2.2.4 Review TCP Manager Features 2.2.5 Review Missed Punch Handling 2.2.6 Review Break Rules/Needs 2.2.7 Leave Request Management 2.2.8 Review Schedule Needs 2.3 Eden Payroll Software Integration Discovery Meeting 2.3.1 Eden Payroll Software Requirements 2.3.2 Job Code/Position Needs for Eden Payroll Software 2.3.3 Cost Code Needs for Eden Payroll Software 2.3.4 Payroll Export Schedule 2.3.5 Other Technical Requirements 2.3.6 Integration of Time Collection Devices 2.3.7 Employee Workflow Discussion 2.4 Create and Send Requirements (Technical & Functional) for City of EI Segundo sign -off (Required) Agreement No. 5830 2.5 Obtain City of EI Segundo Sign -off of Requirements 3.1 Project Plan 3.1.1 Develop project budget and schedule 3.1.2 Schedule meeting to review Project Plan with City of EI Segundo and IS 3.1.3 Hold meeting to review Project Plan with City of EI Segundo and Implementation Specialist 3.2 Create Supplemental Delivery Phase Documents: 3.2.1 Create Communication Plan 3.2.2 Begin updating Issue/Risk Log 3.2.3 Create Test Strategy for User Acceptance 3.2.4 Create Training Plan and Schedule 4.1 Schedule Meetings/email updates according to communication plan 4.2.2 Create Training Plan (Required) 4.2 TCP Software and module verification 4.3 TCP Manager Configuration 4.3.1 Install TCP Software 4.3.2 Walk Through of v7 with City of •• (for Users) Milestone; Installation pf TCP Software & Initial„Trarnror�,. Hardware 4.3.3.1 Provide Hardware documentation 4.3.3.2 Install Hardware 4.3.3.3 Configure Clocks/Mobile App settings 4.3.3.4 Test Clock Operations NOW 4.3.4 Core Configurations 4.3.4.1 Verify Import Files with City of EI Segundo 4.3.4.2 Add/Import Job Codes and Cost Codes 4.3.4.3 Configure Advanced Job Code Settings 4.3.4.4 Add/Import Employees 4.3.4.5 Assign/Import Job Codes to Employees 4.3.4.6 Create & Assign Employee Roles 4.3.4.7 Create User Profiles 4.3.4.8 Create & Assign User Roles 4.3.4.9 Configure Company Default Settings 4.3.5 Advanced Configurations 4.3.5.1 Recurring Schedules (as required) 4.3.5.2 Request Templates 4.3.5.3 Clock Configurations 4.3.5.4 Holiday Calendar (as required) likili r ®r r •r • r • r • x 4.3.6 Module Configurations Agreement No. 5830 4.3.6.2 Eden Payroll Module 4.3.6.4 Auto Import 4.3.6.7 Employee Access Builder 4.3.6.9 Mobile Clock Settings t Is 4.3.7 Initial Payroll Validation 4.3.7.1 Insert Test Data with City of EI Segundo 4.3.7.2 Test Eden Payroll Module with City of EI Segundo 4.3.7.3 Conduct Validation Analysis with City of EI Segundo 4.4 Training 4.4.1 Admin 4.4.1.1 Review Admin Workflow 4.4.1.2 Schedule Admin Training 4.4.1.3 Train Admin Personnel (Onsite) 4.4.1.3 Train Admin Personnel (Remote) 4.4.2 Manager For Pilot Group 4.4.2.1 Review Manager Workflow 4.4.2.2 Schedule Manager Training 4.4.2.3 Train Managers (Remote) 4.4.2.3 Train Managers (Onsite) .o . ..- . . . .- 4.4.3 Employees for Pilot Group 4.4.3.1 Review Employee Workflow 4.4.3.2 Schedule Employee Training 4.4.3.3 Employee Training (Remote) 4.4.3.3 Train the Trainer (Onsitei 11:,) SA- . . . o 4.4.4 Payroll 4.4.4.1 Review Payroll Workflow 4.4.4.2 Schedule Payroll Training 4.4.4.3 Train Payroll Personnel (Onsite) 4.4.4.3 Train Payroll Personnel (Remote) 4.5 Pilot Go Live 4.5.1 Perform Clock Operations with Pilot Group 4.5.2 Review Payroll Reconciliation 4.5.2.1 Verify hours are exporting out of TCP 4.5.2.2 Verify hours are importing into Eden Payroll System 4.5.2.3 Signoff on Export Module Functionality 4.6 Go Live Agreement No. 5830 4.6.1 Train Go Live/Roll Out Managers 4.6.2 Train Go Live/ Roll Out Employees 4.6.3 Complete Readiness Assessment 4.6.3.1 Develop Cut over Checklist 4.6.3.2 Review the Issues & Risks Log and Complete Any Outstanding Items 4.6.3.3 Go/No Go Signoff 4.6.4 Review Payroll Reconciliation 4.6.4.1 Verify hours are exporting out of TCP 4.6.4.2 Verify hours are importing into Eden Payroll System 4.6.5 Verify issues log is complete '. . 4.7 Delivery phase gate meeting 4.7.1 Review the Delivery Phase collective retrospective sheet 4.7.2 Complete the Delivery Phase Gate Checklist 4.7.3 Create & Send Project Status Reports to City of EI Segundo and Project Team 5.1 Complete Project Review 5.1.1 Administer project completion survey 5.1.2 Close any outstanding issues and risks 5.1.3 Ensure that City of EI Segundo has TCP support information 5.4 Conduct Project Closing/Transition Meeting with new support team 5.4.1 Review the Transition Closure Phase collective retrospective sheet 5.4.2 Complete the Transition Closure Phase Gate Checklist 5.4.3 Create & send final status report Agreement No. 5830 Source: https://www.timeclockplus.com/privacy TimeClock Plus, LLC Global Data Privacy Policy Effective June 1, 2018 Last Updated September 3, 2019 Il lmea lc'('Jk J1 (. (" Vrna["es )f IlI'S ',r"oii (Wfj"':l) thal pwocesges a vast aniount of Personal IIaw We pRxcss die pevonW d;ata "M ';:)n [�'e[llaH c4 our C HeR arKi of wn busniess cwtacts. In C) 11"d ("', r Itc' �' 11 �1e t I IIe IInV0.nIl :?!s' t 4 IX e Df d „:i N�i II..I111cIX t 11 111 !s aJI )i ��i e d t le [:� F" 11 s k:'11- 1pV c)( 11 C eiI t elln I yee a'Jua 11 busmess conum chh, in addlkw rcp Pias injAemental pOcks for III wosOng �I r.). %? u'a? D cl t I > 11 s P, 11 ll '/ '), c')II lutl c zre k' i II Ir tc, 11- 11 n IIII IX. Vv; E:^ II c�' II II E, IX,-. t' IIII �." E:1, , i 11 n cl c' t I I ":r 11 %/11 1 s e, PIKOLKS AWHYlahon Wong to Whoduak rPersonaMatal, urA ycqn ilghis juY C�11 11��) C)Ur f)11 C)CEISSk q yi��.)11, 1111- [�`eil sc)FaflI [)ata. TimeClock Plus, LLC Privacy Policy for Business Contacts e'>', " dull'. I q ,�'V/Ir'' ..�I ('..(YI I " V'..':° iI YIafh:111 "01 N n , I'll n 11 II 11 Y1dfio;II l %'\!] no "';'nsid , 11d. >r'Jkle Vill IL ,JOes his i�)'o�k I, ;c� k II,. 11 1111 11l,'I' ' l' "/(" ) V' 1-11 J!� "y e 11 D Ci to 11 11 t t C:d. C1 11 u ie!' �'11 ��' �� �11 N �!" 11- 11 ( n I I" F or IIIIA onto tK) no n I i ow TC P In of ect s d VE: 11 l ,-3N 1-1 If 1)1,1 E" S 11 ell !S, ea Se °s c-�"" (:.a k: Rii e i C I "�P ii I,, a cy Po I w c "" f () 11 ( 111 11 t If ii �n 11) N o y s. 1. Types of Personal Data F I P 11 P j_eU'.:jj -, (' I,) '��j I i ) yt 0 C: t (j .unj-"1I-aCflce.S v'/1tJ) t(."� pelp"' rey P A any wManahon that calln Knonal Dawn b e used to lderOJ61, cpcate w cornact you. ".',.;orne K::\-,)Hecte(.:1 i:�)y rc'. Agreement No. 5830 a. If you express an interest in obtaining additional information about our services, request customer support, use our "Contact Us" or similar features, sign up for an event or webinar, or download certain content, we generally require you to provide us with your contact information, such as your name, job title, company name, address, phone number, or email address; b. If you make purchases of our products or register for an event, we may also require you to provide us with financial information and billing information, such as billing name and address, credit card number, or bank account information; c. If you attend an event, we may, upon your consent, scan your attendee badge which will provide us with your name, title and company name, address, country, phone number and email address; d. If you use our products we may ask you to provide a first name, last name, username, and password; e. If you use and interact with our website or products, we automatically collect log files and other information about your device and your usage of our website and products through cookies, web beacons or similar technologies, such as IP -addresses or other identifiers, which may qualify as Personal Data (view the "What device and usage data we process" section below); and f. If you visit our offices, you may be required to register as a visitor and to provide your name, who you are visiting, company name, and time and date of arrivals. 1.1 We may also collect information about you from other sources, including third parties from whom we have purchased Personal Data, and combine this information with Personal Data provided by you. This helps us to update, expand and analyze our records, identify new customers, and create more tailored advertising to provide services that may be of interest to you. In particular, we collect the following data from third party sources: g. Business Contact information, including mailing address, job title, email address, phone number, 'intent data' which is web user behavior data, IP addresses, social handles, LinkedIn URL and custom profiles from third party data providers for the purposes of targeted advertising, delivering relevant email content, event promotion, and profiling. Personal Data also includes other information that may be associated with your Personal Data. Agreement No. 5830 2. How TCP Collects Personal Data h. u;..W u,.VII II�u°II^a I II 1111,oll II II '„I va � u”I N ' all I'd NeV' h::4' d' ^:,.a 'II oxo `,, td,u: ` " 11 11 d011 NII N u V II d u II pt 'Y'11)011 d D11 II 'YI I:, 0.. Y h d ° II zarid 4'"i, a„II II M. CH u,,.,l11 II L,? II � v 1 � II""'V u I ,'u d Ih, n " �lV ” 11 11 v ' kd u: II II II III I e""".D II If ""V N r i � II `" !I IIN I N I Ieii o11 N "'.0 V Xila � v II YI u:'a II 'N II � '.,"lu"Qd",v 11 v'r:uNU "LIVNn v'..'u n d i II U "N m::111 b „" I" LN II N d u II " u:;,N V ° ' flY 6 e " , N oP) II 'll 111;.,1 , y U Il il:, II" D u v II VG N,,. N "III 'II;' Ilk. 111 N IIN0l' I VI IId I'u Iu,;y'A' .: 3. How TCP uses Personal Data TCP uses your Personal Data for the following Business Purposes: a. Personal Data pertaining to Professionals with whom TCP has a business relationship may be processed as needed: 1. To initiate, assess, develop, maintain, or expand a business relationship, including negotiating, contracting, and fulfilling obligations under contracts; 2. For due diligence regarding the Individual's qualifications and eligibility for the relationship, including verifying the identity, qualification, authority, and creditworthiness of the Professional and obtaining publicly -available information from Third Parties (such as publicly -available sanction lists from screening companies); 3. To send transactional communications (such as requests for information, responses to requests for information, orders, confirmations, training, and service updates); 4. For account management, accounting, finance, and dispute resolution purposes (such as accounts receivable, accounts payable, account reconciliation, cash management, or money movement) and for consolidated management and reporting; 5. To assure quality control and to enforce company standards and policies; 6. For risk management and mitigation, including for audit and insurance functions, and as needed to license and protect intellectual property and other assets; Agreement No. 5830 7. For security management, including monitoring Individuals with access to TCP's websites, applications, systems, or facilities, investigation of threats, and as needed for any Data Security Breach notification; and 8. To anonymize or de -identify the Personal Data. b. Personal Data pertaining to Consumers and other Individuals with whom TCP has a business relationship may be processed as needed: 1. To provide the information, product, or service requested by the Individual, and as would be reasonably expected by the Individual given the context in which the Personal Data were collected, and the information provided in the applicable privacy statement given to the Individual (such as for personalization, remembering preferences, or respecting Individual rights); 2. For due diligence, including verifying the identity of the Individual, as well as the eligibility of the Individual to receive information, products, or services (such as verifying age, employment, or account status); 3. To trackjob applicants for the purposes of recruiting, interviewing, and onboarding; 4. To send transactional communications (such as requests for information, responses to requests for information, orders, confirmations, training materials, and service updates); 5. To manage the Individual's account, such as for customer service, finance, and dispute resolution purposes; 6. For risk management and mitigation, including for audit and insurance functions, and as needed to license and protect intellectual property and other assets, 7. For security management, including monitoring Individuals with access to TCP's websites, applications, systems, or facilities, investigation of threats, and as needed for any Data Security Breach notification; and 8. To anonymize or de -identify the Personal Data. c. TCP may process Personal Data as needed (i) to protect the privacy and security of the Personal Data it maintains, such as in connection with advanced security initiatives and threat detection; (ii) for treasury operations and money movement activities; (ii) for compliance functions, including screening Individuals against sanction lists in connection with anti -money laundering programs; (iv) for business structuring activities, including mergers, acquisitions, and divestitures; and (v) business activities, management reporting, and analysis. Agreement No. 5830 d. TCP may process Personal Data to develop and improve TCP's products and/or services, and for research, development, analytics, and business intelligence. e. TCP may process Personal Data for relationship management and marketing. This purpose includes sending marketing and promotional communications to Individuals who have not objected to receiving such messages as may be appropriate given the nature of the relationship, such as product and service marketing, investor communications, Client communications (e.g., compliance alerts, product updates, and training opportunities and invitations to TCP events), customer satisfaction surveys, supplier communications (e.g., requests for proposals), corporate communications, and TCP news. f. TCP uses your Personal Data for Secondary Purposes such as: 1. Disaster recovery and business continuity, including transferring the information to an Archive; 2. Internal audits or investigations; 3. Implementation or verification of business controls; 4. Statistical, historical, or scientific research; 5. Dispute resolution; 6. Legal or business counseling; 7. Compliance with laws and company policies; and 8. Insurance purposes. g. TCP uses systems to store and process your Personal Data such as: 1. Customer Relationship Management System (CRM); 2. Applicant Tracking System (ATS); 3. Mass Marketing Email Tools; 4. Workforce Management Application (WFM); 5. Technical Support Ticketing System; 6. Project Management Tool; 7. Email and Email Archive Servers; 8. Phone Call Recording Application; 9. Public Forums (Online Communities and Social Media); 10. Instant Messaging Applications; and 11. Relational Databases. 4. Why and How Personal Data is Disclosed by TCP TCP commits to not provide your Personal Data to Third Parties for their own marketing purposes. We limit our sharing of your Personal Data to: Agreement No. 5830 a. Our service providers, who are bound by law or contract to protect your Personal Data and only use your Personal Data in accordance with our instructions. b. Our business partners, but only to the extent you have purchased product or service from such partner, interacted with such partner, or otherwise authorized the sharing. For example, if you are referred to TCP from a business partner website, we may provide that partner with your contact information and certain economic and financial information to validate the referral. c. Enforce our rights, protect our property, or protect the rights, property or safety of others, or as needed to support external auditing, compliance and corporate governance functions. We will also disclose Personal Data when required to do so by law, such as in response to a subpoena, including to law enforcement agencies and courts in the United States and other countries where we operate. „`,Cl 11 11'o a Illltl 11 rrv,�, 11 I u::, uu.l a ulloll u'uu,:lu.na'uu <:ullu Juun: °,;u u,u �Ihlll:u u:; uu. V II"°�u L:,�II'lll:allll, u�q�::uun�lutlu�°''II:�Jpu Il:�;hu ��� �,u-uull!q�', �w��' utlnlu', Il Ju all:��llu1�II"Il r�:"Il�p uN: VIIu�oV: �.:��uuV:„alutl 11 U : `VI ° Cl IL ItI', II II "B II II” tl h 1 II lI n' I ::q g U u. )' 11 `Y VII @ !t Okr u,.a V I I N to U tl fl G 11 a,::u H Ye !^ II"^i::' III d 111;, V 'p a bit :'^ u. ',' ^ II' d. " IC II' I I .: C � J ' !-;J II IP " Il 110y/ 111 a k'111 11 "U "1'1, g 11u: 111 tl 1 5. Cookies and Other Data Collection Technologies �, O l l - 1r q: d:..'I' Ir U„V , u d fl - M i I: IJ 11 P:p,DIIVtlu.tl%I'J4111I 111'u � t 0 III111E",^IItl , V.Vv 11luU g.,Mu.LIIYhu,.. +,"ugll "'IIN° .0 Gk° u.,l,IiU'Ilq' I .;" V, -d V � 1 J:''' ' Y ", II � V':." �,; fir' u " . � u a J.. ^ . �(.,P'V, ',VII II 1• , ". u. '➢ II Y ';"1' P, ,q II 4: '„,."e II' II 'II I Y U �. a;-,' U- _ _ _ U: --:, s a I" ', s I ) �. c., at f Im"I"l. J ; ^ ° II t a^send : y_U..4 II o, 7.t.e- d e'k,,` V c e k U..11 U "'V U a:'q U.V U od P it t f” ', '''d' C.N .VII- I.) B"(:T °~,/'.,„ g' U 011 U1.) St('N-P. 11fo:U"VU V"nr.:Gt.U'm if l 0ll' u"t6� ')gS 11 '1 ` � - �0e.s V���kln .,.. pU`V�,J;➢Iin 'r�Ubdj'(.)'N .. �.... �.. ,�" � b rI...V b ::u U"t'r `u"`,,r" "'a _' U �.... ":�,, p ° "" °?:: r: uUU u:t uu'tlf uu'uu uti:aJ,:: aII, sU..aa:Ii71 a. -is ,,a u.0 "r �A:::Be1r71tofiica;�t.aoo� code a: I. II a-u(J�Woe^::a°s, \/vIhar'.II"n „tl ''k�1,1 rn� 1' !:)@'' "" ti! �.: V G UT o;: �wD•r;k a~;.. the q,:P a"U �;;;�,' �^i +dk U ') if.:;i "'P !i�U ')I"71 .:1' U- amD "q . C Pl'.,V K,' �`.':i �:"V U..0 -ll a8 °'vi d.:, 1�r I "•; ": a l l wmfl l li rii g us to y m,,V "w 11 --tl'e in iV cmU II ¢u' tII. V Ir rU ...q... I"Ile",V,' aso a cu_u,,.;h:oiii,)I.:ed exq.ierueuuce r: and enabe us to detect cU: i U:Din U<:u1ruds of fraul..ue„V. rhe data re,, -..)d fic'.I "uil these, ca:`k61,,:i1es li7iay be Iluu...tlk.ed to lia::lentlify"in g (P111) airld nc)r'tl- I:� 1r„w,u,'u"tlatlUll` iu:➢eritiii',.�,liriu-q f1rtlnu-II ILII) linf�v�o-tl'�"uv�.giiori. full Iina: ny � asses, �:�u..0 car)u,u-uairitl,-��ie coM,,,iteI1,,.)req�eir.,urlce s, a intl,:V ojpt clt..ut of and o.qI &- (Ja:::atau coUUec.t1(''1I'1 t e c SI 11 "o u� v g a _o ' used lz°- the settlings c) "tl /i.:'zJ"". AH.Jse-"a I"e Agreement No. 5830 a. Providing you tailored content and advertisements (see below for more information); b. Enabling social media features; c. Safeguarding against spam and malware; d. Analyzing trends, traffic, and user behavior; e. Administering the website; f. Gathering demographic information about our user base as a whole; g. Tracking web and advertising analytics throughout the Website and its affiliate websites; h. Remembering your preferences and voluntarily -submitted information (e.g. custom video playlists, preferences, job title, story ratings, membership status); i. Performing location -related functionalities and analytics; j. Participating in market research (e.g., website ratings); and k. Educating ourselves about how we can continue to improve the Website and its various elements. I. Essential Cookies. Certain cookies are used for specific purposes that are essential to your secure use and navigation of the website. Without them, TCP may not be able to provide core website functions and features to you, and the website would not operate as well as you or TCP would like. These cookies collect and use information such as your server preferences, single -session data and corresponding identifier, web beacons and log files (detailed below), and other credential -related information. For EU individuals, essential cookies also help inform TCP whether you require, or have already been served, an affirmative consent request in connection with the GDPR. Essential cookies include analytics cookies, which provide us data that allows TCP to better understand its users and improve the Website based on what we have learned from that data. m. Preference Cookies. Other cookies are used to collect and process information about your preferences and similar choices in connection with the website in order to optimize your browsing. Preference cookies include social media cookies, which collect information about your social media Agreement No. 5830 usage and other data you may have provided in connection with such usage (if you access the website through a social media website or mobile application, you may have social media cookies). If you wish to modify or change your social media cookies, please visit and review the settings on your applicable social media account(s). n. Advertising Cookies. To help support the website and further tailor your experience, TCP and its advertising partners (and/or their third party analytics providers) also use cookies on the website to personalize the content and advertisements you may be shown. These Third Party advertising companies place advertisements on our website and other websites, and perform tracking and reporting functions for our website and other websites. These Third Party advertising companies may place cookies on your computer when you visit our website or other websites so they can display targeted advertisements to you. These Third Party advertising companies do not collect Personal Data in this process, and we do not give Personal Data to them as part of this process. This Privacy Policy does not cover the collection methods or use of the information collected by these vendors. For more information about Third Party advertising, please visit the Network Advertising Initiative (NAI) at www.networkadvertising.org. You may opt out of being targeted by many Third Party advertising companies by visiting http://bit.ly/2Ig9IgT or http://preferences.truste.com/truste/ u W 'u l :;,0 : I ',ulf II II II�":'SII"ILII II URII+:u 11 1, II"11 II qIle11 V';;)up u u u III 11 " u :b p.:I II J l : M Il. http://bit.ly/2jXZ13Y. ',I !.,' 1 11111 V u.,� if .,^ l 4 ^ '11 1 I9 V ':: r. l , l3s II L Ir" ',u V II r, U J u l : u " 'a °, r yA „U1111'II 1( 10A11 1rVr°ry..'L+ II I"", ,,a ti11u Il 1lll,vu' IIN4,.'V�: a uu ` '.V .I� a",..0 QN rJ" "II Ilil'III' R u. °II 'V'"!:PIIIIh ULe, i:0U1:Ilw IGlll,'YII'') �Vo'. l'tl' VGp,.11llu;° ull'71;'N 'I Iluh,w Nv:u' Id �IINn'r„Il,u Nq D "'6 P, II N M:' "i`'' „UV„VII- Cl''L "'II II u;;'II'Y!. u...'". 111G7101(filhv f.Iln,"il11- I!bil v\.r` ell' tiol IIBII`sll::ll a 'Vl/:uITi111I11g11II)t011a?HA.(:°I)IIIlun 11 rs rc:.:q::�q:rfl Ilo:, 11:) !`l)1 CRNIIic llii'Iial,.�,'1 1111,11 0LA11 t-I1I,:'all ,.; t.INal: ?;11cu"/V 11...A'v t clet'E'IInii1111In l uIV'h( the"uuc'u 1.3 ,: u:: I11cdU u. ua a alja , l' .uu".p� 011 ,.1111* k' Z)11) q:.'ll'11"II. N , '11::. _r11,4tags VII"ill:;l Vn:Ml.r l,!u„'LNa,q. ll11 i glA:'110u::"II":u�4,' U:"M 111 c) c) tIu.::t I L..0 a L:;Yu.:p ,b Ak:-,aA1 4,.A's ttl.;u r u; v;u 11 'I II 'U U 0...A 111111 u & � 11 o ,,,, e a"", U II II F ' l Agreement No. 5830 11 11 N ii ! ti tl'„/' ( I �I Ie 1! 11 11 !1111-11 ll 11dJ'„1ill 11 Vvi�' I( c [ V�!11 11u �!, (.."u^ , tl E;!: ;111 k I c) N i Ve ii- II III )[, II I "11 'V '"" b�i k? 11p VVI tl 110 11 11-e 1111! R 01 a o11' )' e I ➢ 11',i Li I sIX: 11'11 Ie' V It, t III e 11111 11 111 11 ai 11 vv 111111 t:lk Lv Lu I E�:' 11 ") h C)l 4J V ",/1.6e b S Ae 6 0 2 IS 110 1 1 U; re n Hy Ih a v e a rn e c h a In i w n N) i e c o c” A w t h I? VXIC� rs Do Not Jim k KinaL, we ck"alfer h WAIT Ws A& es 1":" 111`111'.M'�!Jge Hot a'ilie in ll'le lNew I ous !S i ',:�) 11 IS EF. W F'all" r,%,: :G ^:� eii I.Ing 1.)aN hli�:II' S tO use reaqx'Ia[',kr effoll t's ticli webske SAws whose lwmmsa4a've Not Dac[, setrillli(] that su�iIIIIIIE:!IINNL)I,NII1111�";Y clo inIX')L I]Ns u:�a�pabOih,, t1c,6dN )y, 1c, le.Miirii sigillak �IindD�:�, ",Iic)l vdl!so httP://www.allaboutdnt.org/. 6. Mobile Applications H!! d'!Oe li��t I", �u It 1: �, � � � I 11:::� S �> �� �!�' � ) E 1:1l t �' I,: � �� "� 11� � � � � iii, I 1. , 11 � 11 � '� cm J11 �Iii ui� 1� J11 � 6fld 11't�( (11'v'e 11'111� A�C'11 Is Oil: %')UIJ1- 11 m de"'�I' -I I 1(id i C i, ';'1kD! � pi� HIF 11 �11�e ap�i tei] li�:u I:':111-11 u N I:d III] III -'w II II " b 11.:, r' N' ' ` a „J11 y; 7. Communication Preferences c:^ca' n 11 h I°l'"J1 ';�Il 1 111111 '1 "uiisJJflLii!.IXJ11 6e" I kIie II .:IX IX " q 1,1,11 'Inl NY i "ou 'D11 q'Is all II Nease We that 4 YOU are cuuenHy receNing serv�ces frorn rCP and you have dedded to opoout of priorrodoW & iiafls, this wH1 not Alpact die rnessages we send to you for Ipurposes of deiivering such services. If you have qLWSbons about your chokes or Uvou ineed assistance wi�,h cq-&ng QLA, p1ease contact us via enialW to Pdvacy(g"bTiiiiiie'C8or.,,.k�Illuiconi You may So make us at Che address in the Il.....low to Cointact Us section OWL If YOU send us a Agreement No. 5830 �k JLwout WE' , ij t E:�ip,/ 1? 11 �"k �,v J) C t�:: n, III It, 'p 101 )11 1!11 hi,V! I'll Y1 d 8. Review, Correction, Erasure, and Other Individual Rights S I(". :r 11 � 11, � 11 � 11 -1 : .. , , . - il�0 levIlk"nN, 11,�Irld illik""]E,1�'C� VIDIIJr � Pj P S A" Ul 11 cil e III I ti' Nidl,.IiaII I. ]l1.jt1�, :,ffu- l")N 11 10 11 ` Y aIj.q. cflb lr�,-,,.-.4 VVV11-10(D tl� U K" vc1ci l e,. fll,le [-1i'D)/\/ t1i') 1: t t -'1 11 V 11 L 3 11111 "1 3 11 "1 11 U21 1 11 II 1111i 1 S � ci IJ C, 11 -r E? 11 1 , �D 11 cl e I ll 11 E.'r l, ql:l� S' Si' e l I P F,), 1 A 1 3 lr""'� li t 1 J 11 wl li I I u""� �a C 11 t? 1[ 11 UV. S": 11 1 11' q ', 111 t� z" I L�. t 11 e q vv f3 l e ii I. E' C1 1111 1 t 1111 "!1 clb r 11 Z 11 1111 C UIl Cl '11 11,11 e a L] I I a 1111 21111 �j 1 11 (�jj 1 C, 13 < t? "i/ V I ii t., 11 tz IF. I I 1, 11 k e [:Ijlti S 111 e is ',,I -,I, L1 11 II II 11 ,,1 C� ill 111r,"I C 11 1, (-j f 111 e(] LA 11 I -E.", C1 11' 1 C t 11 11 S L V11 V 11 11 t t I E 0 E' �5i!S 1) (D 11 111 110 I'l j1yrj,,'.1, 111111�":� 1111 ' 'E" t I 11111 1"i 11 t:v 11 "11 (Di a. a 111r,w`"0. 111, 1, ii ii 'i, ('r V NII.: r,/1!a s Cl 9.. II 111 11 o t I 111' 0 11 UJ tiIF(_7i 11" t irl "i Il e 0 1- II 111 )1 J.") 11 1::) I 11 -N 1, "i t n:" a: kI a,.�, ii -ii ii e �:"� 1 �I c, l ii � 11 11 (,- �, d 1. ".1, 11111 S� 1 C U, I IJ t V�'r l,: I �jj jj-, I IF01. 13 Irl 1)) C t S J II13 I C' e "i I r o 11111 11 3 1 -.i 0.lj�",�'t III. it F!Eu2u1111!,;U W, C D 11 TO H l"t �11 , 1 11 E?!", t? �, 11 � I -I, : I I,' �.), I� (r) 111 S 11 (,? 11 11 < l a k IF 11 l i �.-i I %M I i I ii a rt- q S t 11 e C ii l� at (zl t I I b e I c E 11 111111 C <; II 11V,� C., 11 fil I e 11 11 e ii 3U-- 11 N VV I 111 I['11 cz:w si�,l D L11 11 a 111 D t 11 i" I U a "Y 11) 11 S E', 11 �-2 cli 9. Information Security Agreement No. 5830 0 d 11 OlflllhIJ111c, I' ni:",1111 lk:Diii 111111 a„^r. I!III I d Ae flhioii �i bii iiiiu A, lit S , E 1 11 1� t < II ro t I t i, 11-!, e 11, 111 e 11 0II InII'11 11 e S, 11 11r1I111,Y! J 11 1),.) S"A'h'.) 11 Cvvkh 'i e E� E� . I VV 11 11 1 S I 11- 0 i.,� S v,!I 11 1,1 111 1 ) S C J 11 'i PIIS %"111 In EM 4. ns,D1161 S II"aq:°IIVace e 11 1 tI, I) 1 u" J 1� ZN 11 Vv 01 HFOVVS,e� %,�/in(J') hen i1 1""n:':" t 1,111 ii I I d ""1111"". 1 S to 11 5 fu E:, Y 111 11-3 C,Dririiot a1I DaL..1 ;'VIlrld 1111,11 u:V!Sjj JC(t C' coillqp 10. Data Retention ':'1i1"11r, 11 1 In 11 111 1111 irll 1[ 11 v: r I� Ile N t e 11 12 '1, 11 IS II -E, tt? 1 11 1 S� e fill ii- .1 jj ii eirdion to e n JP u 11 'S 111 k�, E, L3 Hir, ii ii r`: e in jj-u,, 11 1 )11C),J 11 ie^ 11:1) 11 I.S 1111 j�,:uJjjj 1NJ,p, 111 )s. Er, t:C � . 11 t 11 [ �11 :11 11 1� El, 11 11Va 1 d:111d 611V1111 ),D O 11. Prohibition of International Data Transfers 11 V 11 Ela (111, ro -E E�,'( ),J ),13 11 t I- 1El I i(D 11 E° S 12. Privacy Statements of Third Parties Tl,i'is [)x-Ivacy 1::)ol'l(::y curly addresses the use and disclosure of il1onriiat'l n1 by TO::) Ou, Suppl'jers, BUSliness Pall-finei's, �irid other I Party websites that II be Agreement No. 5830 ad CI( : :::, 1111 ( 11�� o� 1111- TimeClockPlus.com,,l,,'ii::::,����l�l:��I ld:� -a el, �,, lo e e (:5 � Na !�� 111 "III ic[71�11111111kklizeI N.,,Jr 111,1111111V ol :oni hi)JI'J,jji,yl y, ^ 6 'C`1110III ',:III N" "tl„ II C)11 116NII lik"11-11 I Nzflli u; 11 N (All Hl 111!,111, Ei E'1,1,VIIfIpk,!,::, ud 1111 Nai J11111011 k0t:� II INUeiidcie 1r,J iiE,!, N::"Hers, Jio�J �J�iers '041 f)1111(fl Nff� 011(:,11n11 v`'Ohi �Ov,u1111L)1011101 01111 C 11 ul 11- 11 a.. l If ril o t 11 o II N. 13. Forums, Product Reviews and Other Public Areas I N" II cdheii 311,�?:I, VVhere,/ciu ril,;,/ ItoIHIIVW11dWM:, III jjd.:', 11 "1Ia' 111: e 11 hic"Illn �� hill 14. Job Applicants 11 loNu::`I'NN 111, !"S irN �fve I ii e I r,, 1, 11 11 V'V 11 110y, d t 1.� 13 11, n o 1111 11 111 11 ANS`) Bulla.kiifNaulu" u Agreement No. 5830 '%A/c � , )11 '� k �( k , �] N 11 N 111111 'L!l N fl 1111 11 : 'Jj u Ici N] I111'd:::l e 11111, 1 Pst �)VI[)11 I a eficir wHeo ind 11 aV oIl I Xi-, 11 "" VII '1 Cd Nlzd;y TEIC t 11110, DI iaN I H Ile HP, Fi::I: II"I1 lH n (::'110 plroioi,j' d,::nJj VII jj'iflljjiild V II vklivd'::�: i1Ik:'1e'!L 11 y d :1, 1, , I Y 11 YI uI 111 1 11 N E, ( w::::" ': 1, S''u 11 I 1111 1 ( a NII 111 , 11, e VS 1111, �SIVH 11 11 .'3 11 111! :0 1!�� I( ^,l "IV li.� Vu II V 11 ij ('I I ii- in ii \/V e 11 11 11 ci 11 o 11 b H 11 0 N II N II (.: g 111 11 N x;,' a 1:;011 1111 N flil 11 11 111: 11 If, 11 1111 F 1111 q : w I v v I'll 11, 11111 t 1. In rIf1111d^'u„x11ii-e liI V,.rlll11 lii ii ii- t 11 11 V ii ii a t::! 1111 t (' N I y14.'^ � N ' 11 � 11 Q 'w� N 0 11 !1 I Y 11” o1 E:�': !':l. lie �1) N i:::, � )"r, Q Q 111' NU 11 � 11 'l '� 11 , I , , V/I " V x , 11 - 11 - E" II„, l, 11 1 . )I )INN It P 1111 C 1) I'TV 11 LID t tr'II eqlju1::'Jr i' Ind aldcHJ-"u vqq'V L'� h F1',” IF [11 11 In 011 tk"IinI111M] i? :111111 t iI II If NZl jj-'', I, I j V E, 1111 J, jj-p 15. Withdraw of Consent J1.911 II 11 11, V "i in 117111 loll Ily 11 Eua S N.rs Dt I LpL ri Z I LAS 01 t� I II pk?'�.Ise 'V 111 1 E:l 3 ii e ii 11 11 'll 16. Your California Privacy Rights: Notice to California Customers 111J E, a rda 1141-0�'" CII :":J�� J I C 0 11") IS 11 F) C I L11 Cl &S' ,A [)'cliii DizA,3, arill fi­qr t G. J:') C) 11 11 A"A'NJ Agreement No. 5830 17. Individuals Located in the European Economic Area (EU Data Subjects) 1111 i dh h r I:,I 0 Ih. I „ o II I '' a II II 3, YOUu o "1 I V u..v u' the e rIIg' IN. 'h" date I d'e I u uI a III Ih il„ „'Iro', ab v Q. II II as s 1h"" II II II i!; I q t 4,' he '" II n N II h u P d q;.:N II GV,.gfl V:a fid: -''I p,Ilo:ullb II II"II.;«";Id'1'� °01, ..h p cl . 18. Children k:;,l IIh:' ue V girt' Il llh'::,ull gMlluuh�.:N � III'. II IIIIoN II „gull or,,,191I!hlia:Vlll^ �IXII-IIu hh�:,y'u I V u N U -h` iiI , �wl,h:u I'.; o II 'u ".,,J Ili h l ;b ld !" II II N u � f' ..ado a ". li V N u � 11... ,6 k V .... N III h h '6 'f:: l 'V V � Po, q, 11 lh. If" ,d.i-q^ II dV..,��IlIly;u"sinci IXll, l u.h-(y qN : ,." "' IIub114,.,;id w,'r'.''U„Uii- y,(,,yhr,,I"IIu., l':)Ia + a: IX oh:uyII.u""III`llr� ally:;;" h�dwll"PNh:a'�.IId.lYV IIII'V VhhN" "I "11'11N,a Ir: V,,,,,,II s, d"cIIIy"Ila :"N U, hi e, d,h"Uu \,/l,i'".:" �°VIII �NII!i u;' I-I,.,J)ihyp I;V,IXIIIXu fll-f:yllhY I'D 11plI ::ii¢,,,"111"Y,r. 19. Changes to this Privacy Policy B'i:.11rn Me tu:ryry:u 1""iVUVVIe, vs may UuII:fIdn,Vte this YY I-'�I5v r f l.-"If;Illln. 'r' W n4 IIIVwu�IN::V'q � Illlu;"�Ju,::b,lldt,,,,_'^II"h, "y i V.. ° � ' v °:" h e JB:,^ our vv4' V q II . y a. ^ I N. 4,:1u I d ,° N. �u q,.) 0 II I . 4,:h I I f �� N, y ll ,. N N ";,::" I h B m " ":,I, t hII"N-1Ie. � hll",,JII:I:?i "ry II lu".',u IJIN.)'...� hNay IIli:wC..u" Iq,'uu c aull su'ua::, t he dxNlle 4....Ilhh 1rWP 1111,aad / 20. How to Contact Us (N,.)' II ) (II Uuc, if 'VgnU.JI have a..;.MoIan q,,w r oI"h"hP,.n.P l".':,i, :R Privacy@TimeClockPlus.com. a Ir'h.0 Y Y h , reach h u u u "JrO mad pull a a idh II, , U /eIIN.:m u.::Il V II send VII , d:a I o.. Ir V p',`;'` II- a o l b ase ., I' n IY 8:.:" I( 4? y q .'I' Il..11 II II "h ::A II I l Ua, 'D n NI N , &1 II .h..h L! II U u a:J uJ II 'f., a II YI p:::w ull'hfr'I,:."IIU-II'h11a;11^,;:n about your qlluM:;➢IY'V, q; v'pU-VWII'1111tlG11'V'Ir., or N.N::;^Ulf pl VMllllaL. Wers can AM: LeQl l�...p, ..II .°( 76".—,)0-4; N...NS,Y"'"". Agreement No. 5830 21. How to Lodge a Complaint DPO@TimeClockPlus.com � Z [),)uzi su[)Ierc�ts ' S Ele "be('JJOIII Entilde(]Pri acy Poh'ry fq,f - - " ....... . — ------ Hiturnairi ResqiWuiirices Ek Client Data Proiciessiling foir EUI Datia Subijggq. Riefeireinices: ;a) https://ico.org.uk/for-organisations/guide-to-the-generaI-data-protection- reg u lation-gd pr/i nd ivid ua I -rig hts/rig ht-to-erasu re/ TimeClock Plus, LLC Privacy Policy for Business Data 1. Introduction a lei(J "Oki 111a's N (JC)pted a Prrala' pichc'W' [,)Ili"II �Jirq set ot ik'iiteii n," II ii trc':) be i e�:Ioa:.)nh. ed [),V, tht^ D-iiic')pe"In hdoi") (D.,h [),�.'Oa [)rctetion Aiut[jCq1rjj ties (DF:'/V:•), i he Pri,.,a: P, -kip,: en,Suii es a C'D U) S 11 S 11,11 l aIppiicr achi b:' privac)", and datl�) ['),ii'1otercAk)ri 1"K:n'Dss 2. Scope and Applicability Agreement No. 5830 Ih Ie' i u II u I :, II ii 3. Implementation 4::'1111+.'�%"uII ,e,^fill uulrill4:ullauu�n�^IIuII th �" y tl Wu II)u..u' Ilune� V o.Ja! a a".":" tlllu":" II iE)�J uunu II F: 11 ii nus"Npgs v�yi ii in (i") uNn"::"Irngllu 4. TCP Business Data Policy Principles )J !!a a L ° "V II ", .n u,. d "u,..0 N N " II tl..'^ II U N ". II II n a " U ." q, ," I " n " ,, ".,,u + N II N .1I 'I, q "., ;n �',.. a II q i U. II a...!' N u �,..n. II"u.nulllriles IC:"uiinlVu"::mi". i;:rN' Ilya ," q nu"un::B IC',.'n:Yu:ynn ull Il,nr: to u vq.y N n ;,u Il II )atl ,n v.,..k IF", in the ",. o lY n rie:'J (.)II.q lb u..0 a 11 ,n ess➢ fiG.::qP:)jI nV'liP:"IY�w.: "wPIIV"U�:u ,vll,!ISVUNw" a. Business Purposes for Processing Personal Data pertaining to Professionals: 1. Business relationship management; 2. Business relationship due diligence; 3. Transactional communications; 4. Account management; 5. Quality control; 6. Risk management; 7. Security management; and 8. Anonymize or de -identify Personal Data. b. Business Purposes for Processing Personal Data pertaining to Consumers and other Individuals: 1. Provide requested information, products or services; 2. Due diligence; 3. Transactional communications; 4. Account management; 5. Risk management; 6. Security management; and 7. Anonymize or de -identify Personal Data. Agreement No. 5830 c. Business -necessary Processing activities. 1. Protect privacy and security; 2. Troubleshooting of products and services; 3. Compliance; 4. Business structuring activities; and 5. Reporting and analysis. d. Development and improvement of products and/or services; and e. Relationship management and marketing. f. Disaster recovery and business continuity, including transferring the Information to an Archive; g. Internal audits or investigations; h. Implementation or verification of business controls; i. Statistical, historical, or scientific research; j. Dispute resolution; k. Legal or business counseling; I. Compliance with laws and company policies; or m. Insurance purposes. n. Special Categories of Data revealed by Photographic Images. Photographic images and video recordings may be processed for security, compliance and other legitimate Business Purposes, such as participating in video conferences. o. Racial or ethnic data. TCP may Process racial and ethnic data as needed to facilitate affirmative action, supplier diversity, and other inclusion programs. p. Criminal data (including data relating to criminal behavior, criminal records, or proceedings regarding criminal or unlawful behavior). TCP may Process criminal data as needed to conduct appropriate due diligence on Individuals (employees, partners, and contractors) and in connection with Agreement No. 5830 security and compliance activities as needed to protect the interests of TCP. q. Physical or mental health data. TCP may Process physical or mental health data as needed to accommodate a person's disability or dietary needs, address emergency health needs, or in similar circumstances. r. Biometric data (such as fingerprints). TCP may Process biometric data for the protection of TCP and Staff assets, time and attendance, system and site access, security and fraud prevention reasons. s. Religion or beliefs. TCP may Process data pertaining to religion or beliefs as needed to meet an Individual's specific needs, such as accommodating dietary requests (for kosher or halal meals) or respecting religious holidays. 5. Quantity and Quality of Data g w II L:I� "'I id N II p ... A uu A 'v p,... 'M 0, .NN 4;uV � u .... e a.'B � .... � a"",,u ,,,.e Ilti."all 11 2 p"" , sNu ✓ fi Il l tlp:::"Il:ullu 1I1.3, "II urll:o::u.IC: zn u4 SIIe a f f h) ,J II''./' II dIL. II [ Y II '; f: ^' ;^ "Y' II 'V h:v h V II d:::" "h:' N"U , '� ll " a i ." II II" .." :a II ';, d..1 Il...p ':;� C...N ti:`u ' : q V ":::, ¢N? ^;.: P': l,V II :ti r:' , ^'::: c:,'b C N 'll '.:^ I ;::. c,, a II ...11— �.:Nr:N�R''. 6. Individual Rights of Access, Rectification and Objection �LN":...VIIwVrt;NlLI:pII :, N'i',.V`.1,ry'f "B^r.:! fII"NII'' to 11d u`ju st$NII;u6IIII1ph':.'",.P Niicl)4,..N N, 11i"'�IX...l N,.ul/ �r,.A vv. NII IXNII"..' Ndl�'j 4..�N r.;J V. fl��!I', E.v I;: 1117,I'D NP":u.i 11!II,a.11,11 uD11 II II^,'I `rVC,)I,,.!:'31d NII 11V"ol,.^ 11 0.'::' 1111 ^'.N .IL.1�::�° II"1rii,.;�.,nr: J 1"I:'�lilp.,;hh �(u:�N-ppN�",u,.N IX1111"YIP."��.a4 II:�p ul,�m, �II11:.' NuI1PNiib�iill::?�N�'9V bN��4, �IINoN: N-iil��llllh Iltl.:11 II11,y:.�,ol lllll�:^ e r :11". o-. S,:r 111111(A J) ;N -'t: PIIS: 1 11 N:Iu a ll :'PII'V, x.1111—L"') II 11 C. `1iJulI11Q tIIII��"N ::k nll'�V..V..p�91111111 �i wllll" (h.:::p� YiliN"PI(::A—n"'^NUY,Y'. Agreement No. 5830 I Il I_ E 11 q,: E NMI 11 15 Il 11- 1 11 c I[ I 1 1) e 11 1:? (1 (D re e )l I'D ii 11 11 11 S S e I C 1 1( 11 13 !S 11 VV 1111 'll`Vf1Jl11l'h::.`�I!S 01 [)11 -,)1i,.e,�-inl IS In Hilt: il 11 c e v 16, 11 Cu I e 111 Z� 11111,Icl ON:, !S I!� f")II rep11� �S'111 '3 a:'' u. 11 S 11-'n 11 11) vIlk'.1 elll'1100 ".) 11 In 11 [111, a ("I ,J V N I c) 11 111, 11;" FlI2 S tl a S le 11 111 n t: 1111 Ci, [) 110 E, S S 111 C11 11 C)II 11 t",' 11 1, t? pa 11 I�,� 11 irl, J 11 ""LIl I e a„')l 11- n C11 H3 S 11 11 11) 1�1 1111 11:le 11 El J''s 11'6()l vv a ii J LJ I 1 111 I'll In;Jih 11111 N: II kfll 1111hilllilhillan 7. Security and Confidentiality Requirements 11 uIMIM,11H hIJH,,/' ic,a CIH, Dll) p rv.gl "3pIqjjjljpjj- IJ11 op V N I':,', a u u 11 IX ,''i:, I .rc: ° a p” N N ":' '`(.. h I )ejjr,;,1,11)1,N lik )l: � � �11( � c) � �� )e LA 11 P ) )1[ h S ' C N S 11' lie I�? 1111 11' 11 ,X V tl 11 ry II 1111 tl 1111 -IaH ,�rkl !s�l n,,S 0 1 In "Al 1� 1 11- S Ill c.", 11) 11 f z.�.0 11 I,J 1111") cl If o v 11 CJ o/ 11 1 �.3 j 11 III:'-'�L.11 11"ll,"'. E- pol 11 f the I - 11 t 1111, I'� j- I �� �11,lCk�, 1111 1 �p vv "IIS:, k, 111-11 11111 ( C 11 1111 C" � 1 VV L!S` i­WI�,-.,� J S 111) I'l 11 C� G EA 11 f 11 111 '1111 u I S a 11 e E'u t 11 �i ELi!`:i I Ul 11 11 t.k 11 '1p:ua.NII lj,N Cr 1" IIIA v, I a ii ::k 11 1 -11I,Navyt.IIfIIC4:u.uIl j.'11 Bii-ealic,J", if (,-il) flhe ii 3 1 1 j 11 /II L Z3 IS Ji! 11 u.j -ii l- 11 is 1 B a If ii N V "'Sil- 11,111 t l:-4 x.11 "n ObN If the, IS I Elt a h14hij­ S�J, 11 1 C I ') 11 t 11 f 11 N..li I I p IIvv 11 J 11 AJ I 11 Ftz!; lric�] lvNa-Iu,l II inu:AJ if k'Nl 1"("" F, olnIj- I th C - L.fle �.fl,7 11 fic(3111ir'llin I hav,,,, e-(- ' L 111 r a I vy t 3 1 It N cp i ciI EI 111 Il 11- E, C) 11 111 C1 I E, I U 1111 Ei) I- e I II F'S'"Lllra t 1 11 o k-11 q i a C',dbell`.,E" I I() ll 11 d:, Y 11 t 11 f 11 11 10 1 Agreement No. 5830 Vo 1111 u 11 u� II l�� : 11-1 1:::, [l, 0 l 8. Direct Marketing 9. Transfer of Personal Data to Third Parties and Internal Processors a. Commercial Data Centers; b. Customer Relationship Management System (CRM); c. Applicant Tracking System (ATS); d. Mass Marketing Email Tools; e. Workforce Management Applications (WFM); f. Technical Support Ticketing System; g. Project Management Tools; h. Email and Email Archive Servers; i. Public Forums (Online Communities and Social Media); and j. Instant Messaging Applications. 10. Governance (' rn�lflil rrierill 11 - i , i[, 11 q, )l 11 C E' 11- A 11 11 11 c l 11 1�.-) 11 In w 11 11 1111 1, C, t 11 S t ,,11: E.,� C) 11 S B" 1111 S ii l, ii 11 11r.) 3 11 E", Z') Agreement No. 5830 ll"eieri bj' RIIll"s llI"li�:IlnuIIIIth61- I C It 11 lll 11 Y 11 t 11 11 a l IVI 11. Training � l l Ill 11 �111 � I I� w ii t l �i � i c �, e 11' 11 k�!" ll) 0 11 l) 11 l � t� � t? i � � i(� �11 11, ��� �' 11 � � 11��� e �; ii � � g llut!�, ii :c� o 1111 l ��, 1, L ) � 11 rt��qwii?,J ii(:� �:ornp�eli.e %,/ l jj�jjj�ljj� Ijjj,,j,,,,jr � t�'DIFHIDY "ll; 1, d N h i ucf!IY a 11 "0' t "', „/ ^t1,. II i � 12. Monitoring and Audit EwicfiLJIM] tha ll�'ruile,,,, ing N:fl 7lLZ. I(' au l'1011 th �� 11�� )Hk �11;vv e���!!'Jjjj jj�� l 'e all cfi� ' I Flht�., GIOL:41 (]hbef Privaq, Offic(,?ii sJ-411 airn f011 th1 t, (" ' coRqAknce w% lJhe l C`�'P fCIllr l" .' I eS"- � 3w�n Data, yonacy data rwtection ll ajna:] (,-)Uh(zir rek.'varit. lssU-�es. 13. Complaints Procedure 11 q' b II Ill N 11 ry l i �, �, C);''d Jj®u hl, l )"'/ b )) ::' l s.'":7" " I, )1;� [,)JI ",J11111 , t:' :'' 11 11 Cuirlrlpk�lid If thl0n' l)�:°"If , ',I ��:'fjjjje() 1111, y (:oirrq:)�Ialints I be subrvVR1(.:'.,cJ 4-ilwiifinig bo TIP. Corripkints rnav be SLa)1YnUe(.J v,0 ern,�.,Ol t(,) or VA Inad by 111rneGod,. P�Iiiis, l l C AM NO a e (,' l " ") C l"', SII n Xrlgelo, D,',' '769()�; l -P&A may also fHe a cm,lakit oir (Jzdirrn vJt]h the rekwant DPAs or thi(-.n Courts, Agreement No. 5830 [)m,::u SuN,:aiok ts See Own EnAded ]QUM Ifunian & Ell [Xata TimeClock Plus, LLC Privacy Policy for Client Employees �I (�: 171" s G U ': " U p U)�.'p �lI,- i� ,/ p1�11 "), U 11 t?!S, [ IX , z', 1' ll li ;a e 5 11 u ci e, 11 'w 11 ),/ e ,° �IV ':' 11 -II IXj i! IXj e C,ucJ li )i z" [,)�a 11-u ,,a Ct. pL:, e a r Su.u1 c, IIW N 2 11 S, C, 11 n,.uU [)a a ua II aur p II ecl p. ) e l -ll y G L), a ,'ua:'611- II v (r IX :,"[) t:@ ir"" 11 wu, ' C), I �lE., c p :1 �i [�" f'o 11 11 t S, ".:;!"t/V111'"11 �N ".11 H 113 S 0 S, ',''rVO?V��s pirc,,,J,.Jed to us as a ppxanyN for our IX,.., Ri It prxMeu. :':, Adonnabon cokded whm? as wil Ds oH1lire. o [) IS CC)Mnlilted �c=, the x)11 v ] sec�,.�d by c�f fl',Ot "',!\Iie process An k71' Sli'11 V111IO?S OU111 We oLI111 (JNerlts dhelir , 1�11n,.�] )I'Efl ell"I �s M��:'H a,�� elLO11 dk:iu. ts ii,,l faiLP.O[y r)i �er)i OL)eii s. p lks %°, u4. "", [" c) �I 11 u:r 'J' �� �� ) � �� 0 !�` q ) U! 11 1�,� l t i e, �� \;v e ��j a - d It o t h e P e i z o ml LIM a vx"v c A v e � ii 11'.:;', ii Vr 1. TCP Collection and Processing of Client Employees' Personal Data arA pwcess your PanonM [Ma why instri oe,:l 0 U.. J 11- e II,..II ii ii UIII I-) r D 11 r 11 u cji 11 r u rc), I s a c' (. I 11 w p c, w N II , � , , �/ t 1111 b e 11 le, 1111 11 N V 11 1 ll � /,�, 11 J , � :'J � 1111, J II 1I l,;,J11 id, IL.( II llal LIIIII nIe, 'Iiu f, 11- N, Icii i�li J,!!ta req°wu !d [11,1,hill u11-opIII 1111� III I pi Nic"Jtl OF, VU1111 tl,..fi!�,,dc)se your p&mona! data to your EMplo.ver wid to other EAMS Wherii L)y Y,c.)urEWITYPY W Mhw- EAAKes HIM& paYI&H piocessoq beneW alllTunktabon provId1eii,,,,,, jp[ainnkriJj vendom, and adiess We rnav d4chse your pasonM data to our Whanns anci Wd pay piocessars as needed lo pr,:,,;llde the services ell Iequested. These enhhes are contraduaHy hw.,Iild t,-, krnIt of your penonal dala as needed to perfonn the ;u II "Re, PETSona! data when required wAo so b.y a.0ch zi;�; IIID tc.,,!sii ii h I-) Cv e ii k,�, kII,,-Ji-xfiing I.c., k-,-o/v agenaes and couns in the I rr,It�z-�d "'und c"Id-v 11 1: 0 U 11) t 11 u e V,v/ I I e 11 "Y"', (�, ic, I ) e 11 1. e. It Vounhave queshons about your prwacy nghs, phase conUct yow arphor's lru.,Jirnain resouii,.:e�, Agreement No. 5830 2. Types of Personal Data TCP Processes for Clients L V,.. ¢ TIC) o",°V V ,^,::utl`V"K �..,h !!h'4. l;dli.".'tl Ilu III Ito°IIV9;,, � / I,l I';.;I II I� I " :} II o„. � :'” . � II "II � u 'o II ` �, V �:. V, it ,:'V V , \:'1! u " YI II ": Y ",:. II : Y : • .' `p n u,:711 r; I \!V II II V o;.,I^I II o p '„' i,..I I Y ” � I L.. ¢,; � '.,'v � u..'o h" a 1, j p,,:, II 1' � ` a. Personal Demographic Data includes username, password, first name, last name, address, email, phone number, job title, employee ID, taxpayer ID, gender, date or birth, hire date, termination date, language preference, payroll classification, employment classification, pay rates, work schedules, employment contracts, and labor union affiliation; and b. Personal Activity Data includes clock -in time, clock -out time, clock -in location, clock -out location, leave requests, including vacation, sick, and other third party defined leave reasons, leave accruals, FMLA cases, and hours worked. 3. International Data Transfers a"IIY II �_IIIIVII�;IYIi: l IL:;I•' a ulap:ull r„p.v:u �..If° n/ulll nu< 111 ler IMpo.0 :...«11,11 all o.N::.t:d Il.r ull""uunlllun-..•H a".:II x:11 `iI Fa F" P ul /;in::, Iycrlllia.„ h¢.::Xu Il llu a"II IF) a�;q B ._a¢.r: ,:i 11 11 p r"".rII'u«:I-I10..bII :';I,ialrit 1.,")Vd uL:"N II a. ," :p d II'lIl'. ;XI11'0t�¢. t11C, "h c In 1;. II pi'' u:-rV" .. u o r '"IX¢;' 1'0 .M a' :,,m v,::'a';I a id.4'I�`.sYp 4�" 'h''V¢.: �.0..!III-I',.,rl�-°n'uV""I'I En.,1. 8114; a 111 I1u..:." II u.',r'. �� , G"a.�u.11: u"I,ull IL a�,:,. Ilnu.:",,f I uc.ry_. 0.., 11 11 III11w,VrI'611 / �, nJ'n uu u¢,➢tl:'¢":N°,d all. w;Y'!' E, a 114.. .'11 II IL.,V 'tl- 111: a::°!e11At, ',�41:> 11 1 S "�«Ir :�uul:- "�II,.IIw.�ho, pV. "µ1.u61',1"a.7'llllnll¢,..".rUV,.u..,`..YII, P VII IC:r `All a+",II;:" V'I� Y' II II u N -V ll:1ll ;III:«µ II „l l`u 'I'w II YI r p..11l ¢" pq:, "uII0. ",. ¢:^Y111' !III.,`.i Il .::pd 7 E, ` II � ..:.N.V•,M 0 11„u�°�'° IL:III 11vu;'110V'3t111K,.MVIIt.9 4. Sensitive Personal Data A )1 V kVII'"YI II Il�lia:' IV�: II-tl:�, lllf u�.dllll"'"✓ N II-'� w� ... ��� II II . II�h^yIL.V',� I I "r::,`:,, L:. 1 1. ¢:'^•;, @'grJ k IpI a uII"�"u"::v II . ll -I 11 11 VAI."".V: :'p llVM1lulYll ui; h'::;11 111 "Y 0..V 111111 " l,.p !I u , a ... w',„V 111. O U.. V , ".:,V R P II:. V.,V II 111",iII.p;.Yr,IL.V'Y ". e11 :.;¢"pYI 4 VV N4 II ":..4rliIIlllau;:.�uM11.a i`0.VR.' IIk:''tl;IV...VIIV4".4.,IPu,a II"."1:..ru/1 '�,ul;u'i.N :^:iYhc,b :III ;:I'IY ,IIu w;utl:;�IL.VIYu;'V;, ::"IrIP:LV C:`bllu llll1l,' �.31111a.1 c,;7 II II :. l,tl:u;".v :Y �V1111111r,.: I Sl:(.°IMI ,IuM1,.b°'yr,"M'.:„ a.:pIIV4.l M1'. "IIV61I ':k",.Y..R,III..:Y 4'.V Vc' III:::V'"d'e c), Ilu.ce!,,': NII'"V�I. VIII10.r,a111:11tl,11"'u 'll;;:r 11.1k',III ,.µ:".::''11'11"pp 'l 'I(.:"P p V1h1V M1;r'llli`iY''I: ":° :DIr:'u'.',I,)111El Agreement No. 5830 flx'u"hxtl tic. 0II �o1 11"NII:: II 111I;,I,.,11qu :u,r uugfl11uw::uu , Z�11 1 V,, 11un U11-1 Vu q ;w oII. G::;,cellaull"c%:UVIuv fl p,wtPq 'I :I!,tl Il 11 :'q' bk::( II t11 E111nn l ull II :IlV1l1111- c] ()II Il dIIIuIIui�lIP4 II :u�,v. u;:� Nd 5. How to Lodge a Complaint (European Economic Area (EEA), UK, and Switzerland Client Employees only) fl III p P II N:° u V u'., 'I..NV NV .,P11"r°II II V N°.1111"IId II pi '11 Ed 11 q 1::1111 ~; , 11 n 11IX: % Ne ll e ii x cd g lL tl kIii n 1111 11 11,:x ^ II ° a q:] of ,u q . [:!Iii II:ILu p , Il n :: l' i q..:n lrik ti, � Ir 11 q.-:ILfl a ^ II q .11-:" II °IIIIv,:!!p. "u;:'Illlitl- ,° �'a::"1111' N Ilua:liP Ilh: II Nx �,:'1 II 11 na d:'i1 w n°'� II 1111" '1'fl "I`e 11N «L.I e tl,gvv, ,I Wr :1i11 nl I tl ICalll 11C Vlltip,ce. -11'gl ill itd Iu,.." I' "fl 11tl"'Ia.°lHtlN ..I ..0 I°"s, "II ol "°q„°IIill 11II1 lluq:°II V,vii ii el«IllV'E, ce I qq II le, II "II q II a k:)( V N II U N N:'' II "q'N (::";::1h ' w .." II' U' 11 I .Ili ! II U U u U' 4.. L„p II "u II Ill( fl II q ” 't II u ° fl Il n Ir.-' II fl U 11 "':;!! fl vv II'V::' II II N II U'::p 0:11 U""" rt u II 'II i..il I V IIII"'1111 ' fl II all''U' II it! " d 11 d " II .,;V N,,,0 11 a II 11 11 a :," (;P II V- ' V V ` Il"'ni:,IN q �."�..fl..flun914.;'�:Iltl.:atl.Il IhuII�..N, tl:�::I'ul�.0 Ai,t N 11 . Data a [ ) C N....' I N "0 t I ,,.,4 N 11 II U Y.,f Fo N II ILIIo 11 q: II II N IFIL:.b .: N 11Ir 11 N til Iti::" N "U Ih:" N'U fl' V a: a rer"Wr 1I: p.. q a V..q fl:'?I N "U II II �:Y9 a:. " ,q IP II U 11 'u Z) 11 Ii U t N.!I u, " ii l] II ci, :," V II E4 a...:'. Ir.:' U e u s :H 11 :x N...t II , IV �::'' 6 q,:;u 11 u..N.�. it II a :u q: fl "°�"www .� ....i : i Plus, L i. v Privacy ShhiOd "ri'v �'c q"°.w�9 blc �dlq„��;° to 'C�mrail11"q'N;r„'�"'g✓ ill"�'�""�"'�1 ltc� °ti'll1W'", II„Jiriw'IIo1Al,W�:d stU�II"� 's "II�'111r� 11P'"1�1� "���"�1mll'U __.. ---...................................... — ..... - ----- 6. ....._ 6. Questions about Your Personal Data II: co 111 UUw'UII':tce k 1k:;q til r011U..s' 1 x.UlY4IIqu 4-". W r.1 ,q "q pr:;IIN lY tlp'�II`r'U4iV.N: .:Y tc, U..!IIIBgflell rlY1VUIIU(J fl.0^'b,,U, ve:'' H :lla.lu,. ;'!) OI114U'"'v lna,i IIIIIItII4IIa(l 4/"drll`Ir':I.0 ICF, vivilth 4'::^;!1IId Vv.,UIr'U`ICIItl qx .,.Mq;':v u N °u q:k 1111 q 11 l:u 11 q a w" 11 �,u �' �::fl Ii 11 N 44 Ir INf Irk 6 ry 11 o IX :: „ If tIp�.;'u 11 li . hn u N IUVN `4' h u 4 fl fl r :;v u.,N 1111 �:;i t. IV N q � 1111 u � c)11 u u � � illi 11.,N V:Ie (.A ��aL)Iq° LIt J,..)11�NIX ��IX,;ir 'iNl I�.V'"" flV� �"�I(;.:Gu 1�1 llavue tlu.94„s's"u Il II Ills "x.:D ir.l"E' V., g1.,!INulg,! '11°11. t NIS arr;U4' PU"IIt,3 t U.N:S ISI,. P,1[I\ U4 �lf.df rU11U"'Uu:,'Cfla,..f'4.,'s,.G fluty, h. aU' N ,' EIIIII ]I mrya.'e bfla,x:'UaU' 114.'r;U4 U u;::"a 11..9 to Y(�'Ull q',,III11111" If.)„U;II;uU u;::!IN VnUoU1le IIIIUNIIU11atNIf:'YIY...11 UIt;°4;aUlYCi, NU"'UG ti'll";: Iflfl11'u;:::t, Uu:OU..Ua;;IlUld.i 4IIUII;;r4e,S1111Ug':JIB"w1:.P11!I11 �':eI�~x4:gIY'Ua l�x;;�'�'.:`I. Data Retention Policy 1. Purpose Agreement No. 5830 2. Personal Data Retention (All Medias) C° V "; h."IId d�...;uV;""�,VIIVIIY"II`"117. II illd"11'11 ::u II II up II II VIIh V ,:::CI d, :nd VVI11 11E"11111 S �:�YI';V�. V .'.0 tl tl'.. 11 ule uu u: Ilu II ^li..'N„ t a ea 11 o t 1111,1111II a to nhiC tl' Ui qe id ud ne � uIIuINN a e t tlIIII tl V.] fu nV t a' u'd..11tl II Ve111'..I a "II V,.:V n d, II Correspondence .- Legal,2.2 • Safety Records Insurance Policies (with Additional Name Insured) Leases R Safety Records 2.3 Accounting and Corporate Tax Records Annual Audits and Financial Statements IRS 990 Tax Returns Journal Entries Invoices 7 years after termination 3 years Permanent 6 years after termination 7 years after termination Permanent Permanent Permanent 7 years 7 years Sales Records (box office, concessions, gift 5 years shop) Cash Receipts 3 years Credit Card Receipts 3 years Electronic Fund Transfer Documents 7 years Payroll Registers State Unemployment Tax Records Payroll Registers State Unemployment Tax Records Earnings Records Garnishment Records Payroll Tax Returns W-2 Statements 2.5 Employee Records Employment and Termination Agreements Retirement and Pension Plan Documents Records Relating to Promotion, Demotion or Discharge Accident Reports and Worker's Compensation Records Employment Applications I-9 Forms Time Cards Biometric Information Agreement No. 5830 Permanent Permanent Permanent Permanent 7 years 7 years 7 years 7 years Permanent Permanent 7 years after termination 5 years 3 years 3 years after termination 2 years 1 year (Refer to Biometric Information Section Retention Schedule Clause) Contact Information (email, phone number, Permanent address) Correspondence (phone call, email, mail) Sales Notes Marketing Campaign Notes Technical Support Notes Implementation Project Notes Active Client Data (employee records) Inactive Client Data (employee records) Service Contracts 3. Electronic Documents and Records 3 years Permanent Permanent Permanent Permanent Permanent 30 to 45 days after termination 7 years after termination Agreement No. 5830 E N ec t 11 Ia, 11l i c d N I III 'I E` 111 11'n 11-(�pc" I1e 1! e� R a i up It t IIP11";- %1Vt'.? rE, II11 a I b2 apc:ba,:uu111 11 S, vviIdrouft (Jup'I IIcaOng the Murt w1won a hardcopj,,:),III jjNie E,Idst, k. 11 .0 J IN eS J��ici ii ii tlJ e n c e g E n e m be d h y I GP e ni ad I pp is bD arc I I We it an c,l everaually desoov it awychy to the sd,n��ck.IIle are EW)311)11h,9 .d Whi&111,` IhJ` -ezrrsomflLde eHomn to reduce haKopy generation 0/iHl 11 "114 I Ottell"�I)tIIIIIO to convm IcD a mme Imperless cq)ewwADn,, 1 TirneClock Plus, LLC Biometric Information Privacy Policy 1. Introduction i.0.... IJ,µ II a nsh(Wied th,I:� Fld::Oed bCji �Indl IU I( IJ, I1I::11)It,S u!��e Jind I, e11 -e :o, ',,VUHJ "s oll, niflHi::, h,:� KP lol- hiinH :)H(l Dllcl luill"JlYI 2. Biometric Information B i cejV-�Jfc?nwawon coHectwl by TCP inckdes Wogkal IOUs unique t(-,.,, I 111 cl 11 :�:.f i �.] ul ��.i I s a ii -� ,�] i -:� ii � 'il t�`t 11-i k,-, I �j " 11 � t. i If i 11 S -'rs cl t, [i 11 1� ""�,�j 11111.1 tr I �� 1 J I i I P o i .,s I i o N NI e t If ii c KoHnanon Fj nucy Act 740 ILCS 1411, el seq, or as may be chnned in any c1hell" al[) plkcable local aws that QWHI the coldecdc, LMR4 StUraye or &sdic.:�sI,.hirie Kdonetrk: clata. "Wistnc ldenbfie;` wans a L.-dok:,, �111�Jui(-fing retina 01I oll, ()J- rneains 1'1110�,V Vrr iS Jr(]"I'Itl�'I'-`N r'�Seq:] IC' k',11eii od"y arii iiii ik..-linduaL The capqwe W sudi aril` Adc ldowKon cwhes [311o:11111'1k?tjj-Ik" in the Joni of n"mAnedc vake ANGY can be stored AM LISed tO alldleHtKate the idwwMy�f a person Me usilrO,,..� nos nunwrk.-.: Me wnnot L)e re,,e� E? "1 11111 a (,)t �ii,)ui- ic� idennheir. 3. Client's Responsibilities are, fc)r c"vVin c]Wa cicdkeclic)ili, 11 le J. f aind �,3!S M,3y apoy to awn undekMIAlkable 1W11) tht-, le4ters requited by 0xv, Chents trill obtayi vshaerhaudionzatkni for the Chent, t 1, 1 c, Ji t""' Ills 0 1 c., f IC F` t i I a1:t i', 11 n (I 1� 11 I C E"? S Agreement No. 5830 11111V-ul;,a'l11 cl"..fl �,nr q . : VH Lie I V "A' I 11 11 I qi:'' 'V ....III ".,AN VPIINI :;lVo"q;° L:dN,.'U@, INV II tl:, r'.:7I G�6u;` tiprc^}/I:Pr,:M�olhl'!N IYI,tluN..!!Va.'. q}' 111111 In':)I Ilx';:�u...ulll i II L:Y yuuo.x�ul! IY"N'0VIIuN,'V'Ir.III,NIY11.4v:,'VIL. p 1! I': II q, 'I'll III b II ^V 11 q. II v ' a:.N i D .0 G a. a: tl 1 o ` ,.:I! IN ;l II 4''I V,.,,II 11 11 E, 11 a;;:. V' tl a. Inform the employee in writing that biometric data is being collected, stored, and used; b. Indicate the specific purpose(s) for collecting the biometric data and length of time for which it is being collected, stored, and used; and c. Receive a written release from the employee (or his or her legally authorized representative) of the biometric data authorizing the Client, TCP and/or the licensor of TCP time and attendance software to collect, store, and retain the employee biometric data utilized by TCP's devices designed to capture and store biometric information, and authorizing the Client to provide such data to TCP and the licensor of TCP time and attendance software. 4. Disclosure and Sharing of Biometric Information II u, II 11 rc1111 "II w N tl II tl h i:;u p u u V ,u.yc, U V " II IIu E' p 111 lie :a! Il YI b" ... 11114 II "u N: I -C... P pp :n n„u..? a. First obtaining the Client's employee's written consent; b. Disclosure is required by state, federal law or other applicable local law; or c. Disclosure is required pursuant to a valid warrant or subpoena. 5. Retention Schedule Agreement No. 5830 J, I )'':) 11 1 ;4� "'� ", � k ], �!� �!'; f �' VII i 1, 1[ n 11 1�2 Y, 11 j h': "', t t E:�� S t l�") i �a � � (.j I l' 111 -) � ��I �I 11 � 11 11 ) i r , �l ,. lig �, S , a� �ti Iles dewyed to capW a0d SIANe WMISWC VV0II `t.1' 11 IrhEr °L.1lw'11111'S ewqsloyees i h:'Vve�"eil thie Bloilm:''1.6c cankiLle t() unbthe "'Jk.NIM tllre t i i'lle VII i 11111 e(. �l 10(k :'° Il Ugs a I K�l t te I U I lie e11-61 � i o 11 f Ore B i �:� III ie 111 ietenkon pehod; whVh is set to ISO Ups by dMAt Tom hhe 4Jate, Lhe N-)iioces,s ,sf 01ij�:)' evecute ch Ming ne,Kkse Week cyde, 6. Biometric Data Storage I CP W use a reo no md I e k) airiO'J u I, roleA �llS ;11 J 115�" a 111 );3 11 yXV t�? �l El q: t V 'I �, N 11 1 1111 1I 11 :i � 11 () 11 1 0 t? I, e ai I s �Ii a I: ea': L h C) 11 "!11 (1 ci!'3 i a )Ill LU i 11 , 11 . 11,.1 1 1111111 n,a 111 110 11 111, ) e 11 I Is, Uie 1111111,:',Jjr,�.° fall AMve than tht' rnvIj VII ja:.'m jV°V til-lail Isn lits, Id [,111 'h?(As IAVI'211- )o�1 ial [ p 0Ildu.uR '::a1i I [��e all se�:J Ira u1i dei'10 ify 11- 11 I'D 11 s11' '1 11 P:,' n II 11 11-[, e ii TimeClock Plus, LLC Privacy Policy for Human Resources & Client Data Processing for EU Data Subjects L Introduction I CP Jas adopled We ILMI AISM Cd 10 luii 11J1,?i0 '::°111`I 1111,,' I.Iteii v �p e";pk)" LiiinaJk 11( Q ^:i ii "V 'd Ill 111 ell 11'11fl 11 111 kA t?ll !:11 H (�� 'I I'S ''all.° Ijjj i P ('ll I 111 all I'd 11 k'ita i1011 I I u e 1a M, ("'"kent [AW Prociessing WMAnks % colrrirmnyenh FCF�' wi �flie Q personi&a pertakIing to CheM einifsksyees by IT& in connechon vAT proWng Chent swavidand Clent suppal avowbes. 2. Scope and Applicability The TCP Privacv Whs for Clent Data flie. c'f of CHeii l�. L)"/ N ( IF' iii 11 ills� I as a data Vncoessor foii Uelwls in the UOLKSe of dekwung Clent so-,/IIces, vdh('..,re sii.lc�h Agreement No. 5830 a. Subject to EEA Applicable Law; b. Collected originally in the context of the activities of an EEA establishment of a Client; c. Subject to EEA Data Transfer Restrictions; d. Processed by TCP outside the EEA in a country which has not been deemed to provide an adequate level of data protection by competent EEA institutions; and e. Processed pursuant to a Service Agreement that specifically provides that the TCP Privacy Policy for Client Data Processing shall apply to such personal data. 3. Implementation y ' V �' a ^III u...' "; 11 I d""I� p a L.:'I''�i � I " ^ ..I. � I�'YI '"V V tl I ''r` ' I II �!,. ,` y u III ;, l.,V I I I I ,,,,'!, I� ti 4'�i ''4 I � L. \I U' 11 I I ,,;III (.!i � ., L•II 'C'V Iii III III tl, .. V .,` ! WY I::V Iul1�-uIIV tl ..II I I ui U. ylC ! lll;� .J c' ' I I l V I 9l' I d : \1'6� IIY II IT, J, in" I;,)fl III Vu u,r' Qu 1( u N 4. TCP Privacy Policy for Client Data Processing Principles el" I..�IW IYV �..�u1t II'i tllVl .I'1111 II II II a0u (old' I'4o,,p; ",IlU 11 h I I III. , U III! II___!I a III VII VVV I';;,'ILpplluui"uy ",, Vllu ""c..�Q II11',d;ll U ri, I'. IIB Ill J;!ylUi' "IyIII kill � I II a. Hosting, storage, and other processing needed for business continuity and disaster recovery; b. System and network administration and security, including infrastructure monitoring, identity and credential management, verification and authentication, and access control; c. Monitoring and other controls needed to safeguard the security and integrity of transactions; d. Enforcing contracts and protecting TCP, its employees, Clients, Client employees, and the public against theft, legal liability, fraud, or abuse; and e. Approved TCP internal business processes. Agreement No. 5830 leill vvJki II eqII LQ t] Ie r 111-11 11111 Iq I'e� c:111 111 4: 11 V i II (' JII, 1: " P L E /�" ` II ' II III kJV"V. 5. Security Requirements I. P, I 11 3 „V "•..u., 11 11 rtE'd I I VVI A 11 1 1.1 11_V 11 L, El B'LJ n, 11 111 s S D 2 1-'D 1� 11 11,1 11 is S 1! 11 11 11 e S (1 11- 111 11 t:" I) e S S 11111 VV ii,:`'^'PI'IIUU III ii ^:, e e -PII IZ'nL�, ' as PAH 1, . :1 1 M14) � .1 IV IC �ejj Ie ii y t 0 1. h t 110.':': lie 1µµ1 11 ly e 0.V I z�, I,,' q ii I id P I f f VVr II. E1 �S !S 10 I� 11 J -11 1111 SUI 1.11ua:d I[.-) 11-ovi'.] tc.' ii 11 o l a c! 1.1 tc-ie".: 1111 1: 1 1-) Sj�j(jj'B ['11-J." J) Je S J S C] C) Ll 11 U1 I'll 1:,u11° In 11 1 S C) 11 C �ent d F3, ii 111 c' t 11 cl, ii 11c,y: i ii -I I S �a vi iCI a 11 0 11 11 �j I 'i 11 11 1 V t C J I.'] L 11 11 11 a 1 11 rl P1.1 t, e� 11 1 t. I �,:l ii o t IIII" 11 ca t 111,.) �.-1 �1 til Irl, dhk., 11-I �d I t. 13 t ry t 6. Transparency to Client Employees i f,/ e k- 11 E" 11) 0 " II e (I k" S, Cd Il.') 11 N,::D ;;0.1111 U_dabed OI 'U U31YV t �� I r e r ii I le, )i I e \/v ii se Fil cl 11' ril o S I, I'll I[ L vv 11 q 11 es ent. ID Seii IS I 1 11 e IDIIIE'. es�s, I "4,.) ii ri I �a t 11 1! e S t F 1! 11 11 11 e E:'s C, MEHU M tlhee( fIril n S e 7. Subprocessors Agreement No. 5830 N&c' 11 )11ltl II"C Vw ;U L"Ila II N, h,: I-1181 :,Vq IIIVlie I11II11 111 ,w1 `nNII J,I";)IIwu4' :. WII" IIII V: \','IIIV 11 ICA Vd TOE( IIOV:.ILVII NIID Il:nl101 w-, wq Vlluwtl ::" li IDV'II II qd° III' 0L Nd fill q II.IIVVUII Lily 11IBI ° I d 2111 "' V II1 N V : V V � 1 Il u P � 1N II ' '0 1" ;';" V IX 1 V;".D N ' N N V ;" II ""q'V I I'll it ! w:' " 1111 V d ,;1 y a it ''' ll' -Ilk I V ° �.., II 8. Governance x II N f " " h ^,'YNu R11 1 II uIIIIuIId::^IIgV `IIN%a,, %II �,uII, U-"u'u N<`' q tl:NII'li'NILNgIINbf"y:u d uvN"V'ulf.:uull' w",.; rd gllutl::u w IIgII ^d rid thkl ' FIII ullu"V,,,'q':IIa Klin d "III °l1', Wivhc. Iiis lin V:: II 11 Iry d( ' r,'ghi /,..IX u d w..,UIIU e ^:,,r W/d"NNu..;u N aGtl...` b uMI11 Ile,] h seid,I:Iii :a u11I1 eIINVtl"u°Nt �uNwV eIIwuw e= IX IllIh:IIIu ugd..tl D.'u'ubIhN II uu c:N,% VNw p w,"liIf IInuu11 tII'Nwui1u u° s II X e w Ove e II..'n N .N I i V o 9. Compliance :tIIn: h IIw",.,hDu.lulltl:'� :`:ullu ull,N,,llu.,u.� ::a llgd:Id w�.:u,:;ull-a"h °II II,;'NV:"^ " 1,i. "u IIE.Cw Iii,e Vw:;D 11 %,wllN a,,x fic,alim IOle :IIIiJ°geld n.:a ryMNq dll:;bll "theChent u„.0 %.:ouaOmAhq lit dwlhnllilwg, li.V.:7VV`, ,q.ulllll.'d tlx:, ApphaLde I a"` :NIr11V`V IIUV,N".:p.x.)rilr:HP d °w'1Jth th..utl,:V:" are q o N° f::;11 II V U II 'V V;: ti II U,.q II,. G V. ':NII "N II w w V d, tl,::'V orMeSYM, II IL N 'VNVII uc:. Nall M:Ntl tIX;'"II- V,/O U'U'�:: ,d tPIi'11:.')II dJIlldlltlui"' VN Ilu° ::;"..;1IIIV Nhli D.. U'116Vp II IL"'iI� :r l:a,,:;tl.IV.NV"'N V: �V ." ;Mu.::ull kVIrIIV".;PIIaNVII°W'a::^ costs of PIIu',°I1dwilhe IIII u:"uln agV'.Ilu;:n w:; ii yI'VUIIIIIItlNII''..VU„NII 10. Training ��.1111 a, lir !-,,'taff wI1di access to or gespo11wIIIV 1111ll.11 es KIM OMalllr :.1 IPie� ;.:aIle' r^.cNllllred to ...oll"quIMbkie all.gggllll"w11 V..uata V"'UgM,..V..II:.DIIq"'iIIIN'19 V(..Vs`::e I.. e Y:iriiNgN -ii d,';� II g ��::. ,,,. .. wllq,'�� �a:ill'tl"Bn;:i^.II"ull. _:.D"_r�:�N"N'N. Agreement No. 5830 11. Monitoring and Audit t I"' , I L ' jj-(:a e t. 11 )1 i E"! �rjj C 11::::, 11- 11 t 11-11 11 e "1 11 D 11 II I11 lI 11 , � I 11 e I a I if a .i�!ill- t Ile v e ll^ ell 11 � ��)a a e�: Iii I�� ii 'I, ii i� 11 e 11 11 e ii e!!i. 12. Complaints Procedure ( I u i l, E: r r 11 Y 11 CC) 11 (?id ["y 01 re lk�il liell t Da F'II-C)CEI!^3SH g ii n a,,/iulle 11. I'll rr [ u f tr 1 11: ^, thit R -p hz-ls not Ihan(Te,,1 thiek Dal;u -'r thaut h,:Is IN [o-bacy obHqa6onI; We; any appkAkla daM F" �D t e l. � o Ir a vvs o 11- tr e I F1, t f iz� 11 C ?n[ E)ata A wAtky to the ad6ies�> 1:14ovv, cm V0 t() at In le(� FlIusi oRL TCH Data (�)ffilceil voH inveshgaw, and document eadi conqdMnt and respond to the HOW! wkhm reasonable th"el-Huys of the whowe of die inves6g,atW. l a r ? ta ) p (�jj II e Y u II1 11 11 B I: p �'III ii I.:'ii- DPO@TimeClockPlus.com "...II 11gliIl I� Ir "Ottin: Data F�:r) 11 1� �),,D 11 E� � I )i �-')11 F� i,-1,1 t o) ` � I ) I lovv ti��) sil flhrn�t ��l uncfi',�r ,:;/ Sa11Od 1:,,kaw Wir w the secOwi entlitk,bd "rinieOock Privacy S11--fleld 11311rivacy for ii"),ata rranst?rI�-gd �tg Statesfil thg §U/SwkzedwdLUK, 13. Contact Us Agreement No. 5830 "11- 1111 4 H I(, I'll 11 1 11�V�o11 V flby :' :lrk,acy lJ , ie,�, H ii�( 1d� H ie H� P \'; ,,:, �"�)11 11 J [�111'0ctl111 (I i' u &V� t d pe hW k In 11, BHl( c I:A Privacy@TimeClockPlus.com 5:U "fie VII e IIVIa Vaal B 0. IN, Ill 11 (zo https:Hico.org.uk/for-organisations/guide-to-the-generaI-data-protection- reg u lation -gd pr/i nd ivid ua I - rig hts/rig ht -of -access/ TirneClock Plus, LLC Privacy Shield Privacy Policy for Data Transferred to the United States from the EU/Switzerland/UK c,I:Nin 6p�kie's he IW l ek,kV 01 ,'"A JI LI'lE 110 1 1 the Eun �,ea: n Unlion 11 1 e 11 t:, ",l" CI_11 11'� 1111 S, "'11E` 11 0 11,11 1, gD 1111 11 j I 1 11 El(�i I" S, Ci 11 11 Iv, IJI I Ut:, NJ, shk,:��°k:J Priinclq.',�es ��vith ii�ns�jp,ect tic) suil]h E9 11 S "�I CC) 11 11k, hetvo�a tI i e 1:),D ie s 1vzr) c d tJ'lEll I S FrTk!aic,y: to VIeVVE)U11, Agreement No. 5830 VOIIIII Vu ",i� U,u:Y l 7!WVuwal u:;'"all D V e`(d°IlWE,Ii IxV It1lI31IIIYI "H 6! I'll III H :IV 11 ci II➢a:aNIU V':^ �lI,e [:'11-N,, ell the h I u.°,. dx II -W h adeC on H1 n uII ha..11r°u. Y Y u V'' 1""r 4 a° 0 11',i d:' x W"" 1"" N l d°+] U"" II w ll 11 11 °\!'', ! .all 1111!! 1l ;;. G II h ( V V U 'II ' N w 1 V„V a;.,u H n a'; I"":” ai, 1IIII udn �)CII4.,➢ V911 t] le U.UhIll "u dH °;b'C'igaM",. 1'. U1a W.'ullll II"u,"q1 le:V'% ° u'','wyllll VII"1 II°Ve:' w)11. V1,+'V"r.� 11 il.u.."a %H Vo" :aa b d:!IIn "H Ii 11 L !111 11 :IIx xIIII Ihl'11 a v'vIVawdd,61 r;I um uu,.ut Yaxu a -.p. °v i nV•.V IIn'Vr , I'.a'°1 IIa11.;hY I - II - x aI d:aVNhwull'u'f'H 1 1I 'Ili" u I,dUIII•.:,xllh vvW " dud 1d Ia l yx:u0.„h. 'All 11 VII"Ild,.a1p"'Iuwllu"flWv,l x::u �'', u'" Bu.11",,+a %:' aNell'II U u.,Y11 IgEiNI(•, d u:"m"qd':' in w Nate U " ptl';,PVI! �e' d:'r UW::u IhNll"" Q•..UV'kIUecu l G;, uVII'Na.;1u""II ;"W a'. W" II W! aH, 'f:"H`ha11VY W'H u•:lV d.t Vlhx''GIl quell Wa °IIVad..ru; i hIIIa.ld..;a( N ':B111.N'.u,";u llh'll. X11 II'1:°a.:liuu IIV:°VH Il c) 11 1111 11,,"a'r" 11Gk0' vv111H y u "; ,1 o co V N rt, -i vv I1 F l o ll ll ii :' a 'o 11 1 111 a 'N l:11 l u !" .U. II II' a 'V a ii iu h a „' dwa� V II`N hW 1111- ...u...:"1111 IIV II �u':I a Uwub ,N,l ou,:'"'lla'`1111.d:-" "!v a:"' e 11 11- 4u 'dU.:N vv 11 II,; 1111 11 -" '?":"II Ill 111"II d::nuN11 ,Ntloa 11111 w,ull u;°'nn','ll"a" Wluu:` V!' W:V 1'Ir11 1nV..u11 Se uau Nx:;"h VIN..uNN ""xx'lllu h IIII qWu' x UINN w y; ,..,uu -l 11 Vin"JMx'llu;c,f11� !II N11 c E,lii uua,°IIlb.', -",hW, lIq 11111I:7. "u �..x" IFOCP.IIN: �-u."'11 lI111�.'U in VN°„tl;; "!iP.Oq,',11 CII`•,u..x” NhVe d,-•11 your litl'ln ullllral IIN'1"a1111NIIha.NIL: IIa. III"', 1111'::➢!!'""w',,e ua',.'"II'hhll'h ':; `'v11-11tIE)u""N II4 "111pu"p;','.0 U"x 11`!'1111 ,"',''v;@,': III1lu"d Hu!a::.l "HNu!;„.'I !;"'„JII'll'II. III d ."Illi aNIIN a."11�1!ga.��Ilr,nIlN''., I've Ilnua", be required Nf.°'All.du.."ta personal dG'nl":0 in hd °IIS hll^re II,u,A li"nm'11uI u!e'qIl,he 'it;s by pub hc i:liLoh old ltllev IIII IId1V,.Ni("1Nn'11q 1'i a Ini;iItio: Ni.'411 II.. 11 -it"", cm Hc:u'vv !� ...u.�f:m -r:: fl;:` ....., • $: II-�'�';H 0...111 :o"-n� l.,a n' II uullVw: Oda IIUV U: it NI"u u."II is „ ih0. UIVa:" II Unted "a"w4a::^" Vitlfh(;Vm'h ",'"aa "11r N:HNIIW" a :;1'II"Niu `,q.u.:! d`w7Hu..p, II''y+'`UI11 11'1,6 IV' II' ,"..;x J tl111111-uH Ilii'",Iht,,,,' V" Vu;, Sw IIFII aa`",.:H IIIIN h'"Vd uu uu11uIIY:,H li°uiuh" ullxlla uN II u11:uW.:N1111 u, HN ll" uen c:ulillh ua":IlaanuN",wll H IV11u..1 IIII N,9d: NIIuN �11;,II Blue VII Di e 11 U.H'hVlly,1—l',..,v,alllf ua"11 tIIV wu II U. I 11 It c' s ^''::" °a':` -"II d'DII"N�i.;NH NU a�.dl0. a"IIV Vd..'s x0.:''ll11:a1 dU°' ''",q v Illlh "-;n VuV:'I'Ifhlf..ur'V` IIILVd..""h N' a":GU.u',IL'hIL. a"+\�'°Iltlh NH'll^I' N -I pp • " h 111 6 H u'" " a I,,, 1 p a 1/� '° && m ":' l l n V 11 1 1'",i� &• d w Y O h e U, �N".'N d. �u,. Y Nb., ,, � tl �'ba„W ::� a•,.I I �, �Nq N„ r11.h.11I[:1'l I k!' vv t I I tIIN 1 1: h"u v m"... `"I'N11 El, Hw::i ["r iilYrc11111 IIe 1(IPI: (D11 r '1, 11 0. 11 i I !S tc, a of"'Ii 'ard.:.:1!.IIV- i::all"Ilvr he' and (:P0..NII colleclUmn or use bf Your 1.nW"II;;a.YlYn6l VIYN'W:"IYIP�"ha:h Ila:'IYN G:II'.,dIIN �a;;°P"h.'a.,H C:) thil II,...UIYhR�,:'n:'.1 x"Ir Nila,.°", �.,wh.Vl"'Mr111V NNa'I'.:'IC'.:d:11 P1I'N "xwa ShBw"kl. G.uRM4.�::k;r;Vu 11o111 x::uIIoK:H .,"'vilII`Y'ri IIIfhidVvIlal4.h;,NH°a vv Ir ll,IIi"w'is^ca' ";`uI"u NeH(:1 !IPI iqI!NIIIIIIW2` a::dIP' a;;:I'111111plall11)ts SIIlcJ f'IIII's t c oll"P,'IrrN„°t °.I.0 P 1::P"r r"IInaIIH M IPIIIIva c I., IIIIu11"m.''u I"",u.:l^;N4.uvn:u;::71I C. l', s [,)a': . °I k'::a1R"y: U: 114:"ii a..fIiIIcw w!'✓vhIIH r e c e i v e Ina e'~r64j Nte, aII¢k:.0 dd,Da u.,0n'm'°wu!IYut ."nY:'Ra.IIh ":oIInNH.aHaIIui11 ,::NII"N(I ii les 1."aI11a(I t() tIiae I r h I iv iclI..V;ml V'x,MIItI'1111h'N as ii le as o n a 1) 11 t netii 'allniie 0.::0.1 t I N I n"' IIta:(:')i11'Lha" (:'"f t I h e 1111) " I S IL II('').w%.Ili.: 1'1. Agreement No. 5830 t l l';:.) V u tII'!: ) u V (�) � If � ( (',,, 11 DPO@TimeClockPlus.com P 'i " v, IINnII ii e 11 tl I: "o 111111111 1111 .,,N,i o 11 t,, fe" I- 4..1N`uIIo" q'..!' I [) 11 11 d 4 11 11 11 aIIIIaN. ii- t 11 k:!l II � l� " S � t Vt o 11 11 i 1111 ��I 11E„ 11 ; IL:) 11 u i le I -E :;tlut.0;yup11 11 E:! 1111 11 V u c ^ BRR Elt i PRIM A" A [), I II:„ Iqq" l Hl 11(11U q id' tti- IcJk 1111-eall H 011 nlek/ „u Ilpl'..V„°lr +"!IllpllellNN lnvi, N11 1!rtl11 11 IIL, VII IIII �V alllni is not l b b11 Ik", a6 h!'11, 111111,:tllnII NhV IN"Illfpl';phll IjIlvd Iio lulu D d 1!Vllmpllilllld of, hlallrll:'1e lh,p.,mvm iesources dak haUlned to the United SuMes Et �.,and/or S101nerland in the coinUvt of die eqj., Il all,lid TOP dow not adckess it sakkd&N, TCP coninks to widh panel estabhshed by the EU data patection authwitJes. Pane) thile SwKs Fedem! EM PlIote,,,,tk)n and InNowadw-i Cononwoner, as appHY& :;p id Cclrnpthe advke given by the CW a 1:1, �I e q,N 11 t, II E' �-.t n.1, 11 IJ t.C., U (,. I I I i Ll Y -11 111 V"D II N ts Cl , i f cowlYanit, you skoukd cont;Q the We w II abonal dat;I ii te(,:fi :,iii (:)i Lic.),ir 1111 nt!,"', I a to not OR adchessed to the BBB EL"AMVAC) STAEU). f,::1,11 the [„.UI qJNt:":a authcolks can be found W httP:Hec.europa.euaushce/data-protection/bodies/authorities/index_en.htm H your PAwKy Shill coaq*ka cannot be iesdved 11nough We above channds, IT"Ildeii eo,,:.Nn rna�,,� �ilV,;Cllke L)�n„Jknc'N [Ul'!5CllrIh? claiii-i'IS '11C)t by c,lldheii Iediess inechw6sirji!s. Seie 9,I�ekl i'viwa, I ��d https://www.privacyshield.gov/article?id=ANNEX-I-introduction Contact Us NII , e d..11 c <; 11 111 P 111 e II r, 7 (�, '.;V ( ) i , t � H !!�:",!;, P 'i " v, IINnII ii e 11 tl I: "o 111111111 1111 .,,N,i o 11 t,, fe" I- 4..1N`uIIo" q'..!' I [) 11 11 d 4 11 11 11 aIIIIaN. ii- t 11 k:!l II � l� " S � t Vt o 11 11 i 1111 ��I 11E„ 11 ; IL:) 11 u i le I -E :;tlut.0;yup11 11 E:! 1111 11 V u c ^ BRR Elt i PRIM A" A [), I II:„ Iqq" l Hl 11(11U q id' tti- IcJk 1111-eall H 011 nlek/ „u Ilpl'..V„°lr +"!IllpllellNN lnvi, N11 1!rtl11 11 IIL, VII IIII �V alllni is not l b b11 Ik", a6 h!'11, 111111,:tllnII NhV IN"Illfpl';phll IjIlvd Iio lulu D d 1!Vllmpllilllld of, hlallrll:'1e lh,p.,mvm iesources dak haUlned to the United SuMes Et �.,and/or S101nerland in the coinUvt of die eqj., Il all,lid TOP dow not adckess it sakkd&N, TCP coninks to widh panel estabhshed by the EU data patection authwitJes. Pane) thile SwKs Fedem! EM PlIote,,,,tk)n and InNowadw-i Cononwoner, as appHY& :;p id Cclrnpthe advke given by the CW a 1:1, �I e q,N 11 t, II E' �-.t n.1, 11 IJ t.C., U (,. I I I i Ll Y -11 111 V"D II N ts Cl , i f cowlYanit, you skoukd cont;Q the We w II abonal dat;I ii te(,:fi :,iii (:)i Lic.),ir 1111 nt!,"', I a to not OR adchessed to the BBB EL"AMVAC) STAEU). f,::1,11 the [„.UI qJNt:":a authcolks can be found W httP:Hec.europa.euaushce/data-protection/bodies/authorities/index_en.htm H your PAwKy Shill coaq*ka cannot be iesdved 11nough We above channds, IT"Ildeii eo,,:.Nn rna�,,� �ilV,;Cllke L)�n„Jknc'N [Ul'!5CllrIh? claiii-i'IS '11C)t by c,lldheii Iediess inechw6sirji!s. Seie 9,I�ekl i'viwa, I ��d https://www.privacyshield.gov/article?id=ANNEX-I-introduction Contact Us Agreement No. 5830 , 11 � r " ' �) ' 11 11 11 �,f) �) �11 %� 1 11 F,��ll lln'011E?, Ohl, e,�, Iry k �i� �iiiinll�ll H iie CJ��ll ��'ll I 1 ;u(.&`," 11 11