Gordon Food Service, Inc. and Gordon Food Service Canada, Ltd.
Last updated February 19, 2024
This Data Processing Agreement (āDPAā) applies to any supplier of goods to GFS (āSupplierā) that has entered into one or more Agreements with Gordon Food Service, Inc. and Gordon Food Service Canada Ltd. (collectively, āGFSā). Supplier and GFS are referred to herein as āPartyā or āPartiesā as the context requires.
1. Key Definitions
1.1 āAffiliatesā means any entity that directly or indirectly controls, is controlled by, or is under common control with GFS. āControl,ā for purposes of this definition, means direct or indirect ownership or control of more than 50% of the voting interests of the subject entity.
1.2 āAgreementā means one or more agreements between Supplier and GFS pursuant to which Supplier is provided access to, collects or otherwise processes Covered PI.
1.3 āCovered PIā means any Personal Information provided by or collected on behalf of GFS to Supplier, collected by Supplier on behalf of GFS, or otherwise made available to Supplier pursuant to the Agreements.
1.4 āPersonal Informationā means (a) any information relating to a consumer or household and (b) any information that falls within the scope of āpersonal dataā, āpersonal informationā or āpersonally identifiable informationā (or any materially similar or analogous concept or definition) under any Privacy Laws.
1.5 āPortable Formatā means to the extent technically feasible a structured, commonly used, machine readable, readily usable format that allows the consumer to transmit the Covered PI to another entity or controller without hindrance, as further specified in the Privacy Laws.
1.6 āPrivacy Lawsā mean any and all privacy and data protections laws and regulations applicable to the processing of the Covered PI under the Agreement, including but not limited to those in the United States and Canada, California Consumer Privacy Act, the California Privacy Rights Act, the Virginia Consumer Data Protection Act, the Colorado Privacy Act, The Personal Information Protection and Electronic Documents Act (āPIPEDAā), British Columbiaās Personal Information Protection Act (āBC PIPAā); Albertaās Personal Information Protection Act (āAB PIPAā); and Quebecās Act respecting the Protection of Personal Information in the Private Sector (āQuebec Privacy Sector Actā), in each case when and if applicable to the processing of Covered PI by Supplier under this DPA.
1.7 The terms ābusiness,ā ābusiness purposes,ā āconsumer,ā ācontroller,ā āprocessing,ā āprocessor,ā āsale,ā āsensitive data,ā āsensitive personal information,ā āservice provider,ā āsharing,ā and āverifiable consumer requestā shall have the meanings given to those terms in the Privacy Laws. In the event of a conflict in the meanings of terms in the Privacy Laws, the Parties
agree the meanings from each law apply.
1.8 āServicesā means the services provided by Supplier to GFS specified in the Agreements.
2. Terms of Date Processing
2.1 Relationship of the Parties. The Parties agree that GFS is the sole Party that determines the purposes and means of processing Covered PI as the ābusinessā or ācontroller;ā and Supplier processes Covered PI as the āservice providerā or āprocessorā on behalf of GFS.
2.2 Compliance with Obligations. Supplier represents and warrants that Supplier, its employees, specialists, subcontractors, and sub-processors (a) will comply with Privacy Laws and this DPA while processing the Covered PI, and (b) will provide GFS with all reasonably-requested assistance to enable GFS to fulfill its own obligations under the Privacy Laws. Upon the reasonable request of GFS, Supplier shall make available to GFS all information in Supplierās possession reasonably necessary to demonstrate its compliance with this subsection.
2.3 Deletion or Return of Covered PI. Upon written request by GFS or termination of an Agreement, Supplier will discontinue processing Covered PI without undue delay. Within sixty (60) days of a written request by GFS or termination of an Agreement, Supplier will destroy Covered PI unless otherwise instructed by GFS; provided that prior to such destruction Supplier
will return or make available to GFS for a period of sixty (60) days, for a complete and secure download, all of the Covered PI in Supplierās possession. Supplier may retain Covered PI to the extent and for such period of time required by Applicable Law provided that Supplier shall (a) notify GFS of such obligations (unless prohibited from doing so) and (b) ensure the ongoing confidentiality of all such Covered PI. Upon written request by GFS or within 60 days of the termination of an Agreement, Supplier will provide a written certification to GFS that it has complied with these deletion obligations.
2.4 Assessments. If applicable, Supplier shall, upon the reasonable request of GFS, provide GFS with such assistance and information as is reasonably necessary to enable GFS to carry out privacy impact assessments under Privacy Laws.
3. Limitations of Use of Covered PI
3.1 Limited Scope of Processing. Supplier will process Covered PI solely as instructed in the Agreements, this DPA and any other written instructions provided by GFS that are consistent with the terms of the Agreement, in each case for the duration of the provision of the Services to GFS.
3.2 Data Restrictions. Supplier will not: (a) sell or share Covered PI, (b) collect, retain, use, or disclose Covered PI for any purpose other than the business purposes specified in the Agreements, such as providing the Services to GFS, (c) retain, use, or disclose Covered PI outside the direct business relationship with GFS, (d) combine the Covered PI with other Personal Information, including for data augmentation or profiling, unless expressly permitted under Privacy Laws for Supplier functions (such as for fraud prevention purposes, or where required by law), and/or (e) export Covered PI outside the country from which it was provided or collected without GFSās prior written consent. Supplier shall have the right to use Aggregate Data (as defined below) for internal business purposes upon the written consent of GFS (email sufficient) provided that Supplier shall not use or disclose the Aggregate Data for commercial purposes. āAggregate Dataā means Covered PI that is de-identified and aggregated in accordance with Privacy Laws such that the information is not linked or reasonably linkable to any of GFS or its customers.
3.3 Audit Rights. GFS, or, upon GFSās election, a third party reasonably designated by GFS to act on GFSās behalf and acceptable to Supplier, shall have the right to monitor Supplierās compliance with this DPA through measures that may include manual reviews, automated scans, penetration tests, regular assessments, audits, or technical or operational testing. Supplier shall cooperate fully with any audit initiated by GFS, provided that such audit will not unreasonably interfere with the normal conduct of Supplierās business. Supplier shall provide audited results with sufficient detail to understand findings, related risks, and remediation requirements. Unless otherwise required by law, GFS shall provide Supplier no less than 10 days prior notice of any such audit and shall not audit Supplier more than twice per twelve month period, except that GFS may audit at any time in the event of a Security Incident, as required by a regulator or in connection with the defense of GFSās legal rights. Should the results demonstrate a material failing in Supplierās compliance with this DPA, Supplier shall work in good faith with GFS to remediate such issues to GFSās satisfaction.
3.4 Compliance Remediation; Termination Rights. Supplier agrees to notify GFS without undue delay if Supplier determines that it can no longer meet its obligations under Privacy Laws and the present DPA. Upon receiving notice from Supplier pursuant to this subsection, GFS may direct Supplier to take steps as reasonable and appropriate to remediate unauthorized use of
Covered PI or terminate the Agreements.
3.5 Subcontractors; Sub-processors.
3.6 Re-identification. Supplier will not, and will not allow its subcontractors or sub-processors to, re-identify any de-identified, anonymized, or pseudonymized data derived from Covered PI that is processed by Supplier on behalf of GFS, unless instructed by GFS in writing (email is sufficient).
4. Consumer Rights
4.1 Fulfillment of Consumer Requests. Supplier will implement and maintain sufficient processes and procedures to satisfy GFSās requests to access, correct, and/or delete Covered PI held by Supplier. Within ten (10) calendar days of a written request from GFS (email is sufficient), Supplier shall, as applicable: (a) securely erase or destroy, or cause to be erased or destroyed, specific pieces of Covered PI, including any copies of such Covered PI maintained by Supplierās subcontractor(s) or sub-processor(s); (b) Provide information requested by GFS about Supplierās processing of the Covered PI; (c) Provide the specific pieces of Covered PI that Supplier and/or one of its subcontractors or sub-processors has collected or otherwise obtained about the consumer on behalf of GFS in a Portable Format; (e) modify, and direct its subcontractors or sub-processors to modify, specific pieces of Covered PI; or (f) limit processing of Covered PI defined in Privacy Laws as āsensitive personal informationā or āsensitive data,ā in accordance with the instructions of GFS.
4.2 Referral of Direct Requests. Supplier must refer to GFS applicable consumer requests submitted directly to Supplier for Covered PI and not to respond to any such requests other than to notify requester that the request is referred to GFS.
5. Security Controls
5.1 Duty of Confidentiality. Supplier, its employees, specialists, subcontractors, and sub-processors are subject to a duty of confidentiality with respect to the Covered PI.
5.2 Security Measures. Supplier shall implement and maintain reasonable technical and organizational security measures, procedures, and practices appropriate to the nature of the Covered PI to protect such Covered PI from unauthorized access, destruction, use, modification, or disclosure (āSecurity Measuresā). Such Security Measures shall meet or exceed applicable industry standards (e.g., NIST Cybersecurity Framework) and any obligations set forth in the Agreements or applicable law. Supplier shall comply with the requirements of the Security Exhibit attached hereto.
5.3 Security Incident.
(a) Notification. Supplier will inform GFS within twenty-four (24) hours of Supplierās suspected unauthorized access, destruction, use, modification, or disclosure (each, a āSecurity Incidentā) of any Covered PI. Supplier will notify GFS via email with read-receipt to privacy@gfs.com and a copy to legal@gfs.com and Supplierās primary business contact at GFS. Supplier shall: (i) provide GFS with the name and contact information for an employee of Supplier who shall serve as GFSās primary security contact and shall be available to assist GFS twenty-four (24) hours per day, seven (7) days per week as a contact in resolving obligations associated with a Security Incident. Written notification provided pursuant to this paragraph will include a brief summary of the available facts, the status of Supplierās investigation, and if known and applicable, the potential number of persons affected by release of data relating to such person.
(b) Management & Remediation. Supplier will provide GFS with any information and cooperation reasonably requested by GFS regarding such Security Incident, including providing GFS or its designated forensic investigator reasonably acceptable to Supplier with physical access to the facilities and operations affected, facilitating interviews and making available relevant records, logs and other materials reasonably required by GFS. Supplier shall immediately remedy any Security Incident at its own expense in accordance with applicable laws. Supplier shall reimburse GFS for actual costs incurred by GFS in responding to, and mitigating damages caused by, any Security Incident, including all costs of notice and remediation. Unless required by law, Supplier shall not inform any third party of any Security Incident without written approval of GFS. Further, Supplier agrees that GFS shall have the sole right to determine whether notice of the Security Incident is to be provided, the contents of such notice, and the nature and extent of any remediation.
5.4 Oversight. Upon request and on an annual basis, Supplier will provide GFS with the results of any audit(s) performed (e.g., SOC1, SOC2, ISO27001, etc) by or on behalf of Supplier that assesses the effectiveness of Supplierās information security program as relevant to the security and confidentiality of Covered PI (āControls Reportā). Supplier shall ensure that each subcontractor or sub-processor makes available to GFS a Controls Report on an annual basis or following a Security Incident.
6. Inquiries
6.1 Notification of Regulatory Inquiry. Supplier shall notify GFS of any regulatory inquiry or correspondence regarding Covered PI (an āInquiryā) within three (3) calendar days of receiving such Inquiry. Supplier shall provide GFS with all copies of documents and correspondence relating to the Inquiry without unduly delay.
6.2 Response to Inquiry. Supplier shall not disclose any confidential information of GFS or any affiliated party to the applicable authority without GFSās prior written consent. Supplier shall take all other measures necessary to respond to or otherwise address the Inquiry adequately and in a timely manner.
7. Miscellaneous
7.1 Severability. If any provision of this DPA shall be found to be void by a court of law, such provision shall be deemed to be severable from the other provisions of this DPA, and the remainder of this DPA shall be given effect, as if the Parties had not included the severed provision.
7.2 Seizure or Confiscation. If any Covered PI may be endangered by seizure or confiscation, insolvency proceedings (including a sale) or composition proceedings, or any other events or measures taken by a third party, Supplier shall inform GFS with reasonable advance notification. In addition, Supplier shall inform any such third party that sovereignty and ownership of the Covered PI belong to GFS.
7.3 Survival. All representations, warranties, and indemnities shall survive the termination and/or expiration of this DPA and shall remain in full force and effect. All of a Partyās rights and privileges, to the extent they are fairly attributable to events or conditions occurring or existing on or prior to the termination and/or expiration of this DPA, shall survive termination and shall
be enforceable by that Party.
7.4 General. Except as expressly set forth herein, the terms of the Agreements shall remain unmodified and in full force and effect. In the event of a conflict between the terms of the Agreements and the terms of this DPA, the terms of this DPA shall control unless the
Agreement(s) includes a specific cross-reference to the section of DPA intended to be modified. Headers are for convenience and do not affect the interpretation of the terms of this DPA.
Search Our Siteā¦