Data Security

EXHIBIT A
Third Party Minimum Data Security Requirements

1.0.         General Security Requirements.

1.1.         Agreement Compliance. Third Party’s compliance with these Security Requirements will not in it of itself excuse Third Party from any of its obligations, including without limitation, indemnification and confidentiality, set forth in the agreement.

1.2.         Compliance with Applicable Laws. Third Party represents, warrants and covenants that its collection, access, use, storage, disposal and disclosure of Mativ Data does and will at all times comply with all applicable laws, including, without limitation, international, federal, state and local privacy and data protection laws and regulations for all jurisdictions in which Third Party is conducting commerce with Mativ Data. Without limiting the generality of the foregoing, the Third Party shall not process any personal data without entering into a separate agreement on the processing of personal data and shall comply at all times with its obligations under such agreement.

1.3.         Notification of Fourth Parties. Third Party will notify Mativ of any planned use of fourth parties to fulfill contract requirements prior to the disclosure of or access to any Mativ systems or data.

1.4.         Single Sign On. Third Party systems shall utilize SAML 2.0, OAuth2, or OpenID Connect for the purposes of providing Mativ employees Single Sign On access to Third Party’s systems.

1.5.         Third Party Network Protection. Mativ data and must at all times be protected from unauthorized use, access, disclosure, alteration or destruction.

1.5.1.         Secure and Private Data Networks. Data networks that have Data Interactions, as defined in Definitions Section, must be secured and private.

1.5.2.         Reputation Based Filtering. Third Party shall use a reputation-based service to determine if a source IP address is a known anonymous proxy and prevent such anonymous proxies from accessing Third Party systems that have Data Interactions, as defined in Definitions Section.

1.6.         Audits. Third Party shall provide Mativ with reasonable and sufficient access to all relevant Third Party personnel, records and facilities including SOC reports upon request. No audit shall unreasonably interfere with Third Party’s performance of services to Mativ or Third Party’s other customers.

1.6.1.      Information Technology and Security Control Audits by External Firm. At least once per year, Third Party shall conduct an audit of the information technology and security controls for all systems used in complying with its obligations under any agreement, including without limitation, a network-level vulnerability assessment based on industry security best practices performed by a nationally recognized third-party audit firm.

1.6.2.      Information Security Audits. Upon prior written notice of not less than fifteen (15) business days, not more than twice in any twelve (12) month period Mativ shall have the right, to conduct a security audit at any Third Party location having Data Interactions, as defined in Definitions Section. The focus of the audits shall be Third Party’s policies, procedures, relevant written records and documentation, security compliance requirements, inspections of equipment, logged data and facilities servicing Mativ and compliance with these Security Requirements. The audits will also include interviews with Third Party personnel who are responsible for data and information security.

1.6.3.      Audit Results Reporting. Upon request, Third Party shall provide to Mativ any relevant formal summaries, attestations, or executive summaries of any security audit reports related to or impacting Mativ data or systems.

1.6.4.      Issue Remediation: Addressing Risks, Gaps, or Other Issues. If Mativ requests a remediation plan to address identified risks, then Third Party shall provide, within an agreed upon timeframe following such request, a written remediation plan to Mativ that details corrective actions, responsible individual(s), and associated time frames for completion of the remediation plan.

1.6.4.1.   Third Party shall provide periodic progress reports during this remediation process.

1.6.4.2.   Mativ may, at Mativ’s convenience and in its sole discretion, verify results after the remediation plan has been executed.

1.6.4.3.   In the event that Mativ learns of, or identifies, a risk or vulnerability related to any Third Party system that transmits, stores or handles Mativ Data, then Third Party shall cooperate with Mativ to immediately address the risk. Possible remediation actions include, but are not limited to, taking down the affected service or application, remediating through development, making configuration changes and adding additional security controls.

1.7.         Mativ System Disruptions. Third Party shall make all commercially reasonable efforts to detect and prevent any disruptions of the Mativ systems or data availability.

1.8.         Intrusion Detection/Prevention Systems. Third Party shall employ an industry-standard Intrusion Detection System (“IDS”) and/or an Intrusion Prevention System (“IPS”).

1.8.1.      Monitoring. The IDS/IPS devices must monitor all ingress and egress traffic in any environment where any Third Party system, that has Data Interactions as defined in Definitions Sections, resides.

1.8.2.      Alerts. The IDS/IPS devices must be configured to alert Third Party personnel of any and all suspected compromises of Mativ Data.

1.9.         Event Logging. Third Party shall configure detailed audit logging for enterprise assets containing sensitive data. Include event source, date, username, timestamp, source addresses, destination addresses, and other useful elements that could assist in a forensic investigation.

1.10.     Business Continuity and Disaster Recovery. On an annual basis, Third Party shall supply Mativ with a detailed business continuity plan related to the Services provided to Mativ. Mativ and Third Party agree to review the Business Continuity Plan at least once per year throughout the Term of this Agreement.

1.10.1.  Third Party Contact Information. Within 30 days of the Effective Date, and upon any organizational changes during the Term, Third Party will send to Mativ, the contact information of the person(s) in charge of Vendor’s business continuity plans should there be an adverse event. The contact information must contain, at a minimum, the name, physical address, email address, business phone number, mobile phone number, and fax number of the contact and their assigned alternate.

1.10.2.  Event Reporting. In the case of an adverse event and within 24 hours of such event, Third Party shall provide Mativ with a description of the problem, the projected length of time Services will be interrupted, and a detailed contingency plan to continue Services.

1.10.3.  Annual Plan Testing. Third Party shall conduct an annual test of the business continuity plan related to the Services provided to Mativ and provide test results or reporting to Mativ within 30 days of test completion.

1.11.     Training. On an annual basis, Third Party shall supply Mativ with a detailed business continuity plan related to the Services provided to Mativ. Mativ and Third Party agree to review the Business Continuity Plan at least once per year throughout the Term of this Agreement.

1.11.1.  Training Material Reviews. Third Party will, upon request of Mativ but no more than annually, provide copies of related training materials for Mativ review.

1.11.2.  Training Certifications. Third Party will, upon request of Mativ, have an officer certify that the applicable Third Party personnel have completed the training.

1.12.     Security Incident Handling. Third Party shall immediately investigate any Security incident, take immediate steps to stop and control any damage, resolve the issue and prevent its recurrence.

1.12.1.  Notification and Escalation. Third Party shall, unless prohibited by applicable law, notify Mativ of any Security Incident as soon as possible, but not more than twenty- four (24) hours following such incident. This includes any inadvertent exchange of Mativ Data outside the intended exchange (e.g., payment card information, etc.). Third Party shall continue to provide written updates every twenty-four (24) hours after submission of the initial report until the incident has been resolved to Mativ’s satisfaction. Notification must include a written report detailing:

1.12.1.1.     the nature of the incident,

1.12.1.2.     timelines of critical events,

1.12.1.3.     scope of suspected data loss,

1.12.1.4.     immediate steps taken to stop the damage,

1.12.1.5.     ongoing resolution activities, and

1.12.1.6.     expected timeline to reach full remediation.

1.12.2.  Breach Investigations. Third Party shall cooperate with Mativ during investigations of any known or suspected security breach of a Mativ system or data network. Third Party shall allow Mativ to employ an outside audit firm to conduct such an audit should it be deemed necessary by Mativ in Mativ’s sole and absolute discretion.

1.12.3.  Abnormal Access Research. Third Party shall follow up on all exceptions, suspected exceptions, suspicious activity, compromises and breaches in any way involving or related to Mativ Data.

1.12.4.  Customer Notification. Third Party shall notify end user customers that have been determined to be impacted as required by all applicable laws, including state privacy laws. In no event shall this provision require Third Party to assume any of the notification obligations that the law requires exclusively of Mativ.

1.12.5.  Login Credentials Incident Notification. Third Party acknowledges Mativ’s right to request additional information at any time, in Mativ’s sole discretion. If Third Party suspects that login credentials have been stolen or compromised in any manner, Third Party shall notify Mativ immediately.

1.13.     Credential Sharing Prevention. Third Party shall not engage in the “sharing” of login credentials (e.g., generic logins) between multiple systems or multiple personnel on any Third Party system having Data Interactions.

1.14.     Quarterly Access Reviews. Third Party shall review all login IDs related to Third Party systems that have Data Interactions, on a quarterly basis, to ensure that any inactive or unauthorized accounts are disabled or removed.

2.0.         Data Access Requirements.

2.1.         Automated Access Prevention. Third Party shall not use any automated means to access, query or otherwise collect Mativ Data from Mativ systems without prior explicit written authorization from Mativ.

2.2.         Mativ Application or System Logouts. Third Party shall ensure that any person or system that logs into any Mativ application or system also explicitly logs out of such Mativ application or system immediately at the end of such use. Third Party acknowledges that Mativ systems will not automatically end inactive sessions through use of time-outs or a similar mechanism.

3.0           Data Collection Requirements.

4.0           Data Processing Requirements.

4.1.         Third Party Hosted Solution Location. All Mativ Data processed through any Third Party or fourth party system must remain within the U.S. and/or any U.S. territory.

4.2.         SOC 2 Type II for Data Centers. If Third Party is processing Mativ Data, or using any third party to process Mativ Data, then the data center and each data center operator (each, a “Data Center Operator”) shall (a) maintain a SOC 2, Type II, report that is no more than one year old, and (b) upon request, provide Mativ with a true and complete copy of the most recent SOC 2, Type II report, for each Data Center Operator.

5.0           Data Storage and Destruction Requirements.

5.1.         Data Storage Location. All Mativ Data stored on any Third Party or fourth party system must remain within the U.S. and/or any U.S. territory.

5.2.         Data Center Security Standards. Third Party shall implement or, if using a third party Data Center Operator, ensure the Data Center Operator has implemented, administrative, physical and technical safeguards to protect Mativ Data that are consistent with the most recently published versions of industry-recognized security standards that have been approved by Mativ.

5.2.1.      SOC 2 Type II for Data Centers. Third Party shall (a) maintain a SOC 2, Type II, report that is no more than one year old, and (b) upon request, provide Mativ with a true and complete copy of the most recent SOC 2, Type II report, for each Data Center Operator.

5.3.         Mativ Data Separation. Mativ Data must at all times be logically separated from all non- Mativ Data by means of using access control or other security related tools to ensure only authorized people are able to access Mativ Data stored on Third Party systems.

5.4.         Data "At Rest" Encryption. All non-public Mativ Data must be encrypted at all times, using a method approved by Mativ in its sole and absolute discretion prior to use, including, but not limited to, while it is stored (“at rest”), regardless of the means, methods or mediums of storage.

5.5.         Data Retention. Unless otherwise set forth in the Agreement, all Mativ Data that is not being used to service an active account must be purged on a regular basis at least once every 6 months to proactively delete such data, and no Mativ Data related to a former Mativ customer may be stored for any period longer than 2 years.

5.6.         Data Return or Destruction Upon Termination or Request. "Except to the extent otherwise specifically set forth in the Agreement, upon termination of the Agreement and upon Mativ request, Third Party shall destroy, at Mativ’s option in Mativ’s sole and absolute discretion, all documents, electronic media, software and other items containing or relating to Mativ Data unless legally required to retain such information.

5.6.1.      Data Return Upon Termination or Request. If Mativ requests the Information to be returned, then delivery must take place by secure methods as determined by Mativ, in its sole and absolute discretion, and must be completed no less than thirty (30) days after termination of the Agreement.

5.6.2.      Data Destruction Upon Termination or Request. Within thirty (30) days following any request made by Mativ, Third Party shall destroy the information in a manner that makes it completely unrecoverable, as approved by Mativ in advance.

5.6.3.      Fourth Party Data Destruction. Within thirty (30) days following any request made by Mativ, Third Party shall require any fourth party in possession of Mativ Data to destroy the information in a manner that makes it completely unrecoverable, as approved by Mativ in advance.

5.6.4.      Data Destruction Certification. Within sixty (60) days following any request made by Mativ, an officer of Third Party will certify in writing to the Mativ Information Security Department stating that all data destruction has taken place in accordance with these Security Requirements.

6.0           Data Transmission Requirements.

6.1.         Data "In Transit" Encryption. All Mativ Data must be encrypted at all times, using a method approved by Mativ in its sole and absolute discretion prior to use, including, but not limited to, while it is transmitted ("in transit"), regardless of the means, methods or mediums of transmission.

 

Definitions

Data Interactions: the acts of accessing, collecting, receiving, processing, storing, or transmitting data.

Access: the ability to view data without the ability to modify the data.

Collect: the act of capturing data on behalf of the company.

Receive: the act of obtaining data that was distributed by Mativ (e.g., email file attachment) Process: the act of performing any operation or set of operations, whether or not by automated means, intended to modify or destroy data.

Store: the act of retaining data virtually or physically for any period of time.

Transmit: the act of sending, moving, or distributing data.

Third Party: an entity that enters into a contractual relationship with Mativ to provide business functions, systems, personnel, or products.

 

Read Mativ’s Terms and Conditions.