Last modified:
04-12-2025
WSB Solutions B.V.
Kade 30
3371 EP Hardinxveld-Giessendam
The Netherlands
If you have any questions about this Data Pro Statement or data protection, please contact our Security & Privacy Officer; privacy@wsb-solutions.nl. Tel. +31 184 618837.
We regularly update this Data Pro Statement and the security measures described therein in order to remain prepared and up-to-date with regard to data protection. We publish the current version of this Data Pro Statement on our website.
All services of WSB Solutions B.V. (hereinafter referred to as WSB) are listed in our Service Description (Dutch). This Data Pro Statement applies to all processing of Personal Data carried out by WSB in the context of the provision of the services listed in the Service Description and to all our agreements and offers for these services.
The services that WSB provides to you are partly outsourced by WSB to third parties; the so-called “sub data processors” or “sub-processors” according to the General Data Protection Regulation (GDPR). In article 8, this Data Pro Statement contains an overview of the sub-processors that WSB uses. The agreement(s) that WSB enters into with you will indicate which services WSB provides to you and which third parties WSB uses in those specific agreement(s).
The most important party that WSB provides services from is Microsoft. For all products and services provided by Microsoft, a direct agreement, the so-called Microsoft Customer Agreement, is concluded between you as a customer and Microsoft. This means that Microsoft, and not WSB, should be regarded as a “Processor” and that Microsoft is not a “sub-processor” of WSB. However, for the sake of clarity, we have mentioned Microsoft in the overview of sub-processors in article 8. In the Microsoft Customer Agreement and in the Microsoft Trust Center, you can find all the information you need about how Microsoft handles security and privacy and complies with the GDPR as a Processor of personal data.
In our Service Description you will find a description of all available services of WSB. The Service Description determines what you can expect from each service. In each of the agreement(s) that WSB concludes with you is indicated which of the available services WSB provides to you. Any deviations or exceptions to the Service Description are stated in the agreement(s) that WSB enters into with you.
WSB’s services are not intended for the processing of special categories of personal data or data relating to criminal convictions and offences or personal numbers issued by the government. The processing of this data with the services of WSB by the Client is at the Client’s own discretion.
WSB uses the Standard clauses on data processing, which are included in Section 2 of the NLdigital Terms 2020. The NLdigital Terms 2020 are included with each agreement.
For all services that WSB performs itself, WSB processes the personal data of its clients within the EU/EEA. For the services that WSB subcontracts to sub-processors, Article 8 lists for each sub-processor whether it processes personal data within and/or outside the EU/EEA and how the relevant sub-processor complies with the GDPR.
WSB uses the following sub-processors:
| Processor (Microsoft is a Processor under the GDPR, not a sub-processor) | Microsoft (Microsoft Ireland Operations Limited) | |
| Location | One Microsoft Place South County Business Park Leopardstown Dublin 18, D18 P521, Ireland |
|
| Processing inside or outside the EU/EEA? | Within the EU/EEA (default data center is EU West (the Netherlands); client can choose another data center) | |
| Description of the work | Microsoft Online Services. This includes all Microsoft Cloud services; Azure, Microsoft 365, Dynamics 365, and more | |
| Privacy Statement and Certifications | See the Microsoft Trust Center for up-to-date privacy, security, and compliance information | |
| Sub-processor | RoutIT B.V. |
| Location | Maxwellstraat 51 6716 BX Ede, Netherlands |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Supplier of internet connections and VoIP telephony. |
| Privacy Statement and Certifications | See the Privacy information on the RoutIT website for up-to-date information. ISO/IEC 27001:2013 |
| Sub-processor | NG-BLU Networks B.V. |
| Location | Professor van der Waalsstraat 1 1821 BT Alkmaar, Netherlands |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Supplier of internet connections and VoIP telephony. |
| Privacy Statement and Certifications | See the Privacy statement of NG-BLU for up-to-date information. ISO 9001:2015, ISO 27001:2017 and NEN 7510 |
| Sub-processor | Eurofiber Nederland B.V. |
| Location | Safariweg 25-31 3605 MA Maarssen, Netherlands |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Internet Connection Provider |
| Privacy Statement and Certifications | See Eurofiber’s Privacy Statement and Corporate Compliance page for up-to-date information. ISO 9001, ISO 27001, ISO 14001, ISAE3402 Type II Statement |
| Sub-processor | Landis Technologies LLC |
| Location | 1120 Division Highway Ephrata, PA 17522, USA |
| Processing inside or outside the EU/EEA? | Within the EU/EEA (default data center is EU West (the Netherlands); client can choose another data center) |
| Description of the work | Vendor of Landis Attendant Console for Microsoft Teams and Landis Contact Center for Microsoft Teams |
| Privacy Statement and Certifications | Please see the Landis Privacy Policy for up-to-date information. ISO 27001 |
| Sub-processor | Keeper Security, Inc. |
| Location | 333 N. Green Street Suite 811 Chicago, IL 60607, USA |
| Processing inside or outside the EU/EEA? | Outside the EU/EEA. Subprocessor complies with the EU/US Data Privacy Framework. |
| Description of the work | Provider and hoster of Keeper Password manager |
| Privacy Statement and Certifications | Privacy: Please see the Privacy Policy on Keeper Security’s website and specifically the GDPR Compliance for up-to-date information. Security and certifications: See the data protection information on the Keeper Security website. |
| Sub-processor | N-able Technologies Ltd |
| Location | See contactpage N-able website for information about the locations Contact Us | N-able Headquarters: N-able Technologies Ltd 30 Corporate Drive, Suite 400 Burlington, MA 01803 USA |
| Processing inside or outside the EU/EEA? | Both inside and outside the EU/EEA. Sub-processor has binding corporate rules in place to comply with the GDPR. |
| Description of the work | Provider of Cove Backup services. Supplier of N-Central Remote Monitoring & Management platform; used for the WSB Remote Management and Support services |
| Privacy Statement and Certifications | See the N-able Trust Center where you can find up-to-date information in the field of privacy, security and compliance |
| Sub-processor | TOPdesk Nederland B.V. |
| Location | Westlandseweg 40 2624 AD Delft, Netherlands |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Supplier of Service Management Software; used for the WSB Support Services |
| Privacy Statement and Certifications | Privacy: Please see the TOPdesk Privacy Statement for up-to-date information. Security: see the TOPdesk – Technical and Organisational Measures for up-to-date information. |
| Sub-processor | Scope4mation B.V. |
| Location | Rubensstraat 211 6717 VE Ede, Netherlands |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Supplier of Qixium platform; used for the WSB Remote Management and Support services |
| Privacy Statement and Certifications | Privacy: see the Scope4mation Privacy Statement for up-to-date information. ISO27001:2017 |
| Sub-processor | Devolutions inc. |
| Location | 1000, rue Notre-Dame Lavalrie, Québec, J5T 1M1, Canada |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Supplier of Remote Desktop Manager; used for the WSB Remote Management and Support services |
| Privacy Statement and Certifications | See the Devolutions Legal & Privacy page where you can find up-to-date information in the field of privacy, security and compliance. |
| Sub-processor | Inforcer Ltd |
| Location | 128 City Road London, EC1V2NX, United Kingdom |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Supplier of Inforcer Platform; used for defining, monitoring and enforcing the Security Baselines of the WSB Security Level services |
| Privacy Statement and Certifications | See Inforcer’s Privacy and Security Policy. SOC 2 type 1 report. |
| Sub-processor | Dmarcly |
| Location | 901 5th Avenue Suite 1720 Seattle, WA 98164, USA |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Supplier of Dmarcly; used to secure email communications as part of the WSB Security Level services. |
| Privacy Statement and Certifications | Privacy: see the Privacy Policy from Dmarcly for up-to-date information |
| Sub-processor | Blackpoint Holdings, LLC |
| Location | 1099 18th Street, Suite 3050 Denver, CO 80202, USA |
| Processing inside or outside the EU/EEA? | Outside the EU/EEA. Sub-processor has binding corporate rules in place to comply with the GDPR. |
| Description of the work | Provider of the Blackpoint Cyber Monitoring, Detection & Response service; used for the WSB MDR services |
| Privacy Statement and Certifications | Privacy: see the Privacy Policy from Blackpoint for up-to-date information |
| Sub-processor | Sana Commerce EMEA B.V. |
| Location | Van Nelleweg 1 3044 BC Rotterdam, Netherlands |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Supplier of Sana Commerce software; eCommerce software for Microsoft Dynamics NAV and Dynamics 365 Business Central |
| Privacy Statement and Certifications | See the Security Measures and Privacy Policy from Sana Commerce for up-to-date information. |
| Sub-processor | Beveiligmij.nl |
| Location | Fahrenheitstraat 18 6662 PZ Elst, Netherlands |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Supplier of Security Awareness training |
| Privacy Statement and Certifications | Please see the Beveiligmij.nl Privacy Statement for up-to-date information. |
| Sub-processor | Rewst, Inc. |
| Location | 9560 W Linebaugh Ave Tampa, FL 33626, USA |
| Processing inside or outside the EU/EEA? | Both inside and outside the EU/EEA. Sub-processor has binding corporate rules in place to comply with the GDPR. |
| Description of the work | Supplier of Managed Services Automation Platform |
| Privacy Statement and Certifications | See the Privacy Policy from Rewst for up-to-date information. |
| Sub-processor | Tinx-IT B.V. |
| Location | Bennekomseweg 43 6717 LL Ede, The Netherlands |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | upplier of Tinx apps (via Microsoft Appsource); eCommerce software for Dynamics 365 Business Central. Supplier of consultancy services regarding these apps. |
| Privacy Statement and Certifications | Data Pro Statement, ISO 27001 |
| Sub-processor | Abakion A/S |
| Location | Vibenhuset, Lyngbyvej 2 2100 København, Danmark |
| Processing inside or outside the EU/EEA? | Within the EU/EEA |
| Description of the work | Supplier of Abakion apps (via Microsoft Appsource) and of consultancy services regarding these apps. |
| Privacy Statement and Certifications | ISAE 3000 and ISAE 3402 declarations; see Abakion’s Policies & Conditions for up-to-date information. |
The Client can easily create a ticket via the WSB Support Desk with requests for an export, modification or deletion of data. The procedure for this is included in our Service Level Agreement, which can be found on our website.
After termination of the agreement with a client, WSB will in principle delete the personal data within 3 months in such a way that they can no longer be used and are no longer accessible (render inaccessible). Exceptions to this are:
WSB has implemented the following security measures. These security measures may be adjusted from time to time to reflect changing circumstances.
Obligation of confidentiality
WSB is obliged to maintain the confidentiality of all confidential information, including personal data, of the Controller, that its employees see during the performance of the agreement(s). This is described in the NLdigital Terms that apply to all agreements that WSB enters into with you. To ensure compliance with this confidentiality obligation, WSB requires all its employees to sign a confidentiality agreement upon commencement of employment. This non-disclosure agreement is part of the employment contract. Failure to comply with the confidentiality agreement is subject to a penalty clause.
Quality and Information Security Management System
WSB uses a certified Quality and Information Security Management System that meets the standards of ISO 9001 and ISO 27001 respectively.
To ensure that only authorized employees have access to its systems and data, WSB has policies in the following areas that are laid down in the Management System. Compliance with the policy is verified periodically by internal audits and by external audits, by an independent and accredited party.
Within the password policy, the following measures have been taken, among others.
Manage customer passwords
In order to be able to carry out its work, WSB may need to have passwords, including the Admin password, of the client. These passwords (and things like encryption keys) are stored centrally and encrypted in the data vault of our password management application. Only WSB employees whose user identity has been verified via Entra and who, by virtue of their position, must have access to these passwords, have access to the data in this data vault.
WSB uses the following monitoring tools/practices to identify and respond to potential security incidents:
There is a procedure for internally reporting security incidents and data breaches. Security incidents and data breaches are registered in a designated register.
In the event of a data breach, WSB will, as far as possible, provide the following information to the Client within 72 hours of the discovery of the data breach.
| General | Responsible | Processor |
| Name | ||
| Contact | ||
| E-mail address | ||
| Telephone number |
| Notification details | To be filled in / ticked by the Processor |
| Security Breach Date | o On:
o Between: ……………….. and ……………….. o To be announced |
| Date of discovery of infringement | |
| Date of notification to Controller | |
| Is this a follow-up to a previous report? | o No, this is the first notification
o Yes o Date of previous notification: …………………………………………. o Questions to be completed: …………………………………………. |
| Summarize the breach | |
| Indicate the (probable) cause of the breach | |
| Personal data of how many Data Subjects are involved in this breach? | |
| Describe the group of Data Subjects | |
| What is the nature of the infringement? (multiple answers possible) | o Read
o Copy o Modify o Delete / Destroy o Theft o Otherwise: ………………………………………….. o To be announced |
| What type of Personal Data is involved? (multiple answers possible) | o NAW
o Gender, date of birth and/or age o Telephone number(s) o E-mail address(es) o BSN o Access or identification data o Financial data o (Copy) ID o Special categories of personal data o Otherwise: ………………………………………….. o To be announced |
| What possible consequences may the breach have for the Data Subjects? | o Stigmatisation and/or exclusion
o Exposure to (identity) fraud o Exposure to spam and/or phishing o Otherwise: ……………………………………… o To be announced |
| What measures have you taken to address the infringements and prevent further infringements? | |
| Has the Personal Data in question been encrypted, hashed or otherwise rendered unreadable/incomprehensible or inaccessible? | o No
o Yes, this way: ………………………………………….. o Partely, namely: ………………………………………….. o To be announced |
| Does the infringement concern persons outside the EU? (both Data Subjects and potential infringer) |
o No
o Yes, from …………………………………………… o To be announced |
| Is there a possible solution to the breach? | o No
o Yes, namely …………………………………………… o To be announced |
| Is this report complete? | o Yes, all questions have been answered and no follow-up notification is needed
o No, a follow-up report is necessary |