Greenfly

Greenfly Data Protection Policy

1. Overview

Greenfly is committed to ensuring the confidentiality and integrity of all information it holds and Processes while operating its business in compliance with the requirements of relevant Data Protection Laws and Regulations.

We recognize the importance of Personal Data and respecting the privacy rights of individuals. This Data Protection Policy (“Policy”) sets out the principles which we apply to our Processing of Customer Data and use of Confidential Information.

This Policy describes Greenfly's approach to ensuring the privacy and security of Customer Data, including technical and organizational measures implemented by Greenfly applicable to the Service.

Any questions about this Policy should be raised with the Data Protection Officer.

2. Terms and Definitions

The following key terms and definitions are use throughout this Data Protection Policy:

3. Data Protection

Under the Data Protection Laws and Regulations, Personal Data must be Processed in accordance with data protection principles, under which said Personal Data must:

  1. be Processed fairly and lawfully and in a transparent manner;
  2. be obtained and Processed only for one or more specified, explicit, and lawful purposes;
  3. be adequate, relevant and not excessive in relation to the purpose;
  4. be accurate and, where necessary, kept up to date;
  5. be kept for no longer than is necessary for the purpose;
  6. be Processed in accordance with the rights of Data Subjects and in a manner, that ensures appropriate security, integrity and confidentiality of the Personal Data.

Greenfly ensures it applies appropriate technical and organizational measures to assist its customers with adhering to these principles.

3.1 Nature and Purpose of Processing

Greenfly will process Personal Data as necessary to perform the Service and as further instructed by customers in the use of the Service, as a Data Processor. Examples include the encoding of high-, medium-, and low-resolution copies for image and/or video content submitted by Data Subjects as well as the potential application of watermarks or pre- and post-roll content as specified by customers.

3.2 Categories of Data Subjects

Customer users may submit Personal Data to the Greenfly platform, the extent of which is determined and controlled by the customer in its sole discretion, and which may include, but is not limited to Personal Data relating to the following categories of Data Subjects:

3.3 Types of Personal Data

Customers may submit, or allow collection of, Personal Data in the use of the Service, the extent of which is determined and controlled by a customer in its sole discretion, and which may include, but is not limited to the following categories of Personal Data:

3.4 User Authentication

User access to the Greenfly platform requires a valid user email and password combination, which are encrypted via TLS while in transmission, as well as machine specific information for identity validation (see section 3.7 “Security Controls” below). Following a successful authentication, a random session ID (or token) is generated and stored in the user's device to maintain identity state.

3.5 Data Encryption

The Service uses industry-standard encryption products to protect Customer Data and communications during transmissions between a customer's network and the Service, including 256-bit TLS Certificates, AES-256 encryption for data storage, and one-way salted hashing of customer user credentials.

3.6 Data Segregation

The Service is operated in a multi-tenant architecture that is designed to segregate and restrict Customer Data storage and access based on business needs. The architecture provides an effective logical data separation for different customers via customer-specific unique IDs and allows the use of customer and user role based access privileges. Additional data segregation is ensured by providing separate environments for different functions, especially for testing and production.

3.7 Security Controls

Greenfly has implemented procedures designed to ensure that Customer Data is Processed only as instructed by customers, throughout the entire chain of Processing activities by Greenfly and its sub-processors. Additionally, the Service undergoes security assessments by internal personnel and third parties, which include infrastructure vulnerability assessments and application security assessments.

Greenfly implements a number of security controls, including:

3.8 Intrusion Detection

Greenfly monitors the Service for unauthorized intrusions using network-based intrusion detection mechanisms.

3.9 Virus Protection

Greenfly systems have controls in place that are designed to prevent and detect the introduction of viruses to the respective platform services.

3.10 Security Logs

All Greenly systems used in the provision of the platform, including routers, load balancers, network switches and operating systems, log information to their respective log facility or a centralized syslog server and are then aggregated in order to facilitate security reviews and root cause analysis.

3.11 Incident Management

Greenfly maintains security incident management policies and procedures and will notify customers without delay of any unauthorized disclosure of their respective Customer Data by Greenfly or its agents of which Greenfly becomes aware to the extent required by Data Protection Laws and Regulations.

3.12 Physical Security

Production data centers used to provide the Greenfly Service have access control systems. These systems permit only authorized personnel to have access to secure areas. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions, are secured by around the-clock guards, two-factor access screening, including biometrics, and escort-controlled access, and are also supported by on-site back-up generators in the event of a power failure.

3.13 Reliability and Data Backup

All platform infrastructure are configured in a high availability mode or in a redundant fashion. All Customer Data submitted to the Greenfly Service is stored on infrastructure that supports high availability and is backed up on a regular basis in encrypted form to an off-site facility. All backup data is retained for a period of at least 90 days.

3.14 Disaster Recovery

Production systems are protected by disaster recovery plans which provide for backup of critical data and services. A comprehensive system of recovery exists to bring business-critical systems back online within the briefest possible period of time. Recovery processes for database security, systems administration, and network configuration and data provide a roadmap for personnel to make processes available after an outage. Our disaster recovery plans currently guarantee restoration of the Service (RTO) within 24 hours after Greenfly's declaration of a disaster.

3.15 Analytics

Greenfly may track and analyze the usage of the platform for purposes of security and helping Greenfly improve the user experience of the Service. For example, we may use this information to understand and analyze trends or track which of our features are used most often to improve product functionality.

Greenfly may share usage data with third party service providers for the purpose of analysis and improvements. Additionally, Greenfly may share anonymous usage data on an aggregate basis in the normal course of business operations. For example, we may share information publicly to show trends about the general use of the Service. No Customer Data consisting of personally identifiable information shall be contained in the anonymized data, nor any data that would identify customers, their users, or any individual, company or organization.

3.16 Sub-Processors

Greenfly utilizes certain sub-processors to assist it in providing to its customers the Service described in Services Agreements or Terms of Service available at https://www.greenfly.com/termsofservice (as applicable, the “Agreement”). Defined terms used herein shall have the same meaning as defined in the Agreement.

A sub-processor is a third party data processor engaged by Greenfly, who has or potentially will process Customer Data (which may contain Personal Data). Greenfly engages different types of sub-processors to perform various functions as explained in the tables below.

Infrastructure: We use the following sub-processors to provide our cloud infrastructure environment and storage of Customer Data:

Sub-ProcessorCountry of Processing
Amazon Web Services, Inc.USA
Google Inc.USA

Processing of Customer Data: We work with various sub-processors that monitor, maintain and otherwise support the Service. In order to provide this functionality these sub-processors may, but not necessarily will, have access to Customer Data:

Sub-ProcessorCountry of ProcessingPurpose
MailChimpUSADelivery of Mail Notifications
Mixpanel, Inc.USAService Usage Metrics
Slack, Inc.USACustomer Support
Zendesk, Inc.USACustomer Account Administration and Support

4. Confidentiality

Greenfly will keep Confidential Information, which extends beyond Personal Data, it receives in accordance with the relevant agreement between the customer and Greenfly and, except with prior written consent of the customer or as permitted in the relevant agreement, will:

5. Roles and Responsibilities

Greenfly has appointed “Data Owners” who are locally responsible for ensuring employees within their department or area receive appropriate training and are working in compliance with this Policy. The data owners undertake regular assessments of data types and ensure appropriate levels of protection are in place.

Greenfly has also designated an overall Data Protection Officer who is responsible for:

If you have any questions regarding this Policy, please contact our Data Protection Officer by email at Data Protection Officer.