CONTRACT 5830 License AgreementAgreement No. 5830
TimeClock Plus OnDemand
License Agreement
THIS TIMECLOCK PLUS ONDEMAND LICENSE AGREEMENT (the "Agreement") is entered into
as of Dec 20, 2019 ("Effective Date"), by and between TimeClock Plus, LLC, a Delaware
limited liability company with its principal office located at 1 Time Clock Drive, San Angelo, TX
76904 ("TCP"), and the City of EI Segundo with its principal office
located at 350 Main Street, EI Segundo, CA
WHEREAS, TCP and Client (the "Parties') desire to enter into this Agreement for the provision of
hosted services by TCP to Client, as provided herein.
NOW, THEREFORE, in reliance on the mutual covenants and promises, representations and
agreements set forth herein, the Parties agree as follows:
1. Definitions.
1.1 "Active EmDlovee" means an Employee that has not been marked as either
terminated or suspended within the TCP Services for whom Client is required to pay a fee under
this Agreement.
1.2 "Afflllate" means any parent or subsidiary corporation, and any corporation or other
business entity controlling, controlled by or under common control with a Party.
1.3 "Biometric Data" means any information based on an individual's retina or iris scan,
fingerprint, voiceprint, or scan of hand or face geometry which is used to identify an individual,
regardless of how it is captured, converted, stored or shared.
1.4 "Client Data" means all of Client's data processed or stored by or transmitted to
TCP in connection with the TCP Services, including, without limitation, all Personal Data contained
therein.
1.5 "Designated User" means an individual Employee who is authorized by Client to
use the TCP Services on behalf of the Client, and whose Personal Data may be processed or
stored by or transmitted to TCP in connection with the TCP Services.
1.6 "EmDlovee" means Client's individual employee, worker, consultant, substitute or
contractor.
1.7 "Global Data Privacy Policy"' means TCP's Global Data Privacy Policy located at
https://www.timeclockpius.com/privacy, as updated from time to time.
1.8 "Hardware SuDDort and Maintenance Agreement" means any agreement that
extends services to current TimeClock Plus terminals, clocks, and biometric devices, and
maintenance releases for related products purchased or licensed by the Client from TCP or a
registered reseller.
1.9 "Initial Term" has the meaning set forth in Section 10.
1.10 "Monthly EmDlovee Fee" means TCP's then current fees applicable for each of
Client's Employees based on the aggregated Permissions, to access and use the TCP Services
measured over the course of each calendar month, as outlined on an invoice or Order Form. This
2019.12 WEIL_D.Mclntyre 1
Agreement No. 5830
fee may be prorated during the first month of the Initial Term, and may be prorated for the last
month of the Initial Term.
1.11 "Order Form" means a written document mutually agreed upon and executed by
the Parties for ordering products and/or services, and which expressly incorporates the terms of
this Agreement.
1.12 "Permissions" means the permission(s) granted to Client's Employees to access
features within TCP Services, as outlined on an invoice or Order Form. Permissions are applied
within the TCP Services by Client's Designated Users.
1.13 "Personal Data" means any information that identifies, relates to, describes, is
reasonably capable of being associated with, or could reasonably be linked, directly or indirectly,
with a particular Employee or Designated User.
1.14 "Suborocessor" means any third party entity that processes Personal Data on
behalf of TCP and to which TCP discloses Personal Data for a business purpose pursuant to a
written contract, provided that the contract prohibits such entity from retaining, using, or disclosing
the Personal Data for any purpose other than for the specific purpose of performing the services
identified in such contract.
1.15 " uuDorted Hardware" means any hardware purchased from TCP that is coverable
under a TCP Support and Maintenance Agreement.
1.16 "TCP Services" means the hosted TimeClock Plus software application hosted by
TCP in accordance with TCP's then -current hosting environment, any associated documentation,
and any ancillary services described in this Agreement or an Order Form.
1.17 "TCP Technology" means the computer hardware, software and other tangible
equipment and intangible computer code contained therein used by TCP in the provision of the
TCP Services.
1.18 "Term" has the meaning set forth in Section 10.
1.19 "Use Fees" means the fees set forth on the applicable invoice or Order Form,
including, but not limited to, Monthly Employee Fees and Hardware Support and Maintenance
Agreement Fees.
2. Delivery of Services.
2.1 TCP Services. Subject to the terms and conditions of this Agreement and the
Global Data Privacy Policy, TCP grants to Client, its Affiliates and their Designated Users a limited,
non -transferable (except in compliance with Section 22), nonexclusive right and subscription
license to access and use the TCP Services during the Term only for the internal business purposes
of processing, storing and maintaining Client Data. TCP shall provide to Client the TCP Services
during the Term in accordance with the terms and conditions of this Agreement, the Global Data
Privacy Policy, and any additional terms outlined in an Order Form or Hardware Support and
Maintenance Agreement, as applicable.
2.2 Client ResDonsibilities. Client's use of the TCP Services is subject to the terms of
this Agreement, the Global Data Privacy Policy and any additional terms outlined in an Order Form
or Hardware Support and Maintenance Agreement, as applicable.
2.2.1 Access. Client is responsible for maintaining the confidentiality of Client's
account and password and for restricting access to its computer systems, and Client agrees to
2019.12 WEIL_D.Mclntyre 2
Agreement No. 5830
accept responsibility for all activities that occur under Client's account or password, including but
not limited to any acts or omissions by Designated Users. Client shall inform each Designated
User of the terms and conditions governing such Designated User's use of the TCP Services as
set forth herein, and shall cause each Designated User to comply with such terms and conditions.
Client acknowledges that TCP is not responsible for third party access to Client's account,
including, without limitation, third party access that results from theft or misappropriation of Client's
account. TCP reserves the right to refuse or cancel service or terminate accounts, in its sole
discretion.
2.2.2 Restrictions on Use. Client acknowledges and agrees that Client will not use
the TCP Services for the benefit of any third party. Client agrees not to, not to attempt to, nor allow
any third party to: (i) use the TCP Services in any manner that could damage, disable, overburden,
or impair TCP's servers or networks or interfere with any other party's use and enjoyment of the
TCP Services; (ii) attempt to gain unauthorized access to any services, user accounts, computer
systems, or networks through hacking, password mining, or any other means; (iii) copy, distribute,
rent, lease, lend, sublicense or transfer the TCP Services, make the TCP Services available to any
third party or use the TCP Services on a service bureau or time sharing basis, (iv) decompile,
reverse engineer, or disassemble the TCP Services or otherwise attempt to reconstruct or discover
any source code, underlying ideas, algorithms, file formats or programming interfaces of the TCP
Services, (v) create derivative works based on the TCP Services; (vi) modify, remove, or obscure
any copyright, trademark, patent or other notices or legends that appear on the TCP Services or
during the use and operation thereof; (vii) publicly disseminate performance information or analysis
(including benchmarks) relating to the TCP Services; (viii) use the TCP Services to develop a
competitive product offering; or (ix) use the TCP Services in a manner which violates or infringes
any laws, rules, regulations, third party intellectual property rights, or third party privacy rights.
Client may not use any automated means, including agents, robots, scripts, or spiders, to access
or manage the TCP Services, except solely to the extent as may be specifically enabled and
authorized by TCP in writing. TCP may take any legal and technical measures to prevent the
violation of this provision and to enforce this Agreement.
2.3 Third Partv Services.
2.3.1 Client may require the TCP Services to interoperate with platforms or other
online services operated by third parties ("Third -Party Platforms") pursuant to an agreement
between TCP and the operators of such Third -Party Platforms, an agreement between Client and
the operators of such Third -Party Platforms, or through application programming interfaces ("APIs")
or other means of interoperability which are generally made available by such operators.
2.3.2 Client hereby grants TCP the limited right to access such Third -Party Platforms
with Client's credentials and on behalf of the Client in connection with the performance of the TCP
Services. Client acknowledges and agrees that TCP's agreements with the operators of such
Third -Party Platforms and the terms governing the use of APIs may be modified, suspended or
terminated at any time, and TCP shall have no liability with respect to any such modification,
suspension or termination. Client is responsible for ensuring that its use of the TCP Services in
connection with any Third -Party Platform, and TCP's access to such Third -Party Platforms on
Client's behalf, complies with all agreements and terms applicable to such Third -Party Platform.
2.4 Client Data.
2.4.1 General. Client hereby grants TCP a worldwide, royalty -free, non-exclusive,
limited license to use, host, copy, transmit, display, modify and create derivative works of Client
Data for the express purpose of providing the TCP Services. Client acknowledges and agrees that
it will determine the means and purposes of processing Client Data, and that TCP acts solely as a
service provider that processes Client Data on behalf of and at the direction of Client for the sole
purpose of performing the TCP Services under this Agreement. Client is responsible for ensuring
that all Designated Users who provide instructions to TCP on Client's behalf are authorized to do
2019.12_W ElL_D.McIntyre
Agreement No. 5830
so. Client shall have sole responsibility for the accuracy, quality, content, legality and use of Client
Data and the means by which any Personal Data is obtained from Designated Users and
Employees and transferred to TCP, and Client is solely responsible for any transfer of Personal
Data to any third party data controller or data processor (e.g., human resources or payroll
application), and TCP shall have no liability in connection therewith. Client agrees to implement
data protection -related procedures that will not be less protective than those imposed on TCP by
this Agreement and the Global Data Privacy Policy.
2.4.2 restrictions on TCP's Processing of Client Data. TCP is expressly prohibited
from processing any Client Data for any purpose other than for the specific purpose of performing
the TCP Services, unless requested by Client or required by applicable law. TCP is expressly
prohibited from selling Personal Data under any circumstances and for any purpose. No other
collection, use, disclosure or transfer (except to Subprocessors in accordance with Section 2.4.3)
of Client Data is permitted without the express prior written instruction of Client. TCP acknowledges
and agrees that it understands and will comply with each of the restrictions and obligations set forth
in this Section 2.4.2.
2.4.3 Suborocessors. TCP has appointed Subprocessors for the purpose of
providing data hosting and security services. Client acknowledges and agrees that Subprocessors
may process Client Data in accordance with the terms of this Agreement, the Global Data Privacy
Policy and any Order Form. TCP's agreements with its Subprocessors impose data protection -
related processing terms on such Subprocessors that are not less protective than the terms
imposed on TCP in this Agreement and the Global Data Privacy Policy. The Global Data Privacy
Policy contains an overview of the categories of Subprocessors involved in the performance of the
relevant TCP Services. The appointment of a Subprocessor to perform part or all of the TCP
Services hereunder shall not relieve TCP of any liability under this Agreement.
Data Security.
3.1 Securitv Standards.
3.1.1 TCP shall implement reasonable security procedures consistent with industry
standards to protect Client Data from unauthorized access, including without limitation (i) industry -
standard encryption of data at rest within TCP's data centers; (ii) web application firewalls; (iii) virus
detection and anti-virus software; (iv) authentication techniques, such as user names and
passwords, or authorization formats, which limit access to particular TCP personnel; and (v)
additional security controls consistent with SOC 2 Type II reporting standards.
3.1.2 The Parties shall implement administrative, technical and physical security
procedures consistent with industry standards and applicable data protection laws to protect Client
Data from unauthorized access, including by adopting access policies that prevent the internal
sharing or inadvertent communication of login credentials.
3.1.3 Client is responsible for reviewing the information made available by TCP
relating to data security and making an independent determination as to whether the TCP Services
meet Client's requirements and obligations under applicable data protection laws. Client
acknowledges that data security measures taken by TCP are subject to technical progress and
development and TCP may update or modify such security measures from time to time, provided
that such updates and modifications do not result in the degradation of the overall security of the
TCP Services.
3.2 Securitv Breach Notifications. TCP will promptly report to Client any unauthorized
access to Client Data within TCP's or its Subprocessors' systems upon discovery and in
accordance with applicable data breach notification laws. TCP will use diligent efforts to promptly
remedy any breach of security that permitted such unauthorized access. TCP's notification of or
2019.12 WEIL_D.McIntyre 4
Agreement No. 5830
response to any security incident under this Section 3.2 shall not be construed as an
acknowledgment by TCP of any fault or liability with respect to such security incident.
3.3 Data. Backuo and Detention. TCP shall undertake commercially reasonable efforts
to backup Client Data with a restore point objective of twenty-four (24) hours. Client Data shall be
backed up and retained in accordance with TCP's retention policy as set forth in the Global Data
Privacy Policy.
4. Data Privacy. TCP will process Employee Personal Data in accordance with the terms of
this Agreement, the Global Data Privacy Policy and all applicable data protection laws. Client must
maintain its own data collection, disclosure, retention, and storage policies in compliance with
applicable law.
4.1 Biometric Data. To the extent that Client collects, captures, stores, or otherwise
uses Biometric Data relating to an individual, Client must (i) first inform the individual from whom
Biometric Data will be collected, in writing and prior to collecting his or her Biometric Data, that
Biometric Data is being collected, stored, and/or used; (ii) indicate, in writing, the specific
purpose(s) (which may not be other than employment-related purposes) and length of time for
which Biometric Data is being collected, stored, and/or used; and (iii) receive a written release from
the individual (or his or her legally authorized representative) authorizing the Client, TCP, TCP's
third -party service providers (who are subject to restrictions no less restrictive than those imposed
on TCP herein) to collect, store, and/or use the Biometric Data and authorizing the Client to disclose
such Biometric Data to TCP and TCP's third -party service providers.
4.2 Ieouests. Client agrees to adopt a commercially reasonable policy for managing
data requests from Designated Users and Employees, which policy shall safeguard the rights of
such data subjects and respect the original purpose of such data collection. Client, as the Party
which determines the means and purposes for processing Client Data, shall be responsible for
receiving, investigating, documenting, and responding to all Designated User and Employee
requests for inspection or erasure of Personal Data.
4.3 Assistance. If Client receives a request from a Designated User or Employee to
exercise such individual's rights under applicable data protection laws, and Client requires TCP's
assistance to respond to such request in accordance with applicable data protection laws, TCP
shall assist the Client by providing any necessary information and documentation that is under
TCP's control. TCP shall be given reasonable time to assist the Client with such requests in
accordance with applicable law.
4.4 Privacy Policy. Where required by law, Client agrees to adopt a privacy policy in
alignment with this Agreement and all applicable laws governing the collection, use, transfer and
retention of Personal Data. Client agrees to provide TCP, upon reasonable request, Client's
adopted privacy policy.
5. Confidential Information.
5.1 Each Party (the "Neceivino Party") acknowledges that it will have access to certain
confidential information of the other Party (the " DisciosinaPa ") concerning the Disclosing Party's
business, plans, customers, software, technology and products, other information held in
confidence by the Disclosing Party, and Personal Data. In addition, a Disclosing Party's
confidential information will include (i) all information in tangible or intangible form that is marked
or designated as confidential or that, under the circumstances of its disclosure, should be
considered confidential, and (ii) the TCP Technology and related algorithms, logic, design,
specifications, and coding methodology, and to the extent permitted by law, the terms and
conditions of this Agreement, but not its existence (all of the foregoing being referred to as
"Confidential Information").
2019.12 WElL_D.McIntyre 5
Agreement No. 5830
5.2 The Receiving Party agrees that it will not use in any way, for its own account or
the account of any third party, except as expressly permitted by, or required to achieve the purposes
of, this Agreement, nor disclose to any third party (except as required by law or to that party's
attorneys, accountants and other advisors as reasonably necessary), any of the Disclosing Party's
Confidential Information, and will take reasonable precautions to protect the confidentiality of such
Confidential Information in at least the same manner as is necessary to protect its own Confidential
Information and in accordance with applicable data protection laws. To the extent that the
Receiving Party is permitted to retransmit any Confidential Information it receives from the
Disclosing Party, the mode of retransmission must be at least as secure as the mode by which the
Disclosing Party transmitted the Confidential Information to the Receiving Party.
5.3 Information will not be deemed Confidential Information hereunder if such
information: (i) is known to the Receiving Party prior to receipt from the Disclosing Party, whether
directly or indirectly, from a source other than one having an obligation of confidentiality to the
Disclosing Party; (ii) becomes known (independently of disclosure by the Disclosing Party) to the
Receiving Party, whether directly or indirectly, from a source other than one having an obligation
of confidentiality to the Disclosing Party; (iii) becomes publicly known or otherwise ceases to be
secret or confidential, except through a breach of this Agreement by the Receiving Party; or (iv) is
independently developed by the Receiving Party without use of or reference to the Confidential
Information.
6. Cooperation With Authorities. If either Party is requested to disclose all or any part of
any Confidential Information under a subpoena or inquiry issued by a court of competent jurisdiction
or by a judicial or administrative agency or legislative body or committee, the Receiving Party shall
(i) immediately notify the Disclosing Party of the existence, terms and circumstances surrounding
such request; (ii) consult with the Disclosing Party on the advisability of taking legally available
steps to resist or narrow such request and cooperate with the Disclosing Party on any such steps
it considers advisable; and (iii) if disclosure of the Confidential Information is required or deemed
advisable, exercise its best efforts to obtain an order, stipulation or other reasonably acceptable
assurance that the Confidential Information or part thereof required to be disclosed shall retain its
confidentiality and remain otherwise subject to this Agreement. Although TCP will not
systematically monitor the Client Data, TCP reserves the right, upon prior written notice to Client,
to remove access to Client Data to comply with applicable law, provided, however, that access to
such Client Data will be restored upon a mutual determination of the Parties that such Client Data
is in compliance with, or has been modified to be in compliance with, applicable law.
Supplemental Services; Master Agreement.
7.1 TCP may provide to Client supplemental services in accordance with a Statement
of Work or a separate services agreement.
7.2 Client may elect to purchase additional products and services via Order Forms
from time to time. The Parties agree that this Agreement is a master agreement such that additional
transactions will be governed by the terms and conditions hereof. Pricing for additional transactions
shall be in accordance with TCP's then -current pricing schedule. Client agrees that, absent TCP's
express written acceptance thereof indicated by execution by an officer of TCP, the terms and
conditions contained in any purchase order or other document issued by Client to TCP for the
purchase of additional services, shall not be binding on TCP to the extent that such terms and
conditions are additional to or inconsistent with those contained in this Agreement.
8. Use Fees.
8.1 In consideration for the performance of the TCP Services, Client shall pay TCP the
Use Fees. During the Term, Client will be billed in advance an amount equal to the annual charges
as indicated in the applicable invoice or Order Form. All other charges for TCP Services received
and expenses incurred during a month will be billed at the end of the month in which the TCP
2019.12 WEIL_D.Mclntyre
Agreement No. 5830
Services were provided. Payment by Client for all Use Fees is due upon receipt of each TCP
invoice, and in no event shall such payment be received by TCP later than thirty (30) days after the
invoice, except in cases where a Net Terms Agreement has been authorized by TCP. All payments
will be made to TCP at its offices in San Angelo, Texas, in U.S. dollars.
8.2 Subsequent to the Initial Term specified in an applicable Order Form or this
Agreement, TCP may increase the Use Fees at any time effective thirty (30) days after providing
notice to Client; provided, however, that any such increase will not occur more than once in a
consecutive twelve (12) month period and such increase shall not exceed five percent (5)%.
8.3 TCP Services charges will be equal to the number of total Active Employees
multiplied by the Monthly Employee Fee which is based on the aggregated Permissions for each
Active Employee. Client is responsible for Monthly Employee Fees for the total number of Active
Employees who are made active during any calendar month. Client may add additional Employees
or Permissions as desired each month, by paying the Monthly Employee Fees on the next billing
cycle. Client agrees to promptly update the status in the TCP Services for any Active Employee
who has been terminated or suspended.
8.4 Employees added at any time during a calendar month will be charged in full for
that billing period. Because Client is billed in advance for TCP Services, if Client increases its
Active Employee count or increases Permissions during a calendar month, Client will receive an
invoice reflecting the increased Active Employee count with overage charges incurred from the
previous month and prorated over the number of months remaining in the Term.
8.5 Hardware Support and Maintenance charges will be equal to the percentage set
forth in the applicable Hardware Support and Maintenance Agreement multiplied by the total
purchase price of the Supported Hardware.
9. Taxes. As applicable, Client shall, in addition to the other amounts payable under this
Agreement, pay all sales, use, value added or other taxes, whether federal, state or local, however
named, arising out of the transactions contemplated by this Agreement, except that Client shall not
be liable for taxes based on TCP's aggregate income.
10. Term; Guaranteed Payment. This Agreement commences on the Effective Date and,
unless terminated earlier in accordance with Section 11, will remain in effect for the initial term of
one 1 year(s) ("Initial Term"), and then shall automatically renew for subsequent one (1) year
terms thereafter, unless either Party gives written notice of non -renewal at least ninety (90) days
prior to the end of the then current term (the Initial Term and subsequent renewal terms being
referred to as the "Term"). Any associated Hardware Support and Maintenance Agreement for
Supported Hardware which is incorporated with the TCP Services shall also automatically renew
for subsequent one (1) year terms thereafter.
11. Termination for Cause. A Party may terminate this Agreement for cause if (i) the other
Party breaches any material term or condition of this Agreement and fails to cure such breach
within thirty (30) days after receipt of written notice of the same, or in the case of failure to pay Use
Fees, thirty (30) days; (ii) the other Party becomes the subject of a voluntary petition in bankruptcy
or any voluntary proceeding relating to insolvency, receivership, liquidation or composition for the
benefit of creditors; or (iii) the other Party becomes the subject of an involuntary petition in
bankruptcy or any involuntary proceeding relating to insolvency, receivership, liquidation or
composition for the benefit of creditors, and such petition or proceeding is not dismissed within sixty
(60) days of filing. Notwithstanding the foregoing, if a material breach by Client, by its nature,
cannot be cured, TCP may terminate this Agreement immediately.
12. Effect of Termination. Without prejudice to any right or remedy of a Party with respect to
the other Party's breach hereunder, upon the effective date of any termination of this Agreement:
2019.12 WEIL_D.Mclntyre 7
Agreement No. 5830
12.1 TCP's obligation to provide the TCP Services shall immediately terminate;
12.2 after such termination and upon Client's reasonable request, no later than thirty
(30) days from termination, TCP shall provide Client Data to Client in a SQL database file format;
and
12.3 within thirty (30) days of such termination, each Party will destroy or return all
additional Confidential Information of the other Party in its possession and will not make or retain
any copies of such Confidential Information except as required to comply with any applicable legal
or accounting record keeping requirement.
13. Intellectual Property Ownership. Subject to the limited rights expressly granted
hereunder, TCP reserves all right, title and interest in and to the TCP Services and TCP
Technology, including all intellectual property rights embodied therein, which shall remain the sole
and exclusive property of TCP or its licensors. No rights are granted to Client hereunder other than
as expressly set forth herein. This Agreement does not transfer from TCP to Client any ownership
interest in the TCP Services or TCP Technology, and does not transfer from Client to TCP any
ownership interest in Client Data.
14. Client Representations and Warranties.
14.1 Client represents and warrants that (i) it has the legal right to enter into this
Agreement and perform its obligations hereunder, and (ii) the performance of Client's obligations
and use of the TCP Services by Client, its Designated Users and Employees will not violate any
applicable laws, including all applicable domestic and international data protection laws, or cause
a breach of duty to any third party, including Employees.
14.2 Client represents and warrants that all Personal Data included in the Client Data
has been collected from all Employees and Designated Users and will be transferred to TCP in
accordance with all applicable data protection laws, including, but not limited to, the EU General
Data Protection Regulation 2016/679 and the Illinois Biometric Information Privacy Act, to the
extent applicable. Client acknowledges and agrees that (i) TCP is a service provider and processes
Client Data solely on behalf of and at the direction of Client, and exercises no control whatsoever
over the content of the Client Data passing through the TCP Services or that is otherwise
transferred by Client to TCP, and (ii) it is the sole responsibility of Client to ensure that the Client
Data passing through the TCP Services or that is otherwise transferred by Client to TCP complies
with all applicable laws and regulations, whether now in existence or hereafter enacted and in force.
14.3 Client represents and warrants that its Affiliates' use of the TCP Services, if any,
shall not relieve Client of any liability under this Agreement, and Client shall be responsible and
liable for the acts and omissions of its Affiliates hereunder as if performed or omitted by Client.
14.4 In the event of any breach of any of the foregoing representations or warranties in
this Section 14, in addition to any other remedies available at law or in equity, TCP will have the
right to suspend immediately any TCP Services if deemed reasonably necessary by TCP to prevent
any harm to TCP and its business. TCP will provide notice to Client and an opportunity to cure, if
practicable, depending on the nature of the breach. Once cured, TCP will promptly restore the
TCP Services.
15. TCP Representations and Warranties. TCP represents and warrants that (i) it has the
legal right to enter into this Agreement and perform its obligations hereunder, and (ii) the
performance of its obligations and delivery of the TCP Services to Client will not violate any
applicable laws or regulations of the United States or cause a breach of any agreements between
TCP and any third parties.
2019.12 WEIL_D.Mclntyre 8
Agreement No. 5830
16. Mutual Representations and Warranties. Each Party represents and warrants that it has
implemented a comprehensive written information security program that includes appropriate
administrative, technical and physical safeguards to: (i) ensure the safety and confidentiality of
Personal Data; (ii) protect against unauthorized access to and use of Personal Data; (iii) protect
against anticipated threats or hazards to the security or integrity of Personal Data, and (iv) comply
with applicable data protection laws.
17. Limited Warranty. TCP represents and warrants that the TCP Services and related
products as described with this Agreement will perform in accordance with all TCP published
documentation, contract documents, contractor marketing literature, and any other
communications attached to or referenced in this Agreement, and that the TCP Services will be
free of errors and defects that materially affect the performance of the TCP Services ("Limited
Warranty"). Client's sole and exclusive remedy for breach of the Limited Warranty shall be the
prompt correction of non -conforming TCP Services at TCP's expense.
18. Warranty Disclaimer. EXCEPT FOR THE EXPRESS LIMITED WARRANTY SET
FORTH IN SECTION 17 (LIMITED WARRANTY), THE TCP SERVICES ARE PROVIDED BY TCP
ON AN "AS IS" BASIS, AND CLIENT'S USE OF THE TCP SERVICES IS AT CLIENT'S OWN
RISK. TCP AND ITS SUPPLIERS DO NOT MAKE, AND HEREBY DISCLAIM, ANY AND ALL
OTHER EXPRESS AND/OR IMPLIED WARRANTIES, INCLUDING WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AGAINST HIDDEN DEFECTS,
AND ANY WARRANTIES ARISING FROM A COURSE OF DEALING, USAGE OR TRADE
PRACTICE. TCP DOES NOT WARRANT THAT THE TCP SERVICES WILL BE
UNINTERRUPTED OR ERROR -FREE. NOTHING STATED OR IMPLIED BY TCP WHETHER
THROUGH THE TCP SERVICES OR OTHERWISE SHOULD BE CONSIDERED LEGAL
COUNSEL. TCP HAS NO RESPONSIBILITY TO NOTIFY CLIENT OF ANY CHANGES IN THE
LAW THAT MAY AFFECT USE OF THE TCP SERVICES. ANY ORAL STATEMENT OR
IMPLICATION BY ANY PERSON CONTRADICTING THE FOREGOING IS UNAUTHORIZED
AND SHALL NOT BE BINDING ON TCP. CLIENT ACKNOWLEDGES THAT IN ENTERING INTO
THIS AGREEMENT, CLIENT HAS RELIED UPON CLIENT'S OWN EXPERIENCE, SKILL AND
JUDGMENT TO EVALUATE THE TCP SERVICES AND THAT CLIENT HAS SATISFIED ITSELF
AS TO THE SUITABILITY OF SUCH SERVICES TO MEET CLIENT'S BUSINESS AND LEGAL
REQUIREMENTS.
19. Indemnification.
19.1 Client hereby acknowledges and agrees that TCP may not be aware of all rights
available to Client's Designated Users or Employees under all data protection regimes. Client shall
indemnify, defend and hold harmless TCP, its Affiliates, Subprocessors, officers, managers,
directors, employees, agents, advisors and other representatives (the "TCP Indemnitees") from
and against any lawsuit, liability, loss, cost or expense (including reasonable attorneys' fees)
actually incurred or suffered by TCP Indemnitees of every kind and nature to the extent caused by
or resulting from (i) any breach of a representation or warranty made by Client under this
Agreement; or (ii) a third -party claim made against a TCP Indemnitee arising from or related to
Client's failure to comply with any applicable domestic or foreign data protection laws or regulations.
Client shall have the right to control any defense provided pursuant to this Section 19.1, provided,
however, that Client shall not, without TCP's prior written consent, (A) enter into any settlement or
compromise or consent to the entry of any judgment that does not include the delivery by the
claimant or plaintiff to the applicable TCP Indemnitee of a written release from all liability in respect
of such third party claim, or (B) enter into any settlement or compromise with respect to any third
party claim that may adversely affect the applicable TCP Indemnitee other than as a result of money
damages or other monetary payments that are indemnified hereunder.
19.2 TCP will indemnify, defend and hold harmless Client and its Affiliates (the "Client
Indemnitees") from and against any lawsuit, liability, loss, cost or expense actually incurred or
suffered by a Client Indemnitee of every kind and nature to the extent caused by or resulting from
2019.12 WEIL_D.Mclntyre 9
Agreement No. 5830
a third -party claim made against a Client Indemnitee that the TCP Technology infringes on any
U.S. intellectual property right of a third party; provided, however, that TCP is notified in writing of
such claim promptly after such claim is made upon Client. TCP shall have the right to control any
defense provided pursuant to this Section 19.2. In no event shall Client settle any such claim
without TCP's prior written approval. If such a claim is made or if the TCP Technology, in TCP's
opinion, is likely to become subject to such a claim, TCP may, at its option and expense, either (i)
procure the right to continue using the TCP Technology or portion thereof, or (ii) replace or modify
the TCP Technology or portion thereof so that it becomes non -infringing. If TCP determines that
neither alternative is reasonably practicable, TCP may terminate this Agreement with respect to
the portion of the TCP Technology infringing or alleged to infringe. TCP shall have no liability or
obligation under this Section 19.2 if the claim arises from (i) any alteration or modification to the
TCP Technology other than by TCP, (ii) any combination of the TCP Technology with other
programs or data not furnished by TCP, or (iii) any use of the TCP Technology prohibited by this
Agreement or otherwise outside the scope of use for which the TCP Technology is intended.
20. Liability Limitation. Except for claims arising out of Section 19.2 (TCP's Intellectual
Property Indemnity) and Section 5 (Confidential Information), in no event shall TCP's aggregate
liability, if any, including liability arising out of contract, negligence, strict liability in tort or warranty,
or otherwise, exceed the sum of amounts paid by Client to TCP during the six (6) months
immediately prior to the date of the claim.
21. Notices. Any notice or communication required or permitted to be given hereunder may
be delivered by hand, deposited with an overnight courier, sent by email (provided delivery is
confirmed), or U.S. Mail (registered or certified only), return receipt requested, to the address set
forth on the initial page hereof.
22. Assignment. This Agreement shall not be assigned by either Party without the prior
written consent of the other Party, which shall not be unreasonably withheld; provided, however,
that either Party may, without the prior consent of the other, assign all of its rights under this
Agreement to (i) such Party's parent company or a subsidiary of such Party, (ii) a purchaser of all
or substantially all of such Party's assets related to this Agreement, or (iii) a third party participating
in a merger, acquisition, sale of assets or other corporate reorganization in which such Party is
participating. This Agreement shall bind and inure to the benefit of the Parties and their respective
successors and permitted assigns.
23. Continuing Obligations. Those clauses the survival of which is necessary for the
interpretation or enforcement of this Agreement shall continue in full force and effect in accordance
with their terms notwithstanding the expiration or termination hereof, such clauses to include the
following: (i) any and all warranty disclaimers, limitations on or limitations of liability and indemnities
granted by either Party herein; (ii) any terms relating to the ownership or protection of intellectual
property rights or Confidential Information of either Party, or any remedy for breach thereof; and
(iii) the payment of taxes, duties, or any money to either Party hereunder.
24. Marketing. During the Term hereof, Client agrees that TCP may publicly refer to Client,
orally and in writing, as a customer of TCP. Any other reference to Client by TCP requires the
written consent of Client.
25. Force Majeure. Except for the obligation to make payments, neither Party will be liable
for any failure or delay in its performance under this Agreement due to any cause beyond its
reasonable control, including acts of war, terrorism, acts of God, epidemic, earthquake, flood,
embargo, riot, sabotage, labor shortage or dispute, governmental act or complete or partial failure
of the Internet (not resulting from the actions or inactions of TCP), provided that the delayed Party:
(i) gives the other Party prompt notice of such cause, and (ii) uses its reasonable commercial efforts
to promptly correct such failure or delay in performance.
2019.12_W ElL_D.McIntyre 10
Agreement No. 5830
a.
1142
.- -,
LLF-8T PYT-F-U VT AY
aIM MI vl�
MISNOMER=
r, a M 5. w. 4 i A..
114T,Hk'3.,%E-GT4ON4-7-rint�ention,aliv, Removed
AGAINS TS E G-T�H-E,-R- A _..A.-1 €SENTAAT'IV- .. "l -i ASS"' '
...1.
I� wAt Rr T lM
L-A - V CZ -E —W° TA--� n
fes- TA-T1E—A ...A A*4ST--T-l-E- t E-1—T1�'�AR-T4� �AGRE-E -T- - A: 4l�
PRE- —IRA �--4T4TL-E.0 T' ' RECn,V Ate" EY9'' FEES
�A G _. W WG-�T CT
W4- Intll�i 0"'TP
PAR " TES AS AE CLASS
-t tt W t IGt E
SENTATIVE ,,N��.tntentionatly removed
29. Applicable Law; Jurisdiction; Limitations Period. This Agreement shall be construed
under the laws of the State of T4xaBCalifornia, without regard to its principles of conflicts of law.
To the extent permitted by law, no action, regardless of form, arising out of this Agreement may be
brought by either Party more than one (1) year after the cause of action has arisen.
30. Counterparts; Facsimile Signatures. This Agreement may be executed in multiple
counterparts, each of which, when executed and delivered, shall be deemed an original, but all of
which shall constitute one and the same instrument. Any signature page of any such counterpart,
or any email transmission thereof, may be attached or appended to any other counterpart to
complete a fully executed counterpart of this Agreement, and any email transmission of any
signature of a Party shall be deemed an original and shall bind such Party.
31. Miscellaneous. This Agreement constitutes the entire understanding of the Parties with
respect to the subject matter of this Agreement and merges all prior communications,
understandings, and agreements. This Agreement may be modified only by a written agreement
signed by the Parties. In the case of any conflict between this Agreement and the Global Data
Privacy Policy, the Global Data Privacy Policy shall control. The failure of either Party to enforce
at any time any of the provisions hereof shall not be a waiver of such provision, or any other
provision, or of the right of such Party thereafter to enforce any provision hereof. If any provision
of this Agreement is declared invalid or unenforceable, such provision shall be deemed modified to
the extent necessary and possible to render it valid and enforceable. In any event, the
unenforceability or invalidity of any provision shall not affect any other provision of this Agreement,
2019.12 WEIL_D.Mclntyre 11
Agreement No. 5830
and this Agreement shall continue in full force and effect, and be construed and enforced, as if such
provision had not been included, or had been modified as above provided, as the case may be.
[Signature Page Follows]
2019.12_W E I L_D. Mc I ntyre 12
Accepted by:
Client
By: ,
Name: _Lt&�
Title:culr
ME T:
cil"
C, of El 8�gu-hdo
F N F"Mr:
for
0 1 TY ATTO R W EY
Agreement No. 5830
TImeClock Plus, LLC
By:
Name: Derek L McIntyre
Title: coo
[SIGNATURE PAGE TO ONDEMAND LICENSE AGREEMENT]
Agreement No. 5830
Addendum
Insurance Reauirements
Ai'x)aIONALTER MIS FOR T1 NI F'CLOC7 K PLUS AGIZEEMEN'r:
32. INSURANCE.
32.1 Before commencing uerformance under this Acreement. and at all other times this.
Aa!reement is effective, Time lock P,lus will orocure and maintain the foHowino Woes of insurance,
with coveraae limits, comolvina, at a minimum, with the ll,imits set forth below:
Tvne of Insurance Limits
(",onimercial general liability: $2.000,000
Technolovv Errors $1.000,000
and Omissions Liability
Cvber Liability $1,000,000
Privaev Liabilitv $1.000,000
Workers comnensation Statutory reauirement
w^ ^w wim . . . . . . . . . . .
Such insurance will be on an "occurrencenot a "claims made." basis and will not be cancelable
or subject to reduction excent uoon thirtv (301 days i)rlor written notice to CO.
NUNN
JMJ I[I"tWL011 All E[4j*!Mj1j6j 111#0 11[41 slag rw"Is
Der occurrence.
into City's s stems in the amount set forth above Der occurrence.
32.5 Privacv Liability Insurance to cover all security breach and notification cost
resultina, in actuai or susoected loss of personal information or anv other records considered
confidential for the Qtv's data located on service oroviders servers or on a cloud comqq!l[n�l
orovider's systern in the amount set forth above Der occurrence.
2019.12WEI L—D. McIntyre 14
Agreement No. 5830
32.6 Each such liability Dolicv shall name the City of El Sequndio as an Additional
Insured for such (lability of the City, and each such, first-oartv shall name the City as a Loss Payee.
TimeClock Plus will furnish to: City duIv authenticated Certificates of Insurance evidencing
maintenance of the insurance reauired under this Acireement and such other evidence of insurance
or conies of policies as may be reasonably reouired by ON from time to time. Insurance must be.
olaced with insurers with a current A.M. Best Company Rating i eauivalent to at least a Ratinq of
"ANIL"
323 Should TimeClock Plus. for any reason, fail to obtain and maintain the Insurance
reauired by this Aareement. Citv may obtain such coveraae at TimeClock Plus's exoense and
deduct the cost of such Insurance from oavments due to TimeClock Plus under this Aareement or
terminate.
2019.12W El L—D. McIntyre 15
TimeClock Plus, LLC
1 Time CUock Drive San Arngq�e1o, TX 76904
325 223-9500 8d0 74'9-84;3
sales@timeclockplus.com
CUSTOMER
City of El Segundo
Sally Rodriguez (310) 524-2355
350 Main St
EI Segundo, CA 90245-3813
ReeEntry
DDIMARTINO I ZHOAG I UPS Ground
I Quote aqI a 2 t 9 =Uto Date
1 484957 12/0,9/2019
Method of Shipment I PurchaseMethod of Pavment
Order Net30
Stock No, Ordered Description I Unit Cost
Annual Employee Licensing: ($6,000.00)
1025-12311 200 TimeClock Plus Professional Annual Clockable Employee License
L Cyber 2019 Pricing ($36 Starting Year 2)
Advanced Scheduler ($4,800.00)
1025-9013 200 Advanced Scheduler Annual Employee Licenses
L Cyber 2019 Pricing ($28.80 Starting Year 3)
Activation Package
1025-1130 1 TimeClock Plus Professional Initial Activation
-Eden (Export Module)
--Autolmport Module (Versions 5/6/7)
- Benefits Status Monitor
- Employee Access Builder (formerly CBEAB)
MobileClock for Android and iOS (Unlimited Devices)
-Job Costing Module
- LDAP Authentication Module (6.0 and 7 0)
-Shift Differential
Cyber 2019 Pricing
HID Proximity TouchScreen Ethernet Card Swipe Time Clock(s) ($15,633.00)
244-200 9 BIO RDT Touch 400
L Cyber 2019 Pricing
Annual Hardware Maintenance and Support
1099-250 1 Hardware Maintenance (Expedited Depot Repair) (11/22/2019-11/21/2020)
L Cyber 2019 Pricing
Professional Services - Remote Implementation and Training ($5,000.00)
800-814 40 Dedicated Support Services (Per hour)
L Cyber 2019 Pricing
7,362.00
2,31600
(579.00)
3,335.04
(3,335.04)
22500
(100.00)
Valid for 11 days. Expires 12/20/2019.
Product Total:
Discount:
S u btota I:
S&H:
Total:
Total
12,0W00
(6;000,00)
5,760.00
(960.00)
7,362.00
(7,362.00)
20,844.00
(5,211.00)
3,335.04
(3,33504)
9,000.00
(4,000 00)
58,301.04
(26,868.04)
31,433.00
101.14
31.534.14
Agreement No. 5830
T*ImeClock
/1° Plu
fir, r�� f �j ��1 /1, f,t�� r �J, r ,��f�ail �,, u, a better sense of timesm
a� 'a r n ec rya °° ° o M e i c egt, �r �,�o
TimeClock Plus v7
Agreement No. 5830
Implementation Project Plan
The following work packages are completed during an implementation of TimeClock Plus. Tasks within
each work package will be assigned an expected delivery date and resource responsible for completing
the task. Not all tasks may be necessary for every implementation and may be removed or altered as
necessary. Weeks listed are for example only as timelines can changed based on the preferred
approach.
WEEK 1
Initiation Phase —Service Strategy
1) Kick Off
Details: Kick off of the project is held to introduce the City of EI Segundo' Project Team and the
TCP Project Team. This call is used to discuss and understand the scope of work to be performed
and lay out expectations for communication and the overall project. The Kickoff Meeting should
include the major stakeholders for the project including but not limited to an HR representative,
Payroll personnel, IT Department representatives, or any other party familiar with the
organization's business rules.
Responsible Party: TCP Project Manager
TCP Parties: TCP Project Manager, Program Manager, Director of Professional Services
City of EI Segundo Parties: Project Lead, HR Mana efL Payroll Manager, IT Manager, Operations
Manager
Prerequisites: None
WEEK 2
Discovery Phase — Service Strategy & Design
1) Discovery & Requirements Gathering
Details: Requirements Gathering is performed by TCP Project Team through interviews with the
City of EI Segundo to better understand the business requirements and analyze the
configuration needs for TimeClock Plus. These requirements are documented and then signed
off on by the City of EI Segundo in order to move to the Planning Phase. Any custom
development or export requirements will be identified and development estimates provided.
Development will be scheduled during the Planning Phase. The Discovery Meeting should
include the same stakeholders from the Kickoff Meeting, though the scope of the data gathering
will be limited for IT personnel if a hosted solution is selected. The City of EI Segundo will be
responsible for gathering relevant documentation and files for Discovery.
Responsible Party: TCP Project Managr
TCP Parties: TCP Project Manager, Solutions Engineer, Implementation Specialist
City of EI Segundo Parties: Project Lead, HR Mana ear Payroll Manager, IT Manager, Operations
Manager
Prerequisites: Kick Off
Agreement No. 5830
2) Initiation & Discovery Phase Gate
Details: This Phase Gate meeting is held to make sure that the Requirements are verified and
accepted by the City of EI Segundo and that we are ready to move in to the Planning Phase. This
meeting includes your Project Sponsor and Project Leader and the Project Manager from
TimeClock Plus.
Responsible Party: TCP Project Manama
TCP Parties: TCP Project Manager
City of EI Segundo Parties: Project Lead, HR ManaggL Pa
yroli Manager„ qT Manager, Operations
Manager
Prerequisites: Dilscovery & Reouirements Gathering
WEEK 3
Planning Phase — Service Design
1) Project Plan Creation and Sign -off
Details: TCP Project Team and the City of EI Segundo Project Team will work together to build
the timeline and strategy for the remainder of the project. Included in this plan will be any
development items with projected time to delivery. After creating this plan will be verified and
accepted by the TCP Professional Services and The City of EI Segundo Project Team.
Responsible Party: TCP Project Manager
TCP Parties: TCP Project Manager, Implementation Specialist
City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager. IT Manager, Operations
Manager
Prerequisites: None
2) Communication Plan Creation and Sign -off
Details: TCP Project Team and the City of EI Segundo Project Team will work together to build a
Communication Plan that outlines the meetings, dates, and times required for completion of the
Delivery Phase. After creation this plan will be verified and accepted by the TCP Professional
Services Team and The City of EI Segundo Project Team.
Responsible Party: TCP Proiect Manager and the Citv El Segundo" Project Team
City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager, IT Manager, Operations
Manager
Prerequisites: None
3) Planning Phase Gate
Details: This Phase Gate meeting is held to make sure that the Project and Communication Plans
are verified and accepted by the City of EI Segundo and that we are ready to move in to the
Delivery Phase. This meeting will include your Project Sponsor and Project Leader and the
Project Manager and Implementation Specialist from TimeClock Plus.
Responsible Party: TCP Project Manager
TCP Parties: TCP Project Manager, Implementation Specialist
City of EI Segundo Parties: Project Lead, HR Manager, Pavrojl Manager, IT Manager, Operations
Manager
Agreement No. 5830
Prerequisites: Project Plan and Communication Plan Creation/Sign Off
WEEK 4-12
Delivery Phase — Service Design & Transition
1) Core Configurations
Details: The Delivery Phase is performed by the TCP Project Team and the City of EI Segundo
Project Team to complete the activities defined within the project plan. The Core Configurations
will revolve around Data Imports, Adaptor Setup, and Company Defaults. The meetings in these
phase are in line with the Communications Plan and cover all of the tasks outlined in the Project
Plan. This will be the longest phase as configurations are made and verified to meet the
established requirements and the organization's business rules. The City of EI Segundo is
responsible for verifying configurations meet their business rules.
Responsible Party: TCP Project Manager
TCP Parties: TCP Project Manager, Implementation Specialist
City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager, IT Manager, Operations
Manager
Prerequisites: Planning Phase Gate
1) Module Configurations
Details: The TCP Project Team and the City of EI Segundo Project Team will complete the
activities defined within the project plan. The Module Configurations will revolve around specific
modules purchased by the City of EI Segundo (i.e. Job Costing, Advanced Scheduler, CBEAB).
The City of EI Segundo is responsible for verifying configurations meet their business rules.
Responsible Party: TCP Project Manama
TCP Parties: TCP Project Manager. Implementation 'S ciahst
City EI of Segundo Parties: Project Lead, HR Mana eg r Payroll Manapaer, IT Manager, Operations
Manager
Prerequisites: Core Configurations
2) Advanced Configurations
Details: TCP Project Team and the City of EI Segundo Project Team will complete the activities
defined within the project plan. The Advanced Configurations will revolve around Clock
Configurations, Notifications, Global Rules, etc. The City of EI Segundo is responsible for
verifying configurations meet their business rules.
Responsible Party: TCP Project Manager
TCP Parties: TCP Project Mana eg E jmplementation Specialist
City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager, IT Manager, Operations
Manager
Prerequisites: Core/'Module Confjurations
3) Payroll Verification
Details: TCP Project Team and the City of EI Segundo Project Team test hour exports for
accuracy. This Step involves inputting test hours (via parallel Pilot Operations or manual entry),
Agreement No. 5830
and then verifying the export from TCP to Eden. The City of EI Segundo is responsible for
verifying exports meet their business needs.
Responsible Party: TCP Project Manager
TCP Parties: TCP Proiect Manager, Implementation Soecialist
City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager, IT Manage__r Op rations
Manager
Prerequisites: Core/Module/Advanced Configurations
4) Training
Details: The Implementation Specialist will provide requested Training sessions via remote
sessions or onsite visits. These trainings can include Admin, Manager, Payroll, or Employee
focuses. The City of EI Segundo is responsible for communicating training to their employees.
Responsible Party: TCP Project Manager
TCP Parties: TCP Project Manager, Implementation Specialist
City of EI Segundo Parties: Project Lead, HR Manager, Payroll Manager, IT Manager, Operations
Manager
Prerequisites: Core/Module/Advanced Configurations
`a) Go -Live (Pilau and Full Go Live)
Details: After configurations, the City of EI Segundo testing acceptance, Eden payroll
verification, and training are completed, we will hold a Go/No Go Meeting. If TCP and the City of
EI Segundo verify we are prepared to move forward, we will perform v7 cutover for live the City
of EI Segundo operations. The City of EI Segundo is responsible for communicating Pilot and Go -
Live dates to employees.
If rollout/phased implementation is preferred, we will adjust project plan and repeat above steps
as necessary
Responsible Party: TCP Proiect Manager
TCP Parties: TCP Prolect Mana er implementation S eco ialist
City of EI Segundo Parties: Project Lead, HR Manager,_ Payroll Manager, IT Manager, Operations
Manager
Prerequisites: Core/Module/Advanced Configurations, Pavroll "verification, and Training
6) Delivery Phase Gate
Details: This Phase Gate meeting is held to make sure that the all Delivery Action Items are
completed and accepted by the City of EI Segundo and that we are ready to move in to the
Transition Phase. This meeting will include your Project Sponsor and Project Leader, and the
Project Manager and Implementation Specialist from TimeClock Plus.
Responsible Party: TCP Proiect Manager
TCP Parties: TCP Proiect Manager, Implementation Specialist
City of EI Segundo Parties: Project Lead, HR Manager, Payroll Manager, IT Manager, Operations
Manager
Prerequisites: Go Live
Agreement No. 5830
WEEK 13-14
Transition Phase —Service Operations
1) Issues/Outstanding Items Wrap Up
Details: TCP Project Team and City of EI Segundo Project Team will meet to review any
outstanding issues or items that have been logged. During this time we will work on this log to
finalize any items or prepare to transition these over to TCP dedicated support team.
Responsible Party: TCP Project Manager
TCP Parties: TCP Project Manager, Implementation Specialjst
City of EI Segundo Parties: Project Lead, ISR Manager, Pavro�ll Manager, IT Manager, Operations
Manager
Prerequisites: None
2) Project Close/Transition Phase Gate Meeting
Details: This Phase Gate meeting is held to make sure that the all main implementation items
are completed and accepted by the City of EI Segundo and that we are prepared to finalize the
TCP Implementation and transition contacts over to Customer Support. This meeting will include
your Project Sponsor and Project Leader, and the Project Manager, Implementation Specialist,
and a Customer Support representative from TimeClock Plus.
Responsible Party: TCP Project Manager
TCP Parties: TCP Project Manager, Implementation Specialist
City of EI Segundo Parties: Project Lead, HR Manager, Pavroll Manager, IT Manager, Oo rations
Manager
Prerequisites: ISSLies/Outstanding Items Wrap Up
Typical Duration to Number of DSS
Task Place of Performance
Complete* Hours
Kick Off
Discovery & Requirements
Gathering
Project Plan and
Communication Plan Creation
and Sign off
Agreement No. 5830
Appendix 2 — Stakeholder Register
Customer Contacts Section:
TimeClock Plus Contacts Section:
TBD
TBD
TBD
TBD
Program
325.223.9500
Manager
Director of
Natalie Davis
Professional
Natalie. Davis (o)timecl'ockolus.com 325.223.9500
Services
Derek
Chief
McIntyre,
Operating
Der'ek.Mclntvr'e tirneclockolus.corn 325.223.9500
PMP
Officer
Dillon
Account
Di;lIon.D,imartino@timeclocki)Ius.com 1, 800.749.8463
Dimartino
Executive
Agreement No. 5830
Appendix 3 —Training Plan
Training Methodology:
As part of Service Transition TimeClock Plus Professional Services will evaluate the training requirements
specific to each department and work with the project team to develop a training plan that fulfills their
unique business needs.
The TimeClock Plus Trainer can utilize various methods as appropriate to deliver training. These
methods include onsite classroom instruction, onsite one-on-one instruction, web -based trainings,
shared webinars, pre-recorded videos, system manuals, and custom documentation if needed.
To reduce costs for City of EI Segundo and to maintain flexibility, TimeClock Plus Professional Services
uses a cascade model (train -the -trainer) for training, which involves educating smaller groups of
individuals who then provide training to others within the organization. This train -the -trainer approach
is particularly useful if a staggered training delivery process is needed due to trainees not being centrally
located or having conflicting availability. The TimeClock Plus Project Manager will discuss the
appropriate training process with the project team during project initiation and planning.
Appendix 4 - Project Change Request
Evaluated by
Decided by
Date Requested
Date Evaluated
Date Decided
Agreement No. 5830
"9glllll IIIIIIIIIIIIIIIIII ';IIIIIII I�IIIIII'IIIIIIIIIIIU11 °�II111IIP9191""'111111 pll� 111111 ILII' III'1911111111�1' '�III�I °;iipllllll�l I� 111111IIIIIUIII� VIII11111 �
Description
..._............... .........................
Justification
Cause
Priority
........................................
Evaluation - Completed by Approver/Approver Team
Scope
Schedule
Cost
Quality
Risk
-1.1 . _................................................................. _.
Project
management
Evaluator's priority
........
__._.__................................
___
Alternatives and
recommendation
Agreement No. 5830
Appendix 5 — Draft Work Breakdown Structure
Title: TimeClock Plus ImWementation
1.1 Review Business Case/Needs Analysis
1.1.1 Review needs analysis information per the Pro. Svcs. Implementation
Request/Request for Proposal
1.1.2 Schedule Project Kickoff Call
1.1.3 Create Features List
1.1.4 Create Technical Specifications per the Config. Form and Features List (use the
template)
1.1.5 Determine TCP Features
1.2 Create Project Charter (Conditional based on project type)
1.3 Kick -Off Meeting
1.3.1 Identify/Validate the Project Team and Stakeholders
1.3.2 Create a Contact List of all Project Team Members and Stakeholders
1.3.3 Schedule Kickoff call with City of EI Segundo, IS & Sales
1.3.4 Create & send Agenda to City of EI Segundo & TCP project team
1.4 Hold kick-off meeting
1.4.1 Review Configuration Questionnaire
1.4.2 Review Features List
1.4.3 Review Project Charter
1.4.4 Review Project Lifecycle Framework
1.4.5 Review the Deliverables to be completed for this project
1.5 Obtain Project Charter Sign -off
2.2 TCP Core Software Discovery meeting
2.2.1 Review Clock Hardware Configurations
2.2.2 Review Badge Parsing or Biometric Requirements for TCP
2.2.3 Review Employee Clock Interactions
2.2.4 Review TCP Manager Features
2.2.5 Review Missed Punch Handling
2.2.6 Review Break Rules/Needs
2.2.7 Leave Request Management
2.2.8 Review Schedule Needs
2.3 Eden Payroll Software Integration Discovery Meeting
2.3.1 Eden Payroll Software Requirements
2.3.2 Job Code/Position Needs for Eden Payroll Software
2.3.3 Cost Code Needs for Eden Payroll Software
2.3.4 Payroll Export Schedule
2.3.5 Other Technical Requirements
2.3.6 Integration of Time Collection Devices
2.3.7 Employee Workflow Discussion
2.4 Create and Send Requirements (Technical & Functional) for City of EI Segundo sign -off
(Required)
Agreement No. 5830
2.5 Obtain City of EI Segundo Sign -off of Requirements
3.1 Project Plan
3.1.1 Develop project budget and schedule
3.1.2 Schedule meeting to review Project Plan with City of EI Segundo and IS
3.1.3 Hold meeting to review Project Plan with City of EI Segundo and Implementation
Specialist
3.2 Create Supplemental Delivery Phase Documents:
3.2.1 Create Communication Plan
3.2.2 Begin updating Issue/Risk Log
3.2.3 Create Test Strategy for User Acceptance
3.2.4 Create Training Plan and Schedule
4.1 Schedule Meetings/email updates according to communication plan
4.2.2 Create Training Plan (Required)
4.2 TCP Software and module verification
4.3 TCP Manager Configuration
4.3.1 Install TCP Software
4.3.2 Walk Through of v7 with City of •• (for Users)
Milestone; Installation pf TCP Software & Initial„Trarnror�,.
Hardware
4.3.3.1 Provide Hardware documentation
4.3.3.2 Install Hardware
4.3.3.3 Configure Clocks/Mobile App settings
4.3.3.4 Test Clock Operations
NOW
4.3.4 Core Configurations
4.3.4.1 Verify Import Files with City of EI Segundo
4.3.4.2 Add/Import Job Codes and Cost Codes
4.3.4.3 Configure Advanced Job Code Settings
4.3.4.4 Add/Import Employees
4.3.4.5 Assign/Import Job Codes to Employees
4.3.4.6 Create & Assign Employee Roles
4.3.4.7 Create User Profiles
4.3.4.8 Create & Assign User Roles
4.3.4.9 Configure Company Default Settings
4.3.5 Advanced Configurations
4.3.5.1 Recurring Schedules (as required)
4.3.5.2 Request Templates
4.3.5.3 Clock Configurations
4.3.5.4 Holiday Calendar (as required)
likili
r ®r r •r • r • r • x
4.3.6 Module Configurations
Agreement No. 5830
4.3.6.2 Eden Payroll Module
4.3.6.4 Auto Import
4.3.6.7 Employee Access Builder
4.3.6.9 Mobile Clock Settings
t Is
4.3.7 Initial Payroll Validation
4.3.7.1 Insert Test Data with City of EI Segundo
4.3.7.2 Test Eden Payroll Module with City of EI Segundo
4.3.7.3 Conduct Validation Analysis with City of EI Segundo
4.4 Training
4.4.1 Admin
4.4.1.1 Review Admin Workflow
4.4.1.2 Schedule Admin Training
4.4.1.3 Train Admin Personnel (Onsite)
4.4.1.3 Train Admin Personnel (Remote)
4.4.2 Manager For Pilot Group
4.4.2.1 Review Manager Workflow
4.4.2.2 Schedule Manager Training
4.4.2.3 Train Managers (Remote)
4.4.2.3 Train Managers (Onsite)
.o . ..- . . . .-
4.4.3 Employees for Pilot Group
4.4.3.1 Review Employee Workflow
4.4.3.2 Schedule Employee Training
4.4.3.3 Employee Training (Remote)
4.4.3.3 Train the Trainer (Onsitei 11:,)
SA- . . . o
4.4.4 Payroll
4.4.4.1 Review Payroll Workflow
4.4.4.2 Schedule Payroll Training
4.4.4.3 Train Payroll Personnel (Onsite)
4.4.4.3 Train Payroll Personnel (Remote)
4.5 Pilot Go Live
4.5.1 Perform Clock Operations with Pilot Group
4.5.2 Review Payroll Reconciliation
4.5.2.1 Verify hours are exporting out of TCP
4.5.2.2 Verify hours are importing into Eden Payroll System
4.5.2.3 Signoff on Export Module Functionality
4.6 Go Live
Agreement No. 5830
4.6.1 Train Go Live/Roll Out Managers
4.6.2 Train Go Live/ Roll Out Employees
4.6.3 Complete Readiness Assessment
4.6.3.1 Develop Cut over Checklist
4.6.3.2 Review the Issues & Risks Log and Complete Any Outstanding Items
4.6.3.3 Go/No Go Signoff
4.6.4 Review Payroll Reconciliation
4.6.4.1 Verify hours are exporting out of TCP
4.6.4.2 Verify hours are importing into Eden Payroll System
4.6.5 Verify issues log is complete
'. .
4.7 Delivery phase gate meeting
4.7.1 Review the Delivery Phase collective retrospective sheet
4.7.2 Complete the Delivery Phase Gate Checklist
4.7.3 Create & Send Project Status Reports to City of EI Segundo and Project Team
5.1 Complete Project Review
5.1.1 Administer project completion survey
5.1.2 Close any outstanding issues and risks
5.1.3 Ensure that City of EI Segundo has TCP support information
5.4 Conduct Project Closing/Transition Meeting with new support team
5.4.1 Review the Transition Closure Phase collective retrospective sheet
5.4.2 Complete the Transition Closure Phase Gate Checklist
5.4.3 Create & send final status report
Agreement No. 5830
Source: https://www.timeclockplus.com/privacy
TimeClock Plus, LLC
Global Data Privacy Policy
Effective June 1, 2018
Last Updated September 3, 2019
Il lmea lc'('Jk J1 (. (" Vrna["es )f IlI'S ',r"oii
(Wfj"':l) thal pwocesges a vast aniount of Personal IIaw We pRxcss die pevonW
d;ata "M ';:)n [�'e[llaH c4 our C HeR arKi of wn busniess cwtacts. In
C) 11"d ("', r Itc' �' 11 �1e t I IIe IInV0.nIl :?!s' t 4 IX e Df d „:i N�i II..I111cIX t 11 111 !s aJI )i ��i e d t le [:� F" 11 s
k:'11- 1pV c)( 11 C eiI t elln I yee a'Jua 11
busmess conum chh, in addlkw rcp Pias injAemental pOcks for III wosOng
�I r.). %? u'a? D cl t I > 11 s P, 11 ll '/ '), c')II lutl c zre k' i II Ir tc, 11- 11 n IIII IX. Vv; E:^ II c�' II II E, IX,-. t' IIII �." E:1, , i 11 n cl c' t I I ":r 11 %/11 1 s e,
PIKOLKS AWHYlahon Wong to Whoduak rPersonaMatal, urA ycqn ilghis juY
C�11 11��) C)Ur f)11 C)CEISSk q yi��.)11, 1111- [�`eil sc)FaflI [)ata.
TimeClock Plus, LLC Privacy Policy for Business Contacts
e'>', " dull'. I q ,�'V/Ir'' ..�I ('..(YI I " V'..':° iI YIafh:111 "01
N n , I'll n 11 II 11 Y1dfio;II l %'\!] no "';'nsid , 11d. >r'Jkle Vill
IL
,JOes his i�)'o�k I, ;c� k
II,. 11 1111 11l,'I' ' l' "/(" ) V'
1-11 J!� "y e 11
D Ci to 11 11 t t C:d.
C1 11 u ie!' �'11 ��' �� �11 N �!" 11- 11 ( n I I"
F or IIIIA onto tK) no n I i ow TC P In of ect s d VE: 11 l ,-3N 1-1 If 1)1,1 E" S 11 ell !S, ea Se
°s c-�"" (:.a k: Rii e i C I "�P ii I,, a cy Po I w c "" f () 11 ( 111 11 t If ii �n 11) N o y s.
1. Types of Personal Data
F I P 11 P j_eU'.:jj -, (' I,) '��j I i ) yt 0 C: t (j
.unj-"1I-aCflce.S v'/1tJ) t(."� pelp"'
rey P A any wManahon that calln
Knonal Dawn
b e used to lderOJ61, cpcate w cornact you. ".',.;orne
K::\-,)Hecte(.:1 i:�)y rc'.
Agreement No. 5830
a. If you express an interest in obtaining additional information about our
services, request customer support, use our "Contact Us" or similar
features, sign up for an event or webinar, or download certain content, we
generally require you to provide us with your contact information, such as
your name, job title, company name, address, phone number, or email
address;
b. If you make purchases of our products or register for an event, we may
also require you to provide us with financial information and billing
information, such as billing name and address, credit card number, or bank
account information;
c. If you attend an event, we may, upon your consent, scan your attendee
badge which will provide us with your name, title and company name,
address, country, phone number and email address;
d. If you use our products we may ask you to provide a first name, last name,
username, and password;
e. If you use and interact with our website or products, we automatically
collect log files and other information about your device and your usage
of our website and products through cookies, web beacons or similar
technologies, such as IP -addresses or other identifiers, which may qualify
as Personal Data (view the "What device and usage data we process"
section below); and
f. If you visit our offices, you may be required to register as a visitor and to
provide your name, who you are visiting, company name, and time and
date of arrivals.
1.1 We may also collect information about you from other sources, including
third parties from whom we have purchased Personal Data, and combine this
information with Personal Data provided by you. This helps us to update, expand
and analyze our records, identify new customers, and create more tailored
advertising to provide services that may be of interest to you. In particular, we
collect the following data from third party sources:
g. Business Contact information, including mailing address, job title, email
address, phone number, 'intent data' which is web user behavior data, IP
addresses, social handles, LinkedIn URL and custom profiles from third
party data providers for the purposes of targeted advertising, delivering
relevant email content, event promotion, and profiling.
Personal Data also includes other information that may be associated with your
Personal Data.
Agreement No. 5830
2. How TCP Collects Personal Data
h. u;..W u,.VII II�u°II^a I II 1111,oll II II '„I va � u”I N
' all I'd NeV'
h::4' d' ^:,.a 'II oxo `,, td,u: ` " 11 11 d011 NII N u V II d u II pt 'Y'11)011 d D11 II 'YI I:, 0.. Y h d ° II zarid 4'"i, a„II II M.
CH u,,.,l11 II L,? II � v 1 � II""'V u I ,'u d Ih, n " �lV ” 11 11 v ' kd u: II II II III I e""".D II If ""V N r i � II `" !I IIN I N I Ieii o11 N "'.0 V Xila � v II YI u:'a II 'N II �
'.,"lu"Qd",v 11 v'r:uNU "LIVNn
v'..'u n d i II U "N m::111 b „" I" LN II N d u II " u:;,N V ° ' flY 6 e " , N oP) II 'll 111;.,1 , y U Il il:, II" D u v II VG N,,. N "III 'II;' Ilk. 111 N
IIN0l' I VI
IId I'u Iu,;y'A'
.:
3. How TCP uses Personal Data
TCP uses your Personal Data for the following Business Purposes:
a. Personal Data pertaining to Professionals with whom TCP has a business
relationship may be processed as needed:
1. To initiate, assess, develop, maintain, or expand a business
relationship, including negotiating, contracting, and fulfilling
obligations under contracts;
2. For due diligence regarding the Individual's qualifications and
eligibility for the relationship, including verifying the identity,
qualification, authority, and creditworthiness of the Professional and
obtaining publicly -available information from Third Parties (such as
publicly -available sanction lists from screening companies);
3. To send transactional communications (such as requests for
information, responses to requests for information, orders,
confirmations, training, and service updates);
4. For account management, accounting, finance, and dispute
resolution purposes (such as accounts receivable, accounts payable,
account reconciliation, cash management, or money movement)
and for consolidated management and reporting;
5. To assure quality control and to enforce company standards and
policies;
6. For risk management and mitigation, including for audit and
insurance functions, and as needed to license and protect
intellectual property and other assets;
Agreement No. 5830
7. For security management, including monitoring Individuals with
access to TCP's websites, applications, systems, or facilities,
investigation of threats, and as needed for any Data Security Breach
notification; and
8. To anonymize or de -identify the Personal Data.
b. Personal Data pertaining to Consumers and other Individuals with whom
TCP has a business relationship may be processed as needed:
1. To provide the information, product, or service requested by the
Individual, and as would be reasonably expected by the Individual
given the context in which the Personal Data were collected, and
the information provided in the applicable privacy statement given
to the Individual (such as for personalization, remembering
preferences, or respecting Individual rights);
2. For due diligence, including verifying the identity of the Individual,
as well as the eligibility of the Individual to receive information,
products, or services (such as verifying age, employment, or
account status);
3. To trackjob applicants for the purposes of recruiting, interviewing,
and onboarding;
4. To send transactional communications (such as requests for
information, responses to requests for information, orders,
confirmations, training materials, and service updates);
5. To manage the Individual's account, such as for customer service,
finance, and dispute resolution purposes;
6. For risk management and mitigation, including for audit and
insurance functions, and as needed to license and protect
intellectual property and other assets,
7. For security management, including monitoring Individuals with
access to TCP's websites, applications, systems, or facilities,
investigation of threats, and as needed for any Data Security Breach
notification; and
8. To anonymize or de -identify the Personal Data.
c. TCP may process Personal Data as needed (i) to protect the privacy and
security of the Personal Data it maintains, such as in connection with
advanced security initiatives and threat detection; (ii) for treasury
operations and money movement activities; (ii) for compliance functions,
including screening Individuals against sanction lists in connection with
anti -money laundering programs; (iv) for business structuring activities,
including mergers, acquisitions, and divestitures; and (v) business activities,
management reporting, and analysis.
Agreement No. 5830
d. TCP may process Personal Data to develop and improve TCP's products
and/or services, and for research, development, analytics, and business
intelligence.
e. TCP may process Personal Data for relationship management and
marketing. This purpose includes sending marketing and promotional
communications to Individuals who have not objected to receiving such
messages as may be appropriate given the nature of the relationship, such
as product and service marketing, investor communications, Client
communications (e.g., compliance alerts, product updates, and training
opportunities and invitations to TCP events), customer satisfaction surveys,
supplier communications (e.g., requests for proposals), corporate
communications, and TCP news.
f. TCP uses your Personal Data for Secondary Purposes such as:
1. Disaster recovery and business continuity, including transferring the
information to an Archive;
2. Internal audits or investigations;
3. Implementation or verification of business controls;
4. Statistical, historical, or scientific research;
5. Dispute resolution;
6. Legal or business counseling;
7. Compliance with laws and company policies; and
8. Insurance purposes.
g. TCP uses systems to store and process your Personal Data such as:
1. Customer Relationship Management System (CRM);
2. Applicant Tracking System (ATS);
3. Mass Marketing Email Tools;
4. Workforce Management Application (WFM);
5. Technical Support Ticketing System;
6. Project Management Tool;
7. Email and Email Archive Servers;
8. Phone Call Recording Application;
9. Public Forums (Online Communities and Social Media);
10. Instant Messaging Applications; and
11. Relational Databases.
4. Why and How Personal Data is Disclosed by TCP
TCP commits to not provide your Personal Data to Third Parties for their own
marketing purposes. We limit our sharing of your Personal Data to:
Agreement No. 5830
a. Our service providers, who are bound by law or contract to protect your
Personal Data and only use your Personal Data in accordance with our
instructions.
b. Our business partners, but only to the extent you have purchased product
or service from such partner, interacted with such partner, or otherwise
authorized the sharing. For example, if you are referred to TCP from a
business partner website, we may provide that partner with your contact
information and certain economic and financial information to validate the
referral.
c. Enforce our rights, protect our property, or protect the rights, property or
safety of others, or as needed to support external auditing, compliance
and corporate governance functions. We will also disclose Personal Data
when required to do so by law, such as in response to a subpoena,
including to law enforcement agencies and courts in the United States and
other countries where we operate.
„`,Cl 11 11'o a Illltl 11 rrv,�, 11 I u::, uu.l a ulloll u'uu,:lu.na'uu <:ullu Juun: °,;u u,u �Ihlll:u u:; uu. V
II"°�u L:,�II'lll:allll, u�q�::uun�lutlu�°''II:�Jpu Il:�;hu ��� �,u-uull!q�', �w��' utlnlu', Il Ju all:��llu1�II"Il r�:"Il�p uN: VIIu�oV: �.:��uuV:„alutl
11 U : `VI ° Cl IL ItI', II II "B II II” tl h 1 II lI n' I ::q g U u. )' 11 `Y VII @ !t Okr u,.a V I I N to U tl fl G 11 a,::u H Ye !^ II"^i::' III d 111;, V 'p a bit :'^ u. ',' ^ II' d. " IC II' I I .: C � J ' !-;J II
IP " Il 110y/ 111 a k'111 11 "U "1'1, g 11u: 111 tl
1
5. Cookies and Other Data Collection Technologies
�, O l l - 1r q: d:..'I' Ir U„V , u d fl - M i I: IJ 11
P:p,DIIVtlu.tl%I'J4111I 111'u � t 0 III111E",^IItl , V.Vv 11luU g.,Mu.LIIYhu,.. +,"ugll "'IIN° .0 Gk° u.,l,IiU'Ilq'
I .;" V, -d V � 1 J:''' ' Y ", II � V':." �,; fir' u " . � u a J.. ^ . �(.,P'V, ',VII II 1• , ". u. '➢ II Y ';"1' P, ,q II 4: '„,."e II' II 'II I Y U �. a;-,' U-
_ _ _ U: --:, s a I" ', s I ) �. c., at f Im"I"l. J ; ^ ° II t a^send : y_U..4 II o, 7.t.e-
d e'k,,` V c e k U..11 U "'V U a:'q U.V U od P it t f” ', '''d' C.N .VII- I.) B"(:T °~,/'.,„ g' U 011 U1.) St('N-P.
11fo:U"VU V"nr.:Gt.U'm if l 0ll' u"t6� ')gS 11 '1 ` � - �0e.s V���kln .,.. pU`V�,J;➢Iin 'r�Ubdj'(.)'N
.. �.... �.. ,�" � b rI...V b ::u U"t'r `u"`,,r" "'a _' U �.... ":�,, p ° "" °?::
r: uUU u:t uu'tlf uu'uu uti:aJ,:: aII, sU..aa:Ii71 a. -is ,,a u.0 "r �A:::Be1r71tofiica;�t.aoo� code a: I. II a-u(J�Woe^::a°s, \/vIhar'.II"n „tl
''k�1,1 rn� 1' !:)@'' "" ti! �.: V G UT o;: �wD•r;k a~;.. the q,:P a"U �;;;�,' �^i +dk U ') if.:;i "'P !i�U ')I"71 .:1' U- amD "q . C Pl'.,V K,' �`.':i �:"V U..0 -ll a8 °'vi d.:, 1�r I "•;
": a l l wmfl l li rii g us to y m,,V "w 11 --tl'e in iV cmU II ¢u' tII. V Ir rU ...q... I"Ile",V,' aso a
cu_u,,.;h:oiii,)I.:ed exq.ierueuuce r: and enabe us to detect cU: i U:Din U<:u1ruds of fraul..ue„V. rhe data
re,, -..)d fic'.I "uil these, ca:`k61,,:i1es li7iay be Iluu...tlk.ed to lia::lentlify"in g (P111) airld nc)r'tl-
I:� 1r„w,u,'u"tlatlUll` iu:➢eritiii',.�,liriu-q f1rtlnu-II ILII) linf�v�o-tl'�"uv�.giiori. full Iina: ny � asses, �:�u..0 car)u,u-uairitl,-��ie
coM,,,iteI1,,.)req�eir.,urlce s, a intl,:V ojpt clt..ut of and o.qI &- (Ja:::atau coUUec.t1(''1I'1
t e c SI 11 "o u� v g a
_o ' used lz°- the settlings c) "tl /i.:'zJ"". AH.Jse-"a
I"e
Agreement No. 5830
a. Providing you tailored content and advertisements (see below for more
information);
b. Enabling social media features;
c. Safeguarding against spam and malware;
d. Analyzing trends, traffic, and user behavior;
e. Administering the website;
f. Gathering demographic information about our user base as a whole;
g. Tracking web and advertising analytics throughout the Website and its
affiliate websites;
h. Remembering your preferences and voluntarily -submitted information
(e.g. custom video playlists, preferences, job title, story ratings,
membership status);
i. Performing location -related functionalities and analytics;
j. Participating in market research (e.g., website ratings); and
k. Educating ourselves about how we can continue to improve the Website
and its various elements.
I. Essential Cookies. Certain cookies are used for specific purposes that are
essential to your secure use and navigation of the website. Without them,
TCP may not be able to provide core website functions and features to
you, and the website would not operate as well as you or TCP would like.
These cookies collect and use information such as your server preferences,
single -session data and corresponding identifier, web beacons and log
files (detailed below), and other credential -related information. For EU
individuals, essential cookies also help inform TCP whether you require, or
have already been served, an affirmative consent request in connection
with the GDPR. Essential cookies include analytics cookies, which provide
us data that allows TCP to better understand its users and improve the
Website based on what we have learned from that data.
m. Preference Cookies. Other cookies are used to collect and process
information about your preferences and similar choices in connection with
the website in order to optimize your browsing. Preference cookies include
social media cookies, which collect information about your social media
Agreement No. 5830
usage and other data you may have provided in connection with such
usage (if you access the website through a social media website or mobile
application, you may have social media cookies). If you wish to modify or
change your social media cookies, please visit and review the settings on
your applicable social media account(s).
n. Advertising Cookies. To help support the website and further tailor your
experience, TCP and its advertising partners (and/or their third party
analytics providers) also use cookies on the website to personalize the
content and advertisements you may be shown. These Third Party
advertising companies place advertisements on our website and other
websites, and perform tracking and reporting functions for our website
and other websites. These Third Party advertising companies may place
cookies on your computer when you visit our website or other websites so
they can display targeted advertisements to you. These Third Party
advertising companies do not collect Personal Data in this process, and we
do not give Personal Data to them as part of this process. This Privacy
Policy does not cover the collection methods or use of the information
collected by these vendors. For more information about Third Party
advertising, please visit the Network Advertising Initiative (NAI)
at www.networkadvertising.org. You may opt out of being targeted by
many Third Party advertising companies by visiting
http://bit.ly/2Ig9IgT or http://preferences.truste.com/truste/
u W 'u
l :;,0 : I ',ulf II II II�":'SII"ILII II URII+:u 11 1, II"11
II qIle11 V';;)up
u u u III 11 " u :b p.:I II J l : M Il. http://bit.ly/2jXZ13Y.
',I !.,' 1 11111 V u.,� if .,^ l 4 ^ '11 1 I9 V ':: r. l , l3s II L Ir" ',u V II r, U J u l : u " 'a °, r
yA „U1111'II 1( 10A11 1rVr°ry..'L+ II I"", ,,a ti11u Il 1lll,vu' IIN4,.'V�: a uu ` '.V .I� a",..0 QN rJ" "II
Ilil'III' R u. °II 'V'"!:PIIIIh ULe, i:0U1:Ilw IGlll,'YII'') �Vo'. l'tl' VGp,.11llu;° ull'71;'N 'I Iluh,w
Nv:u' Id �IINn'r„Il,u Nq D "'6 P, II N M:' "i`'' „UV„VII- Cl''L "'II II u;;'II'Y!. u...'".
111G7101(filhv f.Iln,"il11- I!bil v\.r` ell' tiol IIBII`sll::ll a 'Vl/:uITi111I11g11II)t011a?HA.(:°I)IIIlun 11 rs rc:.:q::�q:rfl Ilo:, 11:)
!`l)1
CRNIIic llii'Iial,.�,'1
1111,11 0LA11 t-I1I,:'all ,.; t.INal: ?;11cu"/V 11...A'v t clet'E'IInii1111In l uIV'h( the"uuc'u 1.3
,: u:: I11cdU u. ua a alja , l' .uu".p� 011 ,.1111* k' Z)11) q:.'ll'11"II. N , '11::. _r11,4tags VII"ill:;l
Vn:Ml.r l,!u„'LNa,q. ll11 i glA:'110u::"II":u�4,' U:"M
111 c) c) tIu.::t I L..0 a L:;Yu.:p ,b Ak:-,aA1 4,.A's ttl.;u r
u; v;u 11 'I II 'U U 0...A 111111 u & � 11 o ,,,, e a"", U II II
F ' l
Agreement No. 5830
11 11 N ii ! ti tl'„/' ( I �I Ie 1! 11 11 !1111-11 ll 11dJ'„1ill 11 Vvi�' I( c [ V�!11 11u �!, (.."u^ , tl E;!: ;111 k I c) N i Ve ii- II III )[, II I "11 'V '""
b�i k? 11p VVI tl 110 11 11-e 1111! R 01 a o11'
)' e I ➢
11',i Li I sIX: 11'11 Ie' V It,
t III e 11111 11 111 11 ai 11 vv 111111 t:lk Lv Lu I E�:' 11
") h C)l 4J V ",/1.6e b S Ae 6 0 2 IS 110 1 1 U; re n Hy Ih a v e a rn e c h a In i w n N) i e c o c” A w t h I?
VXIC� rs Do Not Jim k KinaL, we ck"alfer h WAIT Ws A& es 1":"
111`111'.M'�!Jge Hot a'ilie in ll'le lNew I ous !S i ',:�) 11 IS EF. W
F'all" r,%,: :G ^:� eii I.Ing 1.)aN hli�:II' S tO use reaqx'Ia[',kr effoll t's ticli
webske SAws whose lwmmsa4a've Not Dac[, setrillli(]
that su�iIIIIIIE:!IINNL)I,NII1111�";Y clo inIX')L I]Ns u:�a�pabOih,, t1c,6dN )y, 1c, le.Miirii
sigillak �IindD�:�, ",Iic)l
vdl!so httP://www.allaboutdnt.org/.
6. Mobile Applications
H!! d'!Oe li��t I", �u It 1: �, � � � I 11:::� S �> �� �!�' � ) E 1:1l t �' I,: � �� "� 11� � � � � iii, I 1. , 11 � 11 � '�
cm J11 �Iii ui� 1� J11 � 6fld 11't�( (11'v'e 11'111� A�C'11 Is Oil: %')UIJ1- 11 m de"'�I' -I
I 1(id i C i, ';'1kD! � pi� HIF 11 �11�e ap�i tei] li�:u
I:':111-11 u N I:d III] III -'w II II " b 11.:, r' N' ' ` a „J11 y;
7. Communication Preferences
c:^ca' n 11 h I°l'"J1 ';�Il 1 111111 '1
"uiisJJflLii!.IXJ11 6e" I kIie II .:IX IX " q 1,1,11 'Inl NY i
"ou 'D11 q'Is all II
Nease We that 4 YOU are cuuenHy receNing serv�ces frorn rCP and you have
dedded to opoout of priorrodoW & iiafls, this wH1 not Alpact die rnessages we
send to you for Ipurposes of deiivering such services.
If you have qLWSbons about your chokes or Uvou ineed assistance wi�,h cq-&ng
QLA, p1ease contact us via enialW to Pdvacy(g"bTiiiiiie'C8or.,,.k�Illuiconi You may So
make us at Che address in the Il.....low to Cointact Us section OWL If YOU send us a
Agreement No. 5830
�k
JLwout WE'
,
ij
t E:�ip,/ 1? 11 �"k �,v J) C t�:: n, III It, 'p 101 )11 1!11 hi,V! I'll Y1 d
8. Review, Correction, Erasure, and Other Individual Rights
S I(". :r 11 � 11, � 11 � 11 -1 : .. , , . -
il�0 levIlk"nN, 11,�Irld illik""]E,1�'C� VIDIIJr
�
Pj P S A" Ul 11
cil e III I ti' Nidl,.IiaII I. ]l1.jt1�, :,ffu- l")N 11
10 11
`
Y aIj.q. cflb
lr�,-,,.-.4 VVV11-10(D tl�
U K" vc1ci l e,. fll,le [-1i'D)/\/ t1i') 1: t t
-'1 11 V 11 L 3 11111 "1
3 11 "1 11 U21 1 11
II 1111i 1 S �
ci IJ
C, 11 -r E? 11 1 , �D 11 cl e I ll 11 E.'r l, ql:l� S' Si' e l I P F,),
1 A 1 3 lr""'� li t
1 J 11 wl li I I u""� �a C 11 t?
1[ 11 UV.
S": 11 1 11' q ', 111
t� z" I L�. t 11 e q vv f3 l e ii I. E' C1 1111 1 t
1111 "!1 clb r 11 Z 11 1111 C UIl Cl '11 11,11 e a L] I
I a 1111 21111 �j 1 11 (�jj 1 C, 13 < t? "i/ V I ii t., 11 tz IF. I I 1, 11 k e
[:Ijlti S 111 e is ',,I -,I,
L1 11
II
II
11 ,,1 C� ill 111r,"I
C 11 1, (-j f 111 e(] LA 11 I -E.", C1 11' 1 C t 11 11 S L V11 V 11 11
t t I
E 0 E' �5i!S 1) (D 11 111
110 I'l j1yrj,,'.1, 111111�":�
1111 '
'E" t I 11111 1"i 11 t:v 11 "11 (Di a. a 111r,w`"0. 111, 1,
ii ii 'i, ('r V NII.: r,/1!a s Cl 9.. II 111
11 o t I 111' 0 11 UJ tiIF(_7i 11" t irl "i Il e 0 1- II 111 )1 J.") 11 1::) I
11 -N 1, "i t n:" a: kI a,.�, ii -ii ii e �:"� 1 �I c, l ii � 11 11 (,- �, d
1. ".1, 11111 S�
1 C
U, I IJ t
V�'r l,: I �jj jj-,
I IF01. 13 Irl 1)) C t
S J II13
I C' e "i I r o 11111 11 3 1
-.i 0.lj�",�'t III. it F!Eu2u1111!,;U W,
C D 11 TO H l"t �11
, 1 11 E?!", t? �, 11 � I -I, : I I,' �.), I� (r) 111 S 11 (,? 11 11 <
l a k
IF 11 l i �.-i I %M I i I ii a rt- q S t 11 e C ii l� at (zl t I I b e I c E 11 111111 C
<; II 11V,�
C., 11 fil I e 11 11 e ii 3U--
11 N VV I 111 I['11 cz:w si�,l D L11 11 a 111 D t 11 i" I U a "Y 11) 11 S E', 11 �-2 cli
9. Information Security
Agreement No. 5830
0 d 11 OlflllhIJ111c, I' ni:",1111 lk:Diii 111111 a„^r. I!III I d Ae flhioii �i bii iiiiu A, lit
S , E 1 11 1�
t < II ro t I t i, 11-!, e 11, 111
e 11 0II InII'11 11 e S, 11 11r1I111,Y! J 11 1),.) S"A'h'.) 11 Cvvkh
'i e E� E� . I VV 11 11 1 S I 11- 0 i.,� S v,!I 11 1,1 111 1 ) S C J 11 'i
PIIS %"111 In EM 4. ns,D1161 S II"aq:°IIVace e 11 1 tI, I) 1 u" J 1� ZN 11
Vv 01
HFOVVS,e� %,�/in(J') hen i1 1""n:':" t 1,111 ii I I d ""1111"". 1 S to 11 5 fu E:,
Y 111 11-3 C,Dririiot a1I DaL..1 ;'VIlrld 1111,11 u:V!Sjj
JC(t C' coillqp
10. Data Retention
':'1i1"11r, 11 1 In 11 111 1111 irll 1[ 11 v: r I� Ile N
t
e 11 12 '1, 11 IS II -E, tt? 1 11 1 S� e fill ii- .1
jj
ii eirdion to e n JP u 11
'S 111 k�, E, L3
Hir, ii ii r`: e in
jj-u,, 11 1
)11C),J 11 ie^ 11:1) 11 I.S 1111 j�,:uJjjj 1NJ,p, 111
)s.
Er, t:C
� . 11 t 11 [ �11 :11 11 1� El, 11 11Va 1 d:111d 611V1111
),D O
11. Prohibition of International Data Transfers
11 V
11 Ela (111,
ro
-E
E�,'( ),J ),13 11
t I- 1El I i(D 11 E° S
12. Privacy Statements of Third Parties
Tl,i'is [)x-Ivacy 1::)ol'l(::y curly addresses the use and disclosure of il1onriiat'l n1 by TO::)
Ou, Suppl'jers, BUSliness Pall-finei's, �irid other I Party websites that II be
Agreement No. 5830
ad CI( : :::, 1111 (
11�� o� 1111- TimeClockPlus.com,,l,,'ii::::,����l�l:��I ld:�
-a el, �,, lo
e e (:5 � Na !�� 111 "III
ic[71�11111111kklizeI N.,,Jr 111,1111111V
ol :oni
hi)JI'J,jji,yl y, ^ 6 'C`1110III
',:III N" "tl„ II C)11 116NII lik"11-11 I Nzflli u; 11 N (All Hl 111!,111, Ei
E'1,1,VIIfIpk,!,::, ud 1111 Nai J11111011 k0t:�
II INUeiidcie 1r,J iiE,!, N::"Hers, Jio�J �J�iers '041
f)1111(fl Nff� 011(:,11n11 v`'Ohi �Ov,u1111L)1011101 01111
C 11 ul 11- 11 a.. l If ril o t 11 o II N.
13. Forums, Product Reviews and Other Public Areas
I N" II cdheii 311,�?:I,
VVhere,/ciu ril,;,/ ItoIHIIVW11dWM:,
III jjd.:',
11 "1Ia' 111:
e 11
hic"Illn �� hill
14. Job Applicants
11 loNu::`I'NN 111,
!"S
irN �fve I ii e I r,,
1, 11
11 V'V 11 110y,
d t 1.�
13
11, n o 1111 11 111 11
ANS`) Bulla.kiifNaulu" u
Agreement No. 5830
'%A/c � , )11 '� k �( k , �] N 11 N 111111 'L!l N fl 1111 11 : 'Jj u Ici N] I111'd:::l e 11111, 1 Pst �)VI[)11 I a eficir
wHeo ind 11 aV oIl I Xi-, 11 "" VII '1 Cd Nlzd;y TEIC t 11110, DI iaN I H Ile HP, Fi::I: II"I1 lH n (::'110
plroioi,j' d,::nJj VII jj'iflljjiild V II vklivd'::�: i1Ik:'1e'!L
11 y d :1, 1, , I Y 11 YI uI 111 1 11 N E, ( w::::" ': 1, S''u 11 I 1111 1 ( a NII 111 , 11, e VS 1111, �SIVH 11 11 .'3 11 111! :0 1!�� I( ^,l
"IV li.�
Vu II
V 11 ij
('I I ii- in ii \/V e 11 11 11 ci 11 o 11 b H 11
0 N II N II (.: g 111 11 N x;,' a 1:;011 1111 N flil 11 11 111: 11 If, 11 1111
F 1111 q : w I v v I'll 11, 11111 t 1. In rIf1111d^'u„x11ii-e liI V,.rlll11 lii ii ii- t 11 11 V ii ii a t::! 1111 t
(' N I y14.'^ � N ' 11 � 11 Q 'w� N 0 11 !1 I Y 11” o1 E:�': !':l.
lie �1) N i:::, � )"r, Q Q 111' NU 11 � 11 'l '� 11 , I , , V/I " V x , 11 - 11 - E" II„, l, 11 1 .
)I )INN It P 1111 C 1) I'TV 11 LID t
tr'II eqlju1::'Jr i' Ind
aldcHJ-"u vqq'V L'� h F1',” IF [11 11 In
011 tk"IinI111M]
i?
:111111
t iI
II If NZl jj-'', I, I j V E, 1111
J,
jj-p
15. Withdraw of Consent
J1.911 II
11 11, V
"i in 117111
loll Ily 11 Eua
S N.rs Dt I LpL ri
Z
I LAS 01 t� I II pk?'�.Ise 'V 111 1
E:l 3
ii e ii 11 11 'll
16. Your California Privacy Rights: Notice to California Customers
111J E, a rda 1141-0�'" CII :":J��
J
I C 0 11") IS 11 F) C I L11 Cl &S'
,A [)'cliii DizA,3, arill fiqr
t G.
J:') C) 11 11 A"A'NJ
Agreement No. 5830
17. Individuals Located in the European Economic Area (EU Data Subjects)
1111 i dh h r I:,I 0 Ih. I „ o II I '' a II II 3, YOUu o "1 I V u..v u' the e rIIg' IN. 'h" date I d'e I u uI a III Ih il„ „'Iro', ab v Q. II II as s 1h"" II II II i!; I q t 4,' he '" II n N II h u P d q;.:N II
GV,.gfl V:a fid: -''I p,Ilo:ullb II II"II.;«";Id'1'� °01, ..h p cl .
18. Children
k:;,l IIh:' ue V girt' Il llh'::,ull gMlluuh�.:N � III'. II IIIIoN II „gull or,,,191I!hlia:Vlll^ �IXII-IIu hh�:,y'u
I V u N U -h` iiI , �wl,h:u I'.; o II 'u ".,,J Ili h l ;b ld !" II II N u � f' ..ado a ". li V N u � 11... ,6 k V .... N III h h '6 'f:: l 'V V �
Po,
q, 11 lh. If" ,d.i-q^ II dV..,��IlIly;u"sinci IXll, l u.h-(y qN :
,."
"' IIub114,.,;id w,'r'.''U„Uii- y,(,,yhr,,I"IIu., l':)Ia + a: IX oh:uyII.u""III`llr� ally:;;"
h�dwll"PNh:a'�.IId.lYV IIII'V VhhN" "I "11'11N,a Ir: V,,,,,,II s, d"cIIIy"Ila :"N U, hi e, d,h"Uu \,/l,i'".:" �°VIII �NII!i u;'
I-I,.,J)ihyp I;V,IXIIIXu fll-f:yllhY I'D 11plI ::ii¢,,,"111"Y,r.
19. Changes to this Privacy Policy
B'i:.11rn Me tu:ryry:u 1""iVUVVIe, vs may UuII:fIdn,Vte this YY I-'�I5v r f l.-"If;Illln. 'r' W n4 IIIVwu�IN::V'q � Illlu;"�Ju,::b,lldt,,,,_'^II"h,
"y i V.. ° � ' v °:" h e JB:,^ our vv4' V q II . y a. ^ I N. 4,:1u I d ,° N. �u q,.) 0 II I . 4,:h I I f �� N, y ll ,. N N ";,::" I h B m " ":,I, t
hII"N-1Ie. � hll",,JII:I:?i "ry II lu".',u IJIN.)'...� hNay IIli:wC..u" Iq,'uu c aull su'ua::, t he dxNlle 4....Ilhh 1rWP 1111,aad /
20. How to Contact Us
(N,.)' II ) (II Uuc, if 'VgnU.JI have a..;.MoIan q,,w r oI"h"hP,.n.P l".':,i,
:R Privacy@TimeClockPlus.com. a Ir'h.0 Y Y h , reach h u u u "JrO mad pull a a idh II, , U /eIIN.:m
u.::Il V II send VII , d:a I o.. Ir V p',`;'` II- a o l b ase ., I' n IY 8:.:" I( 4? y q .'I' Il..11 II II "h ::A II I l Ua, 'D n NI N , &1 II .h..h L! II U u a:J uJ II 'f., a II YI p:::w
ull'hfr'I,:."IIU-II'h11a;11^,;:n about your qlluM:;➢IY'V, q; v'pU-VWII'1111tlG11'V'Ir., or N.N::;^Ulf pl VMllllaL. Wers can
AM: LeQl
l�...p, ..II .°( 76".—,)0-4; N...NS,Y"'"".
Agreement No. 5830
21. How to Lodge a Complaint
DPO@TimeClockPlus.com
� Z
[),)uzi su[)Ierc�ts ' S Ele "be('JJOIII Entilde(]Pri acy Poh'ry fq,f
- - " ....... . — ------
Hiturnairi ResqiWuiirices Ek Client Data Proiciessiling foir EUI Datia Subijggq.
Riefeireinices:
;a) https://ico.org.uk/for-organisations/guide-to-the-generaI-data-protection-
reg u lation-gd pr/i nd ivid ua I -rig hts/rig ht-to-erasu re/
TimeClock Plus, LLC Privacy Policy for Business Data
1. Introduction
a lei(J "Oki
111a's N (JC)pted a Prrala' pichc'W'
[,)Ili"II �Jirq set ot ik'iiteii n," II ii trc':) be i e�:Ioa:.)nh. ed [),V, tht^ D-iiic')pe"In hdoi") (D.,h [),�.'Oa
[)rctetion Aiut[jCq1rjj
ties (DF:'/V:•), i he Pri,.,a: P, -kip,: en,Suii es a C'D U) S 11 S 11,11 l aIppiicr achi b:'
privac)", and datl�) ['),ii'1otercAk)ri 1"K:n'Dss
2. Scope and Applicability
Agreement No. 5830
Ih
Ie'
i u II u I :, II ii
3. Implementation
4::'1111+.'�%"uII
,e,^fill uulrill4:ullauu�n�^IIuII th �" y tl Wu II)u..u' Ilune� V o.Ja! a a".":" tlllu":" II iE)�J uunu II F:
11
ii nus"Npgs v�yi ii in (i") uNn"::"Irngllu
4. TCP Business Data Policy Principles
)J !!a a L ° "V II ", .n u,. d "u,..0 N N " II tl..'^ II U N ". II II n a " U ." q, ," I " n " ,, ".,,u + N II N .1I 'I, q "., ;n �',.. a II q i U. II a...!' N u
�,..n. II"u.nulllriles IC:"uiinlVu"::mi". i;:rN' Ilya ," q nu"un::B IC',.'n:Yu:ynn ull Il,nr: to
u vq.y N n ;,u Il II
)atl ,n v.,..k IF", in the ",. o lY n rie:'J (.)II.q lb u..0 a 11 ,n ess➢
fiG.::qP:)jI nV'liP:"IY�w.: "wPIIV"U�:u ,vll,!ISVUNw"
a. Business Purposes for Processing Personal Data pertaining to
Professionals:
1. Business relationship management;
2. Business relationship due diligence;
3. Transactional communications;
4. Account management;
5. Quality control;
6. Risk management;
7. Security management; and
8. Anonymize or de -identify Personal Data.
b. Business Purposes for Processing Personal Data pertaining to Consumers
and other Individuals:
1. Provide requested information, products or services;
2. Due diligence;
3. Transactional communications;
4. Account management;
5. Risk management;
6. Security management; and
7. Anonymize or de -identify Personal Data.
Agreement No. 5830
c. Business -necessary Processing activities.
1. Protect privacy and security;
2. Troubleshooting of products and services;
3. Compliance;
4. Business structuring activities; and
5. Reporting and analysis.
d. Development and improvement of products and/or services; and
e. Relationship management and marketing.
f. Disaster recovery and business continuity, including transferring the
Information to an Archive;
g. Internal audits or investigations;
h. Implementation or verification of business controls;
i. Statistical, historical, or scientific research;
j. Dispute resolution;
k. Legal or business counseling;
I. Compliance with laws and company policies; or
m. Insurance purposes.
n. Special Categories of Data revealed by Photographic
Images. Photographic images and video recordings may be processed for
security, compliance and other legitimate Business Purposes, such as
participating in video conferences.
o. Racial or ethnic data. TCP may Process racial and ethnic data as needed to
facilitate affirmative action, supplier diversity, and other inclusion
programs.
p. Criminal data (including data relating to criminal behavior, criminal
records, or proceedings regarding criminal or unlawful behavior). TCP may
Process criminal data as needed to conduct appropriate due diligence on
Individuals (employees, partners, and contractors) and in connection with
Agreement No. 5830
security and compliance activities as needed to protect the interests of
TCP.
q. Physical or mental health data. TCP may Process physical or mental health
data as needed to accommodate a person's disability or dietary needs,
address emergency health needs, or in similar circumstances.
r. Biometric data (such as fingerprints). TCP may Process biometric data for
the protection of TCP and Staff assets, time and attendance, system and
site access, security and fraud prevention reasons.
s. Religion or beliefs. TCP may Process data pertaining to religion or beliefs
as needed to meet an Individual's specific needs, such as accommodating
dietary requests (for kosher or halal meals) or respecting religious
holidays.
5. Quantity and Quality of Data
g w II L:I� "'I id
N II p ...
A uu A 'v p,... 'M 0, .NN 4;uV � u ....
e a.'B � .... �
a"",,u ,,,.e Ilti."all 11 2 p"" , sNu ✓ fi Il l tlp:::"Il:ullu 1I1.3, "II urll:o::u.IC: zn u4 SIIe a
f f h) ,J II''./' II dIL. II [ Y II '; f: ^' ;^ "Y' II 'V h:v h V II d:::" "h:' N"U , '� ll " a i ." II II" .." :a II ';, d..1 Il...p ':;� C...N ti:`u ' : q V ":::, ¢N? ^;.: P': l,V II :ti r:' , ^'::: c:,'b C N 'll '.:^ I ;::. c,, a II ...11—
�.:Nr:N�R''.
6. Individual Rights of Access, Rectification and Objection
�LN":...VIIwVrt;NlLI:pII :, N'i',.V`.1,ry'f "B^r.:! fII"NII''
to 11d u`ju st$NII;u6IIII1ph':.'",.P
Niicl)4,..N N, 11i"'�IX...l N,.ul/ �r,.A vv. NII IXNII"..' Ndl�'j 4..�N r.;J V. fl��!I', E.v I;:
1117,I'D NP":u.i 11!II,a.11,11 uD11 II II^,'I `rVC,)I,,.!:'31d NII 11V"ol,.^ 11 0.'::' 1111 ^'.N
.IL.1�::�° II"1rii,.;�.,nr: J 1"I:'�lilp.,;hh �(u:�N-ppN�",u,.N IX1111"YIP."��.a4 II:�p ul,�m, �II11:.' NuI1PNiib�iill::?�N�'9V bN��4, �IINoN: N-iil��llllh Iltl.:11 II11,y:.�,ol lllll�:^
e r :11". o-. S,:r 111111(A
J) ;N -'t: PIIS: 1 11
N:Iu a ll :'PII'V, x.1111—L"') II 11 C. `1iJulI11Q tIIII��"N ::k nll'�V..V..p�91111111 �i wllll" (h.:::p� YiliN"PI(::A—n"'^NUY,Y'.
Agreement No. 5830
I Il
I_ E 11 q,: E NMI
11
15 Il 11- 1 11 c I[ I 1 1) e 11 1:? (1
(D re e )l I'D ii 11 11 11 S S e I C 1 1( 11 13 !S
11 VV 1111
'll`Vf1Jl11l'h::.`�I!S 01 [)11 -,)1i,.e,�-inl IS In Hilt: il 11 c e v 16, 11 Cu I
e 111 Z�
11111,Icl ON:, !S I!� f")II rep11�
�S'111 '3 a:'' u. 11 S
11-'n 11 11) vIlk'.1 elll'1100 ".) 11 In 11 [111, a ("I ,J V N I c) 11 111, 11;"
FlI2 S
tl a S le 11 111 n t: 1111 Ci, [) 110 E, S S 111 C11 11 C)II 11 t",' 11 1, t? pa
11 I�,� 11
irl,
J 11 ""LIl
I e a„')l 11- n C11 H3 S 11 11 11) 1�1 1111 11:le 11 El J''s 11'6()l vv a ii J
LJ I 1 111
I'll In;Jih 11111 N: II kfll 1111hilllilhillan
7. Security and Confidentiality Requirements
11 uIMIM,11H hIJH,,/' ic,a CIH, Dll) p rv.gl "3pIqjjjljpjj-
IJ11 op V N I':,', a u u 11 IX ,''i:, I .rc: ° a p” N N ":' '`(.. h I )ejjr,;,1,11)1,N
lik
)l: � � �11( � c) � �� )e
LA 11 P ) )1[ h S
' C N S 11' lie I�? 1111
11' 11 ,X V tl 11 ry II 1111 tl 1111
-IaH
,�rkl !s�l
n,,S 0 1 In "Al 1� 1 11- S Ill
c.", 11) 11 f z.�.0 11 I,J 1111") cl If o v 11 CJ o/ 11 1 �.3
j
11 III:'-'�L.11 11"ll,"'. E- pol 11 f the I
- 11 t 1111, I'� j- I �� �11,lCk�,
1111 1 �p vv "IIS:, k, 111-11 11111 ( C 11 1111 C" � 1 VV L!S` iWI�,-.,� J
S 111) I'l 11 C� G
EA 11 f 11 111 '1111 u I S a 11 e E'u
t 11 �i ELi!`:i I Ul 11 11 t.k 11 '1p:ua.NII lj,N Cr 1" IIIA v, I a ii ::k 11 1 -11I,Navyt.IIfIIC4:u.uIl j.'11
Bii-ealic,J", if (,-il) flhe ii
3 1 1 j 11 /II L Z3 IS Ji!
11 u.j -ii l- 11 is 1 B a If ii N V "'Sil- 11,111 t l:-4 x.11 "n ObN If the,
IS I Elt a h14hij S�J,
11 1 C I ') 11 t 11 f 11 N..li I I p IIvv
11 J 11 AJ
I 11 Ftz!; lric�] lvNa-Iu,l II inu:AJ if k'Nl 1"("" F, olnIj- I th C - L.fle �.fl,7
11
fic(3111ir'llin I hav,,,, e-(-
' L 111 r a I vy
t
3 1 It N cp i ciI EI 111 Il 11- E, C) 11 111 C1 I E, I U 1111 Ei) I- e I II
F'S'"Lllra
t 1 11 o k-11 q i a C',dbell`.,E" I I() ll 11 d:, Y
11 t 11 f 11 11 10 1
Agreement No. 5830
Vo 1111 u 11 u� II l�� : 11-1 1:::, [l,
0
l
8. Direct Marketing
9. Transfer of Personal Data to Third Parties and Internal Processors
a. Commercial Data Centers;
b. Customer Relationship Management System (CRM);
c. Applicant Tracking System (ATS);
d. Mass Marketing Email Tools;
e. Workforce Management Applications (WFM);
f. Technical Support Ticketing System;
g. Project Management Tools;
h. Email and Email Archive Servers;
i. Public Forums (Online Communities and Social Media); and
j. Instant Messaging Applications.
10. Governance
('
rn�lflil rrierill
11 - i , i[, 11 q, )l 11 C E' 11- A 11 11 11
c l 11 1�.-) 11 In w 11 11 1111 1, C, t 11 S t ,,11: E.,� C) 11 S B" 1111 S
ii l, ii 11 11r.) 3 11 E", Z')
Agreement No. 5830
ll"eieri bj'
RIIll"s llI"li�:IlnuIIIIth61-
I C It 11 lll 11 Y 11 t 11 11 a l IVI
11. Training
� l l Ill 11 �111 � I I� w ii t l �i � i c �, e 11' 11 k�!" ll) 0 11 l) 11 l � t� � t? i � � i(� �11 11, ��� �' 11 � � 11��� e �; ii � � g llut!�, ii :c� o 1111 l ��, 1, L ) � 11
rt��qwii?,J ii(:� �:ornp�eli.e %,/ l jj�jjj�ljj� Ijjj,,j,,,,jr � t�'DIFHIDY
"ll; 1, d N h i ucf!IY a 11 "0' t "', „/ ^t1,. II i �
12. Monitoring and Audit
EwicfiLJIM] tha ll�'ruile,,,, ing N:fl
7lLZ. I(' au l'1011
th �� 11�� )Hk �11;vv e���!!'Jjjj jj�� l 'e all cfi�
' I
Flht�., GIOL:41 (]hbef Privaq, Offic(,?ii sJ-411 airn f011 th1
t, (" '
coRqAknce w% lJhe l C`�'P fCIllr l" .' I eS"-
� 3w�n
Data, yonacy data rwtection ll ajna:] (,-)Uh(zir rek.'varit. lssU-�es.
13. Complaints Procedure
11 q' b II Ill N 11 ry l i �, �, C);''d Jj®u
hl, l )"'/ b )) ::' l s.'":7" " I, )1;� [,)JI ",J11111 , t:' :'' 11 11
Cuirlrlpk�lid If thl0n'
l)�:°"If , ',I ��:'fjjjje() 1111,
y
(:oirrq:)�Ialints I be subrvVR1(.:'.,cJ 4-ilwiifinig bo TIP. Corripkints rnav be SLa)1YnUe(.J
v,0 ern,�.,Ol t(,) or VA Inad by
111rneGod,. P�Iiiis, l l C
AM NO
a e (,' l " ") C l"',
SII n Xrlgelo, D,',' '769()�; l -P&A
may also fHe a cm,lakit oir (Jzdirrn vJt]h the rekwant DPAs or thi(-.n
Courts,
Agreement No. 5830
[)m,::u SuN,:aiok ts See Own EnAded ]QUM
Ifunian & Ell [Xata
TimeClock Plus, LLC Privacy Policy for Client Employees
�I (�: 171" s G U ': " U p U)�.'p �lI,- i� ,/ p1�11 "), U 11 t?!S, [ IX , z', 1' ll li ;a e 5 11 u ci e, 11 'w 11 ),/ e ,° �IV ':' 11 -II IXj i! IXj e
C,ucJ li )i z" [,)�a 11-u ,,a Ct. pL:, e a r Su.u1 c, IIW N 2 11 S, C, 11 n,.uU [)a a ua II aur p II ecl p. ) e l -ll y
G L), a ,'ua:'611- II v (r IX :,"[) t:@ ir"" 11 wu, ' C), I �lE., c p :1 �i [�" f'o 11 11 t S, ".:;!"t/V111'"11 �N ".11 H 113 S 0 S,
',''rVO?V��s pirc,,,J,.Jed to us as a ppxanyN for our IX,.., Ri It prxMeu. :':,
Adonnabon cokded whm? as wil Ds oH1lire. o [) IS CC)Mnlilted �c=, the
x)11 v ] sec�,.�d by c�f fl',Ot "',!\Iie process An k71' Sli'11 V111IO?S OU111
We oLI111 (JNerlts dhelir , 1�11n,.�]
)I'Efl ell"I �s M��:'H a,�� elLO11 dk:iu. ts ii,,l faiLP.O[y r)i �er)i OL)eii s. p lks
%°, u4. "", [" c) �I 11 u:r 'J' �� �� ) � �� 0 !�` q ) U! 11 1�,� l t i e, �� \;v e ��j a - d It o t h e P e i z o ml LIM a vx"v c A v e � ii 11'.:;', ii Vr
1. TCP Collection and Processing of Client Employees' Personal Data
arA pwcess your PanonM [Ma why instri oe,:l
0 U.. J 11- e II,..II ii ii UIII I-) r D 11 r 11 u cji 11 r u rc), I s a c'
(. I 11 w p c, w N II , � , , �/ t 1111 b e 11 le, 1111 11 N V 11 1 ll � /,�, 11 J , � :'J � 1111, J II 1I
l,;,J11 id, IL.( II llal LIIIII nIe, 'Iiu f, 11- N, Icii i�li J,!!ta
req°wu !d [11,1,hill u11-opIII 1111� III I pi Nic"Jtl
OF, VU1111 tl,..fi!�,,dc)se your p&mona! data to your EMplo.ver wid to other EAMS Wherii
L)y Y,c.)urEWITYPY W Mhw- EAAKes HIM& paYI&H
piocessoq beneW alllTunktabon provId1eii,,,,,, jp[ainnkriJj
vendom, and adiess We rnav d4chse your pasonM data to our Whanns anci
Wd pay piocessars as needed lo pr,:,,;llde the services
ell Iequested. These enhhes are contraduaHy hw.,Iild t,-, krnIt
of your penonal dala as needed to perfonn the ;u II "Re,
PETSona! data when required wAo so b.y a.0ch zi;�; IIID tc.,,!sii ii h I-) Cv e ii k,�,
kII,,-Ji-xfiing I.c., k-,-o/v agenaes and couns in the I rr,It�z-�d "'und c"Id-v 11
1: 0 U 11) t 11 u e V,v/ I I e 11 "Y"', (�, ic, I ) e 11 1. e.
It Vounhave queshons about your prwacy nghs, phase conUct yow arphor's
lru.,Jirnain resouii,.:e�,
Agreement No. 5830
2. Types of Personal Data TCP Processes for Clients
L V,.. ¢
TIC) o",°V V ,^,::utl`V"K �..,h !!h'4. l;dli.".'tl Ilu III Ito°IIV9;,,
� / I,l I';.;I II I� I " :} II o„. � :'” . � II "II � u 'o II ` �, V �:. V, it ,:'V V , \:'1! u " YI II ": Y ",:. II : Y : • .' `p n u,:711 r; I \!V II II V o;.,I^I II o p '„' i,..I I Y ” � I L.. ¢,; � '.,'v � u..'o h" a 1, j p,,:, II 1' � `
a. Personal Demographic Data includes username, password, first name, last
name, address, email, phone number, job title, employee ID, taxpayer ID,
gender, date or birth, hire date, termination date, language preference,
payroll classification, employment classification, pay rates, work schedules,
employment contracts, and labor union affiliation; and
b. Personal Activity Data includes clock -in time, clock -out time, clock -in
location, clock -out location, leave requests, including vacation, sick, and
other third party defined leave reasons, leave accruals, FMLA cases, and
hours worked.
3. International Data Transfers
a"IIY II �_IIIIVII�;IYIi: l IL:;I•' a ulap:ull r„p.v:u �..If° n/ulll nu< 111 ler IMpo.0 :...«11,11 all o.N::.t:d Il.r ull""uunlllun-..•H a".:II
x:11 `iI
Fa F" P ul /;in::, Iycrlllia.„ h¢.::Xu Il llu a"II IF) a�;q
B ._a¢.r: ,:i 11 11 p r"".rII'u«:I-I10..bII :';I,ialrit 1.,")Vd uL:"N II a. ," :p d II'lIl'. ;XI11'0t�¢. t11C, "h c In 1;. II pi'' u:-rV"
.. u o r '"IX¢;' 1'0 .M a' :,,m v,::'a';I a id.4'I�`.sYp 4�" 'h''V¢.: �.0..!III-I',.,rl�-°n'uV""I'I En.,1. 8114; a 111 I1u..:." II u.',r'. �� ,
G"a.�u.11: u"I,ull IL a�,:,. Ilnu.:",,f I uc.ry_.
0..,
11 11 III11w,VrI'611
/ �, nJ'n uu u¢,➢tl:'¢":N°,d all.
w;Y'!' E, a 114.. .'11 II IL.,V
'tl- 111: a::°!e11At, ',�41:> 11 1 S "�«Ir :�uul:- "�II,.IIw.�ho,
pV. "µ1.u61',1"a.7'llllnll¢,..".rUV,.u..,`..YII, P
VII IC:r `All a+",II;:" V'I� Y' II II
u N -V ll:1ll ;III:«µ II „l l`u 'I'w II YI r p..11l ¢" pq:, "uII0. ",. ¢:^Y111' !III.,`.i Il .::pd 7 E, ` II � ..:.N.V•,M 0 11„u�°�'° IL:III
11vu;'110V'3t111K,.MVIIt.9
4. Sensitive Personal Data
A )1 V kVII'"YI II Il�lia:' IV�: II-tl:�, lllf u�.dllll"'"✓ N II-'� w� ... ��� II II . II�h^yIL.V',� I I "r::,`:,, L:. 1 1. ¢:'^•;, @'grJ k
IpI a uII"�"u"::v II . ll -I
11 11 VAI."".V: :'p llVM1lulYll ui; h'::;11
111 "Y 0..V 111111 " l,.p !I u , a ...
w',„V 111. O U.. V , ".:,V R P II:. V.,V II
111",iII.p;.Yr,IL.V'Y ". e11 :.;¢"pYI 4 VV N4 II ":..4rliIIlllau;:.�uM11.a i`0.VR.' IIk:''tl;IV...VIIV4".4.,IPu,a II"."1:..ru/1 '�,ul;u'i.N
:^:iYhc,b :III ;:I'IY ,IIu w;utl:;�IL.VIYu;'V;, ::"IrIP:LV C:`bllu llll1l,' �.31111a.1 c,;7 II II :. l,tl:u;".v
:Y �V1111111r,.: I Sl:(.°IMI ,IuM1,.b°'yr,"M'.:„ a.:pIIV4.l M1'. "IIV61I ':k",.Y..R,III..:Y 4'.V Vc' III:::V'"d'e c), Ilu.ce!,,':
NII'"V�I. VIII10.r,a111:11tl,11"'u 'll;;:r 11.1k',III ,.µ:".::''11'11"pp 'l 'I(.:"P p V1h1V M1;r'llli`iY''I: ":° :DIr:'u'.',I,)111El
Agreement No. 5830
flx'u"hxtl tic. 0II �o1 11"NII:: II 111I;,I,.,11qu :u,r uugfl11uw::uu , Z�11 1 V,, 11un U11-1 Vu q ;w oII.
G::;,cellaull"c%:UVIuv
fl p,wtPq 'I :I!,tl Il 11 :'q'
bk::( II t11 E111nn l ull II :IlV1l1111- c] ()II Il dIIIuIIui�lIP4 II :u�,v.
u;:� Nd
5. How to Lodge a Complaint (European Economic Area (EEA), UK, and
Switzerland Client Employees only)
fl III p P II N:° u V u'., 'I..NV NV .,P11"r°II II V N°.1111"IId II pi
'11 Ed 11 q 1::1111 ~; , 11 n 11IX: % Ne ll e ii x cd g lL tl kIii n 1111 11 11,:x ^ II ° a q:] of ,u q . [:!Iii II:ILu p , Il n :: l' i q..:n lrik ti, � Ir 11 q.-:ILfl
a ^ II q .11-:" II °IIIIv,:!!p. "u;:'Illlitl- ,° �'a::"1111' N Ilua:liP Ilh: II Nx �,:'1 II 11 na d:'i1 w n°'� II 1111" '1'fl "I`e 11N «L.I e tl,gvv, ,I Wr :1i11 nl I tl ICalll 11C
Vlltip,ce. -11'gl
ill itd Iu,.." I' "fl 11tl"'Ia.°lHtlN ..I ..0 I°"s, "II ol "°q„°IIill 11II1 lluq:°II V,vii ii el«IllV'E,
ce I qq II le, II "II q II a k:)( V N II U N N:'' II "q'N (::";::1h ' w .." II' U' 11 I .Ili ! II U U u U' 4.. L„p II "u II Ill( fl II q ” 't II u ° fl Il n Ir.-' II fl U 11 "':;!! fl vv II'V::' II II N II U'::p
0:11 U""" rt u II 'II i..il I V IIII"'1111 ' fl II all''U' II it! " d 11 d " II .,;V N,,,0 11 a II 11 11 a :," (;P II V- ' V V `
Il"'ni:,IN q �."�..fl..flun914.;'�:Iltl.:atl.Il IhuII�..N, tl:�::I'ul�.0
Ai,t N 11 . Data a [ ) C N....' I N "0 t I ,,.,4 N 11 II U Y.,f
Fo N II ILIIo 11 q: II II N IFIL:.b .: N 11Ir 11 N til Iti::" N "U Ih:" N'U fl' V a: a rer"Wr 1I: p.. q a V..q fl:'?I N "U II II �:Y9 a:. " ,q IP II U 11 'u Z) 11 Ii U t N.!I u, " ii l] II ci, :," V II E4 a...:'.
Ir.:' U e u s :H 11 :x N...t II , IV �::'' 6 q,:;u 11 u..N.�. it II a :u q: fl "°�"www .� ....i : i Plus, L i. v Privacy
ShhiOd "ri'v �'c q"°.w�9 blc �dlq„��;° to 'C�mrail11"q'N;r„'�"'g✓ ill"�'�""�"'�1 ltc� °ti'll1W'", II„Jiriw'IIo1Al,W�:d stU�II"� 's "II�'111r� 11P'"1�1� "���"�1mll'U
__.. ---...................................... — ..... - -----
6. ....._
6. Questions about Your Personal Data
II: co 111 UUw'UII':tce k 1k:;q til r011U..s' 1 x.UlY4IIqu 4-". W r.1 ,q "q pr:;IIN lY tlp'�II`r'U4iV.N: .:Y tc, U..!IIIBgflell rlY1VUIIU(J fl.0^'b,,U, ve:''
H
:lla.lu,. ;'!) OI114U'"'v lna,i IIIIIItII4IIa(l 4/"drll`Ir':I.0 ICF, vivilth 4'::^;!1IId Vv.,UIr'U`ICIItl qx .,.Mq;':v
u N °u q:k 1111 q 11 l:u 11 q a w" 11 �,u �' �::fl Ii 11 N 44 Ir INf Irk 6 ry 11 o IX :: „ If tIp�.;'u 11 li . hn u N IUVN `4' h u 4 fl fl r :;v u.,N 1111 �:;i t. IV N q � 1111 u � c)11 u u � � illi
11.,N V:Ie (.A ��aL)Iq° LIt J,..)11�NIX ��IX,;ir 'iNl I�.V'"" flV� �"�I(;.:Gu 1�1 llavue tlu.94„s's"u Il II Ills "x.:D ir.l"E' V., g1.,!INulg,! '11°11. t NIS
arr;U4' PU"IIt,3 t U.N:S ISI,. P,1[I\ U4 �lf.df rU11U"'Uu:,'Cfla,..f'4.,'s,.G fluty, h. aU' N ,' EIIIII ]I mrya.'e
bfla,x:'UaU' 114.'r;U4 U u;::"a 11..9 to Y(�'Ull q',,III11111" If.)„U;II;uU u;::!IN VnUoU1le IIIIUNIIU11atNIf:'YIY...11
UIt;°4;aUlYCi,
NU"'UG ti'll";: Iflfl11'u;:::t,
Uu:OU..Ua;;IlUld.i 4IIUII;;r4e,S1111Ug':JIB"w1:.P11!I11 �':eI�~x4:gIY'Ua l�x;;�'�'.:`I.
Data Retention Policy
1. Purpose
Agreement No. 5830
2. Personal Data Retention (All Medias)
C° V "; h."IId d�...;uV;""�,VIIVIIY"II`"117. II illd"11'11 ::u II II up II II VIIh V ,:::CI d, :nd VVI11 11E"11111 S �:�YI';V�.
V .'.0
tl tl'..
11
ule uu u: Ilu II ^li..'N„ t a ea 11 o t 1111,1111II a to nhiC tl' Ui qe id ud ne � uIIuINN a e
t tlIIII tl V.] fu nV t a' u'd..11tl II Ve111'..I a "II V,.:V n d, II
Correspondence .-
Legal,2.2 • Safety Records
Insurance Policies (with Additional Name
Insured)
Leases
R
Safety Records
2.3 Accounting and Corporate Tax Records
Annual Audits and Financial Statements
IRS 990 Tax Returns
Journal Entries
Invoices
7 years after termination
3 years
Permanent
6 years after termination
7 years after termination
Permanent
Permanent
Permanent
7 years
7 years
Sales Records (box office, concessions, gift
5 years
shop)
Cash Receipts 3 years
Credit Card Receipts 3 years
Electronic Fund Transfer Documents 7 years
Payroll Registers
State Unemployment Tax Records
Payroll Registers
State Unemployment Tax Records
Earnings Records
Garnishment Records
Payroll Tax Returns
W-2 Statements
2.5 Employee Records
Employment and Termination Agreements
Retirement and Pension Plan Documents
Records Relating to Promotion, Demotion
or Discharge
Accident Reports and Worker's
Compensation Records
Employment Applications
I-9 Forms
Time Cards
Biometric Information
Agreement No. 5830
Permanent
Permanent
Permanent
Permanent
7 years
7 years
7 years
7 years
Permanent
Permanent
7 years after termination
5 years
3 years
3 years after termination
2 years
1 year (Refer to Biometric Information Section
Retention Schedule Clause)
Contact Information (email, phone number,
Permanent
address)
Correspondence (phone call, email, mail)
Sales Notes
Marketing Campaign Notes
Technical Support Notes
Implementation Project Notes
Active Client Data (employee records)
Inactive Client Data (employee records)
Service Contracts
3. Electronic Documents and Records
3 years
Permanent
Permanent
Permanent
Permanent
Permanent
30 to 45 days after termination
7 years after termination
Agreement No. 5830
E N ec t 11 Ia, 11l i c d N I III 'I E` 111 11'n 11-(�pc" I1e 1! e� R a i up It t IIP11";- %1Vt'.? rE, II11 a I b2 apc:ba,:uu111 11 S,
vviIdrouft (Jup'I IIcaOng the Murt w1won a hardcopj,,:),III jjNie E,Idst,
k. 11 .0 J IN eS J��ici ii ii tlJ e n c e g E n e m be d h y I GP e ni ad I pp is bD arc I I We it an c,l
everaually desoov it awychy to the sd,n��ck.IIle
are EW)311)11h,9 .d Whi&111,` IhJ`
-ezrrsomflLde eHomn to reduce haKopy generation
0/iHl 11
"114 I Ottell"�I)tIIIIIO to convm IcD a mme Imperless cq)ewwADn,,
1
TirneClock Plus, LLC Biometric Information Privacy Policy
1. Introduction
i.0....
IJ,µ II a nsh(Wied th,I:� Fld::Oed bCji
�Indl IU I( IJ, I1I::11)It,S u!��e
Jind I, e11 -e :o, ',,VUHJ "s oll, niflHi::, h,:�
KP lol- hiinH :)H(l Dllcl luill"JlYI
2. Biometric Information
B i cejV-�Jfc?nwawon coHectwl by TCP inckdes Wogkal IOUs unique t(-,.,,
I 111 cl 11 :�:.f i �.] ul ��.i I s a ii -� ,�] i -:� ii � 'il t�`t 11-i k,-, I �j " 11 � t. i If i 11 S -'rs cl t, [i 11 1� ""�,�j 11111.1 tr I �� 1 J I i I P o i .,s I i o N NI e t If ii c
KoHnanon Fj nucy Act 740 ILCS 1411, el seq, or as may be chnned in any c1hell"
al[) plkcable local aws that QWHI the coldecdc, LMR4 StUraye or &sdic.:�sI,.hirie
Kdonetrk: clata. "Wistnc ldenbfie;` wans a L.-dok:,, �111�Jui(-fing retina 01I
oll, ()J-
rneains 1'1110�,V Vrr iS
Jr(]"I'Itl�'I'-`N r'�Seq:] IC'
k',11eii od"y arii iiii ik..-linduaL The capqwe W sudi aril` Adc ldowKon cwhes
[311o:11111'1k?tjj-Ik" in the Joni of n"mAnedc vake ANGY can be stored AM LISed
tO alldleHtKate the idwwMy�f a person Me usilrO,,..� nos nunwrk.-.:
Me wnnot L)e re,,e� E? "1 11111 a (,)t �ii,)ui- ic�
idennheir.
3. Client's Responsibilities
are, fc)r c"vVin c]Wa cicdkeclic)ili,
11 le J. f aind �,3!S M,3y apoy to awn undekMIAlkable 1W11) tht-,
le4ters requited by 0xv, Chents trill obtayi vshaerhaudionzatkni for the Chent,
t 1, 1 c, Ji t""' Ills 0 1 c., f IC F` t i I a1:t i', 11 n (I 1� 11 I C E"? S
Agreement No. 5830
11111V-ul;,a'l11
cl"..fl �,nr q .
: VH Lie I V
"A' I 11 11 I qi:'' 'V
....III ".,AN VPIINI :;lVo"q;° L:dN,.'U@, INV II tl:, r'.:7I G�6u;` tiprc^}/I:Pr,:M�olhl'!N IYI,tluN..!!Va.'. q}' 111111 In':)I Ilx';:�u...ulll
i II L:Y yuuo.x�ul!
IY"N'0VIIuN,'V'Ir.III,NIY11.4v:,'VIL.
p 1! I': II q, 'I'll III b
II ^V 11 q. II v ' a:.N i D .0 G a. a: tl 1 o ` ,.:I! IN ;l II 4''I V,.,,II 11 11 E, 11 a;;:. V' tl
a. Inform the employee in writing that biometric data is being collected,
stored, and used;
b. Indicate the specific purpose(s) for collecting the biometric data and
length of time for which it is being collected, stored, and used; and
c. Receive a written release from the employee (or his or her legally
authorized representative) of the biometric data authorizing the Client,
TCP and/or the licensor of TCP time and attendance software to collect,
store, and retain the employee biometric data utilized by TCP's devices
designed to capture and store biometric information, and authorizing the
Client to provide such data to TCP and the licensor of TCP time and
attendance software.
4. Disclosure and Sharing of Biometric Information
II u, II 11 rc1111 "II
w N tl II tl h i:;u p u u V ,u.yc, U V " II IIu E'
p
111 lie :a! Il YI b" ... 11114 II
"u N: I -C... P
pp :n
n„u..?
a. First obtaining the Client's employee's written consent;
b. Disclosure is required by state, federal law or other applicable local law; or
c. Disclosure is required pursuant to a valid warrant or subpoena.
5. Retention Schedule
Agreement No. 5830
J, I )'':) 11 1 ;4� "'� ", � k ], �!� �!'; f �' VII i 1, 1[ n 11 1�2 Y, 11 j h': "', t t E:�� S t l�") i �a � � (.j I l' 111 -) � ��I �I 11 � 11 11 ) i r , �l ,. lig
�, S , a� �ti Iles
dewyed to capW a0d SIANe WMISWC VV0II `t.1' 11 IrhEr °L.1lw'11111'S
ewqsloyees i h:'Vve�"eil thie Bloilm:''1.6c
cankiLle t() unbthe "'Jk.NIM tllre
t i i'lle VII i 11111 e(. �l 10(k :'° Il Ugs a I K�l t te I U I lie e11-61 � i o 11 f Ore B i �:� III ie 111
ietenkon pehod; whVh is set to ISO Ups by dMAt Tom hhe
4Jate, Lhe N-)iioces,s ,sf 01ij�:)'
evecute ch Ming ne,Kkse Week cyde,
6. Biometric Data Storage
I CP W use a reo no md I e
k)
airiO'J u I, roleA
�llS ;11 J 115�" a 111 );3 11 yXV t�? �l El q:
t V 'I
�, N 11 1 1111 1I 11
:i � 11 () 11 1 0 t? I, e ai I s �Ii a
I: ea': L
h C) 11 "!11 (1 ci!'3
i a )Ill
LU i 11 , 11 . 11,.1 1 1111111 n,a 111 110 11 111, ) e 11
I Is, Uie 1111111,:',Jjr,�.°
fall AMve than
tht' rnvIj
VII ja:.'m jV°V
til-lail Isn lits, Id [,111 'h?(As IAVI'211-
)o�1 ial [ p
0Ildu.uR '::a1i
I [��e all se�:J Ira u1i dei'10 ify
11-
11 I'D 11
s11' '1 11 P:,' n II 11 11-[, e ii
TimeClock Plus, LLC Privacy Policy for Human Resources & Client Data Processing for EU
Data Subjects
L Introduction
I CP Jas adopled We ILMI AISM Cd 10
luii 11J1,?i0
'::°111`I 1111,,' I.Iteii v �p e";pk)" LiiinaJk 11( Q ^:i ii "V 'd Ill 111 ell 11'11fl
11 111 kA t?ll !:11 H (�� 'I I'S ''all.° Ijjj i P ('ll I 111 all I'd 11 k'ita i1011 I
I u e 1a M, ("'"kent [AW Prociessing WMAnks % colrrirmnyenh FCF�'
wi �flie Q personi&a pertakIing to CheM
einifsksyees by IT& in connechon vAT proWng Chent swavidand Clent
suppal avowbes.
2. Scope and Applicability
The TCP Privacv Whs for Clent Data flie. c'f
of CHeii l�. L)"/ N ( IF' iii 11 ills� I as a data Vncoessor foii
Uelwls in the UOLKSe of dekwung Clent so-,/IIces, vdh('..,re sii.lc�h
Agreement No. 5830
a. Subject to EEA Applicable Law;
b. Collected originally in the context of the activities of an EEA establishment
of a Client;
c. Subject to EEA Data Transfer Restrictions;
d. Processed by TCP outside the EEA in a country which has not been
deemed to provide an adequate level of data protection by competent
EEA institutions; and
e. Processed pursuant to a Service Agreement that specifically provides that
the TCP Privacy Policy for Client Data Processing shall apply to such
personal data.
3. Implementation
y ' V �' a ^III u...' "; 11 I d""I� p a L.:'I''�i � I " ^ ..I. � I�'YI '"V V tl I ''r` ' I II �!,. ,` y u III ;, l.,V I I I I ,,,,'!, I� ti 4'�i ''4 I � L. \I U' 11 I I ,,;III (.!i � ., L•II
'C'V Iii III III tl, .. V .,` ! WY I::V Iul1�-uIIV tl ..II I I ui U. ylC ! lll;� .J c' ' I I l
V I
9l' I d : \1'6� IIY II IT, J, in" I;,)fl III Vu u,r' Qu 1( u N
4. TCP Privacy Policy for Client Data Processing Principles
el" I..�IW IYV �..�u1t II'i tllVl .I'1111 II II II a0u (old' I'4o,,p; ",IlU 11
h I I III. , U III! II___!I a
III
VII VVV I';;,'ILpplluui"uy ",, Vllu ""c..�Q II11',d;ll U ri, I'. IIB Ill J;!ylUi' "IyIII
kill � I II
a. Hosting, storage, and other processing needed for business continuity and
disaster recovery;
b. System and network administration and security, including infrastructure
monitoring, identity and credential management, verification and
authentication, and access control;
c. Monitoring and other controls needed to safeguard the security and
integrity of transactions;
d. Enforcing contracts and protecting TCP, its employees, Clients, Client
employees, and the public against theft, legal liability, fraud, or abuse; and
e. Approved TCP internal business processes.
Agreement No. 5830
leill vvJki II eqII LQ t] Ie r 111-11 11111 Iq I'e� c:111 111 4: 11
V i II (' JII, 1: " P L E /�" ` II ' II III kJV"V.
5. Security Requirements
I. P, I
11 3
„V "•..u., 11 11 rtE'd I I VVI A 11 1 1.1 11_V 11 L, El B'LJ n, 11 111 s S D 2 1-'D 1� 11 11,1 11 is
S 1! 11 11 11 e S (1 11- 111 11 t:" I) e S S 11111 VV ii,:`'^'PI'IIUU III ii ^:, e e
-PII IZ'nL�, ' as PAH 1, . :1 1 M14) � .1 IV IC �ejj Ie
ii
y t 0 1. h t 110.':':
lie 1µµ1 11
ly e 0.V I z�, I,,' q ii I id
P I f f VVr II. E1 �S !S 10 I� 11
J
-11 1111 SUI 1.11ua:d I[.-) 11-ovi'.] tc.'
ii 11 o l a c! 1.1 tc-ie".: 1111 1: 1 1-)
Sj�j(jj'B ['11-J." J)
Je
S J S C] C) Ll 11 U1 I'll 1:,u11° In 11 1 S C) 11 C
�ent
d F3, ii 111 c' t 11 cl, ii 11c,y: i ii -I I S �a vi iCI a 11 0 11
11 �j
I 'i 11 11 1 V t C J I.'] L 11 11 11
a 1 11 rl P1.1 t, e� 11 1 t. I �,:l ii o t IIII" 11 ca t 111,.)
�.-1 �1 til Irl, dhk., 11-I �d I
t. 13 t ry
t
6. Transparency to Client Employees
i f,/ e k- 11 E" 11) 0 " II e (I k" S, Cd Il.') 11 N,::D ;;0.1111 U_dabed OI 'U
U31YV t �� I r e r
ii I le, )i I e \/v ii se
Fil cl 11' ril o S I, I'll I[ L
vv 11 q 11 es
ent. ID
Seii
IS I
1 11 e
IDIIIE'. es�s, I "4,.) ii ri I �a t 11 1! e S t F 1! 11 11
11 e E:'s C, MEHU M
tlhee( fIril n S e
7. Subprocessors
Agreement No. 5830
N&c' 11 )11ltl II"C Vw ;U L"Ila II N, h,: I-1181 :,Vq IIIVlie I11II11 111 ,w1 `nNII J,I";)IIwu4' :. WII" IIII V: \','IIIV
11 ICA Vd TOE( IIOV:.ILVII NIID Il:nl101 w-, wq Vlluwtl ::" li IDV'II II qd° III' 0L Nd fill q II.IIVVUII Lily 11IBI
° I d 2111 "' V II1 N V : V V � 1 Il u P � 1N II ' '0 1" ;';" V IX 1 V;".D N ' N N V ;" II ""q'V I I'll it ! w:' " 1111 V d ,;1 y a it ''' ll' -Ilk
I V ° �.., II
8. Governance
x II N f "
"
h ^,'YNu R11 1 II uIIIIuIId::^IIgV `IIN%a,, %II �,uII, U-"u'u N<`' q tl:NII'li'NILNgIINbf"y:u d uvN"V'ulf.:uull' w",.; rd gllutl::u w IIgII ^d
rid thkl ' FIII ullu"V,,,'q':IIa Klin d "III °l1', Wivhc. Iiis lin
V:: II
11 Iry d( ' r,'ghi /,..IX u d w..,UIIU e ^:,,r W/d"NNu..;u N aGtl...` b uMI11 Ile,] h seid,I:Iii
:a u11I1 eIINVtl"u°Nt �uNwV eIIwuw e= IX IllIh:IIIu ugd..tl D.'u'ubIhN II uu c:N,% VNw p w,"liIf IInuu11 tII'Nwui1u
u° s II X e w Ove e II..'n N .N I i V o
9. Compliance
:tIIn: h IIw",.,hDu.lulltl:'� :`:ullu ull,N,,llu.,u.� ::a llgd:Id w�.:u,:;ull-a"h °II II,;'NV:"^ " 1,i. "u IIE.Cw Iii,e Vw:;D 11 %,wllN a,,x fic,alim IOle
:IIIiJ°geld n.:a ryMNq dll:;bll "theChent u„.0 %.:ouaOmAhq lit dwlhnllilwg, li.V.:7VV`, ,q.ulllll.'d tlx:, ApphaLde
I a"` :NIr11V`V IIUV,N".:p.x.)rilr:HP d °w'1Jth th..utl,:V:"
are q o N° f::;11 II V U II 'V V;: ti II U,.q II,. G V. ':NII "N II w w V d, tl,::'V orMeSYM, II IL N
'VNVII uc:. Nall M:Ntl tIX;'"II- V,/O U'U'�:: ,d tPIi'11:.')II dJIlldlltlui"' VN Ilu° ::;"..;1IIIV Nhli
D..
U'116Vp II IL"'iI� :r l:a,,:;tl.IV.NV"'N V: �V ." ;Mu.::ull kVIrIIV".;PIIaNVII°W'a::^
costs of PIIu',°I1dwilhe IIII u:"uln agV'.Ilu;:n w:; ii
yI'VUIIIIIItlNII''..VU„NII
10. Training
��.1111 a, lir !-,,'taff wI1di access to or gespo11wIIIV 1111ll.11 es KIM OMalllr :.1 IPie� ;.:aIle'
r^.cNllllred to ...oll"quIMbkie all.gggllll"w11 V..uata V"'UgM,..V..II:.DIIq"'iIIIN'19 V(..Vs`::e I.. e Y:iriiNgN -ii
d,';�
II g ��::. ,,,. ..
wllq,'�� �a:ill'tl"Bn;:i^.II"ull. _:.D"_r�:�N"N'N.
Agreement No. 5830
11. Monitoring and Audit
t I"' , I L ' jj-(:a e t. 11 )1
i E"!
�rjj C 11::::, 11- 11
t
11-11
11 e "1 11 D 11 II I11 lI 11 , � I 11 e I a I if a .i�!ill- t Ile v e
ll^ ell 11 � ��)a a
e�: Iii
I�� ii 'I, ii i� 11 e 11 11 e ii e!!i.
12. Complaints Procedure
( I u i l, E: r r 11 Y 11 CC) 11 (?id ["y 01 re lk�il liell t Da F'II-C)CEI!^3SH g
ii n a,,/iulle 11. I'll rr [ u f tr 1 11: ^,
thit R -p hz-ls not Ihan(Te,,1 thiek Dal;u
-'r thaut h,:Is IN [o-bacy obHqa6onI; We; any appkAkla daM
F" �D t e l. � o Ir a vvs o 11- tr e I F1, t f iz� 11 C ?n[ E)ata
A wAtky to the ad6ies�> 1:14ovv, cm V0 t()
at In le(� FlIusi oRL TCH Data (�)ffilceil voH
inveshgaw, and document eadi conqdMnt and respond to the HOW! wkhm
reasonable th"el-Huys of the whowe of die inves6g,atW.
l a r ? ta ) p (�jj II e Y u II1 11 11 B I: p �'III ii I.:'ii-
DPO@TimeClockPlus.com
"...II 11gliIl
I� Ir
"Ottin: Data
F�:r) 11 1� �),,D 11 E� � I )i �-')11 F� i,-1,1 t o) ` � I ) I lovv ti��) sil flhrn�t ��l uncfi',�r ,:;/ Sa11Od
1:,,kaw Wir w the secOwi entlitk,bd "rinieOock Privacy
S11--fleld 11311rivacy for ii"),ata rranst?rI�-gd �tg Statesfil thg
§U/SwkzedwdLUK,
13. Contact Us
Agreement No. 5830
"11- 1111 4 H I(, I'll 11 1 11�V�o11 V flby :' :lrk,acy lJ , ie,�, H ii�( 1d� H ie H� P \';
,,:, �"�)11 11 J [�111'0ctl111 (I i' u &V� t d pe hW k In 11, BHl( c I:A
Privacy@TimeClockPlus.com
5:U "fie VII e IIVIa Vaal
B 0. IN, Ill 11
(zo https:Hico.org.uk/for-organisations/guide-to-the-generaI-data-protection-
reg u lation -gd pr/i nd ivid ua I - rig hts/rig ht -of -access/
TirneClock Plus, LLC Privacy Shield Privacy Policy for Data Transferred to the
United States from the EU/Switzerland/UK
c,I:Nin 6p�kie's he IW l ek,kV 01 ,'"A JI
LI'lE
110 1 1
the
Eun �,ea: n Unlion 11 1 e 11 t:, ",l" CI_11 11'� 1111 S, "'11E` 11 0 11,11 1, gD 1111 11
j I 1 11 El(�i I" S, Ci 11 11 Iv, IJI I Ut:, NJ,
shk,:��°k:J Priinclq.',�es ��vith ii�ns�jp,ect tic) suil]h
E9 11 S "�I CC) 11 11k, hetvo�a tI i e 1:),D ie s 1vzr) c d
tJ'lEll I S
FrTk!aic,y: to VIeVVE)U11,
Agreement No. 5830
VOIIIII Vu ",i� U,u:Y l 7!WVuwal u:;'"all D V e`(d°IlWE,Ii IxV It1lI31IIIYI "H 6! I'll III H :IV 11 ci II➢a:aNIU V':^ �lI,e [:'11-N,,
ell
the h I u.°,. dx II -W h adeC on H1 n uII ha..11r°u.
Y Y u V'' 1""r 4 a° 0 11',i d:' x W"" 1"" N l d°+] U"" II w ll 11 11 °\!'', ! .all 1111!! 1l ;;. G II h ( V V U 'II ' N w 1 V„V a;.,u H n a';
I"":” ai, 1IIII udn �)CII4.,➢ V911 t] le U.UhIll "u dH °;b'C'igaM",. 1'. U1a W.'ullll II"u,"q1 le:V'% ° u'','wyllll VII"1 II°Ve:' w)11. V1,+'V"r.�
11 il.u.."a %H Vo" :aa b d:!IIn "H Ii 11 L !111 11 :IIx xIIII Ihl'11 a v'vIVawdd,61 r;I um uu,.ut Yaxu a -.p. °v i nV•.V IIn'Vr , I'.a'°1 IIa11.;hY
I - II - x aI d:aVNhwull'u'f'H 1 1I 'Ili" u I,dUIII•.:,xllh vvW " dud 1d Ia l yx:u0.„h. 'All 11
VII"Ild,.a1p"'Iuwllu"flWv,l x::u �'', u'" Bu.11",,+a %:' aNell'II U u.,Y11 IgEiNI(•, d u:"m"qd':' in w Nate
U " ptl';,PVI! �e' d:'r UW::u IhNll"" Q•..UV'kIUecu l G;, uVII'Na.;1u""II ;"W a'. W" II W! aH, 'f:"H`ha11VY W'H u•:lV d.t Vlhx''GIl
quell Wa °IIVad..ru; i hIIIa.ld..;a( N ':B111.N'.u,";u llh'll. X11 II'1:°a.:liuu IIV:°VH Il c) 11 1111 11,,"a'r" 11Gk0' vv111H
y u "; ,1 o co V N rt, -i vv I1 F l o ll ll ii :' a 'o 11 1 111 a 'N l:11 l u !" .U. II II' a 'V a ii iu h a „'
dwa� V
II`N hW 1111- ...u...:"1111 IIV II �u':I a Uwub ,N,l ou,:'"'lla'`1111.d:-"
"!v a:"' e 11 11- 4u 'dU.:N vv 11 II,; 1111 11 -" '?":"II Ill 111"II d::nuN11 ,Ntloa 11111 w,ull u;°'nn','ll"a" Wluu:` V!' W:V
1'Ir11 1nV..u11 Se uau Nx:;"h VIN..uNN ""xx'lllu h IIII qWu' x UINN w y; ,..,uu -l
11
Vin"JMx'llu;c,f11� !II N11 c E,lii uua,°IIlb.',
-",hW, lIq 11111I:7. "u �..x" IFOCP.IIN: �-u."'11 lI111�.'U in VN°„tl;; "!iP.Oq,',11 CII`•,u..x” NhVe d,-•11 your litl'ln ullllral
IIN'1"a1111NIIha.NIL: IIa. III"', 1111'::➢!!'""w',,e ua',.'"II'hhll'h ':; `'v11-11tIE)u""N II4 "111pu"p;','.0 U"x 11`!'1111 ,"',''v;@,': III1lu"d Hu!a::.l "HNu!;„.'I !;"'„JII'll'II.
III d ."Illi aNIIN a."11�1!ga.��Ilr,nIlN''., I've Ilnua", be required Nf.°'All.du.."ta personal dG'nl":0 in hd °IIS hll^re II,u,A
li"nm'11uI u!e'qIl,he 'it;s by pub hc i:liLoh old ltllev IIII IId1V,.Ni("1Nn'11q 1'i a Ini;iItio: Ni.'411 II.. 11 -it"", cm Hc:u'vv
!� ...u.�f:m -r:: fl;:` ....., • $: II-�'�';H 0...111
:o"-n� l.,a n' II uullVw: Oda IIUV U: it NI"u u."II is „ ih0. UIVa:" II Unted "a"w4a::^" Vitlfh(;Vm'h
",'"aa "11r N:HNIIW" a :;1'II"Niu `,q.u.:! d`w7Hu..p, II''y+'`UI11 11'1,6 IV' II' ,"..;x J tl111111-uH Ilii'",Iht,,,,' V" Vu;, Sw IIFII aa`",.:H IIIIN h'"Vd
uu uu11uIIY:,H li°uiuh" ullxlla uN II u11:uW.:N1111 u, HN ll" uen c:ulillh ua":IlaanuN",wll H IV11u..1 IIII N,9d: NIIuN �11;,II
Blue VII Di e 11 U.H'hVlly,1—l',..,v,alllf ua"11 tIIV wu II U. I 11 It c' s ^''::"
°a':` -"II d'DII"N�i.;NH NU a�.dl0. a"IIV Vd..'s x0.:''ll11:a1 dU°' ''",q v Illlh "-;n VuV:'I'Ifhlf..ur'V` IIILVd..""h N' a":GU.u',IL'hIL. a"+\�'°Iltlh NH'll^I' N -I
pp • " h 111 6 H u'" " a I,,, 1 p a 1/� '° && m ":' l l n V 11 1 1'",i� &• d w Y O h e
U, �N".'N d. �u,. Y Nb., ,, � tl �'ba„W ::� a•,.I I �, �Nq N„
r11.h.11I[:1'l I k!' vv t I I tIIN 1 1: h"u v m"... `"I'N11 El, Hw::i ["r iilYrc11111 IIe 1(IPI: (D11 r
'1, 11 0. 11 i I !S tc, a of"'Ii
'ard.:.:1!.IIV- i::all"Ilvr he' and (:P0..NII colleclUmn or use bf Your 1.nW"II;;a.YlYn6l
VIYN'W:"IYIP�"ha:h Ila:'IYN G:II'.,dIIN �a;;°P"h.'a.,H C:) thil II,...UIYhR�,:'n:'.1 x"Ir Nila,.°", �.,wh.Vl"'Mr111V NNa'I'.:'IC'.:d:11 P1I'N "xwa ShBw"kl. G.uRM4.�::k;r;Vu
11o111 x::uIIoK:H .,"'vilII`Y'ri IIIfhidVvIlal4.h;,NH°a vv Ir ll,IIi"w'is^ca' ";`uI"u NeH(:1 !IPI iqI!NIIIIIIW2` a::dIP' a;;:I'111111plall11)ts SIIlcJ
f'IIII's t c oll"P,'IrrN„°t °.I.0 P 1::P"r r"IInaIIH M IPIIIIva c I., IIIIu11"m.''u I"",u.:l^;N4.uvn:u;::71I C. l', s [,)a': . °I k'::a1R"y: U: 114:"ii
a..fIiIIcw w!'✓vhIIH r e c e i v e Ina e'~r64j Nte, aII¢k:.0 dd,Da u.,0n'm'°wu!IYut ."nY:'Ra.IIh ":oIInNH.aHaIIui11 ,::NII"N(I ii les 1."aI11a(I t() tIiae
I r h I iv iclI..V;ml V'x,MIItI'1111h'N as ii le as o n a 1) 11 t netii 'allniie 0.::0.1 t I N I n"' IIta:(:')i11'Lha" (:'"f t I h e 1111) " I S IL II('').w%.Ili.: 1'1.
Agreement No. 5830
t l l';:.) V u tII'!: ) u V (�) � If � ( (',,, 11
DPO@TimeClockPlus.com
P 'i " v, IINnII ii e 11 tl I: "o 111111111 1111 .,,N,i o 11 t,, fe" I- 4..1N`uIIo" q'..!' I [) 11 11 d 4 11 11 11 aIIIIaN. ii- t 11 k:!l
II � l� " S � t Vt o 11 11 i 1111 ��I 11E„ 11 ; IL:) 11 u i le I -E :;tlut.0;yup11 11 E:! 1111 11 V u c ^
BRR Elt i PRIM A" A [), I II:„ Iqq" l Hl 11(11U q id' tti- IcJk 1111-eall H
011 nlek/ „u Ilpl'..V„°lr +"!IllpllellNN lnvi, N11 1!rtl11 11 IIL,
VII IIII �V alllni is not l b b11 Ik", a6
h!'11, 111111,:tllnII NhV IN"Illfpl';phll IjIlvd Iio lulu D d 1!Vllmpllilllld
of, hlallrll:'1e
lh,p.,mvm iesources dak haUlned to the United SuMes
Et �.,and/or S101nerland in the coinUvt of die eqj., Il
all,lid TOP dow not adckess it sakkd&N, TCP coninks to widh
panel estabhshed by the EU data patection authwitJes. Pane) thile
SwKs Fedem! EM PlIote,,,,tk)n and InNowadw-i Cononwoner, as appHY& :;p id
Cclrnpthe advke given by the CW
a 1:1, �I e q,N 11 t, II E' �-.t n.1, 11 IJ t.C., U (,. I I I i Ll Y -11 111 V"D II N ts Cl , i f
cowlYanit, you skoukd cont;Q the We w II abonal dat;I
ii te(,:fi :,iii (:)i Lic.),ir 1111 nt!,"', I a to
not OR adchessed to the BBB EL"AMVAC) STAEU).
f,::1,11 the [„.UI qJNt:":a authcolks can be found W
httP:Hec.europa.euaushce/data-protection/bodies/authorities/index_en.htm
H your PAwKy Shill coaq*ka cannot be iesdved 11nough We above channds,
IT"Ildeii eo,,:.Nn rna�,,� �ilV,;Cllke L)�n„Jknc'N [Ul'!5CllrIh?
claiii-i'IS '11C)t by c,lldheii Iediess inechw6sirji!s. Seie 9,I�ekl i'viwa, I ��d
https://www.privacyshield.gov/article?id=ANNEX-I-introduction
Contact Us
NII
, e d..11 c <; 11
111
P 111 e II r, 7 (�, '.;V
( ) i , t � H !!�:",!;,
P 'i " v, IINnII ii e 11 tl I: "o 111111111 1111 .,,N,i o 11 t,, fe" I- 4..1N`uIIo" q'..!' I [) 11 11 d 4 11 11 11 aIIIIaN. ii- t 11 k:!l
II � l� " S � t Vt o 11 11 i 1111 ��I 11E„ 11 ; IL:) 11 u i le I -E :;tlut.0;yup11 11 E:! 1111 11 V u c ^
BRR Elt i PRIM A" A [), I II:„ Iqq" l Hl 11(11U q id' tti- IcJk 1111-eall H
011 nlek/ „u Ilpl'..V„°lr +"!IllpllellNN lnvi, N11 1!rtl11 11 IIL,
VII IIII �V alllni is not l b b11 Ik", a6
h!'11, 111111,:tllnII NhV IN"Illfpl';phll IjIlvd Iio lulu D d 1!Vllmpllilllld
of, hlallrll:'1e
lh,p.,mvm iesources dak haUlned to the United SuMes
Et �.,and/or S101nerland in the coinUvt of die eqj., Il
all,lid TOP dow not adckess it sakkd&N, TCP coninks to widh
panel estabhshed by the EU data patection authwitJes. Pane) thile
SwKs Fedem! EM PlIote,,,,tk)n and InNowadw-i Cononwoner, as appHY& :;p id
Cclrnpthe advke given by the CW
a 1:1, �I e q,N 11 t, II E' �-.t n.1, 11 IJ t.C., U (,. I I I i Ll Y -11 111 V"D II N ts Cl , i f
cowlYanit, you skoukd cont;Q the We w II abonal dat;I
ii te(,:fi :,iii (:)i Lic.),ir 1111 nt!,"', I a to
not OR adchessed to the BBB EL"AMVAC) STAEU).
f,::1,11 the [„.UI qJNt:":a authcolks can be found W
httP:Hec.europa.euaushce/data-protection/bodies/authorities/index_en.htm
H your PAwKy Shill coaq*ka cannot be iesdved 11nough We above channds,
IT"Ildeii eo,,:.Nn rna�,,� �ilV,;Cllke L)�n„Jknc'N [Ul'!5CllrIh?
claiii-i'IS '11C)t by c,lldheii Iediess inechw6sirji!s. Seie 9,I�ekl i'viwa, I ��d
https://www.privacyshield.gov/article?id=ANNEX-I-introduction
Contact Us
Agreement No. 5830
, 11 � r " ' �) ' 11 11 11 �,f) �) �11 %� 1 11
F,��ll lln'011E?, Ohl, e,�, Iry k �i� �iiiinll�ll H iie CJ��ll ��'ll
I 1 ;u(.&`," 11 11