dienstbeschrijving wsb

Data Pro Statement

Last modified:
04-12-2025

  

This Data Pro Statement, together with the Standard clauses on data processing in section 2 of the NLdigital Terms 2020, forms the processing agreement for the products and services of WSB Solutions B.V.

General information

1. This Data Pro Statement has been prepared by the following data processor:

WSB Solutions B.V.
Kade 30
3371 EP Hardinxveld-Giessendam
The Netherlands

If you have any questions about this Data Pro Statement or data protection, please contact our Security & Privacy Officer; privacy@wsb-solutions.nl. Tel. +31 184 618837.

2. This Data Pro Statement applies from December 02, 2025

We regularly update this Data Pro Statement and the security measures described therein in order to remain prepared and up-to-date with regard to data protection. We publish the current version of this Data Pro Statement on our website.

3. Applicability of the Data Pro Statement

All services of WSB Solutions B.V. (hereinafter referred to as WSB) are listed in our Service Description (Dutch). This Data Pro Statement applies to all processing of Personal Data carried out by WSB in the context of the provision of the services listed in the Service Description and to all our agreements and offers for these services.
The services that WSB provides to you are partly outsourced by WSB to third parties; the so-called “sub data processors” or “sub-processors” according to the General Data Protection Regulation (GDPR). In article 8, this Data Pro Statement contains an overview of the sub-processors that WSB uses. The agreement(s) that WSB enters into with you will indicate which services WSB provides to you and which third parties WSB uses in those specific agreement(s).
The most important party that WSB provides services from is Microsoft. For all products and services provided by Microsoft, a direct agreement, the so-called Microsoft Customer Agreement, is concluded between you as a customer and Microsoft. This means that Microsoft, and not WSB, should be regarded as a “Processor” and that Microsoft is not a “sub-processor” of WSB. However, for the sake of clarity, we have mentioned Microsoft in the overview of sub-processors in article 8. In the Microsoft Customer Agreement and in the Microsoft Trust Center, you can find all the information you need about how Microsoft handles security and privacy and complies with the GDPR as a Processor of personal data.

4. Description of services

In our Service Description you will find a description of all available services of WSB. The Service Description determines what you can expect from each service. In each of the agreement(s) that WSB concludes with you is indicated which of the available services WSB provides to you. Any deviations or exceptions to the Service Description are stated in the agreement(s) that WSB enters into with you.

5. Intended Use

WSB’s services are not intended for the processing of special categories of personal data or data relating to criminal convictions and offences or personal numbers issued by the government. The processing of this data with the services of WSB by the Client is at the Client’s own discretion.

6. Standard clauses on data processing

WSB uses the Standard clauses on data processing, which are included in Section 2 of the NLdigital Terms 2020. The NLdigital Terms 2020 are included with each agreement.

7. Processing of personal data within and outside the EU/EEA

For all services that WSB performs itself, WSB processes the personal data of its clients within the EU/EEA. For the services that WSB subcontracts to sub-processors, Article 8 lists for each sub-processor whether it processes personal data within and/or outside the EU/EEA and how the relevant sub-processor complies with the GDPR.

8. Sub-processors

WSB uses the following sub-processors:

Processor (Microsoft is a Processor under the GDPR, not a sub-processor) Microsoft (Microsoft Ireland Operations Limited)
Location One Microsoft Place
South County Business Park
Leopardstown
Dublin 18, D18 P521, Ireland
Processing inside or outside the EU/EEA? Within the EU/EEA (default data center is EU West (the Netherlands); client can choose another data center)
Description of the work Microsoft Online Services. This includes all Microsoft Cloud services; Azure, Microsoft 365, Dynamics 365, and more
Privacy Statement and Certifications See the Microsoft Trust Center for up-to-date privacy, security, and compliance information

Sub-processor RoutIT B.V.
Location Maxwellstraat 51
6716 BX Ede, Netherlands
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Supplier of internet connections and VoIP telephony.
Privacy Statement and Certifications See the Privacy information on the RoutIT website for up-to-date information.
ISO/IEC 27001:2013

Sub-processor NG-BLU Networks B.V.
Location Professor van der Waalsstraat 1
1821 BT Alkmaar, Netherlands
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Supplier of internet connections and VoIP telephony.
Privacy Statement and Certifications See the Privacy statement of NG-BLU for up-to-date information.
ISO 9001:2015, ISO 27001:2017 and NEN 7510

Sub-processor Eurofiber Nederland B.V.
Location Safariweg 25-31
3605 MA Maarssen, Netherlands
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Internet Connection Provider
Privacy Statement and Certifications See Eurofiber’s Privacy Statement and Corporate Compliance page for up-to-date information.
ISO 9001, ISO 27001, ISO 14001, ISAE3402 Type II Statement

Sub-processor Landis Technologies LLC
Location 1120 Division Highway
Ephrata, PA 17522, USA
Processing inside or outside the EU/EEA? Within the EU/EEA (default data center is EU West (the Netherlands); client can choose another data center)
Description of the work Vendor of Landis Attendant Console for Microsoft Teams and Landis Contact Center for Microsoft Teams
Privacy Statement and Certifications Please see the Landis Privacy Policy for up-to-date information.
ISO 27001

Sub-processor Keeper Security, Inc.
Location 333 N. Green Street
Suite 811 Chicago, IL 60607, USA
Processing inside or outside the EU/EEA? Outside the EU/EEA. Subprocessor complies with the EU/US Data Privacy Framework.
Description of the work Provider and hoster of Keeper Password manager
Privacy Statement and Certifications Privacy: Please see the Privacy Policy on Keeper Security’s website and specifically the GDPR Compliance for up-to-date information.
Security and certifications: See the data protection information on the Keeper Security website.

Sub-processor N-able Technologies Ltd
Location See contactpage N-able website for information about the locations Contact Us | N-able
Headquarters:
N-able Technologies Ltd
30 Corporate Drive, Suite 400
Burlington, MA 01803 USA
Processing inside or outside the EU/EEA? Both inside and outside the EU/EEA. Sub-processor has binding corporate rules in place to comply with the GDPR.
Description of the work Provider of Cove Backup services.
Supplier of N-Central Remote Monitoring & Management platform; used for the WSB Remote Management and Support services
Privacy Statement and Certifications See the N-able Trust Center where you can find up-to-date information in the field of privacy, security and compliance

Sub-processor TOPdesk Nederland B.V.
Location Westlandseweg 40
2624 AD Delft, Netherlands
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Supplier of Service Management Software; used for the WSB Support Services
Privacy Statement and Certifications Privacy: Please see the TOPdesk Privacy Statement for up-to-date information.
Security: see the TOPdesk – Technical and Organisational Measures for up-to-date information.

Sub-processor Scope4mation B.V.
Location Rubensstraat 211
6717 VE Ede, Netherlands
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Supplier of Qixium platform; used for the WSB Remote Management and Support services
Privacy Statement and Certifications Privacy: see the Scope4mation Privacy Statement for up-to-date information.
ISO27001:2017

Sub-processor Devolutions inc.
Location 1000, rue Notre-Dame
Lavalrie, Québec, J5T 1M1, Canada
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Supplier of Remote Desktop Manager; used for the WSB Remote Management and Support services
Privacy Statement and Certifications See the Devolutions Legal & Privacy page where you can find up-to-date information in the field of privacy, security and compliance.

Sub-processor Inforcer Ltd
Location 128 City Road
London, EC1V2NX, United Kingdom
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Supplier of Inforcer Platform; used for defining, monitoring and enforcing the Security Baselines of the WSB Security Level services
Privacy Statement and Certifications See Inforcer’s Privacy and Security Policy.
SOC 2 type 1 report.

Sub-processor Dmarcly
Location 901 5th Avenue Suite 1720
Seattle, WA 98164, USA
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Supplier of Dmarcly; used to secure email communications as part of the WSB Security Level services.
Privacy Statement and Certifications Privacy: see the Privacy Policy from Dmarcly for up-to-date information

Sub-processor Blackpoint Holdings, LLC
Location 1099 18th Street, Suite 3050
Denver, CO 80202, USA
Processing inside or outside the EU/EEA? Outside the EU/EEA. Sub-processor has binding corporate rules in place to comply with the GDPR.
Description of the work Provider of the Blackpoint Cyber Monitoring, Detection & Response service; used for the WSB MDR services
Privacy Statement and Certifications Privacy: see the Privacy Policy from Blackpoint for up-to-date information

Sub-processor Sana Commerce EMEA B.V.
Location Van Nelleweg 1
3044 BC Rotterdam, Netherlands
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Supplier of Sana Commerce software; eCommerce software for Microsoft Dynamics NAV and Dynamics 365 Business Central
Privacy Statement and Certifications See the Security Measures and Privacy Policy from Sana Commerce for up-to-date information.

Sub-processor Beveiligmij.nl
Location Fahrenheitstraat 18
6662 PZ Elst, Netherlands
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Supplier of Security Awareness training
Privacy Statement and Certifications Please see the Beveiligmij.nl Privacy Statement for up-to-date information.

Sub-processor Rewst, Inc.
Location 9560 W Linebaugh Ave
Tampa, FL 33626, USA
Processing inside or outside the EU/EEA? Both inside and outside the EU/EEA. Sub-processor has binding corporate rules in place to comply with the GDPR.
Description of the work Supplier of Managed Services Automation Platform
Privacy Statement and Certifications See the Privacy Policy from Rewst for up-to-date information.

Sub-processor Tinx-IT B.V.
Location Bennekomseweg 43
6717 LL Ede, The Netherlands
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work upplier of Tinx apps (via Microsoft Appsource); eCommerce software for Dynamics 365 Business Central. Supplier of consultancy services regarding these apps.
Privacy Statement and Certifications Data Pro Statement, ISO 27001

Sub-processor Abakion A/S
Location Vibenhuset, Lyngbyvej 2
2100 København, Danmark
Processing inside or outside the EU/EEA? Within the EU/EEA
Description of the work Supplier of Abakion apps (via Microsoft Appsource) and of consultancy services regarding these apps.
Privacy Statement and Certifications ISAE 3000 and ISAE 3402 declarations; see Abakion’s Policies & Conditions for up-to-date information.

9. Supporting the client with requests from data subjects:

The Client can easily create a ticket via the WSB Support Desk with requests for an export, modification or deletion of data. The procedure for this is included in our Service Level Agreement, which can be found on our website.

10. Deletion of personal data after termination of the agreement with a client

After termination of the agreement with a client, WSB will in principle delete the personal data within 3 months in such a way that they can no longer be used and are no longer accessible (render inaccessible). Exceptions to this are:

  • Personal data that is subject to a legal retention obligation (such as invoicing data).
  • Personal data of a person who has indicated that certain personal data may be processed by WSB (opt-in, e.g. for marketing information).

Security policy

11. Security measures

WSB has implemented the following security measures. These security measures may be adjusted from time to time to reflect changing circumstances.

Obligation of confidentiality
WSB is obliged to maintain the confidentiality of all confidential information, including personal data, of the Controller, that its employees see during the performance of the agreement(s). This is described in the NLdigital Terms that apply to all agreements that WSB enters into with you. To ensure compliance with this confidentiality obligation, WSB requires all its employees to sign a confidentiality agreement upon commencement of employment. This non-disclosure agreement is part of the employment contract. Failure to comply with the confidentiality agreement is subject to a penalty clause.

Quality and Information Security Management System
WSB uses a certified Quality and Information Security Management System that meets the standards of ISO 9001 and ISO 27001 respectively.

To ensure that only authorized employees have access to its systems and data, WSB has policies in the following areas that are laid down in the Management System. Compliance with the policy is verified periodically by internal audits and by external audits, by an independent and accredited party.

  • Mobile Device and Telework Policy
  • Screening Policy
  • Information Classification Policy
  • Access security policy; both for digital and physical access
  • Password Policy
  • Policy on the use of cryptographic controls
  • Clean desk and clear screen policy
  • Backup Policy
  • Information Transport Policy
  • Secure development policy
  • Vendor Information Security Policy
  • Information Security Incident Reporting Policy
  • Sanction Policy
  • Information security in project management

Within the password policy, the following measures have been taken, among others.

  • User identities are centrally managed in our Microsoft Entra environment.
  • Entra has a password policy that requires users to choose a strong password. Users are also required to change their passwords regularly.
  • Multi Factor Authentication (MFA) has been set up. In order to be able to log in outside the office, in addition to username and password, access to an authenticated device (smartphone) is also required.

Manage customer passwords
In order to be able to carry out its work, WSB may need to have passwords, including the Admin password, of the client. These passwords (and things like encryption keys) are stored centrally and encrypted in the data vault of our password management application. Only WSB employees whose user identity has been verified via Entra and who, by virtue of their position, must have access to these passwords, have access to the data in this data vault.

12. WSB has conformed to the following Information Security Management System (ISMS):

  • ISO 27001

13. WSB has the following certifications:

Data Breach Protocol

14. WSB uses the following data breach protocol to ensure that the client is aware of incidents:

WSB uses the following monitoring tools/practices to identify and respond to potential security incidents:

  • Threat & Vulnerability information from multiple sources (including Microsoft, National Cyber Security Center and Blackpoint Cyber) is actively monitored to identify potential security incidents at the earliest possible stage.
  • The security measures taken in WSB’s IT environment, based on the information security policy, are continuously monitored and enforced. Deviations are largely corrected automatically.
  • WSB’s IT environment is continuously and actively monitored in order to detect potential security incidents as quickly as possible and to be able to take necessary countermeasures.
  • There is a security awareness program in place to alert WSB employees to phishing attempts.
  • There is a Business Continuity Plan and an accompanying scenario with the steps on how to respond if a security incident occurs in WSB’s internal IT environment.

There is a procedure for internally reporting security incidents and data breaches. Security incidents and data breaches are registered in a designated register.

In the event of a data breach, WSB will, as far as possible, provide the following information to the Client within 72 hours of the discovery of the data breach.

General Responsible Processor
Name
Contact
E-mail address
Telephone number

 

Notification details To be filled in / ticked by the Processor
Security Breach Date o    On:

o    Between: ……………….. and ………………..

o    To be announced

Date of discovery of infringement
Date of notification to Controller
Is this a follow-up to a previous report? o   No, this is the first notification

o   Yes

o   Date of previous notification: ………………………………………….

o   Questions to be completed: ………………………………………….

Summarize the breach
Indicate the (probable) cause of the breach
Personal data of how many Data Subjects are involved in this breach?
Describe the group of Data Subjects
What is the nature of the infringement? (multiple answers possible) o    Read

o    Copy

o    Modify

o    Delete / Destroy

o    Theft

o    Otherwise: …………………………………………..

o    To be announced

What type of Personal Data is involved? (multiple answers possible) o    NAW

o    Gender, date of birth and/or age

o    Telephone number(s)

o    E-mail address(es)

o    BSN

o    Access or identification data

o    Financial data

o    (Copy) ID

o    Special categories of personal data

o    Otherwise: …………………………………………..

o    To be announced

What possible consequences may the breach have for the Data Subjects? o    Stigmatisation and/or exclusion

o    Exposure to (identity) fraud

o    Exposure to spam and/or phishing

o    Otherwise: ………………………………………

o    To be announced

What measures have you taken to address the infringements and prevent further infringements?
Has the Personal Data in question been encrypted, hashed or otherwise rendered unreadable/incomprehensible or inaccessible? o     No

o     Yes, this way: …………………………………………..

o     Partely, namely: …………………………………………..

o     To be announced

Does the infringement concern persons outside the EU?
(both Data Subjects and potential infringer)
o    No

o    Yes, from ……………………………………………

o    To be announced

Is there a possible solution to the breach? o    No

o    Yes, namely ……………………………………………

o    To be announced

Is this report complete? o    Yes, all questions have been answered and no follow-up notification is needed

o    No, a follow-up report is necessary