Uploaded by Rootstackk Music

Kansas House Bill 2039: Tribal Court Judgments Recognition

advertisement
Session of 2019
HOUSE BILL No. 2039
By Committee on Judiciary
1-17
1
2
3
4
5
6
7
8
9
10
11
12
13
AN ACT concerning recognition of tribal court judgments.
Be it enacted by the Legislature of the State of Kansas:
Section 1. (a) Pursuant to rules adopted by the supreme court, the
district courts of this state shall extend full faith and credit to the orders,
judgments and other judicial acts of the tribal courts of any federally
recognized Indian tribe.
(b) In adopting rules under subsection (a), the supreme court shall
only extend recognition to the judgments of tribal courts that grant full
faith and credit to judgments of the courts of the state of Kansas.
Sec. 2. This act shall take effect and be in force from and after its
publication in the statute book.
DESCRIPTI E CATALOGING MAN AL NAME AND SERIES A THORIT
RECORDS
MLA C
M
BIBCO M
cF
C
MLA A
M
2024 (
), 3/7/24
e Re
CTHISMOPEN
, C SOURCE AGREEMENT (“AGREEMENT”) DEFINES THE RIGHTS OF USE, REPRODUCTION,
DISTRIBUTION, MODIFICATION AND REDISTRIBUTION OF CERTAIN COMPUTER SOFTWARE
,M
2023-F
2024
ORIGINALLY RELEASED BY THE UNITED STATES GOVERNMENT AS REPRESENTED BY THE
GOVERNMENT
AGENCY
LISTED BELOW ("GOVERNMENT AGENCY"). THE UNITED STATES
N
F
:
GOVERNMENT, AS REPRESENTED BY GOVERNMENT AGENCY, IS AN INTENDED THIRD-PARTY
M
(E
M
)
BENEFICIARY OF ALL SUBSEQUENT DISTRIBUTIONS OR REDISTRIBUTIONS OF THE SUBJECT
A
(E
M
) REPRODUCES, DISTRIBUTES, MODIFIES OR REDISTRIBUTES THE
SOFTWARE. ANYONE WHO USES,
SUBJECT
SOFTWARE,
ASC DEFINED
OR ANY
PART( THEREOF,
IS,
A
(
L HEREIN,
A
) M
H
.O C
) BY THAT ACTION, ACCEPTING IN
FULL THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS AGREEMENT.
O
:
M
F
(
GRANT
We
a e a OF
a RIGHTSf
N
C
-C
H )
add
a
e be ! A
NACO- M
P
(
A. Under Non-PatentMRights:
Subject to the terms
and conditions of this Agreement, each Contributor,
with respect to
NMP)
F
. BIBCO
NMP
its own contribution to the Subject Software, hereby grants to each Recipient a non-exclusive, world-wide, royaltyI free license to engage in the following activities pertaining to the
F Subject Software:
,
1. Use
BIBCO
M
F
(
Ca a g g & Me ada a C
ee - BIBCO - M c L b a A
ca
)
2. Distribution
3. Reproduction
CMC
K
B
A
FAQ
,
4. Modification
AAP
5. Redistribution
6. Display
BIBCO
B. Under Patent Rights: Subject
to the terms and conditions of this Agreement, each Contributor, with respect to its
I ownK contribution
-J
(Eto the Subject Software,
M
) hereby grants to each
PCC
C
Recipient under
Covered Patents a non-exclusive,
world-wide, royalty-free license to engage in the following activities pertaining to the Subject Software:
C
BIBCO
AAP (
1. Use ( C );
)
.
2. Distribution
3. Reproduction
4. Sale
1. 5.
M Offer for Sale
I
14
I
11
I
31 BIBCOM
10
-L
1519201819 1514141211 1213131211 3025232532
M
2019
2020
2021
2022
2023
2024
I
7
2
7
5
5
9
2. BIBCO
N
:
M
(
A
),
CC
BIBC
A
,
F
F
.
L
C
:
BIBCO
F 2019)
D
.
,
-
(
;
M
F
.
BIBCO
CC
F
CC D
.
BIBCO
(382/655/046/
!
-
.), 240
,
.
BIBCO
-
.
C m la i e S a i ic 2015-2023
N
:
CC
2016. C
(
-
)
/
; . .,
LC/NAF,
NA
NA
.
A
:
F
/
,
.A
(
,
,
,
.)
.
. (1)
ha
;
. (2)
;
. (3)
LC
,
,
,
. (4)
N
CON E
OCLC;
, . .,
:C
.
,
, . .,
.$ E
/
NA
:
NA
:
LC/ CC
,
,
, $ 1903-1976. $ F
, $ 1903-1976. $ F
.
.
A
, . .,
3
.
A
/
.A
4
A
1
E a
:
/245
100 1# $ A
.
,I
.$ E
L
,I
.$ E
L
.$ E
B
October 2023
400 1# $ A
(Va a
add d b ca
a
a
d acc
)
Introd ction 3
DE C I
LC
I E CA AL GI G
c ca a
A
ac c : A
AL 1
A
16, 1999,
ALL
,
/
/
/
.
.
S
a
c d (SAR )
LC
ac c : A
PCC
J
1, 2006, LC
A
.
ac c :
.
,
,
.
C
CC
,
.F
CC
-
(8
)
,
CC
,
.
A
-
, . .,
1
.
A
: 1)
,
,
), 4)
/
, 5)
, 7)
( . .,
,
), 2)
LC
,
, 3)
,
(
,
, 6)
( )
, 8)
/
.A
.C
.
1983,
LC,
,
,
LC
LC
.H
,
A
,
. A
.
( )
.
.A
,
,
;
.
I A
, 2008,
CC
C
-
.
October 2023 Introd ction 4
DE C I
I E CA AL GI G
A
AL 1
.
.P
,
.
SAR
,
-
,
,
.I
.
.
.
S
.C
.E
FRBR
-
.F
,
(380
( . .,
(
MARC 21 046
3
)
)
E
,
).
(
)
.
,
J
ca
acc
.
a
,
046
,
3
046
1
,
670
.
670
.
,
.F
,
"S
B
"
F
,
380
046
3
.
,
670
.
A
a
c a
a
c
A
.N
( . .,
,
)
.
October 2023 Introd ction 5
DESCRIP I E CA ALOGING MAN AL 1
N
.M
.
I
/
1
/
,
.A
LC-PCC PS
RDA
,
(
,
). A
.
C
.
CIP
,
,
.C
,
CIP
NACO
,
;
CIP
,
670
,
.
a a
4
.A
NAR,
LC/NAF
Learning ra e
Costs are in 2010 US dollars as per Lovering et al. [14].
This paper presents evidence of the disruption of a transition from fossil fuels to nuclear po er, and finds the benefits forgone as a
consequence are substantial. Learning rates are presented for nuclear po er in seven countries, comprising 58% of all po er reactors ever
built globall . Learning rates and deplo ment rates changed in the late-1960s and 1970s from rapidl falling costs and accelerating
deplo ment to rapidl rising costs and stalled deplo ment. Historical nuclear global capacit , electricit generation and overnight
construction costs are compared ith the counterfactual that pre-disruption learning and deplo ment rates had continued to 2015. Had the
earl rates continued, nuclear po er could no be around 10% of its current cost. The additional nuclear po er could have substituted for
69,000 186,000 TWh of coal and gas generation, thereb avoiding up to 9.5 million deaths and 174 Gt CO2 emissions. In 2015 alone,
nuclear po er could have replaced up to 100% of coal-generated and 76% of gas-generated electricit , thereb avoiding up to 540,000
deaths and 11 Gt CO2. Rapid progress as achieved in the past and could be again, ith appropriate policies. Research is needed to
identif impediments to progress, and polic is needed to remove them.
2.2. De
e
ae
jec i
To calculate the OCC of nuclear po er in 2015 requires a projection of hat the cumulative global capacit of construction starts ould have
been. Similarl , to calculate the e tra electricit that ould have been generated at the higher deplo ment rates, and the deaths and
emissions that could have been avoided, requires a projection of hat the global capacit of operating reactors ould have been. This
projection assumes that, if not for the disruption, the construction period ould have been five ears 5 and the capacit of po er uprates
and of reactors permanentl shut do n each ear ould have been unchanged from the actual. Three deplo ment rate scenarios ere
anal sed: the actual historical rate and t o projections of earl historical rates.
Ac a
This is the actual historical deplo ment from 1954 to 2015. The cumulative global capacit of construction starts as 486 GW in
2013 [14]; 11 GW as added in 2014 and 2015, making the total 497 GW in 2015. The actual global capacit in operation in 2015 as 383
GW [22] 6.
L ea
The capacit of commercial operation starts peaked at 40 GW in 1985 and averaged 30 GW per ear from 1984 to 1986 [22]. The
capacit in commercial operation in 1985 as 253 GW [26]. The Linear scenario assumes that commercial operation starts continued at 30
GW per ear from 1985 to 2015, and the capacit of po er uprates and reactors permanentl shutdo n each ear as as per the historical
data. (See Appendi A for further e planation of the calculation method and data sources.)
Acce e a
From 1954 to 1976, the capacit of construction starts as accelerating, then slo ed in 1976 (i.e. about 5 to 10 ears after
the reversal points, hich as hen OCC started to increase rapidl ). If the OCC had continued to reduce at the pre-reversal learning rates,
it as assumed the deplo ment rate also ould have continued (all else being equal). A defensible assumption is that the rate continued at
that prevailing from 1960 to 1976. A pol nomial function as fitted to the data points for 1960 to 1976 and projected to 2015. The cumulative
global capacit of commercial operation starts as estimated b subtracting five ears (for the assumed average construction duration) from
the cumulative global capacit of construction starts and subtracting the actual capacit of reactors permanentl shut do n. (See Appendi
A for further e planation).
The Linear and Accelerating scenarios are used to estimate the e tra electricit that ould have been supplied each ear b nuclear
po er from 1985 to 2015 (for the Linear) and from 1980 to 2015 (for the Accelerating) scenarios.
Click here to e pand...
0. 3. Re
a dD c
3.1. Lea i g a e
Figure 2 has a chart for each of the seven countries and one for all seven combined; trendlines ere fitted to the data points before
and after the trend reversal points. The equation for each trendline is sho n on the charts.
6 of 23
Electronic cop available at:
F
N c ea P
e Lea
a d De
e
Ra e : D
a d G ba Be ef
F
e
e 2: OCC (2010 US$/kW) plotted against cumulative global capacit (GW) of nuclear po er reactors, based on construction start
dates; regression lines fitted to points before and after trend reversals.
7 of 23
Electronic cop available at:
N c ea P
e Lea
a d De
e
Ra e : D
a d G ba Be ef
F
e
To compare trends for the seven countries, Figure 3 sho s all the regression lines. Japan and France had the fastest pre-reversal
learning rate; South Korea had a similar rate since it started building reactors in 1972, although it started from a high OCC after the
reversal and initial rapid cost escalation in the other countries.
G ba
C
24% 19% 28% 16% 23% 2%
P e- e e a
P
ec ed OCC a 497 GW $349
$614
$257
$334
$485
$739
N/A
$433
F
e 3: Regression lines for seven countries: OCC plotted against cumulative global capacit of construction starts.
Table 1 lists the learning rates for both periods in each countr for both the cumulative global and the cumulative countr capacit . The
si th column is the reversal point for each countr . The last column is the projected OCC at 497 GW cumulative global capacit if the
pre-reversal learning rates had continued.
Tab e 1: Learning rates for pre-reversal and post-reversal, reversal point and projected overnight construction cost at 497 GW
cumulative global capacit of construction starts.
C
US 23% CA 27% FR 34% DE 28% JP 35% IN 7%
UKRAINE
All 24%
P
- e e a Re e a G ba C
, GW
-94% -102% 32 -23% -20% 64 -28% -10% 64 -82% -62% 64 -56% -35% 100 -54% -8% 100
33% 12% 100 -23% 32
8 of 23
Electronic cop available at:
N c ea P
e Lea
a d De
e
Ra e : D
a d G ba Be ef
F
e
Learning rates are affected b the gro th of cumulative capacit both globall and locall . Follo ing Lovering et al., cumulative global
capacit
as used as the reference. Figure 4 plots the learning rates against the time span of the construction starts for each period in
each countr .
F
e 4: Learning rates pre- and post-reversal points vs time span of construction starts.
Table 1 and Figure 4 sho that, before the reversal, OCC learning rates ere 23% in the US, 27% to 35% in the other countries e cept
India ( here it as 7%), and 24% for all countries combined. At the reversal, learning rates changed abruptl and became negative
(-94% in the US, -82% in German , -23% to -56% in the other countries, e cept in South Korea, and -23% for all seven countries);
South Korea started building nuclear po er plants after the initial rapid cost-escalation period, achieving a 33% learning rate since
1972. The fact that fast learning rates e isted up to about 1970, and in South Korea since, suggests the could be achieved again 9.
The US s post-reversal learning rate as the orst of the seven countries. The reversal occurred t o to four ears later in the other
countries and the real cost increase as not as severe as in the US. This suggests the US ma have negativel influenced the
development of nuclear po er in all seven countries (and probabl all countries). It also sho s that technolog learning and transition
rates can change quickl and disrupt progress, in this case dela ing progress for about half a centur so far.
3.2. De
e
ae a d
jec i
2015
Figure 5 sho s the annual global capacit of construction starts 10 and commercial operation starts from 1954 to 2015 [22]. The
capacit of construction starts as accelerating until about 1970, peaked in 1976, then stalled. The annual capacit of commercial
operation starts peaked in 1985, averaged 30 GW per ear from 1984 to 1986, then declined rapidl and has not recovered. IAEA
9 of 23
Electronic cop available at:
N c ea P
e Lea
a d De
e
Ra e : D
a d G ba Be ef
F
e
[40] sho s grid connections peaked at 31 GW per ear in 1984 and 1985 and declined rapidl thereafter.
1
Lea ning
a e fo
2
Deplo men
a e
3
Ac
4
Linea
p ojec ion
23%
cena io :
al 349
246 Accele a ing 177
27% 34% 28% 35% 7% 24%
F
e 5: Annual global capacit of construction starts and commercial operation starts, 1954 2015.
Figure 6 sho s cumulative global capacit of construction starts and commercial operations starts plotted against time (top panel), and
projections of hat the
ould have been in 2015 if the earl deplo ment rates had continued (bottom panel).
10 of 23
Electronic cop available at:
N c ea P
e Lea
a d De
1
Ac
2
Deplo men
3
Linea
4
3,881 4,000 4,797 5,000 3,676 OCC change f om 2015 ac
e
Ra e : D
a d G ba Be ef
F
e
al OCC
a e
cena io : Ac
al
Accele a ing
al
2,000
4,022
11% 8% 5%
F
e6(
(B
): Cumulative global capacit of construction starts and of commercial operation starts (sorted b construction start date).
): Cumulative global capacit of construction starts (red and green data points); accelerating projection of 1960 1976 data
points (dotted green line); Linear and Accelerating projections of capacit in commercial operation (dashed pink and green lines).
11 of 23
Electronic cop available at:
N c ea P
e Lea
a d De
e
Ra e : D
a d G ba Be ef
F
e
Table 2 summarises the cumulative global capacit of actual and projected construction starts and the capacit in commercial operation
at the end of 2015 for each scenario.
Tab e 2: Actual and projected cumulative global capacit of construction starts and global capacit in commercial operation in 2015 for
the three scenarios.
De
e
a e ce a
Actual
Linear Accelerating
C
c
a
(GW) 497
1,246 2,941
C
e ca
ea
(GW) 383
1,096 2,366
The Linear and Accelerating projections of cumulative global capacit b 2015 in Table 2 represent scenarios calculated on the basis of
the stated deplo ment rate assumptions. The increases in projected cumulative global capacit b 2015 compared ith Actual are large.
It is useful to compare these scenarios ith projections made in the 1970s. For e ample, the Accelerating deplo ment rate projects a
global nuclear capacit of 1,152 GW b 2000. The Workshop on Alternative Energ Strategies (WAES) [12], projected global nuclear
capacit in 2000 at bet een 913 GW and 1,722 GW 11. So the present projection is quite consistent ith the outlook of 40 ears ago.
,$6
,$6
Financial Reporting in Hyperinflationary
Economies
In April 2001 the International Accounting Standards Board adopted IAS 29 Financial
Reporting in Hyperinflationary Economies, which had originally been issued by the
International Accounting Standards Committee in July 1989.
†,)56)RXQGDWLRQ
$
,$6
&217(176
IURPSDUDJUDSK
,17(51$7,21$/$&&2817,1*67$1'$5'
),1$1&,$/5(3257,1*,1+<3(5,1)/$7,21$5<
(&2120,(6
6&23(
7+(5(67$7(0(172)),1$1&,$/67$7(0(176
+LVWRULFDOFRVWƂQDQFLDOVWDWHPHQWV
&XUUHQWFRVWƂQDQFLDOVWDWHPHQWV
7D[HV
6WDWHPHQWRIFDVKƃRZV
&RUUHVSRQGLQJƂJXUHV
&RQVROLGDWHGƂQDQFLDOVWDWHPHQWV
6HOHFWLRQDQGXVHRIWKHJHQHUDOSULFHLQGH[
(&2120,(6&($6,1*72%(+<3(5,1)/$7,21$5<
',6&/2685(6
())(&7,9('$7(
)257+(%$6,6)25&21&/86,2166((3$57&2)7+,6(',7,21
%$6,6)25&21&/86,216
$
†,)56)RXQGDWLRQ
,$6
International Accounting Standard 29 Financial Reporting in Hyperinflationary
Economies (IAS 29) is set out in paragraphs 1–41. All the paragraphs have equal
authority but retain the IASC format of the Standard when it was adopted by the IASB.
IAS 29 should be read in the context of the Basis for Conclusions, the Preface to IFRS
Standards and the Conceptual Framework for Financial Reporting. IAS 8 Accounting Policies,
Changes in Accounting Estimates and Errors provides a basis for selecting and applying
accounting policies in the absence of explicit guidance.
†,)56)RXQGDWLRQ
$
,$6
,QWHUQDWLRQDO$FFRXQWLQJ6WDQGDUG
)LQDQFLDO5HSRUWLQJLQ+\SHULQƃDWLRQDU\(FRQRPLHV
6FRSH
1
This Standard shall be applied to the financial statements, including the
consolidated financial statements, of any entity whose functional currency
is the currency of a hyperinflationary economy.
2
In a hyperinflationary economy, reporting of operating results and financial
position in the local currency without restatement is not useful. Money loses
purchasing power at such a rate that comparison of amounts from
transactions and other events that have occurred at different times, even
within the same accounting period, is misleading.
3
This Standard does not establish an absolute rate at which hyperinflation is
deemed to arise. It is a matter of judgement when restatement of financial
statements in accordance with this Standard becomes necessary.
Hyperinflation is indicated by characteristics of the economic environment of
a country which include, but are not limited to, the following:
(a)
the general population prefers to keep its wealth in non-monetary
assets or in a relatively stable foreign currency. Amounts of local
currency held are immediately invested to maintain purchasing power;
(b)
the general population regards monetary amounts not in terms of the
local currency but in terms of a relatively stable foreign currency.
Prices may be quoted in that currency;
(c)
sales and purchases on credit take place at prices that compensate for
the expected loss of purchasing power during the credit period, even if
the period is short;
(d)
interest rates, wages and prices are linked to a price index; and
(e)
the cumulative inflation rate over three years is approaching, or
exceeds, 100%.
4
It is preferable that all entities that report in the currency of the same
hyperinflationary economy apply this Standard from the same date.
Nevertheless, this Standard applies to the financial statements of any entity
from the beginning of the reporting period in which it identifies the existence
of hyperinflation in the country in whose currency it reports.
1
As part of Improvements to IFRSs issued in May 2008, the Board changed terms used in IAS 29 to be
consistent with other IFRSs as follows: (a) ‘market value’ was amended to ‘fair value’, and (b)
‘results of operations’ and ‘net income’ were amended to ‘profit or loss’.
$
†,)56)RXQGDWLRQ
,$6
7KHUHVWDWHPHQWRIƂQDQFLDOVWDWHPHQWV
5
Prices change over time as the result of various specific or general political,
economic and social forces. Specific forces such as changes in supply and
demand and technological changes may cause individual prices to increase or
decrease significantly and independently of each other. In addition, general
forces may result in changes in the general level of prices and therefore in the
general purchasing power of money.
6
Entities that prepare financial statements on the historical cost basis of
accounting do so without regard either to changes in the general level of
prices or to increases in specific prices of recognised assets or liabilities. The
exceptions to this are those assets and liabilities that the entity is required, or
chooses, to measure at fair value. For example, property, plant and equipment
may be revalued to fair value and biological assets are generally required to be
measured at fair value. Some entities, however, present financial statements
that are based on a current cost approach that reflects the effects of changes
in the specific prices of assets held.
7
In a hyperinflationary economy, financial statements, whether they are based
on a historical cost approach or a current cost approach, are useful only if
they are expressed in terms of the measuring unit current at the end of the
reporting period. As a result, this Standard applies to the financial statements
of entities reporting in the currency of a hyperinflationary economy.
Presentation of the information required by this Standard as a supplement to
unrestated financial statements is not permitted. Furthermore, separate
presentation of the financial statements before restatement is discouraged.
8
The financial statements of an entity whose functional currency is the
currency of a hyperinflationary economy, whether they are based on a
historical cost approach or a current cost approach, shall be stated in
terms of the measuring unit current at the end of the reporting period.
The corresponding figures for the previous period required by IAS 1
Presentation of Financial Statements (as revised in 2007) and any information
in respect of earlier periods shall also be stated in terms of the measuring
unit current at the end of the reporting period. For the purpose of
presenting comparative amounts in a different presentation currency,
paragraphs 42(b) and 43 of IAS 21 The Effects of Changes in Foreign Exchange
Rates apply.
9
The gain or loss on the net monetary position shall be included in profit or
loss and separately disclosed.
10
The restatement of financial statements in accordance with this Standard
requires the application of certain procedures as well as judgement. The
consistent application of these procedures and judgements from period to
period is more important than the precise accuracy of the resulting amounts
included in the restated financial statements.
†,)56)RXQGDWLRQ
$
,$6
+LVWRULFDOFRVWƂQDQFLDOVWDWHPHQWV
6WDWHPHQWRIƂQDQFLDOSRVLWLRQ
11
Statement of financial position amounts not already expressed in terms of the
measuring unit current at the end of the reporting period are restated by
applying a general price index.
12
Monetary items are not restated because they are already expressed in terms
of the monetary unit current at the end of the reporting period. Monetary
items are money held and items to be received or paid in money.
13
Assets and liabilities linked by agreement to changes in prices, such as index
linked bonds and loans, are adjusted in accordance with the agreement in
order to ascertain the amount outstanding at the end of the reporting period.
These items are carried at this adjusted amount in the restated statement of
financial position.
14
All other assets and liabilities are non-monetary. Some non-monetary items
are carried at amounts current at the end of the reporting period, such as net
realisable value and fair value, so they are not restated. All other
non-monetary assets and liabilities are restated.
15
Most non-monetary items are carried at cost or cost less depreciation; hence
they are expressed at amounts current at their date of acquisition. The
restated cost, or cost less depreciation, of each item is determined by applying
to its historical cost and accumulated depreciation the change in a general
price index from the date of acquisition to the end of the reporting period. For
example, property, plant and equipment, inventories of raw materials and
merchandise, goodwill, patents, trademarks and similar assets are restated
from the dates of their purchase. Inventories of partly-finished and finished
goods are restated from the dates on which the costs of purchase and of
conversion were incurred.
16
Detailed records of the acquisition dates of items of property, plant and
equipment may not be available or capable of estimation. In these rare
circumstances, it may be necessary, in the first period of application of this
Standard, to use an independent professional assessment of the value of the
items as the basis for their restatement.
17
A general price index may not be available for the periods for which the
restatement of property, plant and equipment is required by this
Standard. In these circumstances, it may be necessary to use an estimate
based, for example, on the movements in the exchange rate between the
functional currency and a relatively stable foreign currency.
18
Some non-monetary items are carried at amounts current at dates other than
that of acquisition or that of the statement of financial position, for example
property, plant and equipment that has been revalued at some earlier date. In
these cases, the carrying amounts are restated from the date of the
revaluation.
$
†,)56)RXQGDWLRQ
,$6
19
The restated amount of a non-monetary item is reduced, in accordance with
appropriate IFRSs, when it exceeds its recoverable amount. For example,
restated amounts of property, plant and equipment, goodwill, patents and
trademarks are reduced to recoverable amount and restated amounts of
inventories are reduced to net realisable value.
20
An investee that is accounted for under the equity method may report in the
currency of a hyperinflationary economy. The statement of financial position
and statement of comprehensive income of such an investee are restated in
accordance with this Standard in order to calculate the investor’s share of its
net assets and profit or loss. When the restated financial statements of the
investee are expressed in a foreign currency they are translated at closing
rates.
21
The impact of inflation is usually recognised in borrowing costs. It is not
appropriate both to restate the capital expenditure financed by borrowing and
to capitalise that part of the borrowing costs that compensates for the
inflation during the same period. This part of the borrowing costs is
recognised as an expense in the period in which the costs are incurred.
22
An entity may acquire assets under an arrangement that permits it to defer
payment without incurring an explicit interest charge. Where it is
impracticable to impute the amount of interest, such assets are restated from
the payment date and not the date of purchase.
23
[Deleted]
24
At the beginning of the first period of application of this Standard, the
components of owners’ equity, except retained earnings and any revaluation
surplus, are restated by applying a general price index from the dates the
components were contributed or otherwise arose. Any revaluation surplus
that arose in previous periods is eliminated. Restated retained earnings are
derived from all the other amounts in the restated statement of financial
position.
25
At the end of the first period and in subsequent periods, all components of
owners’ equity are restated by applying a general price index from the
beginning of the period or the date of contribution, if later. The movements
for the period in owners’ equity are disclosed in accordance with IAS 1.
26
This Standard requires that all items in the statement of comprehensive
income are expressed in terms of the measuring unit current at the end of the
reporting period. Therefore all amounts need to be restated by applying the
change in the general price index from the dates when the items of income
and expenses were initially recorded in the financial statements.
6WDWHPHQWRIFRPSUHKHQVLYHLQFRPH
†,)56)RXQGDWLRQ
$
,$6
*DLQRUORVVRQQHWPRQHWDU\SRVLWLRQ
27
In a period of inflation, an entity holding an excess of monetary assets over
monetary liabilities loses purchasing power and an entity with an excess of
monetary liabilities over monetary assets gains purchasing power to the
extent the assets and liabilities are not linked to a price level. This gain or loss
on the net monetary position may be derived as the difference resulting from
the restatement of non-monetary assets, owners’ equity and items in the
statement of comprehensive income and the adjustment of index linked assets
and liabilities. The gain or loss may be estimated by applying the change in a
general price index to the weighted average for the period of the difference
between monetary assets and monetary liabilities.
28
The gain or loss on the net monetary position is included in profit or loss.
The adjustment to those assets and liabilities linked by agreement to changes
in prices made in accordance with paragraph 13 is offset against the gain or
loss on net monetary position. Other income and expense items, such as
interest income and expense, and foreign exchange differences related to
invested or borrowed funds, are also associated with the net monetary
position. Although such items are separately disclosed, it may be helpful if
they are presented together with the gain or loss on net monetary position in
the statement of comprehensive income.
&XUUHQWFRVWƂQDQFLDOVWDWHPHQWV
6WDWHPHQWRIƂQDQFLDOSRVLWLRQ
29
Items stated at current cost are not restated because they are already
expressed in terms of the measuring unit current at the end of the reporting
period. Other items in the statement of financial position are restated in
accordance with paragraphs 11 to 25.
6WDWHPHQWRIFRPSUHKHQVLYHLQFRPH
30
The current cost statement of comprehensive income, before restatement,
generally reports costs current at the time at which the underlying
transactions or events occurred. Cost of sales and depreciation are recorded at
current costs at the time of consumption; sales and other expenses are
recorded at their money amounts when they occurred. Therefore all amounts
need to be restated into the measuring unit current at the end of the
reporting period by applying a general price index.
*DLQRUORVVRQQHWPRQHWDU\SRVLWLRQ
31
The gain or loss on the net monetary position is accounted for in accordance
with paragraphs 27 and 28.
7D[HV
32
$
The restatement of financial statements in accordance with this Standard may
give rise to differences between the carrying amount of individual assets and
liabilities in the statement of financial position and their tax bases. These
differences are accounted for in accordance with IAS 12 Income Taxes.
†,)56)RXQGDWLRQ
,$6
6WDWHPHQWRIFDVKƃRZV
33
This Standard requires that all items in the statement of cash flows are
expressed in terms of the measuring unit current at the end of the reporting
period.
&RUUHVSRQGLQJƂJXUHV
34
Corresponding figures for the previous reporting period, whether they were
based on a historical cost approach or a current cost approach, are restated by
applying a general price index so that the comparative financial statements
are presented in terms of the measuring unit current at the end of the
reporting period. Information that is disclosed in respect of earlier periods is
also expressed in terms of the measuring unit current at the end of the
reporting period. For the purpose of presenting comparative amounts in a
different presentation currency, paragraphs 42(b) and 43 of IAS 21 apply.
&RQVROLGDWHGƂQDQFLDOVWDWHPHQWV
35
A parent that reports in the currency of a hyperinflationary economy may
have subsidiaries that also report in the currencies of hyperinflationary
economies. The financial statements of any such subsidiary need to be
restated by applying a general price index of the country in whose currency it
reports before they are included in the consolidated financial statements
issued by its parent. Where such a subsidiary is a foreign subsidiary, its
restated financial statements are translated at closing rates. The financial
statements of subsidiaries that do not report in the currencies of
hyperinflationary economies are dealt with in accordance with IAS 21.
36
If financial statements with different ends of the reporting periods are
consolidated, all items, whether non-monetary or monetary, need to be
restated into the measuring unit current at the date of the consolidated
financial statements.
6HOHFWLRQDQGXVHRIWKHJHQHUDOSULFHLQGH[
37
The restatement of financial statements in accordance with this Standard
requires the use of a general price index that reflects changes in general
purchasing power. It is preferable that all entities that report in the currency
of the same economy use the same index.
(FRQRPLHVFHDVLQJWREHK\SHULQƃDWLRQDU\
38
When an economy ceases to be hyperinflationary and an entity
discontinues the preparation and presentation of financial statements
prepared in accordance with this Standard, it shall treat the amounts
expressed in the measuring unit current at the end of the previous
reporting period as the basis for the carrying amounts in its subsequent
financial statements.
†,)56)RXQGDWLRQ
$
,$6
'LVFORVXUHV
39
40
The following disclosures shall be made:
(a)
the fact that the financial statements and the corresponding figures
for previous periods have been restated for the changes in the
general purchasing power of the functional currency and, as a
result, are stated in terms of the measuring unit current at the end
of the reporting period;
(b)
whether the financial statements are based on a historical cost
approach or a current cost approach; and
(c)
the identity and level of the price index at the end of the reporting
period and the movement in the index during the current and the
previous reporting period.
The disclosures required by this Standard are needed to make clear the basis
of dealing with the effects of inflation in the financial statements. They are
also intended to provide other information necessary to understand that basis
and the resulting amounts.
(IIHFWLYHGDWH
41
$
This Standard becomes operative for financial statements covering periods
beginning on or after 1 January 1990.
†,)56)RXQGDWLRQ
UNDERSTANDING THE COMPANY AND ITS ENVIRONMENT, INCLUDING
ITS INTERNAL CONTROL
Thi empla e p o ide an ea
o e fo ma ha can be ed o doc men he a di o
nde anding
of the company and its environment, including its internal control. It is intended that the template would be
used in conjunction with the Institute of Certified Public Accountants in Ireland publication “AUDIT WORK
PAPERS FOR A NOT FOR PROFIT ENTITY ENGAGED IN COMMUNITY DEVELOPMENT ACTIVITIES .
Some example text is included in the template to illustrate the typical type of content that will be included
in the final document. An example document is also included in the above publication to illustrate the
pical con en of a di pape doc men ing he a di o
nde anding of he compan and i
environment, including its internal control. It is envisaged that this document will be a permanent
document that will be updated annually.
It is important that the auditor should amend the template content to reflect the actual audit risk identified
and the planned audit response to these risks. As it is intended that these work papers will be used on
audit assignments of a small company, it is assumed that the auditor will not place reliance on internal
controls and that consequently control risk is high.
Guide to using the work papers
The name of the firm, client, period end, prepared by and reviewed by can be inserted in the page header
and footer and this detail will then appear on each page printed.
In certain sections of the documents we have included a suggested text (in red text) that may be
appropriate in some assignment cases. The user needs to amend this text to suit the actual assignment
situation faced.
November 10, 2011
SUBJECT: Request for Proposal (RFP) SA1301-12-RP-IANA
Dear Potential Offeror:
The United States Department of Commerce (DoC), National Telecommunications and
Information Administration (NTIA) intends to award a contract to maintain the continuity and
stability of services related to certain interdependent Internet technical management functions,
known collectively as the Internet Assigned Numbers Authority (IANA).
The anticipated period of performance of this contract is April 1, 2012
March 31, 2015.
This solicitation utilizes a Statement of Work (SOW). The SOW describes the work in terms of
the required results and reduces the inherent instr ctions regarding ho
to accomplish the
work.
Please send questions regarding the solicitation electronically via email to mdunn@doc.gov. All
written questions must be received no later than 4PM Eastern Standard Time, November 18,
2011.
The closing date for receipt of proposals is 4PM Eastern Standard Time, December 12, 2011.
Thank you in advance and we look forward to reviewing your responses to this RFP!
Best regards
1
SeriesStatementsandSeriesAuthorityRecords
Session10:MultipartMonographs
Summary
Thissessionprovidesinformationaboutwhatmultipartmonographsareandhowtheydifferfromother
monographicseries.Italsooffersguidelinestohelpthecatalogerdecidewhetherornottoanalyzethe
multipartmonograph.
Objectives
Attheendofthissessionyoushouldbeableto:
x Understandwhatamultipartmonographis
x Determinewhethertoanalyzethemultipartmonograph
x UnderstandthedifferencesbetweenAAPsformultipartmonographsandmonographicseries
x Recognizevariousconfigurationsofrecordsformultipartmonographs
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
TableofContents
DeterminingThattheResourceisaMultipartMonograph......................................................................... 1
DefinitionofMultipartMonograph.......................................................................................................... 1
HowisaMultipartMonographDifferentFromaMonographicSeries?..................................................
1
CluesWhetheraResourceisaMultipartMonographorNot.................................................................. 1
LCͲPCCPS0.0........................................................................................................................................1
TheDecisiontoAnalyzeorNotAnalyze....................................................................................................... 3
RDAInstructionsandLCͲPCCPractice...................................................................................................... 3
BestPractices............................................................................................................................................4
DifferencesinSARs:MultipartMonographsandMonographicSeries........................................................5
Difference#1:MultipartMonographsHaveFewerSARs......................................................................... 5
Difference#2:TheSeriesAuthorizedAccessPointsforMultipartMonographsMoreOftenBeginwith
aCreator(MARCFields100,110,111)..................................................................................................... 5
Difference#3:TreatmentofaResourceBearingTitlesofTwoMultipartMonographs..........................6
Difference#4:InitialismastheTitleProper............................................................................................. 8
Difference#5:008/12............................................................................................................................... 9
Difference#6:020Field............................................................................................................................ 9
Difference#7:MoreFrequentUseofthe640field..................................................................................
9
Difference#8:“Works,”“Selections,”andTranslationswithParallelTexts..........................................10
“Works”...............................................................................................................................................
10
Selections............................................................................................................................................12
TranslationswithParallelTexts.......................................................................................................... 13
ConfigurationsofRecords...........................................................................................................................
15
PossibleConfigurationsofRecords.........................................................................................................
15
MultipartMonographNotAnalyzed...................................................................................................
15
MultipartMonographAnalyzedandClassedasaCollection.............................................................17
MultipartMonographAnalyzedandClassedSeparately...................................................................18
UpdatingtheCollectiveDescription....................................................................................................... 19
PCCStandingCommitteeonTraining
Pagei
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
DeterminingThattheResourceisaMultipartMonograph
DefinitionofMultipartMonograph
“Aresourceissuedintwoormoreparts(eithersimultaneouslyorsuccessively)thatis
completeorintendedtobecompletedwithinafinitenumberofparts(e.g.,adictionary
intwovolumes,threeaudiocassettesissuedasaset).” (RDAGlossary)
HowisaMultipartMonographDifferentFromaMonographicSeries?
Unlikeamonographicseries,whichasaserialhasnopredeterminedconclusion,amultipartmonograph
iscompleteorisexpectedtobecompletewithinafinitenumberofparts.Determinationofthisdepends
somewhatonthecataloger’sjudgment,sincethepublishermaynotstatethatfact,andsomemultipart
monographsarepublishedovermanyyears.Seriesthatarecreatedbyaperson(e.g.theNo.1Ladies’
DetectiveAgencynovelsbyAlexanderMcCallSmith)areassumedtobemultipartmonographssincethe
expectationistheywillcometoanendwhenthepersondies,ifnotbefore.
CluesWhetheraResourceisaMultipartMonographorNot
x
x
x
x
Sometimesthepublisherprovidesinformationaboutaplannedendtotheresource
Sometimestheentireresourceor“set”hasitsownISBN;whilethepresenceofanISBNisnota
whollyreliableindicationofaresource’sfinitenature,itisoneclue
Thescopeoftheresourcemaybenarrow,implyingthatanytreatmentofitsscopecouldnot
continueindefinitely
Ifeachpartoftheresourceiscompleteforitsshareofthegeneraltopic,thiscouldimplythat
eventuallyallaspectsofthegeneraltopicwillbecovered
LCǦPCCPS0.0
LCͲPCCPS0.0givessomepracticaladvicefordeterminingifaseriesisamultipartmonographora
monographicseries(i.e.,aserial)
x Frequencyofpublication.
o Doesithaveastatedfrequencyofpublication(e.g.“weekly”)?Ifsoitisprobablyaserial.
o Isthefrequencystatedintermsofeditions?Ifneweditionscomeouteveryoneortwo
yearsitisprobablyamonographicseries;iftheycomeoutlessfrequentlyitisprobably
amultipartmonograph.
o Note:astatedfrequencyisrareforseries.
x Presenceandtypeofnumbering.Bothmonographicseriesandmultipartmonographsmayexist
withorwithoutnumbering.Howeverifthereisnumbering,thetypeofnumberingmaybeaclue
(e.g.doesitincludechronologicaldesignations?)
x Istherenolikelihoodofapredeterminedconclusion?Ifnot,itisprobablyamonographicseries.
PCCStandingCommitteeonTraining
Page1
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
TheDecisiontoAnalyzeorNotAnalyze
RDAInstructionsandLCǦPCCPractice
Onceithasbeendeterminedthataresourceisamultipartmonograph,theseconddecisioniswhether
ornottoanalyzeitsparts.RDA2.1.3providesgeneralinstructionsonhowtocreateanalytical
descriptions,butitdoesnotgiveguidanceonwhethertodoso.
LCͲPCCPS2.1.3presentsLCͲPCCpracticeregardinganalysis:
“WhenapublicationthatisapartofaclassifiedͲseparatelymultipartmonographlacksa
titleotherthanthatofthecomprehensivetitleorhasatitlethatisdependentonthe
comprehensivetitle,prepareaseparatebibliographicrecordforthatpublicationorpart,
regardlessofwhetheritisnumberedornot.”
NOTE: IfaPCCinstitutionchoosestoclassifythesamemultipartmonographtogether
asacollection,thisPSwouldnotapply.
LCͲPCCPS2.1.3alsopresentsLCpractice,statingthatLCanalyzesandclassifiesseparatelyallpartsof
monographicseriesandofmultipartmonographswiththeexceptionofthosecategorieslistedinDCM
M5.OtherPCCinstitutionscanmakeotherseriestreatmentdecisions.
PCCStandingCommitteeonTraining
Page3
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
BestPractices
Herearesomebestpracticestoconsiderwhendecidingwhetherornottoanalyzeamultipart
monograph.
x DoesthecomprehensivetitleofthemultipartmonographappearonalessͲprominentsource
thandoesthetitleoftheindividualpart?
o Thenprobablyanalyze.
x Isthetitleoftheindividualpartdistinctive?(Pleasenote:thisisnotthesamequestionas,"Does
theindividualparthaveitsowntitle?")
o Thenprobablyanalyze.
TypesofnonͲdistinctivetitles:
x Alphabeticornumericdivision(e.g.,v.1,2;partA,B,C)
x Chronologicalsubdivision(e.g.,years;centuries)
x Alphabeticsubdivisionofcontent(e.g.,AͲL,MͲZ)
x Geographicsubdivision(e.g.,continents;countries)
x Phrasethatomitsessentialpieceofinformationfoundinthemultipartitemtitle(e.g.,"Teeth"
asapartof"Dinosaurrelics")
x Generalterm(e.g.,atlas,glossary)
NOTE: Catalogingagenciesinsomecountrieshaveanationalbibliographyrequirementtomakean
analyticdescriptionforeachpartofamultipartmonograph
PCCStandingCommitteeonTraining
Page4
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
DifferencesinSARs:MultipartMonographsandMonographicSeries
Difference#1:MultipartMonographsHaveFewerSARs
AmultipartmonographwillhaveonlyoneSARregardlessofchangesincreatorand/ortitleproper(RDA
2.3.2.12.1andRDA18.4.2.1).Conversely,suchchangesforamonographicseriescouldnecessitate
additionalSARs.
x
x
x
Formultipartmonographs,basetheseriesauthorizedaccesspoint(1XXinSAR)onthefirst
(numbered)orearliest(unnumbered)part(RDA2.1.2.3)
Givesubsequentchangesincreatorand/ortitleproperforlaterpartsas4XXvariantaccess
pointsintheSAR
Updatethedescriptionofamultipartmonographifanearlierpartisreceivedlater(LCͲPCCPS
2.17.13.3)
Example:OnlyoneSARformultipartmonographwithchanges
1001#$aPhillips,Jolene.$tPreschoolvocabularybuildingactivities
430#0$aPreschoolvocabularybuildingactivities
430#0$aPreschoolvocabularyactivities
4001#$aBolling,Diane.$tPreschoolvocabularyactivities
670##$aPhillips,J._______$b(Preschoolvocabularybuildingactivities;v.1)
670##$aPhillips,J._______$b(Preschoolvocabularyactivities;v.3)
670##$aBolling,D._______$b(Preschoolvocabularyactivities;v.4)
670##$aInfofrompublisher$b(JolenePhillipswasauthorofv.1Ͳ3;v.4Ͳ5byDianeBolling)
Difference#2:TheSeriesAuthorizedAccessPointsforMultipartMonographs
MoreOftenBeginwithaCreator(MARCFields100,110,111)
Duetothedifferentnatureofmonographicandserialresources,multipartmonographsmorelikelyto
havepersons,families,corporatebodies(includingconferences)ascreatorsthanaremonographic
series
x Thefollowingtypesofseriescreatedbycorporatebodiesarelikelytobemultipartmonographs
o Collectiveactivityofasingleconference,etc.(RDA19.2.1.1.1c)
o Cartographicmaterials(RDA19.2.1.1.1e)
o Collectivethoughtofbody(RDA19.2.1.1.1b)
PCCStandingCommitteeonTraining
Page5
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
Examples:SeriesAAPsformultipartmonographsthatincludeAAPsofcreator
1112#$aPressureVesselsandPipingConference$d(1985:$cNewOrleans,La).$tProceedings
ofthe1985PressureVesselsandPipingConference
1001#Donegan,Beth.$tCookingmadeeasy!
Difference#3:TreatmentofaResourceBearingTitlesofTwoMultipart
Monographs
Iftheresourcebears,inadditiontotheanalyzabletitleofthemanifestation,titlesoftwomultipart
monographs(andisthereforepartofboth),thesetitlesareusuallynottreatedasmainseriesand
subseries(i.e.,asoneentity).Rather,theyaretreatedastwoseparateseries.
Ifthetwotitlespresentontheresourceinadditiontotheanalyzabletitleofthemanifestationrepresent
twomultipartmonographs,LCͲPCCPS2.12.10tellsustoapplyRDA6.27.2todetermineifthetwotitles
aretobetreatedasoneentityorastwoseparateseries(seeexceptionfornonͲdistinctivetitles).
Iftheyaretreatedastwoseparateseries:
x Recordtwoseriesstatements(intwo490fields)inanalyticrecord
x ThepreferredtitleportionoftheseriesAAPforthesmallermultipartisnottreatedasa
subseriesof(i.e.,subordinateto)thelargermultipartitem’sseriesAAP
PCCStandingCommitteeonTraining
Page6
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
Example:largerandsmallermultipartitems
Exploring South America’s History
Looking at Brazil’s Past
Volume 13 in a set of 40 volumes
Brazil’s History and its Future
Volume 1 of 2
by _______
__________
2003
seriestitlepage
analytictitlepage
TheanalyticrecordhastwoseriesstatementsandtwoseriesAAPs:oneforthelargerandoneforthe
smallermultipartmonograph:
4901#$aExploringSouthAmerica’shistory;$vvolume13
4901#$aBrazil’shistoryanditsfuture;$vvolume1
830#0$aExploringSouthAmerica’shistory;$vv.13.
830#0$aBrazil’shistoryanditsfuture;$vv.1.
Not:
4901#$aExploringSouthAmerica’shistory;$vvolume13.
490#1$aBrazil’shistoryanditsfuture;$vvolume1
830#0$aExploringSouthAmerica’shistory;$vv.13.
830#0$aExploringSouthAmerica’shistory.$pBrazil’shistoryanditsfuture;$vv.1.
PCCStandingCommitteeonTraining
Page7
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
Difference#4:InitialismastheTitleProper
Forsituationsinwhichthesourceofinformationbearsatitleinmorethanoneform,andbothorallof
thetitlesareinthesamelanguageorscript,thegeneralinstructionat2.3.2.5tellsustochoosethetitle
properonthebasisofthesequence,layout,ortypographyofthetitlesonthesourceof
information.Theexceptionforserialsandintegratingresources(alwaystochoosethefullformasthe
titleproperoveranacronymorinitialism,ifbothappearonthepreferredsource)appliesto
monographicseries,butnottomultipartmonographs.Soformultipartmonographs,unlikefor
monographseries,thefullformwillbechosenasthetitleproperoveranacronymorinitialismalso
appearingonthepreferredsourceonlyifthatchoiceisindicatedbythesequence,layoutortypography.
Examples:
Seriestitlepageofamultipartmonograph:
FCI
FloraoftheCanadianIslands
v.15
Titleproperofmultipartmonograph:FCI.
Seriestitlepageofamonographicseries:
AWE
AdvancesinWorldEconomics
v.11
Titleproperofmonographicseries:Advancesinworldeconomics.
PCCStandingCommitteeonTraining
Page8
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
Difference#5:008/12
Usecode“b”(formultipartitem),not“a”(formonographicseries).Beespeciallycarefullytoreviewthis,
becausemanycatalogingtemplatesincludecodingforamonographicseries(i.e.,code“a”).
Difference#6:020Field
Formultipartmonographs,ISBNsforthecomprehensivesetcanberecordedintheSAR’s020field.
TheMARC21FormatforAuthorityDataprovidesthisfielddefinitionandscopefortheSAR020:
“InternationalStandardBookNumber(ISBN),termsofavailability,andany
canceled/invalidISBNcopiedfromfield020ofaMARCbibliographicrecordfora
multipartitemthatiscatalogedasaset.”
Difference#7:MoreFrequentUseofthe640field
Formultipartmonographs,field640intheSAR(SeriesDatesofPublicationand/orVolumeDesignation)
isusedmoreoftentorecordtheextentoftheresource.Suchinformationisespeciallyhelpfultoother
catalogerswhenthemultipartisclassifiedseparately,becausetheSARistheonlyplacetorecordthis
information.
PCCpracticeregardingrecordingdatainthe640isstatedinDCMZ1:
“Donotsearchjusttoprovideinformationforthisfield;givetheinformationifitis
availablefromtheiteminhandorincidentallyfromthepublisher.”
Examples:
6401#$aCompletein15v.
6401#$aProjectedin6v.$zv.1,p.316
PCCStandingCommitteeonTraining
Page9
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
Difference#8:“Works,”“Selections,”andTranslationswithParallelTexts
Duetothenatureofmultipartmonographs,acatalogermayencountersomethatare1)compilationsof
worksofoneperson,family,orcorporatebodies;and2)translationswithparalleltexts.Thesetypesof
resourceshavespecialinstructionsforwhichLCͲPCCpracticeisstillevolving.
“Works”
FollowinstructionsinRDA6.2.2.10.1:
“RecordtheconventionalcollectivetitleWorksasthepreferredtitleforacompilationof
worksthatconsistsof,orpurportstobe,thecompleteworksofaperson,family,or
corporatebody.”
Differentresourcescontaininganauthor’scompleteworksareconsideredtobethesameaggregate
work.Differentiationbetweenversions,ifnecessary,isdoneattheexpressionlevel.
x
Datein$f
Donotautomaticallyaddadateafter“Works.”ThiswasaNACOpracticeunderAACR2thatwasnot
extendedintoRDA.Inmostcasesanauthor’scompleteworksarenotproducedmorethanonce,andso
thereisnoneedtodifferentiatebetweenversions(expressions).However,ifthereismorethanone
expressionofanauthor’scompleteworks(e.g.variousseparatepublications,ortranslations),use
judgmentindeterminingthemostappropriatequalifier.Consideringtheneedofdatabaseusersto
recognizeanddistinguishbetweenversions,datemightinfactbetheleastappropriatequalifiertous.
However,ifdateisusedasaqualifier,choosetheearliestdateassociatedwiththeexpression.Thiswill
usuallybethedateoftheearliestknownmanifestationoftheversion(RDA6.10.1.1)
Example:
1001#$aGoethe,JohannWolfgangvon,$d1749Ͳ1832.$tWorks.$f1997
643##$aKöln$bKönemann
670##$aDieLeidendesjungenWerthers,1997:$bser.t.p.(JohannWolfgangvonGoethe/
WerkausgabeinzehnBanden/Band1)
x Provisionalcoding
Ifdatehasbeenusedtodistinguishbetweenexpressionsandthedateofthefirstpartofthemultipart
monographisn’tknownbecausetheearliestpartisn’tavailable,codetheSARasprovisionalandupdate
itwhenthefirstpartisavailable.
PCCStandingCommitteeonTraining
Page10
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
x Furtherqualification
Ifmorethanonequalifierisneeded,itmaybeadded.
Example:
“Works”(Samepublisherpublishestwoversionsinthesameyear):
1001#$aTwain,Mark,$d1835Ͳ1910.$tWorks$s(WhitingPublishingCompany)
643##$aNewYork$bWhitingPublishingCompany
1001#$aTwain,Mark,$d1835Ͳ1910.$tWorks$s(WhitingPublishingCompany:Annotated
edition)
643##$aNewYork$bWhitingPublishingCompany
4XXVariantaccesspoints
x
FollowspecificinstructionsinLCͲPCCPS6.27.4foralternativeforms.
Example:
1001#$aTwain,Mark,$d1835Ͳ1910.$tWorks.$f1996
430#0$aOxfordMarkTwain.$f1996
4001#$aTwain,Mark,$d1835Ͳ1910.$tOxfordMarkTwain.$f1996
643##$aNewYork$bOxfordUniversityPress
670##$aThe$30,000bequestandotherstories,1996:$bCIPser.t.p.(TheOxfordMarkTwain)
PCCStandingCommitteeonTraining
Page11
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
Selections
Forseriesthatconsistofselectionsofthecompleteworksofacreator,follow6.2.2.10.Iftheseriesis
commonlyidentifiedbyaparticulartitle,usethattitleasthepreferredtitlefortheseries.Ifnot,follow
thealternativetoRDA6.2.2.10.3andusethepreferredtitle,“Works.Selections“.Thisconventional
collectivetitleisusedfortwoormoreworks(butnotall)invariousforms.Donotapplyittotwoor
moreworksinoneform,evenifthecreatorisknowntoworkinonlyoneform;insuchcases,$tconsists
oftheform,listedinRDA6.2.2.10.2.
NOTE: “Selections”shouldnotbeusedbyitself(i.e.,in$t),aswaspermissibleunderAACR2.Selections
mayonlybea‘part’ofsomeform,usedin$a.Assuch,itshouldalwaysbecodedas$k.
Unlikethecaseof“Works”,forwhichdifferentversionsaredifferentiatedattheexpressionlevel,
variouscollectionsofselectedworksofanauthor(asrepresentedby“Works.Selections”)willalwaysbe
differentaggregateworks,andso“Works.Selections”shouldbedifferentiatedattheworklevel.
Variouscollectionsofselectedworksofanauthorinaspecificform(e.g.,“Plays”,“Essays”)aredifferent
aggregateworksaswell,andshouldalsobedifferentiatedattheworklevel.
Examples:
Yan,Lianke,‫ۥ‬d1958Ͳ‫ۥ‬tWorks.‫ۥ‬kSelections(Jiangsurenminchubanshe)
Yan,Lianke,‫ۥ‬d1958Ͳ‫ۥ‬tWorks.‫ۥ‬kSelections(Wanjuanchubangongsi)
RuizNegre,Antoni.‫ۥ‬tPlays.‫ۥ‬kSelections(ComediasdeAntonioRuizNegre)
RuizNegre,Antoni.‫ۥ‬tPlays.‫ۥ‬kSelections(OtrascomediasdeAntonioRuizNegre)
NameAuthorityRecordorSeriesAuthorityRecord?
Becausecatalogerssometimeshaveachoiceofcatalogingmultipartmonographsasacollectedset(with
theauthorizedaccesspointforthemultipartmonographasarelatedwork)orcatalogingthemon
analyticrecords(withanauthorizedaccesspointforthemultipartmonographasaseries),anonͲseries
authorityrecordmayhavebeencreatedforthesamemultipartmonographyounowwanttotreatasa
series.Thiscanhappenwithanyseries.Whatdoyoudo?
x IftheNARyoudiscoverisforthesamemultipartmonographyouarecataloging,reviseittobe
anSAR.Therecordcanthenbeusedtoauthorizetheauthorizedaccesspointeitherasaseries
accesspointinananalyticrecordorasa“name”accesspointinacollectedsetrecord.
x IftheNARisforadifferentmultipartmonograph,addaqualifyingterminsubfield$sinthe
seriesAAPinanewSAR
x Youmayneedtoconsultbibliographicrecordstodeterminewhichoftheabovesituationsyou
have,sincetheNARmaynotprovideenoughinformation(e.g.,nameofpublisher)
PCCStandingCommitteeonTraining
Page12
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
Example:
ExistingNAR(thebibliographicrecordhas260:$aDenver$bM.Smith):
1001#$aTwain,Mark,$d1835Ͳ1910.$tWorks.$f2002
ThenewSARforadifferentmultipartmonographpublishedthesameyearneedsadifferent
qualifier:
1001#$aTwain,Mark,$d1835Ͳ1910.$tWorks$s(IngesonPublishingCompany)
643##$aEvanston,IL$bIngesonPublishingCompany
TranslationswithParallelTexts
Whentheoriginalexpressionandonetranslationareinacompilation,giveananalytical
authorizedaccesspointforeachexpression.Ifacompilationcontainstheoriginal
expressionandmorethanonetranslation,giveanalyticalauthorizedaccesspointsfor
theoriginalexpressionandatleastonetranslation.(LCͲPCCPS6.27.3,labeledLC
Practice)
ThisreplacestheAACR2practiceofprovidinguniformtitleswithsubfield$l“[Language]&[Language]”
additions.TheformerAACR2practiceofrecording“Polyglot”in$lisalsonowobsolete.
Followingthisinstruction(LCpractice),thecomprehensivedescriptionforamultipartmonograph
containingatranslationwithparalleltextswouldlooklikethis:
1000#$aDanteAlighieri,‫ۥ‬d1265Ͳ1321.
24514$aThedivinecomedyofDanteAlighieri.
300##$a3volumes
546##$aEnglishandItalianonfacingpages.
5050#$apart1.Inferno–part2.Purgatorio–part3.Paradiso.
70002$iContainerof(work):$aDanteAlighieri,$d1265Ͳ1321.$tDivinacommedia.
70002$iContainerof(expression):$aDanteAlighieri,$d1265Ͳ1321.$tDivinacommedia.$l
English.
Applicationofthisinstructiontoseriesmeansthatthedifferentlanguageexpressionsoftheseries
shouldbegivenseparateaccesspointsinanalyticrecords.
CurrentLCpractice,asseenintheaboveexample,isnotinfacttorecordanAAPfortheoriginal
expression,butinsteadtofollowAACR2practiceandusetheAAPfortheworktorepresentall
expressionsintheoriginallanguageandtouseanAAPwiththenameofthelanguageaddedto
representallexpressionsinthatlanguage.ThishasneitherbeenacceptednorrejectedasPCCpractice,
thoughitdoesseeminconsistentwithRDAprinciples.However,theLCpracticeisparticularly
PCCStandingCommitteeonTraining
Page13
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
problematicinthecaseofseries,whichhaveinthepastandcontinuetoneeddistinguishingfromother
expressionsinthesamelanguage.TheSeriesPolicyTaskGroupthereforerecommendsthatinthecase
ofseries(includingmultipartmonographs),particularexpressionsofworksalwaysbeassignedunique
AAPs(seeRDA6.27.3).Sotheanalyticrecordforpart1oftheDanteexampleabovewouldlooklikethis:
1000#$aDanteAlighieri,$d1265Ͳ1321,$eauthor.
24010$aInferno.$lEnglish$s([nameoftranslatororanotherdistinguishingelement])
24510$aInferno…
4901#$aThedivinecomedyofDanteAlighieri;$vpart1
546##$aTheItaliantextwithanEnglishversetranslation
8000#$aDanteAlighieri,$d1265Ͳ1321.$tDivinacommedia.$lItalian$s([nameofeditoror
anotherdistinguishingelement]);$vpt.1.
8000#$aDanteAlighieri,$d1265Ͳ1321.$tDivinacommedia.$lEnglish$s([nameoftranslatoror
anotherdistinguishingelement]);$vpt.1.
InthiscasetheseriesworkisDante’sDivinaCommedia,amultipartmonograph.TheSeriesPolicyTask
GrouprecommendsthatcatalogerscreateworkͲlevelauthorityrecordformultipartmonographs,and
asmanyexpressionͲlevelauthorityrecords(createdbyaddingthelanguageandothernecessary
distinguishingelementstotheAAPfortheworkͲlevelrecord)asneeded.TheexpressionͲlevelAAPs
wouldbeaddedasappropriatetobibliographicrecords.TheTaskGroupforwardedthisissuetothePCC
StandingCommitteeonStandardsinfall2015forfurtheranalysisandrecommendations.Staytunedto
PCCcommunicationsaboutpolicies.
PCCStandingCommitteeonTraining
Page14
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
ConfigurationsofRecords
PossibleConfigurationsofRecords
Thereareseveralpossibleconfigurationsofrecordsforthedifferenttypesofmultipartmonographs,
dependingonwhetherthemultipartisanalyzedandhowthemultipartitemsareclassified.Someofthe
configurationsareexemplifiedonthefollowingpages.
MultipartMonographNotAnalyzed
Formultipartmonographsthatarenotanalyzed,thesearethepossibleapproaches:
x Acomprehensivedescription(i.e.,acollectedsetrecord)
x Sometimes,a505contentsnote
x Noanalyticdescriptions(i.e.,noanalyticrecords)
x CreationofSARisoptional
Example1:
5th International Symposium on
Plasma Chemistry
5th International Symposium on
Plasma Chemistry
Symposium Proceedings
Symposium Proceedings
Volume 1
Volume 2
Titlepageofv.1
Titlepageofv.2
Approach:Collectivedescriptionwithoutacontentsnote:
1112#$aInternationalSymposiumonPlasmaChemistry$n(5th:$d1981:$cEdinburgh,
Scotland)
24510$a5thInternationalSymposiumonPlasmaChemistry...
300##$a2volumes:$billustrations;$c21cm
PCCStandingCommitteeonTraining
Page15
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
Example2:
StudiesinMediterraneanArchaeology
Vol.LXXII
ͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲͲ
SurveyofRockͲCutChamber
TombsinCaria
PART1
SouthͲEasternCariaandthe
LycoͲCarianBorderland
ByPaavoRoos
Göteborg
P.Åströms
1985
Approach:Collectivedescriptionwithacontentsnote:
1001#$aRoos,Paavo.
24510$aSurveyofrockͲcutchambertombsinCaria/$cbyPaavoRoos.
264#1$aGöteberg:P.Åstroms,1985Ͳ
4901#$aStudiesinMediterraneanarcheology;$vvol.LXXII
5051#$apt.1.SouthͲeasternCariaandtheLycoͲCarianborderland.
830#0$aStudiesinMediterraneanarcheology;$vv.72.
PCCStandingCommitteeonTraining
Page16
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
MultipartMonographAnalyzedandClassedasaCollection
Formultipartmonographsthatareanalyzedandclassedasacollection,thesearethepossible
approaches:
x Comprehensivedescription(i.e.,acollectedsetrecord)
x 505contentsnote
x Analyticdescriptions(i.e.,analyticrecords)
x SARoptionalforPCC(unlesstheauthorizedaccesspointfortheseriesisrecordedin8XX)
Example:
HANDBOOKOF
CHEMICALNEUROANATOMY
Volume1:
MethodsinChemical
Neuroanatomy
Göteborg
P.Åströms
1985
Approach:Threerecords:SAR,Analyticdescription,Comprehensivedescription:
SAR:
130#0$aHandbookofchemicalneuroanatomy
642##$av.1$5DLC
644##$af$5DLC
646##$ac$5DLC
Analyticdescription:
24500$aMethodsinchemicalneuroanatomy...
4901#$aHandbookofchemicalneuroanatomy;$vvolume1
830#0$aHandbookofchemicalneuroanatomy;$vv.1.
Comprehensivedescription:
24500$aHandbookofchemicalneuroanatomy...
5051#$avolume1.Methodsinchemicalneuroanatomy.
PCCStandingCommitteeonTraining
Page17
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
MultipartMonographAnalyzedandClassedSeparately
Formultipartmonographsthatareanalyzedandclassedseparately,thesearethepossibleapproaches:
x Analyticdescriptions(i.e.,analyticrecords)
x SARoptionalforPCC(unlesstheauthorizedaccesspointfortheseriesisrecordedin8XX)
Example:
THESOLARSYSTEM
Volume4:
TheMysteriesofMars
ByKentJacobsson
[city
publisher]
[date]
Approach:Tworecords:SAR,Analyticdescription:
SAR:
130#0$aSolarsystem
642##$av.4$5DLC
644##$af$5DLC
646##$as$5DLC
Analyticdescription:
1001#$aJacobsson,Kent.
24514$aThemysteriesofMars...
4901#$aThesolarsystem;$vvolume4
830#0$aSolarsystem;$vv.4.
PCCStandingCommitteeonTraining
Page18
December2015
SeriesTrainingforPCCParticipants
Session10:MultipartMonographs
UpdatingtheCollectiveDescription
Ifthemultipartmonographisclassedasacollectionandacomprehensivebibliographicdescription(i.e.
acollectedsetrecord)exists,addand/orupdatethefollowinginformationonthecomprehensive
descriptionaslaterpartsarereceived:
x 020
x 246forchangesintitleproper
x 264$c–and008Dates
x 300$a
x 362ifyouhaveinformationaboutthebeginningdate
x 4XX/8XXsubfield$vifthemultipartmonographisinaseries
x 505
x 5XX/7XXforchangesintheresponsibleperson,family,orbody
Example:
24500$aFloraandfaunainthecentralUnitedStates/$cMidwesternBiologicalSociety.
2460#$iVolumes3Ͳ7havetitle:$aMidwesternfloraandfauna
264#1$aAmes,Iowa:$bRLPPublishingCompany,$c1999Ͳ2004.
300##$a7volumes:$billustrations;$c29cm.
4901#$aMidwesternbiologicalpublications;$vv.13Ͳ14,22,25Ͳ28
550##$aVolumes1Ͳ4issuedbytheMidwesternBiologicalSociety;volumes5Ͳ7bytheSociety
forMidwesternBiology.
5050#$a________________________
7102#$aMidwesternBiologicalSociety.
7102#$aSocietyforMidwesternBiology.
830#0$aMidwesternbiologicalpublications;$vv.13Ͳ14,22,25Ͳ28.
PCCStandingCommitteeonTraining
Page19
December2015
LAW ENFORCEMENT REQUEST FOR EMERGENCY DISCLOSURE OF ATLASSIAN
CUSTOMER INFORMATION
Please complete the form below in detail to assist Atlassian in evaluating whether to disclose
customer information pursuant to 18 U.S.C. § 2702(b)(8) and § 2702(c)(4) and send this form to
lawenforcement@atlassian.com.
Requesting Law Enforcement Agency
Agency Name
City/State/Province/Country
Phone Number
Requesting Officer
Officer Name
Title/Rank/Badge ID
Email Address
Phone Number
The undersigned law enforcement official hereby requests that Atlassian voluntarily disclose the
customer information requested below based upon the provisions of 18 U.S.C. § 2702.
Specifically, the undersigned hereby represents that there is an emergency involving danger of
death or serious physical injury to a person that requires disclosure without delay of information
relating to the emergency.
The undersigned law enforcement official provides the following information to assist Atlassian
in forming a good faith belief that disclosure of the customer information requested is warranted.
1. What is the nature of the emergency
involving death or serious physical injury?
2. Whose death or serious physical injury is
threatened?
3. What is the imminent nature of the
threat? Please provide information that
suggests there is a specific deadline before
which it is necessary to receive the
requested information and/or that suggests
there is a specific deadline on which the act
stated in response to Question 1 will occur
(e.g., tonight, tomorrow at noon).
4. What specific information are you
requesting from Atlassian? Please identify
the relevant Atlassian products and
accounts (by name, address, email address,
etc.).
5. Please explain how the information you
are requesting will assist in averting the
specified emergency.
ATTESTATION
The undersigned affirms that this request is
made solely as a result of an emergency
involving danger of death or serious physical
injury to a person; that this emergency
requires disclosure without delay of the
accounts (by name, address, email address,
etc.).
5. Please explain how the information you
are requesting will assist in averting the
specified emergency.
ATTESTATION
The undersigned affirms that this request is
made solely as a result of an emergency
involving danger of death or serious physical
injury to a person; that this emergency
requires disclosure without delay of the
information sought above; and that the
information sought relates to the emergency.
The undersigned affirms that the information
shall not be obtained, shared, or disseminated
for any unlawful or harmful purpose.
Signature of Requesting Officer
Date
Atlassian’s Technical and Organisa2onal Security Measures
Introduc2on
Security is an essen-al part of Atlassian’s offerings. This page describes Atlassian’s security program, cer-fica-ons, policies, and physical,
technical, organiza-onal and administra-ve controls and measures to protect Customer Data from unauthorized access, destruc-on, use,
modifica-on or disclosure (the “Security Measures“). The Security Measures are intended to be in line with the commonly-accepted
standards of similarly-situated soHware-as-a-service providers (“industry standard“), including NIST 800-53 controls.
Any capitalized terms used but not defined have the meanings set out in the Agreement or the Data Processing Addendum. Further
details on Atlassian’s security posture can be found in our Trust Center and Compliance Resource Center.
1.
Access Control
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for the appropriate
access control and protec-on of Customer Data, which include:
•
•
•
•
•
•
•
•
2.
Access management policy addressing access control standards, including the framework and the principles for user
provisioning.
Designated cri-cality -ers based on a Zero Trust Model architecture, including the requirements for mul--factor authen-ca-on
on higher--er services.
User provisioning for the access to Atlassian systems, applica-ons and infrastructure based on the relevant job role and on the
least privilege principle that is enforced through the authen-ca-on processes.
Strict role-based access controls for Atlassian staff, allowing access to Customer Data only on a need-to-know basis.
Segrega-on of du-es including but not limited to (i) access controls reviews, (ii) HR-applica-on managed security groups, and
(iii) workflow controls.
A prior approval of all user accounts by Atlassian’s management before gran-ng access to data, applica-ons, infrastructure, or
network components based on the data classifica-on level; regular review of access rights as required by relevant role.
Use of technical controls such as virtual private network (VPN) and mul--factor authen-ca-on (MFA) where relevant based on
informa-on classifica-on and Atlassian‘s Zero Trust Model architecture.
Centrally managed mobile device management (MDM) solu-on, including defined lockout periods and posture checks for
endpoints and mobile devices.
Awareness and Training
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for conduc-ng
appropriate trainings and security awareness ac-vi-es, which include:
•
•
•
•
•
•
•
3.
Extensive awareness training on security, privacy, and compliance topics for all employees at induc-on and annually, u-lizing
diverse formats (online, in-person, and pre-recorded sessions, phishing simula-ons).
Targeted role-specific training for employees with elevated privileges to address relevant risks and enhance their specific
knowledge base.
Maintaining of all training records in a designated learning management system.
An automated reminder for training deadlines, with a built-in escala-on process to respec-ve managers.
Con-nuous security awareness trainings (extending to contractors and partners), covering current threats and best security
prac-ces.
Secure coding trainings by security champions embedded within engineering teams.
Annual mandatory security trainings and events to reinforce security principles through different ac-vi-es, emphasizing the
collec-ve responsibility for security.
Audit and Accountability
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for proper audi-ng and
accountability purposes, which include:
•
•
•
•
Comprehensive logging standards as part of Atlassian's policy management framework, with annual reviews and senior
management approvals.
Secure forwarding and storage of relevant system logs to a centralized log plaaorm of the cloud infrastructure with read-only
access.
Monitoring of security audit logs to detect unusual ac-vity, with established processes for reviewing and addressing anomalies.
Regular updates to the logging scope of informa-on and system events for Cloud Products and related infrastructure in order
to address new features and changes.
1
•
4.
U-lizing -me sync services from relevant cloud service providers (e.g. AWS or MicrosoH Azure) for reliable -mekeeping across
all deployed instances.
Assessment, Authorisation and Monitoring
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for consistent system
monitoring and security assessments, which include:
•
•
•
•
•
•
•
•
5.
Extensive audit and assurance policies with annual reviews and updates.
A centralized internal policy program categorising the global policies into different domains including annual review, and senior
management approval of the program.
Audit management encompassing the planning, risk analysis, security control assessment, conclusion, remedia-on schedules,
and review of past audit reports.
Internal and independent external audits conduc-ng annual evalua-ons of legal and contractual requirements, as well as
effec-veness of controls and processes to validate compliance.
Ongoing verifica-on of compliance against relevant standards and regula-ons, e.g. ISO 27001 or SOC 2.
Systema-cally addressing any nonconformi-es found through audit findings taking into account the root-cause analysis,
severity ra-ng, and correc-ve ac-ons, all documented and tracked me-culously.
Annual penetra-on tes-ng on Products and proac-ve bug bounty programs for the detec-on and mi-ga-on of vulnerabili-es.
Con-nuous vulnerability scanning, with iden-fied vulnerabili-es remediated in line with Atlassian's policy.
Configuration Management
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for appropriate
configura-on management, which include:
•
•
•
•
•
•
•
•
•
6.
Change management policies covering the risk management for all internal and external asset changes, reviewed annually.
Standard procedures for change management applicable to encryp-on and cryptography for the secure handling of data (e.g.
encryp-on keys) according to its security classifica-on.
A centralized internal policy program categorising the global policies into different domains including annual review, and senior
management approval of the program.
Stringent policies encompassing (i) encryp-on, (ii) cryptography, (iii) endpoint management, and (iv) asset tracking inline with
industry standards.
Established baselines and standards for change control that require tes-ng documenta-on prior to implementa-on and
authorized approval.
A peer review and green build process requiring mul-ple reviews and successful tes-ng for produc-on code and infrastructure
changes.
A strict post-implementa-on tes-ng and approval process for emergency changes to the code.
Comprehensive automated system supplemented by an Intrusion Detec-on System (IDS), managing and protec-ng against
unauthorized changes.
Me-culous cataloguing and tracking of all physical and logical assets with annual reviews ensuring up-to-date asset
management.
Contingency Planning
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for appropriate
con-ngency planning for business con-nuity and disaster recovery purposes, which include:
•
•
•
•
•
•
•
•
A skilled workforce and robust IT infrastructure, including telecommunica-ons and technology essen-al for Product delivery.
Business con-nuity and disaster recovery plans (“BCDR Plans”) including defined recovery -me objec-ves (RTOs) and recovery
point objec-ves (RPOs).
Business con-nuity plans encompassing data storage and con-nuity of use, reasonably designed to prevent interrup-on to
access and u-liza-on.
Geographic diversity as a result of our global workforce and cloud infrastructure.
Reinforcing business opera-ons through resilience controls, such as daily backups, annual restora-on tes-ng, and alterna-ve
cloud infrastructure storage sites.
A resilience framework and procedures for response and remedia-on of cyber events to maintain business con-nuity.
Quarterly disaster recovery tests and exercises to enhance the response strategies, with post-test analyses for con-nuous
improvement in line with the applicable BCDR Plans.
Con-nuous capacity management across Products, with internal monitoring and adjustments to maintain service availability
and processing capacity, for example (distributed) denial-of-service akack (DDoS) mi-ga-on for Cloud Products and related
infrastructure.
2
•
•
7.
A centralized internal policy program for annual reviews and updates of all global policies related to business con-nuity.
Robust backup protocols, including (i) data encryp-on, (ii) redundancy across data centers, and (iii) regular tes-ng to bolster
con-ngency planning.
Identification and Authentication
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for appropriate
iden-fica-on and authen-ca-on purposes which include:
•
•
•
•
•
8.
Employee iden-fica-on uniquely through ac-ve directory, u-lising single sign-on (SSO) for applica-on access.
U-lising of MFA for secure access, specifically for VPN and applica-on launch via SSO based on Atlassian’s Zero Trust Model
architecture.
Password policies following the NIST 800-63B guidelines, focusing on the security aspects of password crea-on and
management.
Ensuring the security of stored creden-als using advanced encryp-on methods, e.g. password and secret management systems.
Documented approvals, regular reviews of users and accounts, and automa-c syncs between the relevant iden-ty system and
HR systems to maintain the integrity and accuracy of iden-fica-on data.
Security Incident Response
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for appropriate Security
Incident response purposes, which include:
•
•
•
•
•
•
•
•
•
9.
Security Incident response plans emphasizing preparedness, containment, eradica-on and recovery, as well as focus on data
protec-on and other regulatory requirements.
Dedicated cross-func-onal teams handling Security Incidents, ensuring effec-ve communica-on and collabora-on, including
well-defined processes for triaging security events.
Regular tes-ng of response plans with established metrics to track and improve Security Incident management effec-veness.
Annual reviews of company-wide incident response plans and policies to reflect and share current best prac-ces across the
company.
Post-incident review (PIR) with root cause analysis conducted for high-severity Security Incidents, focusing on systemic
improvements and learning.
Incident response procedures and plans embedded in cri-cal business processes to minimize down-me and security risks.
Published system availability informa-on to aid in Security Incident handling and repor-ng at hkps://status.atlassian.com/, and
hkps://www.loomstatus.com/, as applicable.
The ability for Customer to report incidents, vulnerabili-es, bugs, and issues, ensuring prompt aken-on to concerns related to
system defects, availability, security, and confiden-ality.
Commitment to Customer no-fica-on of the Security Incident without undue delay under Atlassian’s Data Processing
Addendum, including the obliga-on to assist the Customer with necessary informa-on for compliance with Applicable Data
Protec-on Laws.
Maintenance
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for con-nued
effec-veness of its Cloud Products, which include:
•
•
•
10.
Regular tes-ng of BCDR Plans with quarterly evalua-ons, validated by external auditors.
Real--me monitoring of the availability of mul-ple regions with performing of regular tests for infrastructure availability and
reliability.
Measures outlined in Sec-on 4 (Assessment, Authorisa-on and Monitoring), Sec-on 6 (Con-ngency Planning) and Sec-on 18
(System and Communica-ons Protec-on).
Media Protection
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces to ensure the
protec-on of media (internal and external), which include:
•
•
•
Using reliable 3rd party services (e.g. MicrosoH Azure or AWS) to operate the physical infrastructure for processing Customer
Data as a Sub-processor.
Sani-za-on and degaussing of used equipment by the 3rd party cloud service providers, including hard drives with Customer
Data in line with industry standards (e.g. ISO 27001).
Full disk encryp-on using industry standards (e.g. AES-256) employed for data drives on servers and databases storing Customer
Data, and on endpoint devices.
3
•
•
11.
Internal bring your own device (BYOD) policy ensuring access to Customer Data is only possible via secure and compliant
devices; restric-ng the access with technical controls (e.g. VPN) for all devices following Atlassian’s Zero Trust Model
architecture.
Unakended workspaces are required to have no visible confiden-al data, aligning with the secure workplace guidance.
Physical and Environmental Protection
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for the physical and
environmental protec-on of Customer Data, which include:
•
•
•
•
•
•
12.
A safe and secure working environment with controls implemented globally at Atlassian's offices.
Employing badge readers, camera surveillance, and -me-specific access restric-ons for enhanced security.
Implemen-ng and maintaining access logs at office buildings for inves-ga-ve purposes.
Mul-ple compliance cer-fica-ons and robust physical security measures, including biometric iden-ty verifica-on and onpremise security, implemented by 3rd party data center providers.
Controlled access points and advanced surveillance systems as well as protec-ve measures for power and telecommunica-on
cables, alongside with environmental control systems, implemented by 3rd party data center providers.
Posi-oning cri-cal equipment in low-risk environmental areas for added safety (both by Atlassian and its 3rd party data center
providers).
Planning
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for appropriate
planning of business opera-ons, which include:
•
•
•
•
13.
Ac-ve monitoring and documenta-on by legal and compliance teams on regulatory obliga-ons.
A detailed system security plan with comprehensive documenta-on on system boundaries and product descrip-ons.
Communica-on to internal users and customers about significant changes to key products and services.
Periodic reviews and updates of the security management program.
Program Management
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for appropriate
program management, which include:
•
•
•
•
•
•
•
•
•
•
14.
Suppor-ng the security management program at the execu-ve level, encompassing all security-related policies and prac-ces.
Documented informa-on security policies, including (i) defined roles, (ii) risk mi-ga-on, and (iii) service provider security
management program.
Periodic risk assessments of systems processing Customer Data, with prompt reviews of Security Incidents for correc-ve ac-on.
Formal security controls framework aligning to standards such as SOC 2, ISO27001, and NIST 800-53.
Processes for iden-fying and quan-fying security risks, with mi-ga-on plans approved by the Chief Trust Officer and regular
tracking of implementa-on.
Comprehensive and diverse approach to security tes-ng to cover a wide range of poten-al akack vectors.
Regular review, tes-ng and upda-ng of the security management program (annually, at a minimum).
Development program for security staff with regular trainings; organiza-onal chart that delinea-ng roles and responsibili-es.
Serng and review of strategic opera-onal objec-ves by the execu-ve management.
Annual review of the Enterprise Risk Management (ERM) framework, including the risk management policy, risk assessments,
and fraud risk assessments, by the Head of Risk and Compliance.
Personnel Security
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls and prac-ces for the security of all
Atlassian’s employees who have access to Customer Data, which include:
•
•
•
•
•
Pre-hire background checks, including criminal record inquiries, especially thorough for senior execu-ve and accoun-ng roles
to the extent permissible under applicable local laws.
An extensive onboarding process including confiden-ality agreements, employment contracts, and acknowledgement of
various policies and codes of conduct.
Global and local employment policies, maintained and reviewed annually.
Processes for role changes and termina-ons including automa-c de-provisioning and checklists for employee exits, with
managerial approval required for re-provisioning the access.
Ongoing security and compliance training for employees, with targeted training for specific roles and the presence of security
champions in teams.
4
•
•
15.
Hos-ng of annual security awareness month to reinforce security educa-on and celebrate achievements in maintaining
organiza-onal security.
Established disciplinary processes to manage viola-ons of Atlassian's policies.
Personal Data Processing and Transparency
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for the compliance of
personal data processing in line with Applicable Data Protec-on Laws, which include:
•
•
•
•
•
•
•
•
16.
A global privacy compliance program for reviewing and adap-ng to data protec-on laws including necessary safeguards and
processes.
Maintaining an internal personal data processing policy with clear defini-ons of personal data categories, processing purposes,
and processing principles.
Detailed standards for processing of various categories of personal data covering the topics such as processing principles,
applicable legal basis, reten-on, destruc-on etc.
An established method to create pseudonymised data sets using industry standard prac-ces and appropriate technical and
organisa-onal measures governing the systems capable of remapping pseudonymous iden-fiers.
Transparent privacy policies for its users and customers, as well as internal guidelines for employees.
Comprehensive compliance documenta-on, including but not limited to (i) processing ac-vi-es, (ii) privacy impact
assessments, (iii) transfer impact assessments, (iv) consents, and (v) data processing agreements with customers and vendors.
Secure development prac-ces across all development lifecycle stages, focusing on security and data protec-on from the ini-al
design phase.
Respec-ng the individual’s rights to access, correct, and delete their personal data in line with relevant data protec-on laws.
Risk Assessment
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for a robust Informa-on
Security Management System, which include:
•
•
•
•
•
17.
A comprehensive risk management program for iden-fying, assessing, and addressing various risks to support informed risk
management decisions.
A policy program aligning company-wide policies with ISO 27001 and other relevant standards to mi-gate associated risks.
Con-nuous security tes-ng, including (i) penetra-on tests, (ii) bug boun-es, and (iii) proac-ve threat mi-ga-on.
Processes and metrics for repor-ng vulnerability management ac-vi-es.
Thorough security evalua-ons, including independent external and internal audits.
System and Services Acquisition
Atlassian has implemented and will maintain a structured, security-centric methodology for the system development, maintenance,
and change management, which include:
•
•
•
•
•
•
•
•
•
18.
An agile secure soHware development life cycle for the adaptability, and efficiency, as well as thorough review and
documenta-on of system and infrastructure changes.
Secure, standardized applica-on deployment with automated processes for system configura-on changes and deployment.
Defined development process with peer-reviewed pull requests and mandatory automated tests prior to merging.
Segregated responsibili-es for change management among designated employees.
Emergency change processes, including "break glass" procedures, ensuring readiness for rapid response during cri-cal
incidents.
Robust compliance serngs in Atlassian’s source code and deployment systems (e.g. Bitbucket Cloud) preven-ng unauthorized
altera-ons.
Clear documenta-on and monitoring of all configura-on changes, with automa-c alerts for non-compliance or altera-ons in
peer review enforcement.
Strict controls over modifica-ons to vendor soHware.
Regular scanning and updates of third-party or open-source libraries as well as ongoing scanning of the code base.
System and Communications Protection
Atlassian has implemented and will maintain a comprehensive set of formal policies, controls, and prac-ces for system and
communica-on protec-on which include:
•
•
Cryptographic mechanisms to safeguard sensi-ve informa-on stored and transmiked over networks, including public internet,
using reliable and secure encryp-on technologies.
Encryp-on of Customer Data at rest and in transit using TLS 1.2+ with Perfect Forward Secrecy (PFS) across public networks.
5
•
•
•
•
•
•
19.
Zone restric-ons and environment separa-on limi-ng connec-vity between produc-on and non-produc-on environments.
Con-nuous management of worksta-on assets including (i) security patch deployment, (ii) password protec-on, (iii) screen
locks, and (iv) drive encryp-on through asset management soHware.
Restric-ng access to only known and compliant devices enrolled in the MDM plaaorm, adhering to the principles of Zero Trust
Model architecture.
Maintaining firewalls at corporate edges for both plaaorm and non-plaaorm hosted devices for addi-onal layers of security.
Network and host defense including opera-ng system hardening, network segmenta-on, and data loss preven-on
technologies.
Established measures to ensure Customer Data is kept logically segregated from other customers' data.
System and Information Integrity
Atlassian has implemented and will maintain formally established policies and prac-ces that include the following controls and
safeguards relevant for system and informa-on integrity, in par-cular:
•
•
•
•
•
•
•
20.
Ongoing vulnerability scans to ensure prompt iden-fica-on and remedia-on of vulnerabili-es.
Adherence to stringent data disposal protocols in line with applicable laws, reasonably ensuring that data from storage media
is irrecoverable post-sani-za-on.
Strict policies to prevent the use of produc-on data in non-produc-on environments, ensuring the data integrity and
segrega-on.
Centrally managed, read-only system logs; monitoring for Security Incidents; reten-on policies aligned with security best
prac-ces.
Managing endpoint compa-bility with systems and applica-ons, enhancing network security and reliability.
Deploying an--malware strategies on the relevant infrastructure and Atlassian devices for robust protec-on against malware
threats with regular updates to malware protec-on policies and detec-on tools.
Unique iden-fiers and token-based access control ensure logical isola-on and secure, limited access to Customer Data.
Supply Chain Risk Management
Atlassian has implemented and will maintain formally established policies and prac-ces for supply chain risk management, which
include:
•
•
•
•
•
•
•
A formal framework for managing vendor rela-onships, aligning the security, availability, and confiden-ality standards of
suppliers throughout their lifecycle.
A robust third party risk management (TPRM) assessment process including risk assessments, due diligence, contract
management, and ongoing monitoring of all third par-es
Dedicated teams, including legal, procurement, security, and risk departments for the review of contracts, SLAs, and security
measures to manage risks related to security and data confiden-ality.
Func-onal risk assessments for suppliers before onboarding and periodically, based on risk levels, with revisions during policy
renewals or significant rela-onship changes.
An inventory of all suppliers detailing ownership and risk levels associated with the services provided to Atlassian.
Yearly review of audit reports (e.g. SOC 2) and regular reviews of IT governance policies and security assessments of supply
chain to ensure controls are both, appropriate and effec-vely compliant.
Measures to secure third-party endpoints, focusing on compliance monitoring and selec-ve restric-ons based on the mobile
& bring your own device policy.
6
Atlassian Data Processing Addendum
Effec%ve star%ng: the earlier of (i) October 6, 2024 and (ii) the date the Atlassian Intelligence and Rovo Product-Specific Terms are effec%ve.
This Data Processing Addendum (“DPA”) supplements the Atlassian Customer Agreement, or other agreement in place between Customer
and Atlassian covering Customer’s use of Atlassian’s Products and related Support and Advisory Services (the “Agreement”). Unless otherwise
defined in this DPA or in the Agreement, all capitalized terms used in this DPA will have the meanings given to them in SecGon 9 of this DPA.
1.
Scope and Term.
1.1. Roles of the ParGes.
(a)
Customer Personal Data. Atlassian will Process Customer Personal Data as Customer’s Processor in accordance
with Customer’s instrucGons as outlined in SecGon 2.1 (Customer InstrucGons).
(b)
(c)
(d)
Atlassian Account Data. Atlassian will Process Atlassian Account Data as a Controller for the following purposes:
(i) to provide and improve the Products; (ii) to manage the Customer relaGonship (communicaGng with Customer
and Users in accordance with their account preferences, responding to Customer inquiries and providing technical
support, etc.), (iii) to facilitate security, fraud prevenGon, performance monitoring, business conGnuity and
disaster recovery; and (iv) to carry out core business funcGons such as accounGng, billing, and filing taxes.
Atlassian Usage Data. Atlassian will Process Atlassian Usage Data as a Controller for the following purposes: (i) to
provide, opGmize, secure, and maintain the Products; (ii) to opGmize user experience; and (iii) to inform Atlassian’s
business strategy.
DescripGon of the Processing. Details regarding the Processing of Personal Data by Atlassian are stated in Schedule
1 (DescripGon of Processing).
1.2. Term of the DPA. The term of this DPA coincides with the term of the Agreement and terminates upon expiraGon or earlier
terminaGon of the Agreement (or, if later, the date on which Atlassian ceases all Processing of Customer Personal Data).
1.3. Order of Precedence. If there is any conflict or inconsistency among the following documents, the order of precedence is: (1)
the applicable terms stated in Schedule 2 (Region-Specific Terms including any transfer provisions); (2) the main body of this
DPA; and (3) the Agreement.
2.
Processing of Personal Data.
2.1. Customer InstrucGons. Atlassian must Process Customer Personal Data in accordance with the documented lawful instrucGons
of Customer as stated in the Agreement (including this DPA) and respecGve Orders, as necessary to (i) provide the Products
and related Support and Advisory Services to Customer and enable the use of various features and funcGonaliGes in
accordance with the DocumentaGon (including as directed by Users through the Cloud Products), (ii) invesGgate Security
Incidents and enforce the Acceptable Use Policy (e.g. enforce the prohibiGon on illegal content such as child sexual abuse
material), or (iii) comply with its legal obligaGons. Atlassian will noGfy Customer if it becomes aware, or reasonably believes,
that Customer’s instrucGons violate Applicable Data ProtecGon Law.
2.2. ConfidenGality. Atlassian must treat Customer Personal Data as Customer’s ConfidenGal InformaGon under the Agreement.
Atlassian must ensure personnel authorized to Process Personal Data are bound by wriVen or statutory obligaGons of
confidenGality.
3.
Security.
3.1. Security Measures. Atlassian has implemented and will maintain appropriate technical and organizaGonal measures designed
to protect the security, confidenGality, integrity and availability of Customer Data and protect against Security Incidents.
Customer is responsible for configuring the Products and using features and funcGonaliGes made available by Atlassian to
maintain appropriate security in light of the nature of Customer Data. Atlassian’s current technical and organizaGonal
measures are described here. Customer acknowledges that the Security Measures are subject to technical progress and
development and that Atlassian may update or modify the Security Measures from Gme to Gme, provided that such updates
and modificaGons do not materially decrease the overall security of the Cloud Products during a SubscripGon Term.
3.2. Security Incidents. Atlassian must noGfy Customer without undue delay and, where feasible, no later than seventy-two (72)
hours a[er becoming aware of a Security Incident. Atlassian must make reasonable efforts to idenGfy the cause of the Security
Incident, miGgate the effects and remediate the cause to the extent within Atlassian’s reasonable control. Upon Customer’s
request and taking into account the nature of the Processing and the informaGon available to Atlassian, Atlassian must assist
Customer by providing informaGon reasonably necessary for Customer to meet its Security Incident noGficaGon obligaGons
under Applicable Data ProtecGon Law. Atlassian’s noGficaGon of a Security Incident is not an acknowledgment by Atlassian of
its fault or liability.
4.
Sub-processing.
1
Atlassian Data Processing Addendum
October 2024 Version
4.1. General AuthorizaGon. By entering into this DPA, Customer provides general authorizaGon for Atlassian to engage Subprocessors to Process Customer Personal Data. Atlassian must: (i) enter into a wriVen agreement with each Sub-processor
imposing data protecGon terms that require the Sub-processor to protect Customer Personal Data to the standard required
by Applicable Data ProtecGon Law and to the same standard provided by this DPA; and (ii) remain liable to Customer if such
Sub-processor fails to fulfill its data protecGon obligaGons with regard to the relevant Processing acGviGes under the
Agreement.
4.2. NoGce of New Sub-processors. Atlassian maintains an up-to-date list of its Sub-processors here, which contains a mechanism
for Customer to subscribe to noGficaGons of new Sub-processors. Atlassian will provide such noGce, to those emails
subscribed, at least thirty (30) days before allowing any new Sub-processor to Process Customer Personal Data (the “Subprocessor No@ce Period”).
4.3. ObjecGon to New Sub-processors. Customer may object to Atlassian’s appointment of a new Sub-processor during the Subprocessor NoGce Period. If Customer objects, Customer, as its sole and exclusive remedy, may terminate the applicable Order
for the affected Cloud Product and related Support and Advisory Services in accordance with SecGon 12.2 (TerminaGon for
Convenience) of the Agreement.
5.
Assistance and Coopera@on Obliga@ons.
5.1. Data Subject Rights. Taking into account the nature of the Processing, Atlassian must provide reasonable and Gmely assistance
to Customer to enable Customer to respond to requests for exercising a data subject’s rights (including rights of access,
recGficaGon, erasure, restricGon, objecGon, and data portability) in respect to Customer Personal Data.
5.2. CooperaGon ObligaGons. Upon Customer’s reasonable request, and taking into account the nature of the Processing, Atlassian
will provide reasonable assistance to Customer in fulfilling Customer’s obligaGons under Applicable Data ProtecGon Law
(including data protecGon impact assessments and consultaGons with regulatory authoriGes), provided that Customer cannot
reasonably fulfill such obligaGons independently with help of available DocumentaGon.
6.
5.3. Third Party Requests. Unless prohibited by Law, Atlassian will promptly noGfy Customer of any valid, enforceable subpoena,
warrant, or court order from law enforcement or public authoriGes compelling Atlassian to disclose Customer Personal Data.
Atlassian will follow its law enforcement guidelines in responding to such requests. In the event that Atlassian receives an
inquiry or a request for informaGon from any other third party (such as a regulator or data subject) concerning the Processing
of Customer Personal Data, Atlassian will redirect such inquiries to Customer, and will not provide any informaGon unless
required to do so under applicable Law.
Dele@on and Return of Customer Personal Data.
6.1. During SubscripGon Term. During the SubscripGon Term, Customer and its Users may, through the features of the Cloud
Products, access, retrieve or delete Customer Personal Data.
7.
6.2. Post TerminaGon. Following expiraGon or terminaGon of the Agreement, Atlassian must, in accordance with the
DocumentaGon, delete all Customer Personal Data. Notwithstanding the foregoing, Atlassian may retain Customer Personal
Data (i) as required by Applicable Data ProtecGon Law or (ii) in accordance with its standard backup or record retenGon
policies, provided that, in either case, Atlassian will maintain the confidenGality of, and otherwise comply with the applicable
provisions of this DPA with respect to retained Customer Personal Data and not further Process it except as required by
Applicable Data ProtecGon Law.
Audit.
7.1. Audit Reports. Atlassian is regularly audited by independent third-party auditors and/or internal auditors, including as
described here. Upon request, and on the condiGon that Customer has entered into an applicable non-disclosure agreement
with Atlassian, Atlassian will supply a summary copy of relevant audit report(s) (“Report”) to Customer, so Customer can verify
Atlassian’s compliance with the audit standards against which it has been assessed, and this DPA. If Customer cannot
reasonably verify Atlassian’s compliance with the terms of this DPA, Atlassian will provide wriVen responses (on a confidenGal
basis) to all reasonable requests for informaGon made by Customer related to its Processing of Customer Personal Data,
provided that such right may be exercised no more than once every twelve (12) months.
7.2. On-site Audits. Only to the extent Customer cannot reasonably saGsfy Atlassian’s compliance with this DPA through the
exercise of its rights under SecGon 7.1 above, or where required by Applicable Data ProtecGon Law or a regulatory authority,
Customer, or its authorized representaGves, may, at Customer’s expense, conduct audits (including inspecGons) during the
term of the Agreement to assess Atlassian’s compliance with the terms of this DPA. Any audit must (i) be conducted during
Atlassian’s regular business hours, with reasonable advance wriVen noGce of at least sixty (60) calendar days (unless
Applicable Data ProtecGon Law or a regulatory authority requires a shorter noGce period); (ii) be subject to reasonable
confidenGality controls obligaGng Customer (and its authorized representaGves) to keep confidenGal any informaGon
disclosed that, by its nature, should be confidenGal; (iii) occur no more than once every twelve (12) months; and (iv) restrict
its findings to only informaGon relevant to Customer.
2
Atlassian Data Processing Addendum
October 2024 Version
8.
Interna@onal Provisions. To the extent Atlassian Processes Personal Data protected by Applicable Data ProtecGon Laws in one of the
regions listed in Schedule 2 (Region-Specific Terms), the terms specified for the applicable regions will also apply, including the
provisions relevant for internaGonal transfers of Personal Data (directly or via onward transfer).
9.
Defini@ons.
“Applicable Data Protec@on Law” means all Laws applicable to the Processing of Personal Data under the Agreement.
“Atlassian Account Data” means Personal Data relaGng to Customer’s relaGonship with Atlassian, including: (i) Users’ account
informaGon (e.g. name, email address, or Atlassian’s account ID (AAID)); (ii) billing and contact informaGon of individual(s) associated
with Customer’s Atlassian account (e.g. billing address, email address, or name); (iii) Users’ device and connecGon informaGon (e.g. IP
address); and (iv) content/descripGon of technical support requests (excluding aVachments) alongside with the Support EnGtlement
Number (SEN).
“Atlassian Usage Data” means Personal Data relaGng to or obtained in connecGon with the use, performance, operaGon, support or
use of the Products, including via their connecGon to Third-Party Products. Atlassian Usage Data may include event name (i.e. what
acGon Users performed), event Gmestamps, browser informaGon, diagnosGc data, data types, file sizes, and similar informaGon
associated with data from the Products and Third-Party Products that Customer connects to the Products. For clarity, Atlassian Usage
Data does not include Customer Personal Data.
“Controller” means the natural or legal person, public authority, agency, or other body which, alone or jointly with others, determines
the purposes and means of the Processing of Personal Data.
“Customer Personal Data'' means Personal Data contained in Customer Data and/or Customer Materials that Atlassian Processes under
the Agreement solely on behalf of Customer. For clarity, Customer Personal Data includes any Personal Data included in the aVachments
provided by Customer or its Users in any technical support requests.
“Personal Data” means informaGon about an idenGfied or idenGfiable natural person, or which otherwise consGtutes “personal data”,
“personal informaGon”, “personally idenGfiable informaGon” or similar terms as defined in Applicable Data ProtecGon Law.
“Processing” (and “Process”) means any operaGon or set of operaGons which is performed on Personal Data or on sets of Personal Data,
whether or not by automated means, such as collecGon, recording, organizaGon, structuring, storage, adaptaGon or alteraGon, retrieval,
consultaGon, use, disclosure by transmission, disseminaGon or otherwise making available, alignment or combinaGon, restricGon,
erasure, or destrucGon.
“Processor” means the enGty which Processes Personal Data on behalf of the Controller.
“Security Incident'' means any breach of security leading to the accidental or unlawful destrucGon, loss, alteraGon, unauthorized
disclosure of, or access to Customer Data Processed by Atlassian and/or its Sub-processors.
“Sub-processor” means any third party (inc. Atlassian Affiliates) engaged by Atlassian to Process Customer Personal Data.
3
Atlassian Data Processing Addendum
October 2024 Version
Schedule 1
Descrip@on of Processing
1.
Categories of data subjects whose Personal Data is Processed: Customer and its Users.
2.
Categories of Personal Data Processed: Atlassian Account Data, Atlassian Usage Data, and Customer Personal Data.
3.
Sensi@ve data transferred: Atlassian Account Data and Atlassian Usage Data do not contain data (i) revealing racial or ethnic origin,
poliGcal opinions, religious or philosophical beliefs, or trade union membership, (ii) geneGc data, biometric data Processed for the
purposes of uniquely idenGfying a natural person, data concerning health, or data concerning a natural person's sex life or sexual
orientaGon, or (iii) relaGng to criminal convicGons and offences (altogether “Sensi@ve Data”). Subject to SecGon 6.3 of the Agreement
(SensiGve Health InformaGon and HIPAA), Customer or its Users may upload content to the Cloud Products which may include
SensiGve Data, the extent of which is determined and controlled solely by Customer.
4.
The frequency of the transfer: ConGnuous.
5.
Nature of the Processing: Atlassian will Process Personal Data in order to provide the Products and related Support and Advisory
Services in accordance with the Agreement, including this DPA. AddiGonal informaGon regarding the nature of the Processing
(including transfer) is described in respecGve Orders for relevant Products and DocumentaGon referring to technical capabiliGes and
features, including but not limited to collecGon, structuring, storage, transmission, or otherwise making available of Personal Data by
automated means.
6.
Purpose(s) of the Processing:
6.1. Customer Personal Data: Atlassian will Process Customer Personal Data as Processor in accordance with Customer’s
instrucGons as set out in SecGon 2.1 (Customer InstrucGons).
6.2. Atlassian Account Data and Atlassian Usage Data: Atlassian will Process Atlassian Account Data and Atlassian Usage Data for
the limited and specified purposes outlined in SecGon 1.1 (Roles of the ParGes).
7.
8.
Dura@on of Processing:
7.1. Customer Personal Data: Atlassian will Process Customer Personal Data for the term of the Agreement as outlined in SecGon
6 (DeleGon and Return of Customer Personal Data).
7.2. Atlassian Account Data and Atlassian Usage Data: Atlassian will Process Atlassian Account Data and Atlassian Usage Data only
as long as required (a) to provide Products and related Support and Advisory Services to Customer in accordance with the
Agreement; (b) for Atlassian’s legiGmate business purposes outlined in SecGon 1.1 (Roles of the ParGes); or (c) by applicable
Law(s).
Transfers to Sub-processors: Atlassian will transfer Customer Personal Data to Sub-processors as permiVed in SecGon 4
(Subprocessing).
4
Atlassian Data Processing Addendum
October 2024 Version
Schedule 2
Region-Specific Terms
Unless otherwise defined in this DPA or in the Agreement, all capitalized terms used in this Schedule will have the meanings given to them in
SecGon 4 of this Schedule.
1.
Europe, United Kingdom and Switzerland.
1.1. Customer InstrucGons. In addiGon to SecGon 2.1 (Customer InstrucGons) of the DPA above, Atlassian will Process Customer
Personal Data only on documented instrucGons from Customer, including with regard to transfers of such Customer Personal
Data to a third country or an internaGonal organisaGon, unless required to do so by Applicable Data ProtecGon Law to which
Atlassian is subject; in such a case, Atlassian shall inform Customer of that legal requirement before Processing, unless that
law prohibits such informaGon on important grounds of public interest. Atlassian will promptly inform Customer if it becomes
aware that Customer's Processing instrucGons infringe Applicable Data ProtecGon Law.
1.2. European Transfers. Where Personal Data protected by the EU Data ProtecGon Law is transferred, either directly or via onward
transfer, to a country outside of Europe that is not subject to an adequacy decision, the following applies:
(a)
The EU SCCs are hereby incorporated into this DPA by reference as follows:
(i)
Customer is the “data exporter” and Atlassian is the “data importer”.
(ii)
Module One (Controller to Controller) applies where Atlassian is Processing Atlassian Account Data or
Atlassian Usage Data.
(iii)
Module Two (Controller to Processor) applies where Customer is a Controller of Customer Personal Data
and Atlassian is Processing Customer Personal data as a Processor.
Module Three (Processor to Processor) applies where Customer is a Processor of Customer Personal Data
and Atlassian is Processing Customer Personal Data as another Processor.
(iv)
(v)
(b)
By entering into this DPA, each party is deemed to have signed the EU SCCs as of the commencement date
of the Agreement.
For each Module, where applicable:
(i)
In Clause 7, the opGonal docking clause does not apply.
(ii)
(iii)
In Clause 9, OpGon 2 applies, and the Gme period for prior noGce of Sub-processor changes is stated in
SecGon 4 (Subprocessing) of this DPA.
In Clause 11, the opGonal language does not apply.
(iv)
In Clause 17, OpGon 1 applies, and the EU SCCs are governed by Irish law.
(v)
In Clause 18(b), disputes will be resolved before the courts of Ireland.
(vi)
The Appendix of EU SCCs is populated as follows:
• The informaGon required for Annex I(A) is located in the Agreement and/or relevant Orders.
•
The informaGon required for Annex I(B) is located in Schedule 1 (DescripGon of Processing) of this
DPA.
•
The competent supervisory authority in Annex I(C) will be determined in accordance with the
Applicable Data ProtecGon Law; and
• The informaGon required for Annex II is located here.
1.3. Swiss Transfers. Where Personal Data protected by the Swiss FADP is transferred, either directly or via onward transfer, to any
other country that is not subject to an adequacy decision, the EU SCCs apply as stated in in SecGon 1.2 (European Transfers)
above with the following modificaGons:
(a)
All references in the EU SCCs to “RegulaGon (EU) 2016/679” will be interpreted as references to the Swiss FADP,
and references to specific ArGcles of “RegulaGon (EU) 2016/679” will be replaced with the equivalent arGcle or
secGon of the Swiss FADP; all references to the EU Data ProtecGon Law in this DPA will be interpreted as references
to the FADP.
(b)
In Clause 13, the competent supervisory authority is the Swiss Federal Data ProtecGon and InformaGon
Commissioner.
(c)
In Clause 17, the EU SCCs are governed by the laws of Switzerland.
(d)
In Clause 18(b), disputes will be resolved before the courts of Switzerland.
(e)
All references to Member State will be interpreted to include Switzerland and Data Subjects in Switzerland are not
excluded from enforcing their rights in their place of habitual residence in accordance with Clause 18(c).
5
Atlassian Data Processing Addendum
October 2024 Version
1.4. United Kingdom Transfers. Where Personal Data protected by the UK Data ProtecGon Law is transferred, either directly or via
onward transfer, to a country outside of the United Kingdom that is not subject to an adequacy decision, the following applies:
(a)
The EU SCCs apply as set forth in SecGon 1.2 (European Transfers) above with the following modificaGons:
(i)
Each party shall be deemed to have signed the UK Addendum.
(ii)
(b)
(iii)
For Table 1 of the UK Addendum, the parGes’ key contact informaGon is located in the Agreement and/or
relevant Orders.
For Table 2 of the UK Addendum, the relevant informaGon about the version of the EU SCCs, modules, and
selected clauses which this UK Addendum is appended to is located above in SecGon 1.2 (European
Transfers) of this Schedule.
(iv)
For Table 3 of the UK Addendum:
•
•
The informaGon required for Annex 1A is located in the Agreement and/or relevant Orders.
The InformaGon required for Annex 1B is located in Schedule 1 (DescripGon of Processing) of this
DPA.
•
The informaGon required for Annex II is located here; and
• The informaGon required for Annex III is located in SecGon 4 (Sub-processing) of this DPA.
In Table 4 of the UK Addendum, both the data importer and data exporter may end the UK Addendum.
1.5. Data Privacy Framework. Atlassian parGcipates in and cerGfies compliance with the Data Privacy Framework. As required by
the Data Privacy Framework, Atlassian (i) provides at least the same level of privacy protecGon as is required by the Data
Privacy Framework Principles; (ii) will noGfy Customer if Atlassian makes a determinaGon it can no longer meet its obligaGon
to provide the same level of protecGon as is required by the Data Privacy Framework Principles, and (iii) will, upon wriVen
noGce, take reasonable and appropriate steps to remediate any unauthorized Processing of Personal Data.
2.
United States of America. The following terms apply where Atlassian Processes Personal Data subject to the US State Privacy Laws:
2.1. To the extent Customer Personal Data includes personal informaGon protected under US State Privacy Laws that Atlassian
Processes as a Service Provider or Processor, on behalf of Customer, Atlassian will Process such Customer Personal Data in
accordance with the US State Privacy Laws, including by complying with applicable secGons of the US State Privacy Laws and
providing the same level of privacy protecGon as required by US State Privacy Laws, and in accordance with Customer's wriVen
instrucGons, as necessary for the limited and specified purposes idenGfied in SecGon 1.1(a) (Customer Personal Data) and
Schedule 1 (DescripGon of Processing) of this DPA. Atlassian will not:
(a)
retain, use, disclose or otherwise Process such Customer Personal Data for a commercial purpose other than for
the limited and specified purposes idenGfied in this DPA, the Agreement, and/or any related Order, or as otherwise
permiVed under US State Privacy Laws;
(b)
"sell" or “share” such Customer Personal Data within the meaning of the US State Privacy Laws; and
(c)
retain, use, disclose or otherwise Process such Customer Personal Data outside the direct business relaGonship
with Customer and not combine such Customer Personal Data with personal informaGon that it receives from
other sources, except as permiVed under US State Privacy Laws.
2.2. Atlassian must inform Customer if it determines that it can no longer meet its obligaGons under US State Privacy Laws within
the Gmeframe specified by such laws, in which case Customer may take reasonable and appropriate steps to prevent, stop, or
remediate any unauthorized Processing of such Customer Personal Data.
2.3. To the extent Customer discloses or otherwise makes available DeidenGfied Data to Atlassian or to the extent Atlassian creates
DeidenGfied Data from Customer Personal Data, in each case in its capacity as a Service Provider, Atlassian will:
3.
(a)
adopt reasonable measures to prevent such DeidenGfied Data from being used to infer informaGon about, or
otherwise being linked to, a parGcular natural person or household;
(b)
publicly commit to maintain and use such DeidenGfied Data in a de-idenGfied form and to not aVempt to reidenGfy the DeidenGfied Data, except that Atlassian may aVempt to re-idenGfy such data solely for the purpose
of determining whether its de-idenGficaGon processes are compliant with the US State Privacy Laws; and
(c)
before sharing DeidenGfied Data with any other party, including Sub-processors, contractors, or any other persons
(“Recipients”), contractually obligate any such Recipients to comply with all requirements of this SecGon 2.3
(including imposing this requirement on any further Recipients).
South Korea.
3.1. Customer agrees that it has provided noGce and obtained all consents and rights necessary under Applicable Data ProtecGon
Law for Atlassian to Process Atlassian Account Data and Atlassian Usage Data pursuant to the Agreement (including this DPA).
3.2. To the extent Customer discloses or otherwise makes available DeidenGfied Data to Atlassian, Atlassian will:
6
Atlassian Data Processing Addendum
October 2024 Version
4.
(a)
maintain and use such DeidenGfied Data in a de-idenGfied form and not aVempt to re-idenGfy the DeidenGfied
Data; and
(b)
before sharing DeidenGfied Data with any other party, including Sub-processors, contractors, or any other persons
(“Recipients”), contractually obligate any such Recipients to comply with all requirements of this SecGon 3.2
(including imposing this requirement on any further Recipients).
Defini@ons.
4.1. Where Personal Data is subject to the laws of one the following regions, the definiGon of “Applicable Data Protec@on Law”
includes:
(a)
Australia: the Australian Privacy Act;
(b)
Brazil: the Brazilian Lei Geral de Proteção de Dados (General Personal Data ProtecGon Act);
(c)
(d)
Canada: the Canadian Personal InformaGon ProtecGon and Electronic Documents Act;
Europe: (i) the RegulaGon 2016/679 of the European Parliament and of the Council on the protecGon of natural
persons with regard to the Processing of Personal Data and on the free movement of such data (General Data
ProtecGon RegulaGon, or GDPR) and (ii) the EU e-Privacy DirecGve (DirecGve 2002/58/EC) as amended,
superseded or replaced from Gme to Gme (“EU Data Protec@on Law”);
(e)
(f)
Japan: the Japanese Act on the ProtecGon of Personal InformaGon;
Singapore: the Singapore Personal Data ProtecGon Act;
(g)
South Korea: the South Korean Personal InformaGon ProtecGon Act (“PIPA”) and the Enforcement Decrees of
PIPA;
(h)
Switzerland: the Swiss Federal Act on Data ProtecGon and its implemenGng regulaGons as amended, superseded,
or replaced from Gme to Gme (“Swiss FADP”);
(i)
The United Kingdom: the Data ProtecGon Act 2018 and the GDPR as saved into United Kingdom law by virtue of
SecGon 3 of the United Kingdom's European Union (Withdrawal) Act 2018 as amended, superseded or replaced
from Gme to Gme (“UK Data Protec@on Law”); and
(j)
The United States: all state laws relaGng to the protecGon and Processing of Personal Data in effect in the United
States of America, which may include, without limitaGon, the California Consumer Privacy Act, as amended by the
California Privacy Rights Act, and its implemenGng regulaGons (“CCPA”), the Colorado Privacy Act, the ConnecGcut
Data Privacy Act, the Utah Consumer Privacy Act and the Virginia Consumer Data ProtecGon Act (“US State Privacy
Laws”).
4.2. “Deiden@fied Data” means data that cannot reasonably be used to infer informaGon about, or otherwise be linked to, a data
subject.
4.3. “Data Privacy Framework” means the EU-U.S. Data Privacy Framework, the UK Extension to the EU-U.S. Data Privacy
Framework, and the Swiss-U.S. Data Privacy Framework self-cerGficaGon program operated by the US Department of
Commerce.
4.4. “Europe” includes, for the purposes of this DPA, the Member States of the European Union and European Economic Area.
4.5. “EU SCCs” means the contractual clauses annexed to the European Commission's ImplemenGng Decision 2021/914 of 4 June
2021 on standard contractual clauses for the transfer of Personal Data to third countries pursuant to RegulaGon (EU) 2016/679
of the European Parliament and of the Council, as amended, superseded, or replaced from Gme to Gme.
4.6. “Service Provider” has the same meaning as given in the CCPA.
4.7. “UK Addendum” means the InternaGonal Data Transfer Addendum to the EU Commission Standard Contractual Clauses issued
by the UK InformaGon Commissioner, Version B1.0, in force 21 March 2022, as amended, superseded or replaced from Gme
to Gme.
7
Atlassian Data Processing Addendum
October 2024 Version
Download