This Data Privacy and Security Guidelines (“DPSG” or “Security Guidelines”) document sets forth the duties and obligations of MHE (defined below) with respect to Personally Identifiable Information (defined below). In the event of any inconsistencies between the DPSG and the Agreement (defined below), the parties agree that the DPSG will supersede and prevail. Capitalized terms not defined herein shall have the meaning ascribed to them in the Agreement.
"Agreement" means the Agreement between the McGraw-Hill Education entity (“MHE”) and Subscriber to which these Security Guidelines are referenced and made a part thereof.
"Applicable Laws" means federal, state and international privacy, data protection and information security-related laws, rules and regulations applicable to the Services and to Personally Identifiable Information.
"End User Data" means the data provided to or collected by MHE in connection with MHE’s obligations to provide the Services under the Agreement.
"Personally Identifiable Information" or "PII" means information provided to MHE in connection with MHE’s obligations to provide the Services under the Agreement that (i) could reasonably identify the individual to whom such information pertains, such as name, address and/or telephone number or (ii) can be used to authenticate that individual, such as passwords, unique identification numbers or answers to security questions or (iii) is protected under Applicable Laws. For the avoidance of doubt, PII does not include aggregate, anonymized data derived from an identified or identifiable individual.
"Processing of PII" means any operation or set of operations which is performed upon PII, such as collection, recording, organization, storage, use, retrieval, transmission, erasure or destruction.
"Third Party" means any entity (including, without limitation, any affiliate, subsidiary and parent of MHE) that is acting on behalf of, and is authorized by, MHE to receive and use PII in connection with MHE’s obligations to provide the Services.
"Security Incident" means the unlawful access to, acquisition of, disclosure of, loss, or use of PII.
"Services" means any services and/or products provided by MHE in accordance with the Agreement.
MHE agrees that the PII is the Confidential Information of Subscriber and, unless authorized in writing by Subscriber or as otherwise specified in the Agreement or this DPSG, MHE shall not Process PII for any purpose other than as reasonably necessary to provide the Services, to exercise any rights granted to it under the Agreement, or as required by Applicable Laws.
MHE shall maintain PII confidential, in accordance with the terms set forth in this Security Guidelines and Applicable Laws. MHE shall require all of its employees authorized by MHE to access PII and all Third Parties to comply with (i) limitations consistent with the foregoing, and (ii) all Applicable Laws.
Subscriber represents and warrants that in connection with any PII provided directly by Subscriber to MHE, Subscriber shall be solely responsible for (i) notifying End Users that MHE will Process their PII in order to provide the Services and (ii) obtaining all consents and/or approvals required by Applicable Laws.
MHE shall use commercially reasonable administrative, technical and physical safeguards designed to protect the security, integrity, and confidentiality of PII. MHE's security measures include the following:
Access to PII is restricted solely to MHE’s staff who need such access to carry out the responsibilities of MHE under the Agreement.
Access to computer applications and PII are managed through appropriate user ID/password procedures.
Access to PII is restricted solely to Subscriber personnel based on the user role they are assigned in the system (provided, however, that it is the Subscriber’s responsibility to ensure that user roles match the level of access allowed for personnel and that their personnel comply with Applicable Law in connection with use of such PII).
Data is encrypted in transmission (including via web interface) at no less than 128-bit level encryption.
MHE or an MHE authorized party performs a security scan of the application, computer systems and network housing PII using a commercially available security scanning system on a periodic basis.
In the event of a Security Incident, MHE shall (i) investigate the Security Incident, identify the impact of the Security Incident and take commercially reasonable actions to mitigate the effects of any such Security Incident, (ii) timely provide any notifications to Subscriber or individuals affected by the Security Incident that MHE is required by law, subject to applicable confidentiality obligations and to the extent allowed and/or required by and not prohibited by Applicable Laws or law enforcement.
Except to the extent prohibited by Applicable Laws or law enforcement, MHE shall, upon Subscriber’s written request, provide Subscriber with a description of the Security Incident and the type of data that was the subject of the Security Incident.
Upon written request by Subscriber, which request shall be no more frequently than once per twelve (12) month period, MHE shall respond to security questionnaires provided by Subscriber, with regard to MHE's information security program applicable to the Services, provided that such information is available in the ordinary course of business for MHE and it is not subject to any restrictions pursuant to MHE’s privacy or data protection or information security-related policies or standards. Disclosure of any such information shall not compromise MHE’s confidentiality obligations and/or legal obligations or privileges. Additionally, in no event shall MHE be required to make any disclosures prohibited by Applicable Laws. All the information provided to Subscriber under this section shall be Confidential Information of MHE and shall be treated as such by the Subscriber.
Upon written request by Subscriber, which request shall be no more frequently than once per twelve (12) month period, MHE's data security measures may be reviewed by Subscriber through an informal audit of policies and procedures or through an independent auditor’s inspection of security methods used within MHE's infrastructure, storage, and other physical security, any such audit to be at Subscriber’s sole expense and subject to a mutually agreeable confidentiality agreement and at mutually agreeable timing, or, alternatively, MHE may provide Subscriber with a copy of any third party audit that MHE may have commissioned.
MHE will use commercially reasonable efforts to retain End User Data in accordance with MHE’s End User Data retention policies.
MHE will use commercially reasonable efforts to regularly back up the Subscriber and End User Data and retain any such backup copies for a minimum of 12 months.