Only this pageAll pages
Powered by GitBook
Couldn't generate the PDF for 157 pages, generation stopped at 100.
Extend with 50 more pages.
1 of 100

TRUST CENTER

TRUST CENTER

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

PRODUCTS

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Physical Security

The physical security requirements, roles and responsibilities, as well as the security areas and controls to be implemented and maintained, are defined in the Physical and Environmental Security Standard.

There are four physical security levels, which are based on the type of information, assets, processes, and services managed within office areas.

Each security area has adequate physical security controls such as access control systems, CCTV surveillance, and environmental protection to safeguard information and other assets.

Access rights to security areas are provided based on the "need to know" and "least privilege" principles, and are reviewed, withdrawn, and audited accordingly. Rules have been defined for issuing, wearing, and returning physical access cards, as well as managing physical keys. Turnstiles, automated doors or other physical barriers are set, and may only be passed with the access cards & rights.

Specific instructions to provide visitors with access and accompany them in designated areas have been defined as well. An access log of visitors is kept in each location.

Physical security measures are be implemented to prevent or mitigate damage by fire, flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disasters. The standard also covers security aspects regarding external areas, delivery and loading areas, and discontinued offices.

People Security

People-related processes (e.g. onboarding, assignment of responsibilities, disciplinary processes, remote working, and offboarding, etc.) must also integrate corporate security controls, in accordance with applicable legislation, as defined in the HR Security Standard.

Security responsibilities set out in corporate security policies and standards, are communicated by Corporate Security to the target audience. Contractual agreements must also include responsibilities related to confidentiality, non-disclosure, and intellectual property rights. Security responsibilities that remain after work hours, during remote working, and after the end of collaboration must also be communicated and acknowledged.

Security training courses and awareness campaigns are planned with the aim of informing the staff about the requirements and expectations related to security, the main threats and risks, while indicating the best ways to avoid, mitigate and report them to preserve the organization’s security posture.

Security courses are mandatory for all employees, with a renewal cycle of 3 years. This training is hosted on the organization’s corporate Learning Management System, managed by a dedicated team. Awareness campaigns are launched through a dedicated platform, on a bimonthly-basis, covering various interactive activities that deal with the main threats and risks (phishing, social media, secure passwords, remote working, etc.), helping staff stay alert, and providing them with ways to deal with such situations.

Completion rates are monitored by Corporate Security, striving to achieve set objectives, and following-up whenever necessary to engage staff in fulfilling the activities.

Trust Center Syntphony

The Trust Center Syntphony main objective is to provide detailed information about the high levels of security and compliance present in its various Syntphony products. This Trust Center aims to ensure and transparently present that all offered solutions are always aligned with the main market standards, providing customers with the peace of mind that their information is protected and in compliance with current regulations.

At the Trust Center Syntphony, you will find a wide range of resources and documentation that demonstrate NTT DATA commitment to information security and data privacy. Among the main highlights are:

  • Security Certifications: Information about the certifications obtained by NTT, which prove adherence to the most rigorous international security standards.

  • Privacy Policies: Details about the policies implemented to ensure the protection of users' personal data.

  • Regulatory Compliance: Documentation that evidences compliance with the main regulations and data protection laws, such as GDPR, among others.

The Trust Center Syntphony is a reflection of NTT's ongoing commitment to providing secure, reliable technological solutions that comply with the highest market standards. Explore our Trust Center and discover how NTT is working to protect your information and ensure compliance in all aspects.

Security Risk Management

The security risk framework, explained in the Security Risk Management Standard for NTT DATA EMEAL, defines the roles and responsibilities of all actors involved in risk management, as well as describes the various risk approaches and risk governance instances.

The steps for systematic risk management such as establishing the context, identifying and evaluating risks, treating risks, communicating, and reviewing are outlined based on the ISO 27005 standard.

The approach to security risk management is oriented both to protect work tools and products as well as to ensure business objectives, thus, two security risk dimensions are highlighted: asset-based risk assessment, and operational risk assessment.

Risk governing bodies at strategic and operational levels, and the communication and escalation mechanisms for risk owners and committees are also defined.

Risk treatment measures are implemented to maintain the risk levels below the established risk appetite set by the Top Management and monitoring actions are carried out to ensure they are completed in due time. The periodicity of assessments is stablished to be, at least, yearly.

Security Operations & Security Incident Management

Threat intelligence and security monitoring mechanisms and processes are executed to determine the threat landscape as accurately as possible, and feed information into other security processes.

A SIEM/UEBA solution is implemented to centralize data from various log sources, and events are correlated to detect anomalous activity. 24/7 monitoring is performed to spot malicious events and facilitate incident response.

Resources are allocated to manage security incidents throughout their lifecycle, including a dedicated Security Incident Response Team, dedicated SOC, and associated processes and tools. Internal and external communication procedures are activated to keep relevant stakeholders informed.

Evidence resulted from security incident investigation and handling actions is securely stored and preserved in accordance with applicable requirements.

Collaboration channels with various area experts within the business and, when necessary, external partners, are maintained for proper and effective response.

Fallback plans are defined and activated in case planned eradication and recovery take an unexpected turn.

Vulnerability management processes and technologies are implemented to enable the identification, analysis, and categorization of vulnerabilities across the infrastructure, and communication to relevant roles for remediation. Patching requirements are also defined, considering the criticality of vulnerabilities identified.

Identity and Access Management

The roles and responsibilities related to identity and access management are defined for Corporate Security, System Administrator, System Owners and End Users in the Identity and Access Management Standard.

Security requirements for end user accounts, privileged user accounts, break-glass user accounts and service/application accounts are also established, including aspects such as account differentiation, uniqueness, traceability, validity, access rights, lockout policy, deactivation and deletion.

Access to corporate resources is only allowed via encrypted communication channels with multi-factor authentication. It also lists the accepted authentication methods, such as password, PIN and biometric factors. The security requirements for password and PIN creation, complexity, expiration and history are defined.

Access rights management processes are guided by the "need to know" and "least privilege" principles.

Privileged accounts and access rights go through a formal request and approval process.

All accounts and access rights are reviewed at least annually to determine if they are still needed or not.

Acceptable User of Assets

A Standard has been developed to establish the security requirements for the acceptable use of corporate IT assets by all employees and third parties.

It focuses on transparency when it comes to the responsibilities assigned to all Asset Users in complying with the acceptable use rules and reporting security incidents.

IT assets are handed to users to carry out the professional activities required by NTT DATA EMEAL. It is prohibited to use NTT DATA EMEAL IT assets for activities that may violate company policies, laws, or cause damage to the company, its clients, or partners.

IT assets, such as digital devices, user accounts, email and messaging, internet, networks, applications and services, storage media, are protected at all times.

Requirements for the return of assets are also defined in this Standard.

Breaches of acceptable use rules are to be investigated and, when deemed necessary, disciplinary actions will be taken proportional to the damage caused.

Suppliers Security Management

Security requirements applicable to suppliers and supplier relationship management are defined, implemented and improved continuously in NTT DATA EMEAL.

A security homologation process is implemented to ensure suppliers are assessed and selected taking into consideration the applicable security requirements.

Security requirements applicable to suppliers are captured in contractual agreements, policies, procedures and other authoritative documents.

Risks originating from the supply chain are managed through the corporate security risk management process, and treatment measures are defined to reduce the risk impact on NTT DATA EMEAL’s operations.

Throughout their relationship with NTT DATA EMEAL, suppliers are expected to implement and improve the agreed security controls, and undergo audits as needed.

Assets to which the suppliers have access are handled in accordance with NTT DATA EMEAL’s requirements and returned in accordance with the established ownership.

Security Organizational Model

A governing body has been established to manage information security on all layers – from Corporate to individual Countries: EMEAL Corporate Security.

The team is coordinated by the EMEAL CISO, and has 2 components: the CISO Forum – overseeing security matters in regions and countries; and the Cross-Operations – overseeing Security Governance, Business Security, Business Continuity and Security Operations.

The core of NTT DATA EMEAL Security Posture

NTT DATA EMEAL believes that the core of a strong security posture is formed by its People, so it aims at bringing together bright and competent minds, passionate about security, to develop, implement, monitor, and continuously improve the security measures within the organization.

The security posture is guided by strong security principles, such as the commitment and leadership of the management, security as a comprehensive process, security embedded in the business, resilience to cyberattacks, risk management, awareness and training, matching responsibilities with the right people, regulatory compliance, and continuous improvement.

Secure Software Development

Security requirements are integrated in all software development phases, as defined in the Secure Software Development Lifecycle standard. Approval gateways shall be established between relevant phases, to ensure the expect degree of quality and security.

Software is designed considering good practice security principles, such as security by design, zero trust, fail securely, as well as NTT DATA EMEAL’s security controls. Software must also be designed to reduce vulnerabilities and enhance maintainability and scalability.

Secure development guidelines are implemented and followed, to preserve the security of information. Development environments and source code are protected throughout the entire lifecycle, and access is controlled.

Test environments are controlled, and security code review and testing operations are carried out before release. Selected test data is carefully selected to be representative for the test scope.

Backup and recovery processes are planned to ensure effective fallback if needed.

Software migrated to the production environment is closely monitored to ensure it’s running properly. Regular maintenance and update activities is performed for current software.

Security Governance Approach

NTT DATA EMEAL aims to bring information security closer and more accessible to its community by continuously fine-tuning the security requirements set in policies, standards, procedures and guidelines. On top of this, it develops and launches periodical security training courses & awareness campaigns to support easier absorption of these requirements and bring the most common and current threats into the spotlight.

The Information Security Policy is at the top of NTT DATA EMEAL’s governance approach. All statements cascade over lower tiers, where security controls take shape in standards, and are further developed in procedures, and guidelines.

These statements and controls reflect the commitment to meet the security requirements and expectations of stakeholders, and safeguard the confidentiality, integrity and availability of information.

They capture the security objectives, which are aligned with the organization's strategic direction and support its goal of leading the technology market by offering high-value services.

The security principles are based on the international standards and good practices related to information security to which the organization adheres.

The key outcomes expected for complying with this policy are a reduction of security incidents and their impact, strengthening of business resistance to cyber-attacks, increase of customers and business partners trust, demonstration of compliance with applicable legal and regulatory requirements and contractual obligations.

Security

Management Commitment

NTT DATA EMEAL is a consulting and outsourcing company with more than 30 years of experience, positioned in all sectors of the economic field and with a presence in Europe and Latin America. As a regional unit of NTT DATA Inc., the organization demonstrates great capacity for adaptation and transformation.

NTT DATA EMEAL’s Top Management is committed to establishing, implementing, and keeping up to date an Information Security Management System that supports its strategic direction and enables the organization to:

• Satisfy the requirements and expectations of its clients and other stakeholders.

• Comply with the legal, regulatory, and normative requirements of application.

Security in IT Operations

Security requirements related to IT Operations are defined and integrated in processes and technologies to protect information at rest, in transit, and in use, and ensure secure configuration of endpoints, networks, and cloud environments.

Endpoints are centrally managed and secured through next-gen malware detection & response, software installation controls, configuration management, and monitoring solutions. Systems are hardened to reduce the attack surface.

Strong authentication mechanisms are enforced, including automatic session termination in case of inactivity.

Corporate networks are protected by strict security mechanisms (e.g., access control, segregation, secure protocols and connection, firewalls, IDS, IPS, etc.). Suspicious connections are filtered. Access to cloud-based environments and services must comply with the identity and access management security requirements, including MFA.

IT resources are regularly backed up to support the continuity of business operations and information security.

Systems are be calibrated, maintained, and assessed regularly to ensure their availability, efficiency, and performance. Patch management processes are executed to remediate vulnerabilities.

Encryption controls using industry-accepted parameters are defined, and are implemented in accordance with the applicable legislation, considering the criticality of information and systems as well.

• Satisfy the requirements of international standards and good practices related to information security to which the organization adheres.

• Safeguard the integrity, availability, and confidentiality of information in order to adequately protect it and ensure business continuity and efficiency.

Through a unique and singular company model, NTT DATA EMEAL seeks to achieve high professional performance.

This commitment responds to the organization’s objective as a company: to lead the technology market by offering high-value services aimed at the strategic and operational improvement of its clients.

IT assets are managed and tracked throughout their lifecycle, to ensure they remain up-to-date.

Compliance

Certifications and Standards

Industry compliance and certifications reinforce our operational excellence

At NTT DATA, we are committed to attaining top-tier industry accreditations in data center and security, providing our valued commercial clients with unwavering confidence in the security of their mission-critical IT systems hosted within our state-of-the-art colocation facilities.

When the time comes for your crucial audits and accreditation procedures, we stand prepared to support you with exclusive facility tours and interviews featuring our team of seasoned experts in IT security and physical security.

Explore our comprehensive list of certifications across various NTT DATA geographies, showcasing our dedication to maintaining the highest standards in the industry.

The certifications and regulations for the NTT DATA Syntphony assets are listed below:

GDPR

NTT DATA Syntphony assets complies with the General Data Protection Regulation (GDPR), which regulates the processing of personal data of individuals within the European Union (EU).

HIPAA Security Rule

The HIPAA Security Rule of 2003 requires covered entities to implement or address over 50 administrative, physical, and technical safeguards designed to ensure the confidentiality, availability, and integrity of electronic protected health information (ePHI), including the prevention of unauthorized access to ePHI.

ISO27001

ISO 27001 is an international standard outlining best practices for an information security management system (ISMS), which is a framework of policies and procedures that includes all legal, physical, and technical controls involved in an organization's information risk management processes.

Conversational AI Agents

Component Introduction

SYNTPHONY CONVERSATIONAL AI is a solution developed by NTT DATA SPAIN S.L.U. belonging to the NTT DATA Europe & Latam group (hereinafter NTT DATA) and designed for for creating and managing virtual agents, uses artificial intelligence with Generative AI to understand and deliver hyper-personalized responses to users. Our tool is developed considering efficiency, security and compliance with the data protection regulations. To learn more, explore our webpage Syntphony.

Main Features:

  • Improved Customer Experience.

  • Personalized Brand Engagement.

  • Reduced Operational Costs.

Syntphony Beyond Net Zero

Product Introduction

Syntphony Beyond Net Zero is designed to seamlessly collect, calculate, and report sustainability data, empowering organizations to seize sustainability opportunities and mitigate risks effectively, while ensuring compliance.​ To learn more, explore our webpage Syntphony.

Customer Support Policy

Syntphony wants harmony in your business, to achieve that our Customer Support Policy provide scalable and flexible services built with your business needs at its core. Choose the service that sounds right for your organization and find its perfect rhythm with Value-Add Services.

Customer Support Plans:

  • Standard: Standard plan is included for all Syntphony customers.

  • Advanced: Minimum recommended tier if you have production workloads.

  • Premier: Recommended if you have production and/or business critical workloads with fast response times and additional services to optimize your support experience.

  • Platinum: Designed for enterprises with critical workloads, with the fastest response time, and dedicated Technical Account Manager.

Technical Account Manager

In a business environment, a Technical Account Manager (TAM) service is often the primary point of contact for clients. They are responsible for understanding the client's business needs and coordinating with the company's technical team to ensure those needs are met. TAMs also monitor the client's usage of the product or service to identify opportunities for improvement or additional support.

  • Service conditions: Only available for PLATINUM plan. Available during business days.

  • Service agreement: Dedicated hours depending on agreement.

Back

Industry Cloud

Component Introduction

Syntphony Industry Cloud accelerate sector-specific transformation through cloud-native, prebuilt components—bringing agility, composability and control to regulated industries where customisation, compliance and scalability are essential to competitive growth.​ To learn more, explore our webpage Syntphony.

Syntphony Autonomous Supply Chain

Product Introduction

Autonomous Supply Chain is a solution developed by NTT DATA SPAIN S.L.U. belonging to the NTT DATA Europe & Latam group (hereinafter NTT DATA) and designed to automate decisions that are made cognitively. Our tool is developed considering efficiency, security and compliance with the data protection regulations. To learn more, explore our webpage Syntphony.

Main Features:

- Multi-agent system.

- Customizable according to the client's needs.

AI Factory

Component Introduction

Syntphony AI Factory operationalise Generative AI with prebuilt use cases, private LLMs and modular architecture—accelerating deployment, reducing complexity and ensuring secure, enterprise-grade scalability and governance by design. To learn more, explore our webpage Syntphony.

Natural Capital

Component Introduction

Syntphony Natural Capital is a digital tool that enables organizations to assess, value and manage their interactions with nature, supporting nature-positive strategies, regulatory alignment and science-based decisions through geospatial data and recognized sustainability frameworks.​To learn more, explore our webpage Syntphony.

Syntphony AI

Product Introduction

Syntphony AI provides you with a common data layer and data management capabilities to build the foundation of your Data & AI platform, including technical capabilities, Gen Al features and packaged modules like Conversational AI Agents or intelligent search to just mix & match and deploy services into production to accelerate the most common vertical use cases. To learn more, explore our webpage Syntphony.

Business Continuity Approach

NTT DATA EMEAL’s business continuity framework is directed by the Business Continuity & Crisis Management Policy, and it covers key elements such as business processes, people, facilities, IT infrastructure and services, operations in scope of customer contracts, and security certifications.

The policy is based on the commitment of the top management to invest in and promote BC & CM within the organization, following industry good practices, ensuring the protection and safety of people, identifying and managing risks, defining and testing business continuity plans (BCPs), and reporting on the effectiveness of the BCMS.

Crisis Committees, comprised of relevant stakeholders and expert support roles from the business and support areas, shall be formed to navigate through disasters that may occur or to escalate to executives when their involvement is required.

The Business Continuity & Crisis Management framework supports the organization in:

  • Providing the business operations after a significant disruption with the least possible impact

  • Managing the resilience and recovery of business processes within the organization

  • Implementing the required strategies to recover the critical functions

  • Providing the tools and means for guaranteed and effective communication during crisis

Carbon Calculator

Component Introduction

End-to end carbon footprint calculation for devices, applications, cloud, data centres, networks and Real Estate, based on real-time data. Corporate carbon emissions reporting.​ To learn more, explore our webpage Syntphony.

Secure Data Deletion

NTT Data’s data deletion process is designed to ensure the secure and effective removal of sensitive and confidential information. Key guidelines include:

  • Data Classification: Prior to deletion, information is assessed for sensitivity to determine appropriate deletion methods.

  • Deletion Methods: Techniques such as data overwriting and physical destruction of media are employed to ensure irrecoverability.

  • Regulatory Compliance: Deletion practices align with legal and industry standards.

  • Documentation: Detailed logs of data deletion activities are maintained to support auditability and accountability.

  • Employee Training: Staff are trained on proper data disposal procedures.

This approach ensures data security and maintains customer trust.

Case Escalation

Depending on the support plan purchased, PREMIER or PLATINUM, there are some ways at client’s disposal to manage the priority of an already submitted non-P1 case but your situation changes to critical.

  • Raise to P1: This option allows you to change the priority of a case to P1 on your support case management, notifying the support team of the urgency for the case.

  • Contact the Technical Account Manager (TAM): Only available for PLATINUM plan. In case of help and guidance, TAM can provide information about the case, and the support process to achieve the solution as fast as possible. This option should be the first one to take in case of necessity, TAM will help the client to evaluate the best way to escalate the case.

Back

Syntphony Business Transformation

Product Introduction

Syntphony Efficiency & Business empowers organizations to optimize operations, increase productivity and deliver tailored solutions with seamless integration of out-of-the-box capabilities for each industry and facilitates technological adoption with immersive learning. To learn more, explore our webpage Syntphony.

Service Credits

We will process claims within 45 days of receipt. If we determine that you have satisfied the customer obligations above and that none of the below limitations applies to your claim, we will grant you a Service Credit.

We will apply any Service Credit to a future invoice or payment for the Syntphony customer environment that experienced the Downtime. Service Credits will not be applied to fees for any other environments.

Service Credits are your exclusive remedy under this SLA.

Product Upgrade Plan

Be Tuned

Products evolve in time: new security updates, features and benefits. Do not miss last updates for your products with Be tuned. We offer two plans designed to stay up to date:

  • Basic: Basic plan is included for all Syntphony customers. You may be informed about products release reports and will be able to check the process to update your product at your own pace.

  • Signature: PREMIER and PLATINUM tiers include Signature plan for Be tuned. Enjoy the benefits of the basic plan and providing proactively you with upcoming EOS/EOL dates that applies to you, and how to plan for those with time.

Infrastructure

Syntphony Knowledge Search operates on a hybrid infrastructure comprising client-managed systems and Microsoft Azure's cloud platform. This combination offers the best of both worlds: the flexibility and scalability of Azure's advanced cloud services, along with the control and customization of client-specific infrastructure. By integrating these environments, Syntphony Knowledge Search delivers a seamless experience tailored to business needs. For more information about their security practices, see below:

Customer Obligations

To be eligible for a Service Credit:

  1. You must have contracted a level of support eligible for Service Credits that ADVANCED, PREMIER and PLATINUM.

  2. You must log a support ticket with our Support Team within 24 hours of first becoming aware of an event that impacts service availability.

  3. You must submit your claim and all required information by the end of the month immediately following the month in which the Downtime occurred.

  4. You must include all information necessary for to our Support Team to validate your claim, including:

    1. A detailed description of the events resulting in Downtime, including your request logs that document the errors and corroborate your claimed outage (with any confidential or sensitive information in the logs removed or replaced with asterisks).

    2. Information regarding the time and duration of the Downtime.

    3. The number and location(s) of affected users (if applicable).

  5. You must reasonably assist the Support Team in investigating the cause of the Downtime and processing your claim.

  6. You must be up-to-date with all payments and with all contractual documentation up to date and signed.

Infrastructure

Syntphony Employee Communications operates within the Microsoft Azure cloud ecosystem, taking advantage of its cutting-edge security protocols, AI-powered analytics, and seamless integration capabilities. Azure’s infrastructure ensures that Syntphony Employee Communications benefits from end-to-end encryption, advanced threat detection, and compliance with industry-leading security standards. This enables businesses to trust Syntphony Employee Communications with sensitive data while ensuring uninterrupted service and optimal system reliability. For more information about their security practices, see below:

Data Encryption

All backup data is automatically encrypted when stored in the cloud using Azure Storage Encryption, supporting compliance and security commitments. Data at rest is protected with 256-bit AES encryption, one of the most secure block cipher methods available, compliant with FIPS 140-2. Furthermore, all backup data in transit is securely transmitted over HTTPS, ensuring it remains within the Azure backbone network. For database storage, Transparent Data Encryption (TDE) is enabled by default in Azure, safeguarding sensitive information from unauthorized access—even at rest. This comprehensive encryption strategy ensures data security while facilitating compliance with data protection regulations and building trust in cloud-based information management. For detailed information on the types of encryption used by Microsoft Azure, visit the official Microsoft page:

Infrastructure

Syntphony Immersive Experience is hosted on Microsoft Azure, a globally recognized cloud platform known for its security, scalability, and enterprise-grade services. By leveraging Azure’s robust infrastructure, Syntphony Immersive Experience ensures high availability, seamless performance, and compliance with international security standards. This cloud environment allows for flexible resource management, enabling organizations to scale operations efficiently while maintaining optimal performance and data integrity. For more information about their security practices, see below:

Conformity

Certifications

Syntphony Intelligent Automation in addition to the general certifications for our syntphony products, this asset meets the following certification:

  • Spanish National Security Scheme (ENS) certification, ensuring the protection of citizen data in electronic procedures. Backed by the ENS, it demonstrates absolute commitment to privacy and user confidence in secure and efficient electronic processes.

Authorization and Authentication

Syntphony uses Azure AD B2C, enabling federation with any Active Directory that complies with OIDC (OpenID Connect) standards. It supports secure and flexible identity management and login experiences. Azure AD B2C leverages authentication protocols such as OpenID Connect, OAuth 2.0, and SAML, allowing seamless integration with modern apps and enterprise software.

Benefits of Azure AD B2C:

  • Scalability: Manages millions of user identities.

  • Customization: Flexible login experiences.

  • Security: Strong data protection and compliance.

For more details on Azure AD B2C and its capabilities, see the official Microsoft documentation:

Infrastructure

Syntphony Conversational AI benefits from the combined capabilities of Google Cloud and Microsoft Azure, leveraging the best of both platforms. This dual-cloud strategy allows Syntphony Conversational AI to utilize the innovative AI and data analytics tools of Google Cloud alongside Azure's enterprise-grade infrastructure and global reach. This hybrid approach ensures flexibility, scalability, and a robust infrastructure to support the needs of diverse clients.

GCP and Azure employ industry-leading security controls and are extensively audited. Both hold multiple certifications, including SOC2 Type II, ISO 27001, and PCI. For more information about their security practices, see below:

Conformity

Certifications

Syntphony Immersive Experiences in addition to the general certifications for our syntphony products, this asset meets the following certification:

  • Spanish National Security Scheme (ENS) certification, ensuring the protection of citizen data in electronic procedures. Backed by the ENS, it demonstrates absolute commitment to privacy and user confidence in secure and efficient electronic processes.

Service Level Agreements

Syntphony SaaS products service commitment guarantees a Monthly Uptime Percentage of at least 99.5% during any monthly billing cycle. If this commitment is not met, then you may be eligible for Service Credits.

Service Credits are structured as follows:

Monthly uptime percentage
Service credit percentage

Support Limitations

  • For any software, hardware or other elements of the Customer environment not provided by NTT DATA.

  • If Customer or a third party has altered or modified any portion of the Software.

  • If Customer has not used the Software in accordance with Documentation or instructions provided by NTT DATA, including failure to follow implementation procedures.

Pricing

Customer Support Model - Pricing

Standard
Advanced
Premier
Platinum

Proactive Business Monitoring

Proactive Business Monitoring can be used for every product covered by the PLATINUM Customer Support plan.

This service could monitor up to three business probes by the Product Support team to ensure the health of the business flows related with the Syntphony products solution.

  • Service conditions: Only available for PLATINUM plan. Product Support team will monitor the products health and define proactively alerts and procedures if any issue is raised to support.

  • Service agreement: Up to three business probes can be monitored. Availability depending on agreement.

Conformity

Certifications

Syntphony Conversational AI guarantees confidentiality, integrity and availability of information. In addition to the general certifications for our syntphony products, this asset meets the following certifications:

  • Spanish National Security Scheme (ENS) certification, ensuring the protection of citizen data in electronic procedures. Backed by the ENS, it demonstrates absolute commitment to privacy and user confidence in secure and efficient electronic processes.

  • NTT DATA Syntphony Conversational AI has successfully obtained SOC 2 Type I security certification. The SOC2 report certifies that this product has implemented controls over the security, availability, and confidentiality of customer data. This encompasses controls related to data backup and recovery, network security, access control, and vulnerability management.

Subprocessors

The subprocessors listed below support NTT DATA in the provision of maintenance and technical support services, common to Syntphony products listed in the scope of the . Please note that each Syntphony product may also rely on additional subprocessors for specific functionalities which are listed separately in each product’s individual Subprocessors section within this Trust Center.

Subprocessor
Service Provided
Location
Guarantees

Support Model

Scope

Our support models are designed to ensure the reliability, efficiency, and accessibility of our services, providing the foundation for a seamless user experience. This section outlines the support models applicable to the products depicted in the image.

For information regarding support models for other Syntphony products not covered in this scope, please refer to the respective product's dedicated section within the Trust Center.

List of abbreviations

Abbreviation

Lifecycle Policy And Legacy Support

Syntphony Lifecycle Policy provides consistent and predictable guidelines for support throughout the life of a product, helping customers manage their IT investments and environments while strategically planning for the future.

All versions released by assets covered by Customer Support Plans have an associated support for 1 year. Most of the products will be able to update to newer versions in time, but in case EOS applies, NTT DATA will provide a minimum of 6 months notification prior to ending support for those versions.

Customer Support for PREMIER and PLATINUM plans can purchase Legacy support service depending on the scenario:

  • EOS (End of Support): EOS is often the precursor to EOL. The product would announce an end date after which they no longer support a system or service. This applies before a migration of users to newer versions of the product. In this scenario Legacy support provides you with an extra 1 year of support.

Immersive Experiences

Component Introduction

Syntphony Immersive Experiences creates large-scale VR and immersive experiences.​ The enterprise extended reality platform.​ Customer and employee experiences that span a wide range of scenarios combining immersive, shared and customisable virtual spaces. To learn more, explore our webpage .

Syntphony Immersive Experiences is a solution developed by NTT DATA SPAIN S.L.U. belonging to the NTT DATA Europe & Latam group (hereinafter NTT DATA) and designed for immersive experiences that can be incorporated into a wide variety of business scenarios, from creating a learning path, displaying products in a virtual shop or visualizing floor plans to remote assistance. Our tool is developed considering efficiency, security and compliance with the data protection regulations.

Main Features:

  • Enterprise friendly and ready.

Employee Communications

Component Introduction

Syntphony Employee Communication connects and empowers every employee on a single digital platform. A digital workspace to boost employee experience and engagement, harnessing the full potential of Microsoft 365. To learn more, explore our webpage .

Intelligent Automation

Component Introduction

Syntphony Intelligent Automation is a platform to transforming business processes and maximising value.​ Intelligent automation that provides organisations with end-to-end business process transformation solutions aligned with the organisations' strategies and technology. To learn more, explore our webpage .

Syntphony Intelligent Automation is a solution developed by NTT DATA SPAIN S.L.U belonging to the NTT DATA Europe & Latam group (hereinafter NTT DATA) and designed to connect corporate strategy with operations transformation, maximizing the value of people, processes and technology. Our tool is developed considering efficiency, security and compliance with the data protection regulations.

Main Features:

  • Adapts to the needs and technological maturity of organizations

Security

Secure Design

NTT Data incorporates security into all phases of the Software Development Life Cycle (SDLC). Key components include:

  • Risk Assessment: Identification of potential software vulnerabilities prior to development.

  • Security Requirements: Defined at project initiation to address data protection and access controls.

  • Secure Development: Best coding practices including input validation, error handling, and protections against SQL injection and XSS.

Definitions

  • As used herein, "billing cycle" refers to a calendar month.

  • "Applicable Monthly Service Fees" means the total fees paid by the customer for the given Syntphony subscriptions during the month in which Downtime occurred.

  • "Downtime": A minute is considered unavailable if all of your continuous attempts to establish a connection to the Syntphony product customer environment within the minute fail. Downtime does not include scheduled downtime for maintenance and upgrades.

Knowledge Search

Component Intoduction

Syntphony Knowledge Search is the intelligent search engine that finds the most relevant and accurate information from your organization's data, both structured and unstructured, and provides valuable ontology-based information. To learn more, explore our webpage .

Syntphony Knowledge Search is a solution developed by NTT DATA SPAIN S.L.U. belonging to the NTT DATA Europe & Latam group (hereinafter NTT DATA) and designed to be the intelligent search engine for an organization. Our tool is developed considering efficiency, security and compliance with the data protection regulations.

Main Features:

  • Consolidation of information from multiple sources in unified profiles.

  • Employee onboarding.

Exclusions

Downtime does not include, and you will not be eligible for a Service Credit for, any performance or availability issue that results from:

  1. Factors outside our reasonable control, such as natural disaster, war, acts of terrorism, riots, government action, cyberattack, power outage, or a network or device failure at customer site or between customer site and NTT Data customer environment.

  2. Services, hardware, or software provided by a third party, such as cloud platform services on which the customer environment runs.

  3. Customer or any third party’s (a) improper use, scaling, or configuration of Syntphony product, or (b) failure to follow appropriate security practices.

Environmental Markets

Component Introduction

Enviromental Markets is a secure and traceable blockchain system enabling ESG compliance and sustainable project funding through flexible environmental credit generation across carbon, water, energy and biodiversity assets.​ To learn more, explore our webpage .

Conformity

Certifications

Syntphony Employee Communications in addition to the general certifications for our syntphony products, this asset meets the following certification:

  • Spanish National Security Scheme (ENS) certification, ensuring the protection of citizen data in electronic procedures. Backed by the ENS, it demonstrates absolute commitment to privacy and user confidence in secure and efficient electronic processes.

Sales

Component Introduction

Syntphony Sales is a multi-channel solution for managing physical and virtual points of sale.​ We help supermarkets and retailers meet the challenges of the future with a scalable and customisable sales solution with advanced management logic. To learn more, explore our webpage .

Syntphony Sales is a solution developed by NTT DATA SPAIN S.L.U belonging to the NTT DATA Europe & Latam group (here in after NTT DATA) and designed as a business management tool. Our tool is developed considering efficiency, security and compliance with the data protection regulations.

Main Features:

  • Adaptable Sales Solutions

  • Complete API Integration

Infrastructure

Syntphony Payments leverages the power of Microsoft Azure, a cloud platform known for its global reach, reliability, and advanced security features. Azure provides a comprehensive suite of tools and services that enable Syntphony Payments to deliver high availability, scalability, and compliance with industry standards. With its focus on innovation and seamless integration, Azure ensures that Syntphony Payments can support modern business requirements and evolving customer needs. For more information about their security practices, see below:

Infrastructure

Syntphony Learning Tech operates on AWS (Amazon Web Services), one of the most robust and flexible cloud platforms in the industry. AWS offers an extensive array of services, from compute and storage to advanced machine learning capabilities. With AWS, Syntphony Learning Tech benefits from a secure, scalable, and highly available infrastructure, ensuring optimal performance even under demanding workloads. The platform's emphasis on innovation and global scalability allows Syntphony Learning Tech to meet the needs of clients across industries. For more information about their security practices, see below:

Conformity

Certifications

Syntphony Payments is designed to provide a secure, reliable, and compliant payment processing experience, meeting the highest industry standards. Our product is certified with:

  • ISO 20000 – Ensuring our 24x7 Team Operations follow best practices in IT service management, guaranteeing high availability and efficiency.

  • ISAE 3402 (SOC1 & SOC2) Report – Validating our IT security checks, ensuring compliance with financial reporting controls (SOC 1) and robust security, availability, and confidentiality measures (SOC 2).

Conformity

Certifications

Syntphony Learning Tech in addition to the general certifications for our syntphony products, this asset meets the following certification:

  • Spanish National Security Scheme (ENS) certification, ensuring the protection of citizen data in electronic procedures. Backed by the ENS, it demonstrates absolute commitment to privacy and user confidence in secure and efficient electronic processes.

Syntphony Commerce & Payments

To learn more, explore our webpage .

User and Password Management Policy

NTT Data defines security standards for user accounts and sensitive data access. Highlights:

  • Account Creation: Only authorized personnel can obtain access to critical systems.

  • Password Requirements: Strong password policies (length, complexity, uniqueness).

  • Password Changes: Periodic updates and secure reset procedures.

Business Continuity Plan

NTT Data’s continuity plan ensures business resilience during disruptive events. Key components:

  • Risk Assessment: Identifying threats and vulnerabilities.

  • Strategy Development: Creating plans to maintain critical operations.

  • Resource Planning: Identifying necessary personnel, technology, and budget.

Data Management

Component Introduction

Syntphony Data Management unify customer data into a single Golden Record using real-time validation, enrichment and deduplication—ensuring accuracy, GDPR compliance and insight-driven decisions across B2B and B2C contexts.​ To learn more, explore our webpage .

Descriptions of your attempts to resolve the Downtime at the time of occurrence.
If the Customer is running a version of the Software that has passed its end-of-support or end-of-life date, or for Beta Offerings.
EOL (End of Life): This means the version should be taken out of service. In this scenario Legacy support provides you with an extra 1 year of support.
  • Service conditions: Legacy support service is available for an additional licence fee and benefits from:

    • Extended technical support for deprecated product versions.

    • Updates, fixes, security alerts, data fixes, and critical patch updates.

  • Back

    Code Reviews: Static analysis and peer reviews detect issues early in the development cycle.

  • Security Testing: Penetration and vulnerability tests are conducted before deployment.

  • Staff Training: Developers receive ongoing training on secure coding standards.

  • Documentation & Tracking: All security-related development activities are documented and monitored.

  • This proactive approach ensures secure, compliant applications and reinforces client trust.

    "Downtime Period" means a period of more consecutive 5 minutes of Downtime. Partial or intermittent Downtime for a period of less than five minutes will not count towards any Downtime Periods.

  • "Monthly Uptime Percentage", is the total number of minutes in a month, minus the number of minutes of Downtime suffered from all Downtime Periods in a month, divided by the total number of minutes in a month.

  • "Service Credit" is the percentage of the Applicable Monthly Service Fees to be credited to the customer if NTT Data Syntphony Products approves the claim, as outlined in the table above.

  • "Customer environment", is a single Syntphony logical environment provided to a customer.

  • Demo Syntphony products environments or proof of concepts.

    Authentication: Use of multi-factor authentication (MFA) for added security.

  • Monitoring & Auditing: Continuous account activity monitoring and periodic audits.

  • Awareness: Training employees on password management best practices.

  • This policy protects access to critical information and limits exposure to unauthorized access.

    Incident Response: Clear protocols for incident management and communication.

  • Training: Employees receive ongoing training on their roles during disruptions.

  • Review & Update: Periodic plan reviews to reflect changing risks. This policy ensures rapid and effective recovery and sustained operations.

  • Back
    Introduction to Azure AD B2C
    Authentication Protocols in Azure AD B2C
    Application Integration Guide
    Back
    Customizable.
  • Scalable.

  • Syntphony
    Syntphony
    Completely modular
  • Dynamic redefinition of transformation plans

  • Syntphony
  • Representation of relationships between entities by means of graphs, allowing graphical navigation through the information that exists at the company.

  • Syntphony
    Syntphony

    Comprehensive Sales Tools

  • Tailored Solution for Every Channel

  • Syntphony
    Syntphony
    Syntphony

    Maximum Financial Credit

    The aggregate maximum number of Service Credits to be issued by NTT Data to the Customer, for any and all downtime periods that occur in a single billing month, will not exceed the amount due by the Customer for the Syntphony environment service, with a maximum annual amount equal to four months of billing.

    Other contracted services will not be affected by the service credit.

    Support Case Severity

    Severity definition
    Description

    P1: Critical impact—service unusable in production

    The application or infrastructure is unusable in production, having a significant rate of user-facing errors.

    Total loss of basic business functions in production environments. This refers to a complete blockage of the business processes supported by the application (e.g. billing, collections, etc.).

    P2: High impact—service use severely impaired

    Partial loss of a business function and/or significant degradation of service performance. Refers to a partial blocking of business processes, but a work-around is available.

    The infrastructure is degraded in production, having a noticeable rate of user-facing errors or difficulties in spinning up a new production system.

    P3: Medium impact—service use partially impaired

    Loss of function or degradation of business processes in production environments that affect individual users or small groups of users with minimal impact. Pull requests are also included in this category.

    Case requires more in-depth investigation and troubleshooting and less frequent interactions.

    P4: Low Impact—Service Fully Usable

    This category includes modifications or tasks that are not critical but contribute to the proper functioning of the system.

    Recommended for consultative tickets where in-depth analysis, troubleshooting or consultancy are preferred to more frequent communications.

    Back

    Data Loss Prevention (DLP)

    NTT Data’s DLP policy is a set of guidelines designed to protect sensitive and confidential information from unauthorized disclosure or access. Key strategic measures include:

    • Data Classification: Categorizing data by sensitivity level for tailored protection controls.

    • Access Controls: Role-based access ensures that only authorized personnel can access sensitive data.

    • Monitoring & Detection: Tools detect unusual or unauthorized data handling activities.

    • Encryption: Data in transit and at rest is encrypted to prevent interception and unauthorized access.

    • Training & Awareness: Employees receive training on data security best practices.

    • Incident Response: In the event of a data breach, defined procedures address impact assessment, containment, and stakeholder notification. This policy supports legal and industry compliance while promoting a culture of security across the organization.

    Vulnerability Management

    To prevent security incidents, NTT Data utilizes corporate vulnerability management agents that are continuously monitored by the corporate security team. This proactive approach enables the identification and mitigation of risks before they evolve into real threats.

    In addition, Syntphony undergoes periodic security audits—annually—carried out by a specialized ethical hacking team. These audits evaluate the infrastructure and Baseline, based on recognized industry standards such as OWASP, OSINT, OSSTMM, and T-REC-X.509.

    Vulnerability management encompasses not only identifying system flaws but also prioritizing them based on the risks they pose. A continuous cycle of discovery, assessment, and remediation is implemented, which includes:

    • Identification: Use of automated and manual tools to detect vulnerabilities across systems, applications, and networks.

    • Classification: Evaluation of each vulnerability’s severity using criteria such as the Common Vulnerability Scoring System (CVSS).

    • Remediation: Application of patches or configuration changes to mitigate identified vulnerabilities.

    • Verification: Testing to ensure that vulnerabilities have been effectively mitigated.

    • Reporting & Tracking: Documenting and communicating findings to management and stakeholders, maintaining a clear security status record.

    This comprehensive approach not only strengthens NTT Data’s infrastructure security but also fosters a security-oriented organizational culture where all employees are aware of the importance of vulnerability management.

    Learning Tech

    Component Introduction

    Syntphony Learning Tech is a digital training and learning platform​ that adapts to every organisation and motivates learning​. It transforms learning in organisations and equips teams with the skills they need to meet challenges by providing an easy, fast and continuous training experience. To learn more, explore our webpage Syntphony.

    Syntphony Learning Tech is a solution developed by NTT DATA SPAIN S.L.U. belonging to the NTT DATA Europe & Latam group (hereinafter NTT DATA) and designed to increase the learnability and employability of teams through personalized plans that it generates after detecting the needs. Our tool is developed considering efficiency, security and compliance with the data protection regulations.

    Main Features:

    • Personalized training itineraries: Assesses each professional to map out a tailored learning pathway.

    • Facilitates the reskilling and upskilling of professionals.

    • Increases the learnability of your employees.

    Contract Termination Policy

    NTT Data’s contract termination policy ensures proper handling and protection of client data. Key practices include:

    • Data Return: Upon contract termination, all client data is returned in a pre-agreed format.

    • Secure Deletion: After return, data is securely deleted in accordance with company policy.

    • Regulatory Compliance: Aligns with applicable data protection laws such as GDPR.

    • Documentation: Activities are recorded to ensure audit readiness and accountability.

    • Client Notification: Clients are informed of the data handling process post-contract.

    This policy reinforces NTT Data’s commitment to data privacy and security, even after contractual obligations end.

    Payments

    Component Introduction

    SYNTPHONY PAYMENTS is a payment solution to manage all means of payment and channels with full control and flexibility​. An omni-channel payment platform offering advanced solutions for payment terminals, mobile devices, cryptocurrencies, and digital commerce. To learn more, explore our webpage Syntphony.

    SYNTPHONY PAYMENTS is a solution developed by NTT DATA SPAIN S.L.U belonging to the NTT DATA Europe & Latam group (here in after NTT DATA) and designed as a business management tool. Our tool is developed considering efficiency, security and compliance with the data protection regulations.

    Main Features:

    • Comprehensive Payment Gateway

    • With Syntphony Payments' Financial Hub, businesses gain access to a centralized platform for financial operations

    • Highly innovative application framework

    • Modular design that ensures flexibility and customization

    Data Retention Policy

    NTT Data’s data retention policy complies with the General Data Protection Regulation (GDPR). Core principles include:

    • Purpose Limitation: Data is collected for specific purposes and retained only as long as necessary.

    • Retention Periods: Defined for each data category based on legal and business needs.

    • Periodic Review: Stored data is regularly evaluated for continued relevance and deleted when no longer needed.

    • Regulatory Compliance: Supports data subjects’ rights, including the right to erasure.

    • Documentation & Auditing: Activities related to retention and deletion are logged for transparency and accountability.

    This policy promotes responsible data management and regulatory compliance.

    Information Transfer Protocols

    In the Syntphony Intelligent Automation environment, secure and industry-evaluated protocols are used to protect data and ensure reliable communication:

    • HTTPS: Encrypts data during web transmission to preserve confidentiality and integrity.

    • TLS 1.2: Provides secure communications over networks, encrypting and authenticating data.

    • SFTP / FTPS: Ensure secure file transfers using SSH (SFTP) or TLS/SSL (FTPS).

    These protocols ensure regulatory compliance and minimize risks from cyber threats and data leaks.

    Less than 70.0%

    100%

    Less than 99.5% but equal to or greater than 98.0%

    5%

    Less than 98.0% but equal to or greater than 90.0%

    10%

    Less than 90.0% but equal to or greater than 70.0%

    50%

    15% of net monthly licences fees

    30% of net monthly licences fees

    Add our most personalized expertise and services.

    Contact your Account Exec

    Support for On-Premise Products

    Included in all licences

    for all Syntphony customers

    5% of net monthly licences fees

    10% of net monthly licences fees

    Add our most personalized expertise and services.

    Contact your Account Exec

    Additional Services

    For all Customer support plans

    • On-call support, licence by app-user: USD 10 monthly per app-user

    • Legacy support: additional 20% fee per licence

    Monthly fees Support plans are calculated based on licences charges (before any discounts are applied).

    Support for

    SaaS Products

    Included in all licences

    for all Syntphony customers

    Colombia

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Spain BPO – Peru Branch

    Global Service Desk

    Peru

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Morocco Centers, S.A.R.L.

    Global Service Desk

    Morocco

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    Enreach Communications, S.L.

    Phone Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Information Processing Services Private Limited

    Global Service Desk

    India

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Spain BPO, S.L.U.

    Local & Global Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Colombia, S.A.S.

    main page

    Global Service Desk

    Meaning

    EOS

    End Of Support

    EOL

    End Of Life

    PCI-DSS Level 1 – The highest level of compliance for Payment Card Industry Data Security Standards (PCI-DSS), allowing the secure processing of credit card transactions with maximum protection.
  • Spanish National Security Scheme (ENS) certification, ensuring the protection of citizen data in electronic procedures. Backed by the ENS, it demonstrates absolute commitment to privacy and user confidence in secure and efficient electronic processes.

  • By achieving these certifications, Syntphony Payments ensures a secure, compliant, and seamless financial transaction environment.

    Value Added Services

    Services
    Standard
    Advanced
    Premier
    Platinum

    Be tuned, Product upgrade plan.

    ✔ Basic

    ✔ Basic

    ✔ Signature

    ✔ Signature

    24x7 ON-CALL Support, licenced by app-user

    ❌

    ✔

    Business Continuity

    Corporate BC & Crisis Management Policy

    Objective

    Enable the organization to continue operating at a minimum acceptable level, recovery business processes and keep a resilient approach

    Scope

    It applies to all NTT DATA Europe & LATAM entities to ensure the continuity of the core and support processes as well as the critical business services and projects

    Key policy statement

    Our Top Management is committed to embrace the BC & CM within the organisation.

    People safety is our priority in a normal situation as well as during a crisis

    We provide the financial and non-financial resources required to ensure the BC & CM objectives.

    Our Business Continuity Management System (BCMS) follows a unified framework aligned with ISO 22301 and industry best practices.

    We update BC & CM framework documents regularly.

    Our BC & CM management involves three layers with defined roles for handling contingencies.

    We maintain a clear and effective communication process to inform our stakeholders during a disruption.

    We integrate BC & CM into our culture, engaging all employees in supporting and improving our BCMS through targeted training.

    Our BCMS undergoes continuous improvement supported by the Exercise & Testing program

    Corporate BCP

    At NTT DATA we are committed to the development of a Business Continuity Plan (BCP) that allows the company to be prepared to respond to an incident, minimizing its impact on business processes and guaranteeing the availability of our services in all levels involved until normal operating levels are recovered.

    The corporative BCP covers these unavailability scenarios:

    • People

    • Facilities

    • Systems

    • Suppliers

    Key points

    Protect and guarantee the safety of our employees, external personnel, collaborators, and any other person in our facilities, as a fundamental priority.

    Be able to respond and recover from incidents that may seriously impact our results, our image in the market, or that may even threaten the existence of our company.

    Maintain the level of service to which our business support areas are committed and have the necessary resources to continue the operations of our fundamental structure, to allow recovery with the least possible damage after a crisis.

    Safeguard the reputation and brand image of the NTT DATA Group.

    Organisational model

    Types of crisis

    Communication channels

    Training

    The Corporate Business Continuity Plan Training is mandatory for Noggin team members, and it is necessary to repeat it every two years.

    Tests

    Tests will be performed at least once a year, alternating different types as necessary

    Subprocessors

    NTT DATA may engage carefully selected subprocessors that support the delivery, maintenance, or operation of this product and its related services.

    Subprocessor
    Service Provided
    Location
    Guarantees

    NTT DATA Spain Infrastructures Engineering, S.L.U.

    Infrastructure governance and management

    Spain

    Data Processing Agreement

    NTT DATA Spain Infrastructures Operations, S.L.U.

    Infrastructure administration and operation

    Spain

    Subprocessors

    NTT DATA may engage carefully selected subprocessors that support the delivery, maintenance, or operation of this product and its related services.

    Subprocessor
    Service Provided
    Location
    Guarantees

    NTT DATA Spain Soluciones Tecnológicas, S.L.U.

    Infrastructure, maintenance, implementation, ticketing, and operation services

    Spain

    Data Processing Agreement

    NTT DATA Portugal Centers Unipessoal, Ltda.

    Maintenance and implementation services

    Portugal

    Subprocessors

    NTT DATA may engage carefully selected subprocessors that support the delivery, maintenance, or operation of this product and its related services.

    Subprocessor
    Service Provided
    Location
    Guarantees

    NTT DATA Spain BPO, S.L.U.

    Local & Global Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Spain BPO – Peru Branch

    Global Service Desk

    Peru

    Infrastructure

    Designed for maximum flexibility and efficiency, Syntphony Intelligent Automation runs on Microsoft Azure, a cloud platform that enables businesses to adapt quickly to evolving market demands. Azure’s extensive suite of services—including AI, automation, and data analytics—empowers Syntphony Intelligent Automation to deliver superior performance, intelligent automation, and a seamless user experience. With global data centers and a strong focus on business continuity, Azure provides Syntphony Intelligent Automation with the foundation to support mission-critical operations securely and reliably. For more information about their security practices, see below:

    Syntphony Intelligent Automation operates on AWS (Amazon Web Services), one of the most robust and flexible cloud platforms in the industry. AWS offers an extensive array of services, from compute and storage to advanced machine learning capabilities. With AWS, Syntphony Intelligent Automation benefits from a secure, scalable, and highly available infrastructure, ensuring optimal performance even under demanding workloads. The platform's emphasis on innovation and global scalability allows Syntphony Intelligent Automation to meet the needs of clients across industries. For more information about their security practices, see below:

    Syntphony Intelligent Automation is also hosted on a client-specific cloud infrastructure, providing a tailored environment to align with the organization's unique IT strategies and security policies. This approach ensures that Syntphony Intelligent Automation can seamlessly integrate with existing systems while adhering to the client's data governance requirements. By leveraging a client-managed infrastructure, Syntphony Intelligent Automation delivers performance and flexibility designed to suit the precise needs of each business.

    Cloud Security

    In the cloud security domain, NTT Data implements advanced solutions to safeguard infrastructure and data. Azure Firewall functions as an Intrusion Detection and Prevention System (IDS/IPS), monitoring and analyzing network traffic in real time to detect and mitigate threats. It provides Layer 4 (network) and Layer 7 (application) protection. We also use an Application Gateway with an integrated Web Application Firewall (WAF) to protect web applications from common attacks, ensuring that sensitive information and critical operations remain secure. This technology stack delivers a robust and effective defense, reinforcing our commitment to cloud data integrity and security.

    For more information, see:

    • Azure Firewall: https://docs.microsoft.com/es-es/azure/firewall/

    • Azure Web Application Firewall (WAF): https://docs.microsoft.com/es-es/azure/web-application-firewall/

    • Azure Application Gateway:

    Subprocessors

    NTT DATA may engage carefully selected subprocessors that support the delivery, maintenance, or operation of this product and its related services.

    Subprocessor
    Service Provided
    Location
    Guarantees

    Meta Privacy Notice - NAKA

    NTT Data Privacy Notice

    At NTT DATA, we value your privacy and are committed to protecting your personal data. This Privacy Notice aims to provide you with transparent and understandable information regarding how we process your personal data in relation to the use of NAKA application that you have downloaded through Meta Horizon. It also explains your rights under current regulations and how you can exercise them. Please read it carefully.

    • Contact details of the Data Controller

      • Controller: NTT DATA Europe & Latam, S.L.U.

    Subprocessors

    NTT DATA may engage carefully selected subprocessors that support the delivery, maintenance, or operation of this product and its related services.

    Subprocessor
    Service Provided
    Location
    Guarantees

    Data Processing Agreement

    NTT DATA Spain BPO, S.L.U.

    Local & Global Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Spain BPO – Peru Branch

    Global Service Desk

    Peru

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Morocco Centers, S.A.R.L.

    Global Service Desk

    Morocco

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Colombia, S.A.S.

    Global Service Desk

    Colombia

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    Enreach Communications, S.L.

    Telephone Service Desk

    Spain

    Data Processing Agreement

    Microsoft Azure

    Cloud hosting and storage services

    Netherlands

    Terms & Conditions

    Exit Games, Inc.

    Voice transmission services

    United States

    Data Processing Agreement – Adequacy Decision

    NTT DATA Information Processing Services Private Limited

    Global Service Desk

    India

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    Data Processing Agreement

    NTT DATA Spain BPO, S.L.U.

    Local & Global Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Spain BPO – Peru Branch

    Global Service Desk

    Peru

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Morocco Centers, S.A.R.L.

    Global Service Desk

    Morocco

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Colombia, S.A.S.

    Global Service Desk

    Colombia

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    Enreach Communications, S.L.

    Telephone Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Information Processing Services Private Limited

    Global Service Desk

    India

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Morocco Centers, S.A.R.L.

    Global Service Desk

    Morocco

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Colombia, S.A.S.

    Global Service Desk

    Colombia

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    Enreach Communications, S.L.

    Telephone Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Information Processing Services Private Limited

    Global Service Desk

    India

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    https://docs.microsoft.com/es-es/azure/application-gateway/

    ✔

    ✔

    Preferred access to new releases

    ❌

    ❌

    ✔

    ✔

    Case escalation

    Learn more.

    ❌

    ❌

    ✔

    ✔

    Legacy support

    Learn more.

    ❌

    ❌

    ✔

    ✔

    Proactive business

    monitoring

    Learn more.

    ❌

    ❌

    ❌

    ✔

    Learn more

    NTT DATA Spain Infrastructures Engineering, S.L.U.

    Infrastructure governance and management

    Spain

    Data Processing Agreement

    NTT DATA Spain Infrastructures Operations, S.L.U.

    Infrastructure operations and support

    Spain

    Data Processing Agreement

    NTT DATA Colombia, S.A.S.

    Global Service Desk

    Colombia

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Brasil Consultoria de Negócios e Tecnologia da Informação Ltda.

    Analysis and resolution of Severity 1 tickets

    Brazil

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Chile, S.A.

    Client assistance services

    Chile

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Spain BPO – Peru Branch

    Global Service Desk

    Peru

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Morocco Centers, S.A.R.L.

    Global Service Desk

    Morocco

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    Meta Platforms, Inc.

    Messaging services (WhatsApp)

    United States

    Data Processing Agreement – Adequacy Decision

    Google Cloud EMEA Ltd.

    Cloud hosting, storage, and AI services

    Ireland

    Terms & Conditions

    Microsoft Azure

    Cognitive and voice services, cloud hosting, and AI services

    Netherlands

    Terms & Conditions

    Enreach Communications, S.L.

    Telephone Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Information Processing Services Private Limited

    Global Service Desk

    India

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Spain Centers, S.L.U.

    Ticketing services for incident resolution and escalation

    Spain

    Data Processing Agreement

    NTT DATA Spain BPO, S.L.U.

    Local & Global Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Spain Soluciones Tecnológicas, S.L.U.

    Hosting, operation and deployment of NTT DATA Group's internal asset management platform

    Spain

    Data Processing Agreement

    NTT DATA Spain BPO, S.L.U.

    Local and Global Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Spain BPO – Peru Branch

    Global Service Desk

    Peru

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Morocco Centers, S.A.R.L.

    Global Service Desk

    Morocco

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Colombia, S.A.S.

    Global Service Desk

    Colombia

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    Enreach Communications, S.L.

    Phone Service Desk

    Spain

    Data Processing Agreement

    Amazon Web Services EMEA SARL

    Hosting and cloud storage services, system integration services

    Ireland

    Terms and Conditions

    NTT DATA Information Processing Services Private Limited

    Global Service Desk

    India

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Spain Infrastructures Engineering, S.L.U.

    Infrastructure management and governance of NTT DATA Group's internal asset management platform

    Spain

    Data Processing Agreement

    NTT DATA Spain Infrastructures Operations, S.L.U.

    Infrastructure administration and operation of NTT DATA Group's internal asset management platform

    Spain

    Data Processing Agreement

    Address: Camino Fuente de la Mora, 1, Madrid, 28050, Spain.
  • Email address: [email protected]

  • Means of obtaining personal data All the personal data may be obtained directly from you to the extent requested by NTT DATA during your interaction with us.

    In case you are using NAKA application as an employee of your company, your company may act as data controller and could facilitate you with the corresponding privacy notice regarding how your personal data is being processed. To this extent, we are not responsible for obtaining your consent to use the application, nor to inform you about how your personal data will be processed. However, and in an informative way, you can continue reading this Privacy Notice in order to know how NAKA application could process personal data.

  • Personal data obtained We could collect and process the following data: name, surname, password, email address, voice and usage data. IP address and/or other device identifiers could be also processed. We may also collect personal information that you give us during your communication with us regarding our services, such as for technical support. In addition to the above, we may need to use your personal information for compliance with our legal obligations under applicable law.

  • Legal basis and purpose of processing Our legal basis for collecting and using your personal information, as described in this Privacy Notice, depends on the information we collect and the specific context in which we collect it. We may process your personal information:

    • When running the application. You will be requested to grant your consent for this processing of personal data. In this event, you may withdraw your consent at any time.

    • For our legitimate interest in measuring user interactions with NAKA application, as well as the number of downloads made through Meta Horizon.

    • To comply with our legal obligations.

  • Recipients of personal data and international data transfers Your data may be transferred to other entities within the NTT DATA group identified at https://es.nttdata.com/group-companies to the extent necessary to achieve the purposes described in this policy, as well as to third parties that are engaged for the right functioning of NAKA application as cloud providers and/or voice transmission providers. These third parties have access to your personal data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

    We will process your personal data primarily within the European Economic Area (EEA). However, for the correct functioning of NAKA application, your personal data could be transferred to, or access it in, jurisdictions outside the European Economic Area. All the steps have been taken to ensure that your personal data receive an adequate level of protection in the jurisdictions in which they are processed. Adequate protection for the transfers of your personal data to countries outside of the European Economic Area is granted through a series of agreements based on the Standard Contractual Clauses or through other appropriate safeguards as available under applicable law from time to time.

    More information regarding the transfers of personal data may be obtained by contacting us on the address indicated in this Privacy Notice.

  • Duration of processing Your data will be processed only for the time necessary to execute the purposes defined in this policy, as well as throughout the duration of your relationship with NTT DATA, if you ultimately decide to use NAKA application. After this period, we may retain your data, duly blocked, for the time required to comply with our legal obligations and/or while responsibilities from the aforementioned processing may arise. Finally, we will proceed with the deletion of your personal data that NTT DATA or its sub-processors have processed during our relationship with you.

  • Rights of the data subjects Under data protection law, you have the following rights:

    • Right to access: You can request copies of your personal data.

    • Right to rectification: You can ask us to correct personal data you consider inaccurate or incomplete.

    • Right to erasure: You can ask us to delete your personal data from our systems.

    • Right to restriction of processing: You have the right to ask us to restrict the processing of your personal data under certain circumstances.

    • Right to object: You can object to the processing of your personal data under certain circumstances.

    • Right to data portability: You have the right to request that we transfer the personal data we hold to another organization or to you under certain circumstances

  • Please contact us at [email protected] if you wish to exercise any of your rights.

    If you do not receive a response from us, even after sending reminders, you can file a complaint within the competent Supervisory Authority in your country of residence.

    • Technical and organizational measures We take appropriate technical measures for keeping your personal information confidential and protected against accidental or unlawful destruction or loss, alteration, unauthorised disclosure or access. Finally, our sub-contractors are contractually bound to keep your personal information secure and confidential, consistent with this Privacy Notice, and are kept up-to-date on our security and privacy practices. The security of your personal information also depends on your protection of your user account. Please use a unique and strong password, and keep your login credentials secret.

    • Changes to this privacy policy If we make material changes and/or update this privacy policy, we may notify you on our website, by a blog post, by email, or by any method we determine. Your continued use of this website or our service and/or continued provision of information to us will be subject to the terms of the then-current Privacy Notice.

    • Additional information You can find additional information regarding NAKA

    Support Plans

    Customer Support Plans are incorporated into and form a part of your agreement with NTT DATA with respect to your use of the products. These plans are designed for B2B contexts as part of the relation between the customer integrator and NTT DATA.

    Customer Support Plan

    Features
    Standard
    Advanced
    Premier
    Platinum

    *Recommended to contact NTT DATA immediately after submitting a P1/P2 support case to ensure the applicable Initial response time objectives (only for users with On-call support available).

    **Business days are considered from 9:00 AM to 5:00 PM (local country or region time), Monday to Friday, excluding regional holidays.

    Meta Privacy Notice

    NTT Data Privacy Notice

    At NTT DATA, we value your privacy and are committed to protecting your personal data. This Privacy Notice aims to provide you with transparent and understandable information regarding how we process your personal data in relation to the use of Syntphony Immersive Experience application that you have downloaded through Meta Horizon. It also explains your rights under current regulations and how you can exercise them. Please read it carefully.

    • Contact details of the Data Controller

      • Controller: NTT DATA Europe & Latam, S.L.U.

      • Address: Camino Fuente de la Mora, 1, Madrid, 28050, Spain.

      • Email address: [email protected]

    • Means of obtaining personal data All the personal data may be obtained directly from you to the extent requested by NTT DATA during your interaction with us.

      In case you are using Syntphony Immersive Experiences application as an employee of your company, your company may act as data controller and could facilitate you with the corresponding privacy notice regarding how your personal data is being processed. To this extent, we are not responsible for obtaining your consent to use the application, nor to inform you about how your personal data will be processed. However, and in an informative way, you can continue reading this Privacy Notice in order to know how Syntphony Immersive Experiences application could process personal data.

    • Personal data obtained We could collect and process the following data: name, surname, password, email address, voice and usage data. IP address and/or other device identifiers could be also processed. We may also collect personal information that you give us during your communication with us regarding our services, such as for technical support. In addition to the above, we may need to use your personal information for compliance with our legal obligations under applicable law.

    • Legal basis and purpose of processing Our legal basis for collecting and using your personal information, as described in this Privacy Notice, depends on the information we collect and the specific context in which we collect it. We may process your personal information:

      • When running the application. You will be requested to grant your consent for this processing of personal data. In this event, you may withdraw your consent at any time.

      • For our legitimate interest in measuring user interactions with Syntphonhy Immersive Experiences application, as well as the number of downloads made through Meta Horizon.

    • Recipients of personal data and international data transfers Your data may be transferred to other entities within the NTT DATA group identified at https://es.nttdata.com/group-companies to the extent necessary to achieve the purposes described in this policy, as well as to third parties that are engaged for the right functioning of Syntphony Immersive Experiences application as cloud providers and/or voice transmission providers. These third parties have access to your personal data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

      We will process your personal data primarily within the European Economic Area (EEA). However, for the correct functioning of Syntphony Immersive Experiences application, your personal data could be transferred to, or access it in, jurisdictions outside the European Economic Area. All the steps have been taken to ensure that your personal data receive an adequate level of protection in the jurisdictions in which they are processed. Adequate protection for the transfers of your personal data to countries outside of the European Economic Area is granted through a series of agreements based on the Standard Contractual Clauses or through other appropriate safeguards as available under applicable law from time to time.

      More information regarding the transfers of personal data may be obtained by contacting us on the address indicated in this Privacy Notice.

    • Duration of processing Your data will be processed only for the time necessary to execute the purposes defined in this policy, as well as throughout the duration of your relationship with NTT DATA, if you ultimately decide to use Syntphony Immersive Experiences application. After this period, we may retain your data, duly blocked, for the time required to comply with our legal obligations and/or while responsibilities from the aforementioned processing may arise. Finally, we will proceed with the deletion of your personal data that NTT DATA or its sub-processors have processed during our relationship with you.

    • Rights of the data subjects Under data protection law, you have the following rights:

      • Right to access: You can request copies of your personal data.

      • Right to rectification: You can ask us to correct personal data you consider inaccurate or incomplete.

      • Right to erasure: You can ask us to delete your personal data from our systems.

    Please contact us at [email protected] if you wish to exercise any of your rights.

    If you do not receive a response from us, even after sending reminders, you can file a complaint within the competent Supervisory Authority in your country of residence.

    • Technical and organizational measures We take appropriate technical measures for keeping your personal information confidential and protected against accidental or unlawful destruction or loss, alteration, unauthorised disclosure or access. Finally, our sub-contractors are contractually bound to keep your personal information secure and confidential, consistent with this Privacy Notice, and are kept up-to-date on our security and privacy practices. The security of your personal information also depends on your protection of your user account. Please use a unique and strong password, and keep your login credentials secret.

    • Changes to this privacy policy If we make material changes and/or update this privacy policy, we may notify you on our website, by a blog post, by email, or by any method we determine. Your continued use of this website or our service and/or continued provision of information to us will be subject to the terms of the then-current Privacy Notice.

    • Additional information You can find additional information regarding Syntphony Immersive Experiences

    Subprocessors

    NTT DATA may engage carefully selected subprocessors that support the delivery, maintenance, or operation of this product and its related services.

    Subprocessor
    Service Provided
    Location
    Guarantees

    NTT DATA Spain Infrastructures Engineering, S.L.U.

    Infrastructure management and governance

    Spain

    Data Processing Agreement

    NTT DATA Spain Infrastructures Operations, S.L.U.

    Infrastructure administration and operation

    Spain

    Privacy

    How SYNTPHONY KNOWLEDGE SEARCH manages privacy?

    1. Do we take privacy into account in the development of SYNTPHONY KNOWLEDGE SEARCH?

    In our technological development process, we integrate from the beginning the principles of privacy by design and comply with the applicable data protection regulations. This means that every stage of the conception, design and deployment of our solutions is carried out with privacy as a central element. We apply proactive measures to guarantee personal data protection, ensuring that our technologies not only comply with relevant legal and regulatory standards, such as the General Data Protection Regulation (GDPR), but also promote trust and security for our customers.

    Data Processing Agreement

    NTT DATA Spain Centers, S.L.U.

    Software development

    Spain

    Data Processing Agreement

    NTT DATA Spain BPO, S.L.U.

    Local and Global Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Spain BPO – Peru Branch

    Global Service Desk

    Peru

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Morocco Centers, S.A.R.L..

    Global Service Desk

    Morocco

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA Colombia, S.A.S.

    Global Service Desk

    Colombia

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    Microsoft Azure

    Cloud hosting and storage services

    Netherlands

    Terms and Conditions

    Redsys Servicios de Procesamiento, S.L.

    Payment Gateway

    Spain

    Data Processing Agreement

    Enreach Communicatios, S.L.

    Phone Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Information Processing Services Private Limited

    Global Service Desk

    India

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    here.
    To comply with our legal obligations.
  • Right to restriction of processing: You have the right to ask us to restrict the processing of your personal data under certain circumstances.

  • Right to object: You can object to the processing of your personal data under certain circumstances.

  • Right to data portability: You have the right to request that we transfer the personal data we hold to another organization or to you under certain circumstances

  • here.
    ENS Certification
    ENS Certification
    ENS Certification
    ENS Certification
    ENS Certification
    ENS Certification
    Summary of Support Model

    English, Spanish, French, Portuguese

    English, Spanish, French, Portuguese

    Online Case Submission 24X7

    ✔ 1 user

    ✔ 1 user

    ✔ Multiple users

    ✔ Multiple users

    Commercial & Billing support

    ✔

    ✔

    ✔

    ✔

    Online documentation

    ✔

    ✔

    ✔

    ✔

    Reviews to assess the platform operations status.

    ❌

    ❌

    ✔ Quarterly

    ✔ Monthly

    Technical Account Manager (TAM)

    ❌

    ❌

    ❌

    ✔

    Case Severity

    Not applicable

    Case priority ranking available. Learn more

    Case priority ranking available. Learn more

    Case priority ranking available. Learn more

    Initial response time objectives

    Not applicable

    P1 cases: 2 hours* P2 cases: 4 hours P3 cases: 8 hours P4 cases: 16 hours

    P1 cases: 1 hour* P2 cases: 4 hours P3 cases: 8 hours P4 cases: 8 hours

    P1 cases: 30 mins* P2 cases: 2 hour P3 cases: 4 hours P4 cases: 8 hours

    Service times

    8/5 ** response for issues

    8/5 ** response for issues

    24/7 response for critical- and high-impact issues (P1 & P2). 8/5 ** response for medium- and low-impact issues (P3 & P4).

    24/7 response for critical- and high-impact issues (P1 & P2). 8/5 ** response for medium- and low-impact issues (P3 & P4).

    Supported languages

    English, Spanish

    English, Spanish

    At NTT DATA, we help our clients fulfil current and future business needs by developing products and assets that work together to multiply business value. In doing so, we constantly track the global picture of privacy and align our technology to comply with data protection regulations, ensuring that our customers can operate with confidence and security in the personal data processing when they use our products.

    1. What does NTT DATA do to comply with privacy regulations?

    The personal data protection is a NTT DATA priority. We ensure that SYNTPHONY KNOWLEDGE SEARCH complies with all requirements stipulated by data protection regulations.

    We have therefore implemented security and privacy protocols to guarantee personal data protection in accordance with the highest standards established by European regulations. As a result, our customers can be sure that their personal data is protected while benefiting from an integrated and efficient technological solution that boosts their businesses.

    1. What types of data does SYNTPHONY KNOWLEDGE SEARCH process?

    The personal data that are processed as a result of the commercialization of the product will depend on the specific functionalities and/or modules that the customer chooses to use. It is important to note that only categories of data explicitly authorized by the client in accordance with the specific instructions provided will be processed by us, and we will ensure that any personal data processing is carried out strictly in accordance with the client's purposes and instructions, thereby ensuring transparency and compliance at all times.

    In this particular case, for the use of SYNTPHONY KNOWLEDGE SEARCH, we will process the following items specified below:

    • Categories of Personal Data:

      • Identification and contact details

      • Employment details

      • Personal Characteristics

      • Education and training details

      • Image data

    • Categories of Data Subjects:

      • Controller’s employees

    • Processing Operations:

      • Consultation

      • Modification

      • Recording and Storage

    1. Which suppliers does SYNTPHONY KNOWLEDGE SEARCH use?

    SYNTPHONY KNOWLEDGE SEARCH may rely on the collaboration of external suppliers to provide software or functionalities complementing the capabilities of the Product, as well as on the collaboration of other NTT DATA group companies for any additional services to be contracted, such as support and maintenance.

    NTT DATA is diligent in choosing its suppliers or service providers and in evaluating the guarantees they can demonstrate regarding compliance with applicable data protection laws, with a view to the protection of data subjects.

    Any provider acting under the authority of an NTT DATA entity and having access to personal data processes said data following NTT DATA entity’s instructions, or those of its data controller (e.g., its customers), securely and adopts the technical and organizational measures needed to guarantee compliance with applicable data protection laws.

    NTT DATA processors and sub-processors are required to sign appropriate agreements that govern the processing and protection of personal data. These agreements include requirements to ensure that the same obligations are passed to any further processors who may process personal data.

    In addition, NTT DATA has policies and supporting procedures to ensure that information assets are protected when NTT DATA engages third party service providers and/or processors. This includes requirements for data privacy, information security due diligence and information security risk assessments to be performed, in order to ensure:

    1. Information security requirements are clearly articulated and documented in agreements in accordance with NTT DATA’s information security standards.

    2. NTT DATA service providers and processors implement the same level of protection and control as NTT DATA;

    3. Service providers and processors are required to report any suspected or actual information security incidents to NTT DATA in a timely manner.

    4. Do we transfer personal data outside the EEA?

    In most cases, we will process personal data within the European Economic Area (EEA) or in a country that has an adequacy decision issued by the European Commission (Switzerland, Canada, etc.). However, we may use providers that process personal data from locations outside the EEA, including our NTT DATA Group companies. For more information about the subprocessors involved see next page.

    In any case, we will take all measures to ensure that our suppliers provide adequate guarantees to protect the personal data processed on behalf of our clients, and we contractually require that such personal data are processed in compliance with applicable data protection laws. In particular, with those suppliers that involve an international data transfer, we do:

    • Risk Assessment: Before any international data transfer, we conduct a detailed risk assessment to identify and mitigate potential risks to the security and privacy of personal data.

    • Standard Contractual Clauses (SCCs): SCCs are incorporated into our contracts with our suppliers outside the EEA to ensure an adequate level of personal data protection.

    • Data Protection Agreement (DPA): Our DPA specifies our obligations and commitments, including security, confidentiality, limitations on international data transfers, cooperation with data subjects' rights, and notification of security incidents.

    1. Do we have a Data Protection Officer (DPO)?

    To comply with the overarching accountability concept, NTT DATA has implemented procure and avail itself of tools to document and showing compliance with the privacy principles and well as with the applicable data protection laws requirement.

    Each company of the NTT DATA dedicates adequate resources to comply with applicable data protection laws, considering different applicable legal requirements of the jurisdictions where NTT DATA operates.

    To NTT DATA Group better compliance and to ensure an elevate level of protection of data subjects’ rights and freedoms, which is consistent and harmonised among the various jurisdictions, NTT DATA Group has adopted a hybrid DPO organization model. This model is halfway between a centralized single DPO for the whole group and separate DPOs, and also, Privacy Teams, for each entity in the various jurisdictions.

    Therefore, each NTT DATA company has a Data Protection Officer (DPO) in compliance with the applicable laws and regulations, as well as a Local Data Protection Office. The DPO is responsible for the supervision of the data protection strategy and its implementation in order to ensure compliance with legal requirements, as well as acting as a point of contact for any privacy and data protection law related queries. The local Data Protection Office implements and executes the data protection strategy to ensure compliance.

    1. How do we protect personal data?

    At NTT DATA we understand the relevance of protecting our clients' personal data. We have therefore implemented a holistic combination of technical and organisational measures designed to guarantee privacy at all phases of the personal data lifecycle, preventing any unauthorised or unlawful processing as well as against any accidental loss, destruction or damage of personal data. In addition, we conduct periodic review processes to assess the compliance and effectiveness of these measures, with the continuous objective of improving security and privacy.

    In addition, NTT DATA SPAIN S.L.U. has various certifications that support our commitment to security and privacy, including:

    • ISO/IEC 27001:2022

    • the HIGH category in the “Esquema Nacional de Seguridad” (ENS)

    • ISO 9001:2015

    • ISO 14001:2015

    • ISO/IEC 20000-1:2018

    1. Updates and Modifications

    We reserve the right to modify this document to reflect changes in privacy practices or legal updates.

    1. Additional information

    Please, refer to our Privacy Policies and our website Syntphony - Home for additional Information about SYNTPHONY KNOWLEDGE SEARCH.

    AI Shared responsibility model

    Introduction

    At NTT DATA, we recognize that the use of Artificial Intelligence in our Global Assets must be followed by a strong sense of responsibility. As a trusted partner, we are upholding the highest standards of compliance, governance, and ethical AI practices, guided by our NTT Group AI chapter.

    We align with a broad range of global frameworks and standards, including ISO/IEC 27001, GDPR, and the EU AI Act, as well as recent legislative proposals from South Korea (AI Basic Act, 2025) and California, USA (Bill SB420 & 243). These regulations embed rigorous controls into every stage of our AI lifecycle. We also invest in training and ethical responsibility programs to empower our teams to design, deploy, and operate AI systems responsibly.

    In addition, NTT DATA Spain, where many of our AI-based Global Assets are allocated, is currently in the process of obtaining ISO/IEC 42001 certification, the first international standard for AI Management Systems, which provides a structured approach to managing AI risks and ensuring responsible innovation.

    This Shared Responsibility Model defines how responsibilities are distributed across all actors involved in the lifecycle of AI-based components within our Global Assets, from model builders to end-users. This model ensures that AI systems are used in a legal, safe, ethical, and compliant manner.

    By clearly delineating roles and obligations, this Model helps mitigate risks related to bias, misinformation, data privacy, intellectual property, regulatory compliance, and misuse. It promotes transparency, accountability, and trust across the AI lifecycle.

    The Shared Responsibility Model — key roles

    AI System Providers

    Entities that develop an AI system and make it available on the market or put it into service under their own name or trademark (e.g. OpenAI or Google).

    Responsibilities

    • Ensure foundational integrity of the AI model (legality, safety, transparency).

    • Ensure compliance with intellectual property and data protection laws.

    • Address bias and publish documentation to support downstream actors’ risk management.

    Platform Providers

    Cloud or infrastructure providers that enable the hosting, deployment, and operation of AI systems (e.g., Azure OpenAI Service, Vertex AI).

    Responsibilities

    • Provide secure and compliant infrastructure for AI deployment.

    • Implement data protection measures and maintain audit trails.

    • Support multi-tenant environments and regulatory reporting.

    Deployers

    Entities that embed AI systems into their business applications or integrate them in a product/service under their control.

    Responsibilities

    • Implement safeguards to prevent misuse and monitor model quality.

    • Put in place input/output filtering and human-in-the-loop oversight.

    • Ensure safe configuration, continuous monitoring and incident response.

    Customers

    Organizations that adopt and use AI-enabled solutions.

    Responsibilities

    • Define intended uses and integrate AI into their environments.

    • Provide accurate input data, manage integrations, and ensure ethical/legal use.

    • Enforce internal AI policies and monitor deployments.

    End-Users

    Users that interact directly with AI systems.

    Responsibilities

    • Understand system limitations and follow usage guidelines.

    • Avoid misuse and report harmful outputs through governance channels.


    NTT DATA role when licensing Global Assets embedding AI

    NTT DATA acts primarily as a Deployer, focused on developing and integrating AI-driven components into our Global Assets. We design and deliver end-to-end solutions that integrate trusted AI Systems (e.g., OpenAI, Azure OpenAI, Google Gemini, Amazon Bedrock).

    Core AI integration activities:

    • LLM integration (selection, configuration, API orchestration).

    • Prompt execution and optimization (prompt engineering).

    • Retrieval-Augmented Generation (RAG) and embedding generation to improve context accuracy.

    • AI Agent orchestration for complex multi-agent workflows.

    Customers using these AI systems must comply with the AI System Provider’s terms, obligations and acceptable-use policies. NTT DATA acts as an intermediary and facilitator of such terms (“pass-through model”), ensuring the contractual framework reflects the respective roles and responsibilities.


    Roles according to the EU AI Act

    NTT DATA’s Shared Responsibility Model aligns with the EU Artificial Intelligence Act (Regulation 2024/1689) and internal governance practices. The EU AI Act defines roles such as Provider, Deployer, Importer, Distributor, and User with specific regulatory obligations depending on control and position in the AI value chain.

    • Providers (EU AI Act): legally responsible for ensuring the AI system complies with regulatory requirements before placing it on the market. NTT DATA would become a Provider only in exceptional circumstances (e.g., when substantially modifying an LLM or AI System used in a Global Asset such that its performance, purpose, or risk profile changes). In such cases NTT DATA would assume Provider-level obligations.

    • Deployers (EU AI Act): entities that use AI systems under their authority for professional purposes. This is the primary role of NTT DATA in most cases, integrating third‑party LLMs or AI Systems into our Global Assets.

      As a Deployer, NTT DATA’s practices include:

      • Input and output filtering to prevent harmful prompts/outputs.

    NTT DATA maintains internal procedures and governance bodies to supervise AI legislation compliance. However, Customers must assess the risk level of specific use-cases and inform NTT DATA so that corresponding obligations can be determined.


    Reference Links

    Microsoft Azure

    Google Cloud

    AWS

    Privacy

    How SYNTPHONY IMMERSIVE EXPERIENCES manages privacy?

    1. Do we take privacy into account in the development of SYNTPHONY IMMERSIVE EXPERIENCES?

    In our technological development process, we integrate from the beginning the principles of privacy by design and comply with the applicable data protection regulations. This means that every stage of the conception, design and deployment of our solutions is carried out with privacy as a central element. We apply proactive measures to guarantee personal data protection, ensuring that our technologies not only comply with relevant legal and regulatory standards, such as the General Data Protection Regulation (GDPR), but also promote trust and security for our customers.

    At NTT DATA, we help our clients fulfil current and future business needs by developing products and assets that work together to multiply business value. In doing so, we constantly track the global picture of privacy and align our technology to comply with data protection regulations, ensuring that our customers can operate with confidence and security in the personal data processing when they use our products.

    1. What does NTT DATA do to comply with privacy regulations?

    The personal data protection is a NTT DATA priority. We ensure that SYNTPHONY IMMERSIVE EXPERIENCES complies with all requirements stipulated by data protection regulations.

    We have therefore implemented security and privacy protocols to guarantee personal data protection in accordance with the highest standards established by European regulations. As a result, our customers can be sure that their personal data is protected while benefiting from an integrated and efficient technological solution that boosts their businesses.

    1. What types of data does SYNTPHONY IMMERSIVE EXPERIENCES process?

    The personal data that are processed as a result of the commercialization of the product will depend on the specific functionalities and/or modules that the customer chooses to use. It is important to note that only categories of data explicitly authorized by the client in accordance with the specific instructions provided will be processed by us, and we will ensure that any personal data processing is carried out strictly in accordance with the client's purposes and instructions, thereby ensuring transparency and compliance at all times.

    In this particular case, for the use of SYNTPHONY IMMERSIVE EXPERIENCES, we will process the following items specified below:

    • Categories of Personal Data:

      • Account name or nickname

      • Email address

      • Name and surname

    1. Which suppliers does SYNTPHONY IMMERSIVE EXPERIENCES use?

    SYNTPHONY IMMERSIVE EXPERIENCES may rely on the collaboration of suppliers that provide specific software complementing the capabilities of the Product or provide cloud hosting related to both the data hosting in the cloud and the provision of additional services as required (infrastructure maintenance and management, support, etc.).

    These suppliers can be either companies within the NTT DATA group or external companies, and may change depending on technical and/or commercial developments. The corresponding data processing agreement signed with the Client will specify the suppliers that may process personal data as sub-processors. For more information about the subprocessors involved see

    NTT DATA is diligent in choosing its suppliers or service providers and in evaluating the guarantees they can demonstrate regarding compliance with applicable data protection laws, with a view to the protection of data subjects.

    Any provider acting under the authority of an NTT DATA entity and having access to personal data processes said data following NTT DATA entity’s instructions, or those of its data controller (e.g., its customers), securely and adopts the technical and organizational measures needed to guarantee compliance with applicable data protection laws.

    NTT DATA processors and sub-processors are required to sign appropriate agreements that govern the processing and protection of personal data. These agreements include requirements to ensure that the same obligations are passed to any further processors who may process personal data.

    In addition, NTT DATA has policies and supporting procedures to ensure that information assets are protected when NTT DATA engages third party service providers and/or processors. This includes requirements for data privacy, information security due diligence and information security risk assessments to be performed, in order to ensure:

    1. Information security requirements are clearly articulated and documented in agreements in accordance with NTT DATA’s information security standards.

    2. NTT DATA service providers and processors implement the same level of protection and control as NTT DATA;

    3. Service providers and processors are required to report any suspected or actual information security incidents to NTT DATA in a timely manner.

    4. Do we transfer personal data outside the EEA?

    In most cases, we will process personal data within the European Economic Area (EEA) or in a country that has an adequacy decision issued by the European Commission (Switzerland, Canada, etc.). However, we may use providers that process personal data from locations outside the EEA, including our NTT DATA Group companies.

    In any case, we will take all measures to ensure that our suppliers provide adequate guarantees to protect the personal data processed on behalf of our clients, and we contractually require that such personal data are processed in compliance with applicable data protection laws. In particular, with those suppliers that involve an international data transfer, we do:

    • Risk Assessment: Before any international data transfer, we conduct a detailed risk assessment to identify and mitigate potential risks to the security and privacy of personal data.

    • Standard Contractual Clauses (SCCs): SCCs are incorporated into our contracts with our suppliers outside the EEA to ensure an adequate level of personal data protection.

    • Data Protection Agreement (DPA): Our DPA specifies our obligations and commitments, including security, confidentiality, limitations on international data transfers, cooperation with data subjects' rights, and notification of security incidents.

    1. Do we have a Data Protection Officer (DPO)?

    To comply with the overarching accountability concept, NTT DATA has implemented procure and avail itself of tools to document and showing compliance with the privacy principles and well as with the applicable data protection laws requirement.

    Each company of the NTT DATA dedicates adequate resources to comply with applicable data protection laws, considering different applicable legal requirements of the jurisdictions where NTT DATA operates.

    To NTT DATA Group better compliance and to ensure an elevate level of protection of data subjects’ rights and freedoms, which is consistent and harmonised among the various jurisdictions, NTT DATA Group has adopted a hybrid DPO organization model. This model is halfway between a centralized single DPO for the whole group and separate DPOs, and also, Privacy Teams, for each entity in the various jurisdictions.

    Therefore, each NTT DATA company has a Data Protection Officer (DPO) in compliance with the applicable laws and regulations, as well as a Local Data Protection Office. The DPO is responsible for the supervision of the data protection strategy and its implementation in order to ensure compliance with legal requirements, as well as acting as a point of contact for any privacy and data protection law related queries. The local Data Protection Office implements and executes the data protection strategy to ensure compliance.

    1. How do we protect personal data?

    At NTT DATA we understand the relevance of protecting our clients' personal data. We have therefore implemented a holistic combination of technical and organisational measures designed to guarantee privacy at all phases of the personal data lifecycle, preventing any unauthorised or unlawful processing as well as against any accidental loss, destruction or damage of personal data. In addition, we conduct periodic review processes to assess the compliance and effectiveness of these measures, with the continuous objective of improving security and privacy.

    In addition, NTT DATA SPAIN S.L.U. has various certifications that support our commitment to security and privacy, including:

    • ISO/IEC 27001:2022

    • the HIGH category in the “Esquema Nacional de Seguridad” (ENS)

    • ISO 9001:2015

    • ISO 14001:2015

    1. How does NTT DATA help customers comply with regulations in the use of SYNTPHONY IMMERSIVE EXPERIENCES?

      1. Fairness and transparency At NTT DATA we understand the importance of compliance with the principles of transparency and fair processing, so we have created this template to facilitate the identification of processing operations and sub-processors so that the Client, as the data controller, can comply with its obligations with respect to these principles.ç

      2. Data Protection Rights NTT DATA Group has implemented policies, procedures, forms, and tools to enable the data subjects to exercise their rights (“DSR”) considering the visibility, accessibility, and simplicity of the applicable DSR system. All this allows us to efficiently assist in the management of rights requests such as access, rectification, objection, portability, erasure, restriction of processing and other rights established by the regulations. NTT DATA Group makes available to its employees, clients, users, contractors, or any other data subjects who own the personal data in the databases, systems or other means of information owned by the entities of NTT DATA Group, appropriate channels to receive and respond to requests, inquiries, and claims from their owners so that they can exercise their rights. NTT DATA Group maintains a record of all data subject requests received and the actions taken to respond to these requests. We are diligent in notifying the client of the rights requests we receive and following the procedures established by the applicable regulations to guarantee the protection and privacy of personal data, safeguarding the rights and freedoms of data subjects.

    We reserve the right to modify this document to reflect changes in privacy practices or legal updates.

    1. Additional information

    Please, refer to our Privacy Policies and our website for additional Information about SYNTPHONY IMMERSIVE EXPERIENCES.

    Privacy

    How AUTONOMOUS SUPPLY CHAIN manages privacy?

    1. Do we take privacy into account in the development of Autonomous Supply Chain?

    In our technological development process, we integrate from the beginning the principles of privacy by design and comply with the applicable data protection regulations. This means that every stage of the conception, design and deployment of our solutions is carried out with privacy as a central element. We apply proactive measures to guarantee personal data protection, ensuring that our technologies not only comply with relevant legal and regulatory standards, such as the General Data Protection Regulation (GDPR), but also promote trust and security for our customers.

    At NTT DATA, we help our clients fulfil current and future business needs by developing products and assets that work together to multiply business value. In doing so, we constantly track the global picture of privacy and align our technology to comply with data protection regulations, ensuring that our customers can operate with confidence and security in the personal data processing when they use our products.

    1. What does NTT DATA do to comply with privacy regulations?

    The personal data protection is a NTT DATA priority. We ensure that AUTONOMOUS SUPPLY CHAIN complies with all requirements stipulated by data protection regulations.

    We have therefore implemented security and privacy protocols to guarantee personal data protection in accordance with the highest standards established by European regulations. As a result, our customers can be sure that their personal data is protected while benefiting from an integrated and efficient technological solution that boosts their businesses.

    1. What types of data does AUTONOMOUS SUPPLY CHAIN process?

    The personal data that are processed as a result of the commercialization of the product will depend on the specific functionalities and/or modules that the customer chooses to use. It is important to note that only categories of data explicitly authorized by the client in accordance with the specific instructions provided will be processed by us, and we will ensure that any personal data processing is carried out strictly in accordance with the client's purposes and instructions, thereby ensuring transparency and compliance at all times.

    Due to the natures of AUTONOMOUS SUPPLY CHAIN, any type of data and data subjects may be processed and any type of processing operations may be carried out, amongst which we highlight the following aspects specified below:

    • Categories of Personal Data:

      • Identification details

      • Personal Characteristics

      • Economic data

    1. Which suppliers does AUTONOMOUS SUPPLY CHAIN use?

    AUTONOMOUS SUPPLY CHAIN may rely on the collaboration of external suppliers to provide software or functionalities complementing the capabilities of the Product, as well as on the collaboration of other NTT DATA group companies for any additional services to be contracted, such as support and maintenance.

    NTT DATA is diligent in choosing its suppliers or service providers and in evaluating the guarantees they can demonstrate regarding compliance with applicable data protection laws, with a view to the protection of data subjects.

    Any provider acting under the authority of an NTT DATA entity and having access to personal data processes said data following NTT DATA entity’s instructions, or those of its data controller (e.g., its customers), securely and adopts the technical and organizational measures needed to guarantee compliance with applicable data protection laws.

    NTT DATA processors and sub-processors are required to sign appropriate agreements that govern the processing and protection of personal data. These agreements include requirements to ensure that the same obligations are passed to any further processors who may process personal data.

    In addition, NTT DATA has policies and supporting procedures to ensure that information assets are protected when NTT DATA engages third party service providers and/or processors. This includes requirements for data privacy, information security due diligence and information security risk assessments to be performed, in order to ensure:

    a. Information security requirements are clearly articulated and documented in agreements in accordance with NTT DATA’s information security standards.

    b. NTT DATA service providers and processors implement the same level of protection and control as NTT DATA;

    c. Service providers and processors are required to report any suspected or actual information security incidents to NTT DATA in a timely manner.

    1. Do we transfer personal data outside the EEA?

    In most cases, we will process personal data within the European Economic Area (EEA) or in a country that has an adequacy decision issued by the European Commission (Switzerland, Canada, etc.). However, we may use providers that process personal data from locations outside the EEA, including our NTT DATA Group companies.

    In any case, we will take all measures to ensure that our suppliers provide adequate guarantees to protect the personal data processed on behalf of our clients, and we contractually require that such personal data are processed in compliance with applicable data protection laws. In particular, with those suppliers that involve an international data transfer, we do:

    • Risk Assessment: Before any international data transfer, we conduct a detailed risk assessment to identify and mitigate potential risks to the security and privacy of personal data.

    • Standard Contractual Clauses (SCCs): SCCs are incorporated into our contracts with our suppliers outside the EEA to ensure an adequate level of personal data protection.

    • Data Protection Agreement (DPA): Our DPA specifies our obligations and commitments, including security, confidentiality, limitations on international data transfers, cooperation with data subjects' rights, and notification of security incidents.

    1. Do we have a Data Protection Officer (DPO)?

    To comply with the overarching accountability concept, NTT DATA has implemented procure and avail itself of tools to document and showing compliance with the privacy principles and well as with the applicable data protection laws requirement.

    Each company of the NTT DATA dedicates adequate resources to comply with applicable data protection laws, considering different applicable legal requirements of the jurisdictions where NTT DATA operates.

    To NTT DATA Group better compliance and to ensure an elevate level of protection of data subjects’ rights and freedoms, which is consistent and harmonised among the various jurisdictions, NTT DATA Group has adopted a hybrid DPO organization model. This model is halfway between a centralized single DPO for the whole group and separate DPOs, and also, Privacy Teams, for each entity in the various jurisdictions.

    Therefore, each NTT DATA company has a Data Protection Officer (DPO) in compliance with the applicable laws and regulations, as well as a Local Data Protection Office. The DPO is responsible for the supervision of the data protection strategy and its implementation in order to ensure compliance with legal requirements, as well as acting as a point of contact for any privacy and data protection law related queries. The local Data Protection Office implements and executes the data protection strategy to ensure compliance.

    1. How do we protect personal data?

    At NTT DATA we understand the relevance of protecting our clients' personal data. We have therefore implemented a holistic combination of technical and organisational measures designed to guarantee privacy at all phases of the personal data lifecycle, preventing any unauthorised or unlawful processing as well as against any accidental loss, destruction or damage of personal data. In addition, we conduct periodic review processes to assess the compliance and effectiveness of these measures, with the continuous objective of improving security and privacy.

    In addition, NTT DATA SPAIN S.L.U. has various certifications that support our commitment to security and privacy, including:

    • ISO/IEC 27001:2022

    • the HIGH category in the “Esquema Nacional de Seguridad” (ENS)

    • ISO 9001:2015

    • ISO 14001:2015

    1. Updates and Modifications

    We reserve the right to modify this document to reflect changes in privacy practices or legal updates.

    Cybersecurity solutions: SecOps, intelligence, AI, and cloud securityGoogle Cloud
    GCP Trust Center

    Conformity

    Certifications

    Syntphony Knowledge Search in addition to the general certifications for our syntphony products, this asset meets the following certification:

    • Spanish National Security Scheme (ENS) certification, ensuring the protection of citizen data in electronic procedures. Backed by the ENS, it demonstrates absolute commitment to privacy and user confidence in secure and efficient electronic processes.

    Extraction
  • Erasure

  • Collection

  • Structuring

  • Interconnection

  • Ellaboration

  • Employment data

  • Health data

  • Categories of Data Subjects:

    • Controller´s Clients

    • Controller´s Employees

    • Controller´s Suppliers

    • Controller´s Users

  • Processing Operations:

    • Consultation

    • Modification

    • Erasure

  • ISO/IEC 20000-1:2018

    Usage and connection data

  • Audio/Voice data

  • Categories of Data Subjects:

    • Users (employees, end customers, students, inhabitants of a specific place…)

  • Processing Operations:

    • Consultation

    • Recording and Storage

    • Collection

    • Disclosure by transmission

    • Elaboration

    • Extraction

    • Structuring

    • Interconnection

    • Blocking and erasure

    • Organization

  • ISO/IEC 20000-1:2018
  • SOC 2 Type 2

  • Personal Data Breaches At NTT DATA we effectively manage our clients' data breaches through internal protocols. In this way, we are constantly monitoring our systems to prevent security incidents and/or breaches affecting personal data. Therefore, in the event of a breach, in accordance with established protocols, research plans will be undertaken to determine whether the confidentiality, integrity and availability of personal data has been compromised. In addition, the client will be notified without undue delay of any data breaches of which we become aware. This communication will always include the relevant aspects of the incident, such as the nature of the breach, the number of individuals affected, the actions taken, etc. In the event that all information cannot be provided immediately, it will be provided in a gradual way without undue delay. In addition, we have established clear procedures for the ongoing monitoring of reported breaches, ensuring a quick and adequate response to mitigate any potential impact on the security of personal data.

  • Deletion and/or Return of Personal Data at the end of the provision of services NTT DATA has protocols for the return and/or deletion of information at the end of the contract with the client, strictly following the instructions received by the client. Our commitment is to ensure that any personal data collected or processed is handled with the utmost security and in accordance with the principles of data protection, while respecting confidentiality and privacy throughout the entire lifecycle of personal data.

  • Updates and Modifications

  • next page.
    Syntphony - Home
    syntphony.com
    Learn more.

    Guardrails management to ensure safe, ethical, human-centric interaction.

  • Users and Agents management.

  • Human-in-the-loop oversight for ethical review and intervention.

  • Monitoring and evaluation of performance, fairness, and safety.

  • Legal and regulatory compliance (GDPR, IP, EU AI Act).

  • Reviewing third-party model documentation (training data awareness).

  • Conducting risk assessments (bias, discrimination, privacy, security).

  • Ensuring transparency toward clients and users (disclosure of limitations and safe‑use guidance).

  • Training and awareness for employees involved in AI integration and governance.

  • Users (EU AI Act): individuals who interact with AI systems but do not operate or modify them. Their responsibilities are to use systems ethically, follow guidance, and report harmful or unsafe behaviour. Normally, NTT DATA does not act as a User when licensing Global Assets with AI capabilities.

  • https://learn.microsoft.com/en-us/azure/ai-services/content-safety/
    https://learn.microsoft.com/en-us/azure/ai-services/openai/concepts/abuse-monitoring
    https://learn.microsoft.com/en-us/azure/ai-foundry/responsible-ai/openai/overview?context=%2Fazure%2Fai-services%2Fopenai%2Fcontext%2Fcontext
    https://learn.microsoft.com/en-us/legal/ai-code-of-conduct
    https://cloud.google.com/vertex-ai/generative-ai/docs/learn/responsible-ai?hl=en
    https://cloud.google.com/blog/products/identity-security/navigating-the-eu-ai-act-google-clouds-proactive-approach
    https://cloud.google.com/vertex-ai/generative-ai/docs/vertex-ai-zero-data-retention?hl=en
    https://aws.amazon.com/ai/responsible-ai/policy/
    ENS Certification

    Privacy

    How SYNTPHONY LEARNING TECH manages privacy?

    1. Do we take privacy into account in the development of SYNTPHONY LEARNING TECH?

    In our technological development process, we integrate from the beginning the principles of privacy by design and comply with the applicable data protection regulations. This means that every stage of the conception, design and deployment of our solutions is carried out with privacy as a central element. We apply proactive measures to guarantee personal data protection, ensuring that our technologies not only comply with relevant legal and regulatory standards, such as the General Data Protection Regulation (GDPR), but also promote trust and security for our customers.

    At NTT DATA, we help our clients fulfil current and future business needs by developing products and assets that work together to multiply business value. In doing so, we constantly track the global picture of privacy and align our technology to comply with data protection regulations, ensuring that our customers can operate with confidence and security in the personal data processing when they use our products.

    1. What does NTT DATA do to comply with privacy regulations?

    The personal data protection is a NTT DATA priority. We ensure that SYNTPHONY LEARNING TECH complies with all requirements stipulated by data protection regulations.

    We have therefore implemented security and privacy protocols to guarantee personal data protection in accordance with the highest standards established by European regulations. As a result, our customers can be sure that their personal data is protected while benefiting from an integrated and efficient technological solution that boosts their businesses.

    1. What types of data does SYNTPHONY LEARNING TECH process?

    The personal data that are processed as a result of the commercialization of the product will depend on the specific functionalities and/or modules that the customer chooses to use. It is important to note that only categories of data explicitly authorized by the client in accordance with the specific instructions provided will be processed by us, and we will ensure that any personal data processing is carried out strictly in accordance with the client's purposes and instructions, thereby ensuring transparency and compliance at all times.

    In this particular case, for the use of SYNTPHONY LEARNING TECH, we will process the following items specified below:

    • Categories of Personal Data:

      • Identification and contact data

      • Employment details

      • Personal Characteristics

    1. Which suppliers does SYNTPHONY LEARNING TECH use?

    SYNTPHONY LEARNING TECH may rely on the collaboration of suppliers that provide specific software complementing the capabilities of the Product or provide cloud hosting related to both the data hosting in the cloud and the provision of additional services as required (infrastructure maintenance and management, support, etc.).

    These suppliers can be either companies within the NTT DATA group or external companies, and may change depending on technical and/or commercial developments. The corresponding data processing agreement signed with the Client will specify the suppliers that may process personal data as sub-processors. For more information about the subprocessors involved see

    NTT DATA is diligent in choosing its suppliers or service providers and in evaluating the guarantees they can demonstrate regarding compliance with applicable data protection laws, with a view to the protection of data subjects.

    Any provider acting under the authority of an NTT DATA entity and having access to personal data processes said data following NTT DATA entity’s instructions, or those of its data controller (e.g., its customers), securely and adopts the technical and organizational measures needed to guarantee compliance with applicable data protection laws.

    NTT DATA processors and sub-processors are required to sign appropriate agreements that govern the processing and protection of personal data. These agreements include requirements to ensure that the same obligations are passed to any further processors who may process personal data.

    In addition, NTT DATA has policies and supporting procedures to ensure that information assets are protected when NTT DATA engages third party service providers and/or processors. This includes requirements for data privacy, information security due diligence and information security risk assessments to be performed, in order to ensure:

    1. Information security requirements are clearly articulated and documented in agreements in accordance with NTT DATA’s information security standards.

    2. NTT DATA service providers and processors implement the same level of protection and control as NTT DATA;

    3. Service providers and processors are required to report any suspected or actual information security incidents to NTT DATA in a timely manner.

    4. Do we transfer personal data outside the EEA?

    In most cases, we will process personal data within the European Economic Area (EEA) or in a country that has an adequacy decision issued by the European Commission (Switzerland, Canada, etc.). However, we may use providers that process personal data from locations outside the EEA, including our NTT DATA Group companies.

    In any case, we will take all measures to ensure that our suppliers provide adequate guarantees to protect the personal data processed on behalf of our clients, and we contractually require that such personal data are processed in compliance with applicable data protection laws. In particular, with those suppliers that involve an international data transfer, we do:

    • Risk Assessment: Before any international data transfer, we conduct a detailed risk assessment to identify and mitigate potential risks to the security and privacy of personal data.

    • Standard Contractual Clauses (SCCs): SCCs are incorporated into our contracts with our suppliers outside the EEA to ensure an adequate level of personal data protection.

    • Data Protection Agreement (DPA): Our DPA specifies our obligations and commitments, including security, confidentiality, limitations on international data transfers, cooperation with data subjects' rights, and notification of security incidents.

    1. Do we have a Data Protection Officer (DPO)?

    To comply with the overarching accountability concept, NTT DATA has implemented procure and avail itself of tools to document and showing compliance with the privacy principles and well as with the applicable data protection laws requirement.

    Each company of the NTT DATA dedicates adequate resources to comply with applicable data protection laws, considering different applicable legal requirements of the jurisdictions where NTT DATA operates.

    To NTT DATA Group better compliance and to ensure an elevate level of protection of data subjects’ rights and freedoms, which is consistent and harmonised among the various jurisdictions, NTT DATA Group has adopted a hybrid DPO organization model. This model is halfway between a centralized single DPO for the whole group and separate DPOs, and also, Privacy Teams, for each entity in the various jurisdictions.

    Therefore, each NTT DATA company has a Data Protection Officer (DPO) in compliance with the applicable laws and regulations, as well as a Local Data Protection Office. The DPO is responsible for the supervision of the data protection strategy and its implementation in order to ensure compliance with legal requirements, as well as acting as a point of contact for any privacy and data protection law related queries. The local Data Protection Office implements and executes the data protection strategy to ensure compliance.

    1. How do we protect personal data?

    At NTT DATA we understand the relevance of protecting our clients' personal data. We have therefore implemented a holistic combination of technical and organisational measures designed to guarantee privacy at all phases of the personal data lifecycle, preventing any unauthorised or unlawful processing as well as against any accidental loss, destruction or damage of personal data. In addition, we conduct periodic review processes to assess the compliance and effectiveness of these measures, with the continuous objective of improving security and privacy.

    In addition, NTT DATA SPAIN S.L.U has various certifications that support our commitment to security and privacy, including:

    • ISO/IEC 27001:2022

    • the HIGH category in the “Esquema Nacional de Seguridad” (ENS)

    • ISO 9001:2015

    • ISO 14001:2015

    1. How does NTT DATA help customers comply with regulations in the use of SYNTPHONY LEARNING TECH?

    Fairness and transparency

    At NTT DATA we understand the importance of compliance with the principles of transparency and fair processing, so we have created this template to facilitate the identification of processing operations and sub-processors so that the Client, as the data controller, can comply with its obligations with respect to these principles.

    In addition, SYNTPHONY LEARNING TECH has the following mechanisms in place to facilitate compliance by the Client as data controller:

    • Ability to display a privacy notice at onboarding.

    • Enabling a checkbox to accept the privacy notice.

    Data Protection Rights

    NTT DATA Group has implemented policies, procedures, forms, and tools to enable the data subjects to exercise their rights (“DSR”) considering the visibility, accessibility, and simplicity of the applicable DSR system. All this allows us to efficiently assist in the management of rights requests such as access, rectification, objection, portability, erasure, restriction of processing and other rights established by the regulations.

    NTT DATA Group makes available to its employees, clients, users, contractors, or any other data subjects who own the personal data in the databases, systems or other means of information owned by the entities of NTT DATA Group, appropriate channels to receive and respond to requests, inquiries, and claims from their owners so that they can exercise their rights.

    NTT DATA Group maintains a record of all data subject requests received and the actions taken to respond to these requests.

    We are diligent in notifying the client of the rights requests we receive and following the procedures established by the applicable regulations to guarantee the protection and privacy of personal data, safeguarding the rights and freedoms of data subjects.

    Personal Data Breaches

    At NTT DATA we effectively manage our clients' data breaches through internal protocols. In this way, we are constantly monitoring our systems to prevent security incidents and/or breaches affecting personal data.

    Therefore, in the event of a breach, in accordance with established protocols, research plans will be undertaken to determine whether the confidentiality, integrity and availability of personal data has been compromised. In addition, the client will be notified without undue delay of any data breaches of which we become aware.

    This communication will always include the relevant aspects of the incident, such as the nature of the breach, the number of individuals affected, the actions taken, etc. In the event that all information cannot be provided immediately, it will be provided in a gradual way without undue delay. In addition, we have established clear procedures for the ongoing monitoring of reported breaches, ensuring a quick and adequate response to mitigate any potential impact on the security of personal data.

    Deletion and/or Return of Personal Data at the end of the provision of services

    NTT DATA has protocols for the return and/or deletion of information at the end of the contract with the client, strictly following the instructions received by the client. Our commitment is to ensure that any personal data collected or processed is handled with the utmost security and in accordance with the principles of data protection, while respecting confidentiality and privacy throughout the entire lifecycle of personal data.

    1. Updates and Modifications

    We reserve the right to modify this document to reflect changes in privacy practices or legal updates.

    1. Additional information

    Please, refer to our Privacy Policies and our website for additional Information about SYNTPHONY LEARNING TECH.

    Subprocessors

    NTT DATA may engage carefully selected subprocessors that support the delivery, maintenance, or operation of this product and its related services.

    Intelligent Automation

    Subcontractors
    Subcontracted services
    Location
    Guarantees

    Process Management

    Subcontractors
    Subcontracted services
    Location
    Guarantees

    Intelligent Document Processing

    Subcontractors
    Subcontracted services
    Location
    Guarantees

    Privacy

    How SYNTPHONY CONVERSATIONAL AI manages privacy?

    At NTT DATA, we help our clients fulfil current and future business needs by developing products and assets that work together to multiply business value. In doing so, we constantly track the global picture of privacy and align our technology to comply with data protection regulations, ensuring that our customers can operate with confidence and security in the personal data processing when they use our products.

    1. What does NTT DATA do to comply with privacy regulations?

    The personal data protection is a NTT DATA priority. We ensure that SYNTPHONY CONVERSATIONAL AI complies with all requirements stipulated by data protection regulations.

    We have therefore implemented security and privacy protocols to guarantee personal data protection in accordance with the highest standards established by European regulations. As a

    result, our customers can be sure that their personal data is protected while benefiting from an integrated and efficient technological solution that boosts their businesses.

    1. What types of data does SYNTPHONY CONVERSATIONAL AI process?

    The personal data that are processed as a result of the commercialization of the product will depend on the specific functionalities and/or modules that the customer chooses to use. It is important to note that only categories of data explicitly authorized by the client in accordance with the specific instructions provided will be processed by us, and we will ensure that any personal data processing is carried out strictly in accordance with the client's purposes and instructions, thereby ensuring transparency and compliance at all times.

    Due to the natures of SYNTPHONY CONVERSATIONAL AI, any type of data and data subjects may be processed and any type of processing operations may be carried out, amongst which we highlight the following aspects specified below:

    • Categories of Personal Data:

      • Identification and voice data

      • Contact data

      • Connection data

    1. Which suppliers does SYNTPHONY CONVERSATIONAL AI use?

    SYNTPHONY CONVERSATIONAL AI may rely on the collaboration of suppliers that provide specific software complementing the capabilities of the Product or provide cloud hosting related to both the data hosting in the cloud and the provision of additional services as required (infrastructure maintenance and management, support, etc.).

    These suppliers can be either companies within the NTT DATA group or external companies, and may change depending on technical and/or commercial developments. The corresponding data processing agreement signed with the Client will specify the suppliers that may process personal data as sub-processors. For more information about the subprocessors involved see

    NTT DATA is diligent in choosing its suppliers or service providers and in evaluating the guarantees they can demonstrate regarding compliance with applicable data protection laws, with a view to the protection of data subjects.

    Any provider acting under the authority of an NTT DATA entity and having access to personal data processes said data following NTT DATA entity’s instructions, or those of its data controller (e.g., its customers), securely and adopts the technical and organizational measures needed to guarantee compliance with applicable data protection laws.

    NTT DATA processors and sub-processors are required to sign appropriate agreements that govern the processing and protection of personal data. These agreements include requirements to ensure that the same obligations are passed to any further processors who may process personal data.

    In addition, NTT DATA has policies and supporting procedures to ensure that information assets are protected when NTT DATA engages third party service providers and/or processors. This includes requirements for data privacy, information security due diligence and information security risk assessments to be performed, in order to ensure:

    a. Information security requirements are clearly articulated and documented in agreements in accordance with NTT DATA’s information security standards.

    b. NTT DATA service providers and processors implement the same level of protection and control as NTT DATA;

    c. Service providers and processors are required to report any suspected or actual information security incidents to NTT DATA in a timely manner.

    1. Do we transfer personal data outside the EEA?

    In most cases, we will process personal data within the European Economic Area (EEA) or in a country that has an adequacy decision issued by the European Commission (Switzerland, Canada, etc.). However, we may use providers that process personal data from locations outside the EEA, including our NTT DATA Group companies.

    In any case, we will take all measures to ensure that our suppliers provide adequate guarantees to protect the personal data processed on behalf of our clients, and we contractually require that such personal data are processed in compliance with applicable data protection laws. In particular, with those suppliers that involve an international data transfer, we do:

    • Risk Assessment: Before any international data transfer, we conduct a detailed risk assessment to identify and mitigate potential risks to the security and privacy of personal data.

    • Standard Contractual Clauses (SCCs): SCCs are incorporated into our contracts with our suppliers outside the EEA to ensure an adequate level of personal data protection.

    • Data Protection Agreement (DPA): Our DPA specifies our obligations and commitments, including security, confidentiality, limitations on international data transfers, cooperation with data subjects' rights, and notification of security incidents.

    1. Do we have a Data Protection Officer (DPO)?

    To comply with the overarching accountability concept, NTT DATA has implemented procure and avail itself of tools to document and showing compliance with the privacy principles and well as with the applicable data protection laws requirement.

    Each company of the NTT DATA dedicates adequate resources to comply with applicable data protection laws, considering different applicable legal requirements of the jurisdictions where NTT DATA operates.

    To NTT DATA Group better compliance and to ensure an elevate level of protection of data subjects’ rights and freedoms, which is consistent and harmonised among the various jurisdictions, NTT DATA Group has adopted a hybrid DPO organization model. This model is halfway between a centralized single DPO for the whole group and separate DPOs, and also, Privacy Teams, for each entity in the various jurisdictions.

    Therefore, each NTT DATA company has a Data Protection Officer (DPO) in compliance with the applicable laws and regulations, as well as a Local Data Protection Office. The DPO is responsible for the supervision of the data protection strategy and its implementation in order to ensure compliance with legal requirements, as well as acting as a point of contact for any privacy and data protection law related queries. The local Data Protection Office implements and executes the data protection strategy to ensure compliance.

    1. How do we protect personal data?

    At NTT DATA we understand the relevance of protecting our clients' personal data. We have therefore implemented a holistic combination of technical and organisational measures designed to guarantee privacy at all phases of the personal data lifecycle, preventing any unauthorised or unlawful processing as well as against any accidental loss, destruction or damage of personal data. In addition, we conduct periodic review processes to assess the compliance and effectiveness of these measures, with the continuous objective of improving security and privacy.

    In addition, NTT DATA SPAIN S.L.U. has various certifications that support our commitment to security and privacy, including:

    • ISO/IEC 27001:2022

    • the HIGH category in the “Esquema Nacional de Seguridad” (ENS)

    • ISO 9001:2015

    • ISO 14001:2015

    1. How does NTT DATA help customers comply with regulations in the use of SYNTPHONY CONVERSATIONAL AI?

    a) Fairness and transparency

    At NTT DATA we understand the importance of compliance with the principles of transparency and fair processing, so we have created this template to facilitate the identification of processing operations and sub-processors so that the Client, as the data controller, can comply with its obligations with respect to these principles.

    b) Data Protection Rights

    NTT DATA Group has implemented policies, procedures, forms, and tools to enable the data subjects to exercise their rights (“DSR”) considering the visibility, accessibility, and simplicity of the applicable DSR system. All this allows us to efficiently assist in the management of rights requests such as access, rectification, objection, portability, erasure, restriction of processing and other rights established by the regulations.

    NTT DATA Group makes available to its employees, clients, users, contractors, or any other data subjects who own the personal data in the databases, systems or other means of information owned by the entities of NTT DATA Group, appropriate channels to receive and respond to requests, inquiries, and claims from their owners so that they can exercise their rights.

    NTT DATA Group maintains a record of all data subject requests received and the actions taken to respond to these requests.

    We are diligent in notifying the client of the rights requests we receive and following the procedures established by the applicable regulations to guarantee the protection and privacy of personal data, safeguarding the rights and freedoms of data subjects.

    c) Personal Data Breaches

    At NTT DATA we effectively manage our clients' data breaches through internal protocols. In this way, we are constantly monitoring our systems to prevent security incidents and/or breaches affecting personal data.

    Therefore, in the event of a breach, in accordance with established protocols, research plans will be undertaken to determine whether the confidentiality, integrity and availability of personal data has been compromised. In addition, the client will be notified without undue delay of any data breaches of which we become aware.

    This communication will always include the relevant aspects of the incident, such as the nature of the breach, the number of individuals affected, the actions taken, etc. In the event that all information cannot be provided immediately, it will be provided in a gradual way without undue delay. In addition, we have established clear procedures for the ongoing monitoring of reported

    breaches, ensuring a quick and adequate response to mitigate any potential impact on the security of personal data.

    d) Deletion and/or Return of Personal Data at the end of the provision of services

    NTT DATA has protocols for the return and/or deletion of information at the end of the contract with the client, strictly following the instructions received by the client. Our commitment is to ensure that any personal data collected or processed is handled with the utmost security and in accordance with the principles of data protection, while respecting confidentiality and privacy throughout the entire lifecycle of personal data.

    1. Updates and Modifications

    We reserve the right to modify this document to reflect changes in privacy practices or legal updates.

    1. Additional information

    Please, refer to our Privacy Policies and our website for additional Information about SYNTPHONY CONVERSATIONAL AI.

    Introducción al cifrado de AzureMicrosoftLearn

    Privacy

    How SYNTPHONY INTELLIGENT AUTOMATION manages privacy?

    1. Do we take privacy into account in the development of SYNTPHONY INTELLIGENT AUTOMATION?

    In our technological development process, we integrate from the beginning the principles of privacy by design and comply with the applicable data protection regulations. This means that every stage of the conception, design and deployment of our solutions is carried out with privacy as a central element. We apply proactive measures to guarantee personal data protection, ensuring that our technologies not only comply with relevant legal and regulatory standards, such as the General Data Protection Regulation (GDPR), but also promote trust and security for our customers.

    Education and Training

  • Categories of Data Subjects:

    • Users (students, employees, inhabitants of a specific place…)

  • Processing Operations:

    • Consultation

    • Recording and Storage

    • Interconnection

    • Extraction

    • Disclosure by transmission

    • Blocking and erasure

    • Modification

    • Structuring and profiling

    • Collection and register

  • ISO/IEC 20000-1:2018
    next page.
    Syntphony - Home

    Usage data via developer module

  • Categories of Data Subjects:

    • Controller´s customers and potential customers

    • Controller’s users

  • Processing Operations:

    • Consultation

    • Recording and Storage

    • Collection

    • Disclosure by transmission

    • Elaboration

    • Extraction

    • Structuring

    • Interconnection

    • Blocking and erasure

  • ISO/IEC 20000-1:2018
    next page.
    Syntphony - Home
    Logo

    NTT DATA SPAIN BPO, S.L.U.

    Local and Global Service Desk

    Spain

    Data Processing Agreement

    NTT DATA SPAIN BPO, S.L.U. SUCURSAL DEL PERÚ

    Global Service Desk

    Peru

    Standard Contractual Clauses. Module 3: Processor to Processor

    NTT DATA MOROCCO CENTERS, S.A.R.L.

    Global Service Desk

    Morocco

    Standard Contractual Clauses. Module 3: Processor to Processor

    NTT DATA COLOMBIA, S.A.S.

    Global Service Desk

    Colombia

    Standard Contractual Clauses. Module 3: Processor to Processor

    MICROSOFT IRELAND OPERATIONS LIMITED

    Hosting and cloud storage services.

    Netherlands

    ENREACH COMMUNICATIONS S.L

    Phone Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Information Processing Services Private Limited

    Global Service Desk

    India

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA SPAIN BPO, S.L.U.

    Local and Global Service Desk

    Spain

    Data Processing Agreement

    NTT DATA SPAIN BPO, S.L.U. SUCURSAL DEL PERU

    Global Service Desk

    PERU

    Standard Contractual Clauses. Module 3: Processor to Processor

    NTT DATA MOROCCO CENTERS, S.A.R.L.

    Global Service Desk

    Morocco

    Standard Contractual Clauses. Module 3: Processor to Processor

    NTT DATA COLOMBIA, S.A.S.

    Global Service Desk

    Colombia

    Standard Contractual Clauses. Module 3: Processor to Processor

    MICROSOFT IRELAND OPERATIONS LIMITED

    Hosting and cloud storage services. Azure OpenAI, Cognitive search, Computer vision, Speech Service, Document intelligence.

    Netherlands

    AMAZON WEB SERVICES EMEA

    Other services: Textract, Bedrock, Transcribe

    Ireland

    ENREACH COMMUNICATIONS S.L

    Phone Service Desk

    Spain

    Data Processing Agreement

    NTT DATA Information Processing Services Private Limited

    Global Service Desk

    India

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA SPAIN CENTERS, SLU

    Ticketing services for resolving or forwarding incidents. Support, maintenance and testing

    Spain

    DPA

    NTT DATA SPAIN INFRASTRUCTURES ENGINEERING, S.L.U.

    Management and governance technology infrastructure service.

    Spain

    DPA

    NTT DATA SPAIN INFRASTRUCTURES OPERATIONS, S.L.U.

    Administration and operation technology infrastructure service.

    Spain

    DPA

    MICROSOFT AZURE

    Hosting and cloud storage services.

    Netherlands

    Terms and conditions

    NTT DATA SPAIN BPO, S.L.U.

    Local and Global Service Desk

    Spain

    DPA

    NTT DATA Spain BPO, S.L.U. Sucursal del Perú

    Global Service Desk

    Peru

    DPA SCC

    NTT DATA MOROCCO CENTERS, S.A.R.L.

    Global Service Desk

    Morocco

    DPA SCC

    NTT DATA COLOMBIA, S.A.S.

    Global Service Desk

    Colombia

    DPA SCC

    ENREACH COMMUNICATIONS S.L

    Phone Service Desk

    Spain

    DPA

    NTT DATA Information Processing Services Private Limited

    Global Service Desk

    India

    EU Standard Contractual Clauses (Module 3 – Processor to Processor)

    NTT DATA SPAIN CENTERS, SLU

    Support services

    Spain

    Data Processing Agreement

    NTT DATA SPAIN INFRASTRUCTURES ENGINEERING, S.L.U.

    Management and governance technology infrastructure service.

    Spain

    Data Processing Agreement

    NTT DATA SPAIN INFRASTRUCTURES OPERATIONS, S.L.U.

    Administration and operation technology infrastructure service.

    Spain

    NTT DATA SPAIN CENTERS, SLU

    Ticketing services for resolving or forwarding incidents. Support, maintenance and testing

    Spain

    Data Processing Agreement

    NTT DATA SPAIN INFRASTRUCTURES ENGINEERING, S.L.U.

    Management and governance technology infrastructure service.

    Spain

    Data Processing Agreement

    NTT DATA SPAIN INFRASTRUCTURES OPERATIONS, S.L.U.

    Administration and operation technology infrastructure service.

    Spain

    Data Processing Agreement

    Data Processing Agreement

    At NTT DATA, we help our clients fulfil current and future business needs by developing products and assets that work together to multiply business value. In doing so, we constantly track the global picture of privacy and align our technology to comply with data protection regulations, ensuring that our customers can operate with confidence and security in the personal data processing when they use our products.

    1. What does NTT DATA do to comply with privacy regulations?

    The personal data protection is a NTT DATA priority. We ensure that SYNTPHONY INTELLIGENT AUTOMATION complies with all requirements stipulated by data protection regulations.

    We have therefore implemented security and privacy protocols to guarantee personal data protection in accordance with the highest standards established by European regulations. As a result, our customers can be sure that their personal data is protected while benefiting from an integrated and efficient technological solution that boosts their businesses.

    1. What types of data does SYNTPHONY INTELLIGENT AUTOMATION process?

    The personal data that are processed as a result of the commercialization of the product will depend on the specific functionalities and/or modules that the customer chooses to use. It is important to note that only categories of data explicitly authorized by the client in accordance with the specific instructions provided will be processed by us, and we will ensure that any personal data processing is carried out strictly in accordance with the client's purposes and instructions, thereby ensuring transparency and compliance at all times.

    In this particular case, for the use of SYNTPHONY INTELLIGENT AUTOMATION, we will process the following items specified below:

    • Categories of Personal Data:

      • Identification details

      • Personal characteristics

      • Employment details

      • Economic details

      • Goods and services transactions

      • Data relating to the events held

      • Economic, financial and insurance data

      • Social circumstances

      • Image/video data

      • Audio/voice data

      • Academic and professional data

      • Commercial information

      • Special categories of personal data, etc.

    • Categories of Data Subjects:

      • Controller's Clients

      • Controller's Employees

      • Controller's Suppliers

    • Processing Operations:

      • Consultation

      • Recording and Storage

      • Interconnection

    1. Which suppliers does SYNTPHONY INTELLIGENT AUTOMATION use?

    SYNTPHONY INTELLIGENT AUTOMATION may rely on the collaboration of suppliers that provide specific software complementing the capabilities of the Product or provide cloud hosting related to both the data hosting in the cloud and the provision of additional services as required (infrastructure maintenance and management, support, etc.).

    These suppliers can be either companies within the NTT DATA group or external companies, and may change depending on technical and/or commercial developments. The corresponding data processing agreement signed with the Client will specify the suppliers that may process personal data as sub-processors. For more information about the subprocessors involved see next page.

    NTT DATA is diligent in choosing its suppliers or service providers and in evaluating the guarantees they can demonstrate regarding compliance with applicable data protection laws, with a view to the protection of data subjects.

    Any provider acting under the authority of an NTT DATA entity and having access to personal data processes said data following NTT DATA entity’s instructions, or those of its data controller (e.g., its customers), securely and adopts the technical and organizational measures needed to guarantee compliance with applicable data protection laws.

    NTT DATA processors and sub-processors are required to sign appropriate agreements that govern the processing and protection of personal data. These agreements include requirements to ensure that the same obligations are passed to any further processors who may process personal data.

    In addition, NTT DATA has policies and supporting procedures to ensure that information assets are protected when NTT DATA engages third party service providers and/or processors. This includes requirements for data privacy, information security due diligence and information security risk assessments to be performed, in order to ensure:

    1. Information security requirements are clearly articulated and documented in agreements in accordance with NTT DATA’s information security standards.

    2. NTT DATA service providers and processors implement the same level of protection and control as NTT DATA;

    3. Service providers and processors are required to report any suspected or actual information security incidents to NTT DATA in a timely manner.

    4. Do we transfer personal data outside the EEA?

    In most cases, we will process personal data within the European Economic Area (EEA) or in a country that has an adequacy decision issued by the European Commission (Switzerland, Canada, etc.). However, we may use providers that process personal data from locations outside the EEA, including our NTT DATA Group companies.

    In any case, we will take all measures to ensure that our suppliers provide adequate guarantees to protect the personal data processed on behalf of our clients, and we contractually require that such personal data are processed in compliance with applicable data protection laws. In particular, with those suppliers that involve an international data transfer, we do:

    • Risk Assessment: Before any international data transfer, we conduct a detailed risk assessment to identify and mitigate potential risks to the security and privacy of personal data.

    • Standard Contractual Clauses (SCCs): SCCs are incorporated into our contracts with our suppliers outside the EEA to ensure an adequate level of personal data protection.

    • Data Protection Agreement (DPA): Our DPA specifies our obligations and commitments, including security, confidentiality, limitations on international data transfers, cooperation with data subjects' rights, and notification of security incidents.

    1. Do we have a Data Protection Officer (DPO)?

    To comply with the overarching accountability concept, NTT DATA has implemented procure and avail itself of tools to document and showing compliance with the privacy principles and well as with the applicable data protection laws requirement.

    Each company of the NTT DATA dedicates adequate resources to comply with applicable data protection laws, considering different applicable legal requirements of the jurisdictions where NTT DATA operates.

    To NTT DATA Group better compliance and to ensure an elevate level of protection of data subjects’ rights and freedoms, which is consistent and harmonised among the various jurisdictions, NTT DATA Group has adopted a hybrid DPO organization model. This model is halfway between a centralized single DPO for the whole group and separate DPOs, and also, Privacy Teams, for each entity in the various jurisdictions.

    Therefore, each NTT DATA company has a Data Protection Officer (DPO) in compliance with the applicable laws and regulations, as well as a Local Data Protection Office. The DPO is responsible for the supervision of the data protection strategy and its implementation in order to ensure compliance with legal requirements, as well as acting as a point of contact for any privacy and data protection law related queries. The local Data Protection Office implements and executes the data protection strategy to ensure compliance.

    1. How do we protect personal data?

    At NTT DATA we understand the relevance of protecting our clients' personal data. We have therefore implemented a holistic combination of technical and organisational measures designed to guarantee privacy at all phases of the personal data lifecycle, preventing any unauthorised or unlawful processing as well as against any accidental loss, destruction or damage of personal data. In addition, we conduct periodic review processes to assess the compliance and effectiveness of these measures, with the continuous objective of improving security and privacy.

    In addition, NTT DATA SPAIN S.L.U. has various certifications that support our commitment to security and privacy, including:

    • ISO/IEC 27001:2022

    • the HIGH category in the “Esquema Nacional de Seguridad” (ENS)

    • ISO 9001:2015

    • ISO 14001:2015

    • ISO/IEC 20000-1:2018

    1. How does NTT DATA help customers comply with regulations in the use of SYNTPHONY INTELLIGENT AUTOMATION?

      1. Fairness and transparency At NTT DATA we understand the importance of compliance with the principles of transparency and fair processing, so we have created this template to facilitate the identification of processing operations and sub-processors so that the Client, as the data controller, can comply with its obligations with respect to these principles.

      2. Data Protection Rights NTT DATA Group has implemented policies, procedures, forms, and tools to enable the data subjects to exercise their rights (“DSR”) considering the visibility, accessibility, and simplicity of the applicable DSR system. All this allows us to efficiently assist in the management of rights requests such as access, rectification, objection, portability, erasure, restriction of processing and other rights established by the regulations. NTT DATA Group makes available to its employees, clients, users, contractors, or any other data subjects who own the personal data in the databases, systems or other means of information owned by the entities of NTT DATA Group, appropriate channels to receive and respond to requests, inquiries, and claims from their owners so that they can exercise their rights. NTT DATA Group maintains a record of all data subject requests received and the actions taken to respond to these requests. We are diligent in notifying the client of the rights requests we receive and following the procedures established by the applicable regulations to guarantee the protection and privacy of personal data, safeguarding the rights and freedoms of data subjects.

      3. Personal Data Breaches At NTT DATA we effectively manage our clients' data breaches through internal protocols. In this way, we are constantly monitoring our systems to prevent security incidents and/or breaches affecting personal data. Therefore, in the event of a breach, in accordance with established protocols, research plans will be undertaken to determine whether the confidentiality, integrity and availability of personal data has been compromised. In addition, the client will be notified without undue delay of any data breaches of which we become aware. This communication will always include the relevant aspects of the incident, such as the nature of the breach, the number of individuals affected, the actions taken, etc. In the event that all information cannot be provided immediately, it will be provided in a gradual way without undue delay. In addition, we have established clear procedures for the ongoing monitoring of reported breaches, ensuring a quick and adequate response to mitigate any potential impact on the security of personal data.

      4. Deletion and/or Return of Personal Data at the end of the provision of services NTT DATA has protocols for the return and/or deletion of information at the end of the contract with the client, strictly following the instructions received by the client. Our commitment is to ensure that any personal data collected or processed is handled with the utmost security and in accordance with the principles of data protection, while respecting confidentiality and privacy throughout the entire lifecycle of personal data.

    2. Updates and Modifications

    We reserve the right to modify this document to reflect changes in privacy practices or legal updates.

    1. Additional information

    Please, refer to our Privacy Policies and our website Syntphony - Home for additional Information about SYNTPHONY INTELLIGENT AUTOMATION.

    Privacy

    How SYNTPHONY SALES manages privacy?

    Do we take privacy into account in the development of SYNTPHONY SALES?

    In our technological development process, we integrate from the beginning the principles of privacy by design and comply with the applicable data protection regulations. This means that every stage of the conception, design and deployment of our solutions is carried out with privacy as a central element. We apply proactive measures to guarantee personal data protection, ensuring that our technologies not only comply with relevant legal and regulatory standards, such as the General Data Protection Regulation (GDPR), but also promote trust and security for our customers.

    At NTT DATA, we help our clients fulfil current and future business needs by developing products and assets that work together to multiply business value. In doing so, we constantly track the global picture of privacy and align our technology to comply with data protection regulations, ensuring that our customers can operate with confidence and security in the personal data processing when they use our products.

    What does NTT DATA do to comply with privacy regulations?

    The personal data protection is a NTT DATA priority. We ensure that SYNTPHONY SALES complies with all requirements stipulated by data protection regulations.

    We have therefore implemented security and privacy protocols to guarantee personal data protection in accordance with the highest standards established by European regulations. As a result, our customers can be sure that their personal data is protected while benefiting from an integrated and efficient technological solution that boosts their businesses.

    What types of data does SYNTPHONY SALES process?

    The personal data that are processed as a result of the commercialization of the product will depend on the specific functionalities and/or modules that the customer chooses to use. It is important to note that only categories of data explicitly authorized by the client in accordance with the specific instructions provided will be processed by us, and we will ensure that any personal data processing is carried out strictly in accordance with the client's purposes and instructions, thereby ensuring transparency and compliance at all times.

    In this particular case, for the use of SYNTPHONY SALES, we will process the following items specified below:

    • Categories of Personal Data:

      • Identification and contact data

      • Transactional data

      • Bank details and credit data

    Which suppliers does SYNTPHONY SALES use?

    SYNTPHONY SALES may rely on the collaboration of suppliers that provide specific software complementing the capabilities of the Product or provide cloud hosting related to both the data hosting in the cloud and the provision of additional services as required (infrastructure maintenance and management, support, etc.).

    These suppliers can be either companies within the NTT DATA group or external companies, and may change depending on technical and/or commercial developments. The corresponding data processing agreement signed with the Client will specify the suppliers that may process personal data as sub-processors. For more information about the subprocessors involved see

    NTT DATA is diligent in choosing its suppliers or service providers and in evaluating the guarantees they can demonstrate regarding compliance with applicable data protection laws, with a view to the protection of data subjects.

    Any provider acting under the authority of an NTT DATA entity and having access to personal data processes said data following NTT DATA entity’s instructions, or those of its data controller (e.g., its customers), securely and adopts the technical and organizational measures needed to guarantee compliance with applicable data protection laws.

    NTT DATA processors and sub-processors are required to sign appropriate agreements that govern the processing and protection of personal data. These agreements include requirements to ensure that the same obligations are passed to any further processors who may process personal data.

    In addition, NTT DATA has policies and supporting procedures to ensure that information assets are protected when NTT DATA engages third party service providers and/or processors. This includes requirements for data privacy, information security due diligence and information security risk assessments to be performed, in order to ensure:

    a. Information security requirements are clearly articulated and documented in agreements in accordance with NTT DATA’s information security standards.

    b. NTT DATA service providers and processors implement the same level of protection and control as NTT DATA;

    c. Service providers and processors are required to report any suspected or actual information security incidents to NTT DATA in a timely manner.

    Do we transfer personal data outside the EEA?

    In most cases, we will process personal data within the European Economic Area (EEA) or in a country that has an adequacy decision issued by the European Commission (Switzerland, Canada, etc.). However, we may use providers that process personal data from locations outside the EEA, including our NTT DATA Group companies.

    In any case, we will take all measures to ensure that our suppliers provide adequate guarantees to protect the personal data processed on behalf of our clients, and we contractually require that such personal data are processed in compliance with applicable data protection laws. In particular, with those suppliers that involve an international data transfer, we do:

    • Risk Assessment: Before any international data transfer, we conduct a detailed risk assessment to identify and mitigate potential risks to the security and privacy of personal data.

    • Standard Contractual Clauses (SCCs): SCCs are incorporated into our contracts with our suppliers outside the EEA to ensure an adequate level of personal data protection.

    • Data Protection Agreement (DPA): Our DPA specifies our obligations and commitments, including security, confidentiality, limitations on international data transfers, cooperation with data subjects' rights, and notification of security incidents.

    Do we have a Data Protection Officer (DPO)?

    To comply with the overarching accountability concept, NTT DATA has implemented procure and avail itself of tools to document and showing compliance with the privacy principles and well as with the applicable data protection laws requirement.

    Each company of the NTT DATA dedicates adequate resources to comply with applicable data protection laws, considering different applicable legal requirements of the jurisdictions where NTT DATA operates.

    To NTT DATA Group better compliance and to ensure an elevate level of protection of data subjects’ rights and freedoms, which is consistent and harmonised among the various jurisdictions, NTT DATA Group has adopted a hybrid DPO organization model. This model is halfway between a centralized single DPO for the whole group and separate DPOs, and also, Privacy Teams, for each entity in the various jurisdictions.

    Therefore, each NTT DATA company has a Data Protection Officer (DPO) in compliance with the applicable laws and regulations, as well as a Local Data Protection Office. The DPO is responsible for the supervision of the data protection strategy and its implementation in order to ensure compliance with legal requirements, as well as acting as a point of contact for any privacy and data protection law related queries. The local Data Protection Office implements and executes the data protection strategy to ensure compliance.

    How do we protect personal data?

    At NTT DATA we understand the relevance of protecting our clients' personal data. We have therefore implemented a holistic combination of technical and organisational measures designed to guarantee privacy at all phases of the personal data lifecycle, preventing any unauthorised or unlawful processing as well as against any accidental loss, destruction or damage of personal data. In addition, we conduct periodic review processes to assess the compliance and effectiveness of these measures, with the continuous objective of improving security and privacy.

    In addition, NTT DATA SPAIN S.L.U has various certifications that support our commitment to security and privacy, including:

    • ISO/IEC 27001:2022

    • the HIGH category in the “Esquema Nacional de Seguridad” (ENS)

    • ISO 9001:2015

    • ISO 14001:2015

    How does NTT DATA help customers comply with regulations in the use of SYNTPHONY SALES?

    a) Fairness and transparency

    At NTT DATA we understand the importance of compliance with the principles of transparency and fair processing, so we have created this template to facilitate the identification of processing operations and sub-processors so that the Client, as the data controller, can comply with its obligations with respect to these principles.

    b) Data Protection Rights

    NTT DATA Group has implemented policies, procedures, forms, and tools to enable the data subjects to exercise their rights (“DSR”) considering the visibility, accessibility, and simplicity of the applicable DSR system. All this allows us to efficiently assist in the management of rights requests such as access, rectification, objection, portability, erasure, restriction of processing and other rights established by the regulations.

    NTT DATA Group makes available to its employees, clients, users, contractors, or any other data subjects who own the personal data in the databases, systems or other means of information owned by the entities of NTT DATA Group, appropriate channels to receive and respond to requests, inquiries, and claims from their owners so that they can exercise their rights.

    NTT DATA Group maintains a record of all data subject requests received and the actions taken to respond to these requests.

    We are diligent in notifying the client of the rights requests we receive and following the procedures established by the applicable regulations to guarantee the protection and privacy of personal data, safeguarding the rights and freedoms of data subjects.

    c) Personal Data Breaches

    At NTT DATA we effectively manage our clients' data breaches through internal protocols. In this way, we are constantly monitoring our systems to prevent security incidents and/or breaches affecting personal data.

    Therefore, in the event of a breach, in accordance with established protocols, research plans will be undertaken to determine whether the confidentiality, integrity and availability of personal data has been compromised. In addition, the client will be notified without undue delay of any data breaches of which we become aware.

    This communication will always include the relevant aspects of the incident, such as the nature of the breach, the number of individuals affected, the actions taken, etc. In the event that all information cannot be provided immediately, it will be provided in a gradual way without undue delay. In addition, we have established clear procedures for the ongoing monitoring of reported breaches, ensuring a quick and adequate response to mitigate any potential impact on the security of personal data.

    d) Deletion and/or Return of Personal Data at the end of the provision of services

    NTT DATA has protocols for the return and/or deletion of information at the end of the contract with the client, strictly following the instructions received by the client. Our commitment is to ensure that any personal data collected or processed is handled with the utmost security and in accordance with the principles of data protection, while respecting confidentiality and privacy throughout the entire lifecycle of personal data.

    Updates and Modifications

    We reserve the right to modify this document to reflect changes in privacy practices or legal updates.

    Additional information Please, refer to our Privacy Policies and our website Syntphony - Home for additional Information about SYNTPHONY SALES.

    Privacy

    How SYNTPHONY PAYMENTS manages privacy?

    Do we take privacy into account in the development of SYNTPHONY PAYMENTS?

    In our technological development process, we integrate from the beginning the principles of privacy by design and comply with the applicable data protection regulations. This means that every stage of the conception, design and deployment of our solutions is carried out with privacy as a central element. We apply proactive measures to guarantee personal data protection, ensuring that our technologies not only comply with relevant legal and regulatory standards, such as the General Data Protection Regulation (GDPR), but also promote trust and security for our customers.

    At NTT DATA, we help our clients fulfil current and future business needs by developing products and assets that work together to multiply business value. In doing so, we constantly track the global picture of privacy and align our technology to comply with data protection regulations, ensuring that our customers can operate with confidence and security in the personal data processing when they use our products.

    Controller's Users
  • Users

  • Suppliers

  • Any other data subject that may be included into the uploaded documentation

  • Extraction
  • Disclosure by transmission

  • Blocking and erasure

  • Collection

  • Structuring

  • Organization

  • Modification

  • Retrieval

  • Limitation

  • Settlement and payment data

  • Economic data

  • Personal Characteristics

  • Access data

  • Usage and connection data

  • Categories of Data Subjects:

    • End customers

    • Employees

    • Suppliers

    • Users

    • Identification and contact data

    • Transactional data

    • Bank details and credit data

    • Settlement and payment data

    • Economic data

    • Personal Characteristics

    • Access data

    • Usage and connection data

  • Categories of Data Subjects:

    • End customers

    • Employees

    • Suppliers

    • Users

  • Processing Operations:

    • Consultation

    • Recording and Storage

    • Interconnection

    • Extraction

    • Disclosure by transmission

    • Blocking and erasure

    • Collection

    • Retrieval

    • Comparison

    • Structuring and Organization

  • ISO/IEC 20000-1:2018
  • PCI DSS v.3.2.1

  • next page.
    Terms and conditions
    Terms and conditions
    Terms and conditions

    What does NTT DATA do to comply with privacy regulations?

    The personal data protection is a NTT DATA priority. We ensure that SYNTPHONY PAYMENTS complies with all requirements stipulated by data protection regulations.

    We have therefore implemented security and privacy protocols to guarantee personal data protection in accordance with the highest standards established by European regulations. As a result, our customers can be sure that their personal data is protected while benefiting from an integrated and efficient technological solution that boosts their businesses.

    What types of data does SYNTPHONY PAYMENTS process?

    The personal data that are processed as a result of the commercialization of the product will depend on the specific functionalities and/or modules that the customer chooses to use. It is important to note that only categories of data explicitly authorized by the client in accordance with the specific instructions provided will be processed by us, and we will ensure that any personal data processing is carried out strictly in accordance with the client's purposes and instructions, thereby ensuring transparency and compliance at all times.

    In this particular case, for the use of SYNTPHONY PAYMENTS, we will process the following items specified below:

    • Categories of Personal Data:

      • Identification and contact data

      • Transactional data

      • Bank details and credit data

      • Settlement and payment data

      • Economic data

      • Personal Characteristics

      • Access data

      • Usage and connection data

    • Categories of Data Subjects:

      • End customers

      • Employees

      • Suppliers

    • Categories of Data Subjects:

      • End customers

      • Employees

      • Suppliers

    • Processing Operations:

      • Consultation

      • Recording and Storage

      • Interconnection

    Which suppliers does SYNTPHONY PAYMENTS use?

    SYNTPHONY PAYMENTS may rely on the collaboration of suppliers that provide specific software complementing the capabilities of the Product or provide cloud hosting related to both the data hosting in the cloud and the provision of additional services as required (infrastructure maintenance and management, support, etc.).

    These suppliers can be either companies within the NTT DATA group or external companies, and may change depending on technical and/or commercial developments. The corresponding data processing agreement signed with the Client will specify the suppliers that may process personal data as sub-processors. For more information about the subprocessors involved see next page.

    NTT DATA is diligent in choosing its suppliers or service providers and in evaluating the guarantees they can demonstrate regarding compliance with applicable data protection laws, with a view to the protection of data subjects.

    Any provider acting under the authority of an NTT DATA entity and having access to personal data processes said data following NTT DATA entity’s instructions, or those of its data controller (e.g., its customers), securely and adopts the technical and organizational measures needed to guarantee compliance with applicable data protection laws.

    NTT DATA processors and sub-processors are required to sign appropriate agreements that govern the processing and protection of personal data. These agreements include requirements to ensure that the same obligations are passed to any further processors who may process personal data.

    In addition, NTT DATA has policies and supporting procedures to ensure that information assets are protected when NTT DATA engages third party service providers and/or processors. This includes requirements for data privacy, information security due diligence and information security risk assessments to be performed, in order to ensure:

    a. Information security requirements are clearly articulated and documented in agreements in accordance with NTT DATA’s information security standards.

    b. NTT DATA service providers and processors implement the same level of protection and control as NTT DATA;

    c. Service providers and processors are required to report any suspected or actual information security incidents to NTT DATA in a timely manner.

    Do we transfer personal data outside the EEA?

    In most cases, we will process personal data within the European Economic Area (EEA) or in a country that has an adequacy decision issued by the European Commission (Switzerland, Canada, etc.). However, we may use providers that process personal data from locations outside the EEA, including our NTT DATA Group companies.

    In any case, we will take all measures to ensure that our suppliers provide adequate guarantees to protect the personal data processed on behalf of our clients, and we contractually require that such personal data are processed in compliance with applicable data protection laws. In particular, with those suppliers that involve an international data transfer, we do:

    • Risk Assessment: Before any international data transfer, we conduct a detailed risk assessment to identify and mitigate potential risks to the security and privacy of personal data.

    • Standard Contractual Clauses (SCCs): SCCs are incorporated into our contracts with our suppliers outside the EEA to ensure an adequate level of personal data protection.

    • Data Protection Agreement (DPA): Our DPA specifies our obligations and commitments, including security, confidentiality, limitations on international data transfers, cooperation with data subjects' rights, and notification of security incidents.

    Do we have a Data Protection Officer (DPO)?

    To comply with the overarching accountability concept, NTT DATA has implemented procure and avail itself of tools to document and showing compliance with the privacy principles and well as with the applicable data protection laws requirement.

    Each company of the NTT DATA dedicates adequate resources to comply with applicable data protection laws, considering different applicable legal requirements of the jurisdictions where NTT DATA operates.

    To NTT DATA Group better compliance and to ensure an elevate level of protection of data subjects’ rights and freedoms, which is consistent and harmonised among the various jurisdictions, NTT DATA Group has adopted a hybrid DPO organization model. This model is halfway between a centralized single DPO for the whole group and separate DPOs, and also, Privacy Teams, for each entity in the various jurisdictions.

    Therefore, each NTT DATA company has a Data Protection Officer (DPO) in compliance with the applicable laws and regulations, as well as a Local Data Protection Office. The DPO is responsible for the supervision of the data protection strategy and its implementation in order to ensure compliance with legal requirements, as well as acting as a point of contact for any privacy and data protection law related queries. The local Data Protection Office implements and executes the data protection strategy to ensure compliance.

    How do we protect personal data?

    At NTT DATA we understand the relevance of protecting our clients' personal data. We have therefore implemented a holistic combination of technical and organisational measures designed to guarantee privacy at all phases of the personal data lifecycle, preventing any unauthorised or unlawful processing as well as against any accidental loss, destruction or damage of personal data. In addition, we conduct periodic review processes to assess the compliance and effectiveness of these measures, with the continuous objective of improving security and privacy.

    In addition, NTT DATA SPAIN S.L.U has various certifications that support our commitment to security and privacy, including:

    • ISO/IEC 27001:2022

    • the HIGH category in the “Esquema Nacional de Seguridad” (ENS)

    • ISO 9001:2015

    • ISO 14001:2015

    • ISO/IEC 20000-1:2018

    • PCI DSS v.3.2.1

    How does NTT DATA help customers comply with regulations in the use of SYNTPHONY PAYMENTS?

    a) Fairness and transparency

    At NTT DATA we understand the importance of compliance with the principles of transparency and fair processing, so we have created this template to facilitate the identification of processing operations and sub-processors so that the Client, as the data controller, can comply with its obligations with respect to these principles.

    b) Data Protection Rights

    NTT DATA Group has implemented policies, procedures, forms, and tools to enable the data subjects to exercise their rights (“DSR”) considering the visibility, accessibility, and simplicity of the applicable DSR system. All this allows us to efficiently assist in the management of rights requests such as access, rectification, objection, portability, erasure, restriction of processing and other rights established by the regulations.

    NTT DATA Group makes available to its employees, clients, users, contractors, or any other data subjects who own the personal data in the databases, systems or other means of information owned by the entities of NTT DATA Group, appropriate channels to receive and respond to requests, inquiries, and claims from their owners so that they can exercise their rights.

    NTT DATA Group maintains a record of all data subject requests received and the actions taken to respond to these requests.

    We are diligent in notifying the client of the rights requests we receive and following the procedures established by the applicable regulations to guarantee the protection and privacy of personal data, safeguarding the rights and freedoms of data subjects.

    c) Personal Data Breaches

    At NTT DATA we effectively manage our clients' data breaches through internal protocols. In this way, we are constantly monitoring our systems to prevent security incidents and/or breaches affecting personal data.

    Therefore, in the event of a breach, in accordance with established protocols, research plans will be undertaken to determine whether the confidentiality, integrity and availability of personal data has been compromised. In addition, the client will be notified without undue delay of any data breaches of which we become aware.

    This communication will always include the relevant aspects of the incident, such as the nature of the breach, the number of individuals affected, the actions taken, etc. In the event that all information cannot be provided immediately, it will be provided in a gradual way without undue delay. In addition, we have established clear procedures for the ongoing monitoring of reported breaches, ensuring a quick and adequate response to mitigate any potential impact on the security of personal data.

    d) Deletion and/or Return of Personal Data at the end of the provision of services

    NTT DATA has protocols for the return and/or deletion of information at the end of the contract with the client, strictly following the instructions received by the client. Our commitment is to ensure that any personal data collected or processed is handled with the utmost security and in accordance with the principles of data protection, while respecting confidentiality and privacy throughout the entire lifecycle of personal data.

    Updates and Modifications

    We reserve the right to modify this document to reflect changes in privacy practices or legal updates.

    Additional information Please, refer to our Privacy Policies and our website Syntphony - Home for additional Information about SYNTPHONY PAYMENTS.

    Logo
    Microsoft Trust Center | Data Security, Privacy, and Compliancewww.microsoft.com
    Azure Trust Center
    Microsoft Trust Center | Data Security, Privacy, and Compliancewww.microsoft.com
    Azure Trust Center
    Microsoft Trust Center | Data Security, Privacy, and Compliancewww.microsoft.com
    Azure Trust Center
    Microsoft Trust Center | Data Security, Privacy, and Compliancewww.microsoft.com
    Azure Trust Center
    Microsoft Trust Center | Data Security, Privacy, and Compliancewww.microsoft.com
    Azure Trust Center
    Microsoft Trust Center | Data Security, Privacy, and Compliancewww.microsoft.com
    Azure Trust Center
    AWS Trust & Safety CenterAmazon Web Services, Inc.
    AWS Trust Center
    AWS Trust & Safety CenterAmazon Web Services, Inc.
    AWS Trust Center
    Users
  • Identification and contact data

  • Transactional data

  • Bank details and credit data

  • Settlement and payment data

  • Economic data

  • Personal Characteristics

  • Access data

  • Usage and connection data

  • Users

    Extraction
  • Disclosure by transmission

  • Blocking and erasure

  • Collection

  • Retrieval

  • Comparison

  • Structuring and Organization

  • Logo
    Logo
    Logo
    Logo
    Logo
    Logo
    Logo
    Logo