TAPTICA PUBLISHERS TERMS & CONDITIONS
The following terms and conditions shall govern the placement and delivery of advertising as set forth in any insertion orders or service agreements (“IO”) executed by and between Nexxen International Ltd. or Taptica Inc. as applicable (hereafter: “Taptica”) and Publisher, each a “Party” and together the “Parties”.
Appendix I
TAPTICA DATA PROCESSING ADDENDUM (FOR PUBLISHERS)
This Taptica Data Processing Addendum (hereafter the “DPA”) supplements and is incorporated into the Taptica Publishers Terms & Conditions.
This DPA describes the protection and security obligations of the Parties with respect to any Processing of Personal Data carried out in connection with the Agreement in accordance with the requirements of Data Protection Laws.
Definitions set out below shall apply to this DPA.
“Consent” | means any freely given, specific, informed and unambiguous indication of the Data Subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the Processing of Personal Data relating to him or her. | |
“Controller” “Data Breach” | means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the Processing of Personal Data. The term “Controller” shall also mean “Business” under the CCPA and CPRA. means “breach of the security of the system,” “security breach,” “breach of security,” “breach of system security,” and other analogous terms. | |
“Data Protection Laws” | means, to the extent applicable in the relevant jurisdiction(s) for the Services, (a) the GDPR as defined herein and any regulations promulgated thereunder, (b) the UK Data Protection Act 2018 and the GDPR as it forms part of the law of England and Wales, Scotland, and Northern Ireland by virtue of Section 3 of the European Union (Withdrawal) Act 2018 (“UK GDPR”), (c) the Swiss Federal Act on Data Protection of 2020, (d) “State Privacy Laws” as defined herein “and (j) all legally binding requirements issued by the competent data protection authorities governing the processing and security of information relating to individuals and providing rules for the protection of such individuals’ rights and freedoms with regard to the processing of data relating to them, specifying rules for the protection of privacy in relation to data processing and electronic communications, or enacting rights for individuals which are enforceable towards organizations with respect to the processing of their personal data, including rights of access, rectification and erasure. | |
“Data Subject” | means an identifiable natural person who can be identified, directly or indirectly, in particular by reference to an identifier (e.g., a name, an online identification number such as a cookie or browser ID, IP address or a device ID, or location data) or to one or more factors specific to that natural person. For the purpose of this DPA, “Data Subject” refers to the natural persons whose Personal Data is processed as part of the provision of the relevant Taptica Services. | |
“GDPR” | means the EU Regulation 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC. | |
“Joint Controller” | means a Controller acting jointly with one or several others. | |
“Personal Data” | means any information identifying, relating to, describing, or is capable of being associated with, or can reasonably be linked with, an identified or identifiable natural person or household Processed in connection with the provision of the relevant Taptica Services. | |
“Processing” | means any operation or set of operations which is performed on Personal Data or on sets of Personal Data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction. | |
“Services” or“Taptica Services” | means the platform and related services made available by Taptica and its affiliates to deliver contextual advertising to and across browsers and other personal and household devices, detect and fill advertising inventory made available by Publisher, and provide ancillary features, functions, data and reporting to enable, improve, operate (or otherwise related to) the same. | |
“State Privacy Laws” | means the California Consumer Privacy Act of 2018, Cal. Civ. Code § 1798.100 et seq., (“CCPA”), together with any amending or replacement legislation, including the California Privacy Rights Act of 2020 (collectively, “CPRA”) and any regulations promulgated thereunder; the Virginia Consumer Data Protection Act of 2021, Va. Code Ann. § 59.1-571 to -581; the Colorado Privacy Act of 2021, Co. Rev. Stat. § 6-1-1301 et seq.; Connecticut Act Concerning Personal Data Privacy and Online Monitoring of 2022, Public Act No. 22-15; the Utah Consumer Privacy Act of 2022, Utah Code Ann. § 13-61-101 et seq.; all state privacy laws that draw a distinction between a data “Controller” and a data “Processor”, in each case as amended, and including any regulations promulgated thereunder. |
“Business,” “Business Purpose,” “Commercial Purpose,” “Consumer,” “Contextual Advertising,” “Deidentified,” “De-identified Data,” “Personal Information,” “Processor,” “Sale,” “Sell,” “Service Provider,” “Share,” and “Third Party” shall have the meanings ascribed to them in the relevant Data Protection Laws.“Controller” shall also mean “Business” and “Data Subject” shall mean “Consumer” under State Privacy Laws.
2. Authorizations A Party shall not disclose Personal Data to the other Party, except where the disclosing Party warrants to the other Party that this disclosure is compliant with Data Protection Law and that it has complied with any applicable requirement(s) of information, notification to, or of authorization or Consent from the relevant public authority(ies) or the relevant Data Subjects, with respect to any Personal Data provided by the disclosing Party to the other Party. Nothing in this DPA shall prohibit or limit Taptica’s rights to implement anonymization of Personal Data processed in connection with the Agreement. For the sake of clarity, data resulting from effective and compliant anonymization is not subject to this DPA.
3. Cooperation Between the Parties
3.1 The Parties shall cooperate to comply with Data Protection Laws and with the other Party to meet and perform its respective obligations pursuant to this DPA;
3.2 The Parties shall keep appropriate documentation on the Processing activities carried out by each of them and on their compliance with Data Protection Laws and with this DPA.
3.3 In the event of an investigation, proceeding, formal request for information or documentation, or any similar event in connection with a data protection authority and in relation to this DPA, the Parties shall promptly and adequately deal with enquiries from the other Party that relate to the Processing of Personal Data under the Agreement.
3.4 To the extent legally required, Taptica and the Publisher have each appointed a data protection officer and shall upon request provide the contact information of their respective data protection officer to the other.
3.5 Publisher shall ensure that it obtains legally sufficient Consent for Taptica to the extent required under Data Protection Laws, including for purposes of permitting device identifiers to be collected and used by Taptica affiliates, Taptica and third parties to deliver mobile device ads to Data Subjects
4. Obligations of the Respective Parties as Controllers
4.1 Except to the extent Data Protection Laws deem the Parties to be “joint” controllers, the Parties are independent Controllers of the Personal Data and all such obligations are set forth in this Section 4. When Processing Personal Data as Controllers under this DPA, each Party agrees that it shall:
4.2 Publisher shall not provide precise location information to Taptica, and Taptica shall not intentionally process such information should it receive it.
4.3 Publisher will ensure that each Data Subject whose Personal Data Publisher provides to Taptica (or otherwise allows Taptica to collect from Publisher properties) has provided Consent to (a) Taptica’s processing of the Personal Data as a Controller for purposes of ad selection, measurement, delivery, reporting and analytics. Publisher will also ensure that such Data Subjects will be presented with or provided Taptica’s privacy policy available at
https://nexxen.com/privacy-policy/. Upon request, Publisher will provide Taptica with an accurate visual representation of its consent mechanism (and how Taptica is included in it), or a way to access such consent mechanism for purposes of auditing and diligence.
5. Cross-Border Data Transfers Between the Parties. The Parties acknowledge that their activities under the Agreement may involve cross-border transfers of Personal Data. Each Party may only engage in cross-border Processing of Personal Data or onward cross-border transfers of Personal Data if it has put in place a data transfer mechanism deemed to be valid under Data Protection Law. To the extent legally required, by entering into this DPA, the Parties are deemed to be signing the Standard Contractual Clauses issued pursuant to Commission Implementing Decision (EU) 2021/914 of 4 June 2021 on standard contractual clauses for the transfer of personal data to third countries pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council, available at https://data.europa.eu/eli/dec_impl/2021/914/oj (“SCCs”), which form part of this DPA and take precedence over the rest of this DPA to the extent of any conflict, and (except as described further below) will be deemed completed as follows:
To the extent legally required under UK Data Protection Law, by entering into this DPA, the Parties are deemed to be signing the United Kingdom International Data Transfer Addendum to the EU Commission Standard Contractual Clauses, available at https://ico.org.uk/media/for- organisations/documents/4019539/international-data-transfer-addendum.pdf (“UK SCC Addendum”), which forms part of this DPA and takes precedence over the rest of this DPA as set forth in the UK SCC Addendum. Undefined capitalized terms used in subsections (a)-(d) below shall have the definitions set forth in the UK SCC Addendum. For purposes of the UK SCC Addendum:
To the extent legally required, with respect to transfers of Personal Data that are subject to the Swiss Federal Act on Data Protection (“FADP”), the SCCs shall be deemed to have the following differences to the extent required by the FADP:
6. Updates. If Taptica updates this DPA to account for changes in Data Protection Laws concerning privacy or data security, or changes in the legal landscape based on enforcement or guidance related to Data Protection laws (“Updates”), provided Taptica shall not materially reduce its obligations hereunder or materially impact Suppliers obligations hereunder, the Parties agree such Updates to the DPA will apply to this DPA automatically as of the date such Updates are posted.
7. Order of Precedence. Unless stated otherwise, in case of a conflict between the provisions of A) the DPA to the provisions of State Privacy laws, or B) the DPA to the provisions of the SCCs, the UK SCC Addendum or the FADP, the provisions providing the more stringent protection to Personal Data and the rights of individuals shall govern. For the avoidance of doubt, any changes required under State Privacy laws, or the SCCs, the UK SCC Addendum or the FADP shall only apply to the Processing of Personal Data which is subject to the applicable Data Protection Law. If the SCCs, the UK SCC Addendum or the FADP are superseded by new or modified mechanism, the new or modified mechanism shall be deemed to be incorporated into this DPA, and the Parties will promptly begin complying with such mechanism. In the event of any conflict or discrepancy between the Data Protection Laws, the SCCs, this DPA, and the Agreement, the following order of precedence will apply: (a) Data Protection Laws; (b) the SCCs (where applicable); (c) this DPA; and (d) the Agreement.
ANNEX I: Controller-to-Controller Processing of Personal Data
The Parties are deemed to have signed Annex I of the SCCs by entering into the DPA.
The data exporter’s and data importer’s address and contact person are set forth in the Agreement.
Data Exporter and Data Importer | The data exporter is the Publisher. Publisher is a Controller.The data importer is Taptica. Taptica is a Controller. Taptica or Publisher is a data exporter or data importer, as the case may be. Each data exporter and each data importer is a Controller. The Parties’ activities relevant to the transfer, each as data importer or data exporter, are Taptica providing and Publisher receiving the Services, as set forth in the Agreement. |
Categories of Data Subjects Whose Personal Data is Processed | Data Subjects who visit Publisher’s digital properties and each Party’s employees. |
Categories of Personal Data Processed | Identifiers consisting of a series of characters (contained in a cookie or other) provided or made available by data exporter, including IP addresses and mobile or other app/device visits, installs or activity. Name and email addresses of authorized Controller employees/representatives. |
Nature and Purpose of Transfer and further Processing | Digital processing to generate online advertising, measurement, analytics and related operations. Taptica providing and Publisher receiving the Services: Delivery of services and related information, payment, providing service and platform functions and features. |
Retention of Transferred Personal Data | Personal Data will be retained by each Party in accordance with the Party’s data retention policies. |
Transfers to Sub-Processors | Not applicable. |
Sensitive or Special Category Data | None. |
Frequency of the Transfer | Continuous for the Term of the Agreement. |
ANNEX II – Taptica Security Schedule
This security schedule (the “Schedule”) represents security controls to be complied with when either Party acts as a data importer of Personal Data.
1. Security Controls. Data importer shall implement the following information security practices and procedures, as to Personal Data it receives as a data importer:
Security Governance and Management: Data importer will maintain a Security Management System similar to ISO 27001, inclusive of other industry known privacy and security best practices and supporting security controls. This will include appropriate documentation (security policies, processes, guidelines, standards, configuration standards and associated security controls to assure adequate protection to Taptica and Publisher data assets throughout the Service lifecycle.
Security Assessments: No more than once per calendar year and only upon receipt of a written request with no less than thirty (30) business days’ notice, data importer may request a copy of data importer’s prior security assessment as to the environment(s) and system practices by which it processes and maintains Personal Data, which Data importer may redact as necessary for purposes of protecting proprietary or confidential matters or information.
3rd Party Security Assurance: Data importer will maintain appropriate security assurance controls to appropriate manage data security risks for 3rd Party services to ensure the protection of Personal Data.
Security Training: Data importer will maintain appropriate security and privacy security awareness programs to proactively protect Personal Data.
Physical and Environmental Security Controls: Data importer will maintain appropriate physical and environmental security controls to protect Personal Data against data security risks, protect against risks to confidentiality, integrity, and availability. Such controls will be aligned to applicable industry, operational and security best practices protecting against physical and environmental security risk, including physical access controls, physical security monitoring and environmental protections against power disruptions, fire hazards, and related operational risks.
Access Control: Data importer will maintain a comprehensive access control management system aligned industry best practices to protect Personal Data, with appropriate governance for the access, ensuring appropriate controls for authorization and authentication, based on the principle of least privileged. These controls shall include identification of privilege accounts with appropriate multifactor authentication (MFA) applied to permissions with access to Confidential Security Information. All authorized accounts, general or administrative, will have access logs collected, monitored, with permissions reviewed on a regular basis.
Business Continuity Management (BCM) System: Data importer will maintain a Business Continuity Management (“BCM”) System that will detail continuity controls, roles, responsibilities, and recovery measures to maintain contracted Service availability requirements in response to a broad spectrum of potential disasters and operations risks that could disrupt operations and timely delivery of materials and services. Data importer will maintain a BCM System that includes regular testing intervals to ensure effectiveness of controls. Upon specific written request of data importer, data importer will support reasonable assessments and questions relating to the effectiveness of its BCM System controls.
Application and Software Security: Data importer will maintain appropriate Secure Software Development (“SDL”) processes that ensure effective release, change and configuration controls are operated and appropriate application security controls are maintained to protect company and client data assets. This shall include maintaining software versions and components at appropriate levels to ensure adequate protection.
Device Security: Data importer will maintain appropriate device security for its employees that includes 24x7x365 security monitoring, detection and response through EDR endpoint protection and configuration baselines applied.
Network Security: Data importer will maintain appropriate network security controls to protect against disruption of Service availability or a Security Breach. This will include 24x7x365 security incident monitoring and detection response, and application of security best practices, including segmentation and vulnerability scanning.
Encryption: Data importer will maintain appropriate encryption ciphers and protocols to protect data in transit, with appropriate encryption or equivalent controls applied if data assets are required to transferred through external media if requested.
Security Incident: means any actual or potential unauthorized access to or use, disclosure, alteration, or destruction of Personal Data or confidential information (i.e., information that has been designated or demarcated as confidential to data importer, by any method agreed to by the Parties) by a third party, or any act or omission that compromises Personal Data transmitted pursuant to the processing under the Agreement or any data relevant to the Services that relate to the protection of the security, confidentiality or integrity of confidential information.
Security Incident Reporting: Data importer will notify data importer of any Security Incident within 72 hours, where that Security Incident reveals confidential information or details about data importer. Data importer, at its own expense, will mitigate, investigate, and provide an appropriate relevant data and information in a security incident report, detailing the impacted data and necessary related information, if a Security Incident is detected impacts data importer’s confidential information.
Security Incident Management: Data importer will maintain 24x7x365 security detection and response capabilities to assure appropriate detection and response to actual and potential data security risks to data importer data assets. These Security Incident management controls will be operated and maintain by a dedicated Security Team.
Vulnerability Management: Data importer will maintain and operate a comprehensive vulnerability management system, with appropriate controls aligned to industry best practices and standards. These controls include vulnerability scans across production environment platforms, with reporting, analysis and mitigation of detected vulnerabilities appropriately managed, such scans will be applied internally and externally.