About IntoPeople

INTOPEOPLE IS AN AMBITIOUS AND INTERNATIONALLY ORIENTED COMPANY. We provide IT-solutions for companies of various sizes and orientation. We do this through projects in nearshore sortware development, recruitment and payrolling of IT personnel or a combination of these services.

IntoPeople was founded in 2006 by Dutch and Eastern European entrepreneurs. So this combination of experience and knowledge in the possession of IntoPeople makes the company unique. It brings us to a good competitive position in the market of IT. We have managed to virtually eliminate the cultural and language barrier in our relationship with our customers, partners and employers.

A simple approach and personal supervision of projects, as well as the personal supervision of employees give us our considerable competitive edge.

For Dutch companies we are:

  • A solid partner in offshore and nearshore software development.
  • An active companion in recruitment, flexible staffing and payrolling of IT-personnel.

For development centres in Eastern Europe we are:

  • A good client with varied and interesting projects.
  • A solid partner in Europe with scope for further cooperation.

For IT-professionals in Eastern Europe we:

  • offer new possibilities of finding and getting top-jobs in the Netherlands
  • arrange everything connected with moving to the place of your new job
  • provide constant support in all matters concerning your stay in the Netherlands

VISION & MISSION

Mission

Providing attractive, effective and creative IT-solutions for each company, regardless of the size and specifics of its business, through effective cooperation between companies and people in the Netherlands and Eastern Europe. We have modern knowledge, extensive business experience, flexibility and a creative approach to management.

Vision

Further developing of European knowledge economy through cooperation between the Netherlands and Eastern Europe.

We can do the project totally for you or we can provide consultancy and guidance within the project.Recruitment and flexible staffing of professional IT-staff for your company to work on short- and long-term projects. The developer or a complete team work wholly at your side in your office but continue to be employed by us, so you don’t have to cope with all the responsibilities and problems as normally an employer does. We provide you with an employee on the basis of an hourly rate. It’s you who determine how many hours the developer works and you pay accordingly. In case of illness or other unexpected occurrences you pay only for the number of working hours.

It is done on the same basis as flexible staffing with the difference that you pay the total amount per month instead of working hours rate. That total amount per month is normally less than the hours rate, but the cost difference has to do with risks in relation to disease. If the employee is ill then it will not be deducted from the total monthly amount.

SERVICE MODEL

We always work SMART within projects. So we always:

Specific; the project is explained with you. The objective of the project is determined here.

Measurable; the preconditions are determined both productively and financially in order to achieve your objective.

Acceptable; both parties indicate what the options are and enter into this contractually.

Realistic; the feasibility of projects are verified internally or in collaboration with the nearshore centers.

Timed; a project has a clear beginning and end, so you know exactly when your software is ready.

WHY EASTERN EUROPE?

Our employees mainly come from Bulgaria, Ukraine and Serbia. The nearshore projects will be outsourced to development teams there. It’s reasonable to question WHY?

The list of advantages set out below convinces us that the strategic destination was chosen correctly:

  • immediate availability of highly trained IT-personnel
  • compatible price so the project always stays within the customer’s budget
  • aim- and customer-oriented partners there
  • negligible time difference with the Netherlands (only 1 hour), so communication is possible within normal working hours
  • high quality work on the projects with perfect results
  • no culture differences so relationships are easy and pleasant
  • the right combination of quality, money and time
  • low risk so low price alternative

AGREEMENT (AVG)

Processing agreement (AVG)
According to the General Data Protection Regulation

Article 1. Introductory provisions

Article 1.1.
The terms in this Processor Agreement that are defined in the GTC have the meaning as described therein.

Article 1.2.
Where in this Processor Agreement reference is made to a provision from the Wbp, as per 25 May 2018 the corresponding provision from the General Data Protection Regulation (the “AVG”) is meant.

Show all

Article 2. Purposes of the processing

Article 2.1.
Processor undertakes to process personal data on behalf of the Responsible Party under the conditions of this Processor Agreement. Processing will only take place within the framework of the execution of the Agreement and for purposes that are determined with further approval.

Article 2.2.
The controller determines for himself which (types of) personal data he has processed by the Processor and to which (categories of) data subjects these personal data relate. Processor has no influence on this.

Article 2.3.
Processor will not process the personal data for any purpose other than as determined by the Controller. The controller will inform the Processor of the processing purposes insofar as these have not already been mentioned in the Processor Agreement.

Article 2.4.
The personal data to be processed on the instructions of the Responsible Person remain the property of the Responsible Person or the person (s) concerned.

Article 2.5.
The controller guarantees that the content, use and instruction to process personal data as referred to in the Processor Agreement is not unlawful and does not infringe any rights of third parties. In addition, the Controller is responsible for: that the processing of personal data falls under one of the exemptions under the AVG, or if this is not the case, a report has been made to the Dutch Data Protection Authority; and that from 25 May 2018 it will keep a register of the processing operations regulated under this Processor Agreement.

Article 2.6.
The responsible party indemnifies the Processor against all claims and claims that are related to non-compliance or incorrect compliance with the obligations under Article 2.5.

Article 3. Obligations of Processor

Article 3.1.
With regard to the processing operations referred to in Article 2, Processor will ensure compliance with the conditions that are imposed on Processor to process personal data on the basis of the AVG and the AVG.

Article 3.2.
Processor will, at its first request, inform the Controller of the measures it has taken regarding its obligations under this Processor Agreement and the Wbp and AVG.

Article 3.3.
The Processor’s obligations arising from this Processor Agreement also apply to those who process personal data under the Processor’s authority.

Article 4. Transfer of personal data

Article 4.1.
Processor may process the personal data in countries within the European Union. Transfer to countries outside the European Union is only permitted with due observance of the applicable AVG regulations.

Article 4.2.
At the request of the Processor, the Controller will report which country or countries it concerns.

Article 5. Division of responsibility

Article 5.1.
The permitted processing will be carried out by Processor within a (semi) automated environment under the control of Processor.

Article 5.2.
Processor is only responsible for the processing of the personal data under this Processor Agreement, in accordance with the instructions of the Controller and under the express (final) responsibility of the Controller.

Article 5.3.
For all other processing of personal data, including in any case the collection of personal data by the Controller, processing for purposes not reported by the Controller to the Processor, processing by third parties or for other purposes, the Processor is not responsible.

Article 6. Engaging third parties or subcontractors

Article 6.1.
The controller gives the Processor permission to make use of third parties when processing personal data on the basis of this Processor Agreement, with due observance of the applicable privacy laws and regulations.

Article 6.2.
The Processor will, if the Controller requests this, inform the Controller as soon as possible about the third parties it has engaged. The controller has the right to object to any third parties engaged by the Processor.

Article 6.3.
Processor will not object on unreasonable grounds and must provide sufficient reasons for the objection. If the Controller raises an objection against third parties engaged by the Processor, the Parties will consult to reach a solution.

Article 6.4.
Processor ensures that third parties engaged by it assume written obligations that are at least as strict as those imposed on the Processor pursuant to the Processor Agreement.

Article 6.5.
Processor guarantees correct compliance with the obligations referred to in Article 6.4 by these third parties and is liable in the event of errors by itself towards the Controller as if it had committed the error (s) itself.

Article 6.6.
The maximum liability of Processor for damage as referred to in Article 6.5 is limited to the amount agreed in the Agreement (including the General Terms and Conditions of Processor).

Article 7. Security

Article 7.1.
Processor shall take appropriate technical and organizational measures with regard to the processing of personal data to be carried out, against loss or against any form of unlawful processing (such as unauthorized access, encroachment, alteration or provision of personal data).

Article 7.2.
Although Processor must take appropriate security measures in accordance with paragraph 1 of this article, Processor cannot fully guarantee that security is effective under all circumstances. However, in the event of a threat of – or actual breach of – these security measures, the processor will do everything possible to limit the loss of personal data as much as possible.

Article 7.3.
If an explicitly described security is not included in the Processor Agreement, Processor shall ensure that the security meets a level that, in view of the state of the art, the sensitivity of the personal data and the costs associated with taking the security, is not unreasonable.

Article 7.4.
The controller only makes personal data available to the Processor for processing if the Controller has ensured that the required security measures have been taken.

Article 8. Reporting obligation

Article 8.1.
In the case of a data leak (which is understood to mean: a breach of the security of personal data that leads to a considerable chance of adverse consequences, or has adverse consequences, for the protection of personal data, within the meaning of Article 34a Wbp) , Processor makes every effort to inform the Controller of this as quickly as possible, but in any case within 48 hours after the data leak has become known to Processor.

Article 8.2.
The reporting obligation only applies if the leak has actually occurred and in any case includes reporting that a data leak has occurred, and, insofar as this information is available to Processor:

what the (alleged) cause of the leak is ;
what the (as yet known or expected) consequence is;
what the (proposed) solution is;
contact details for following up the report;
the number of people whose data has been leaked, or the minimum and maximum number of people whose data has been leaked if no exact number is known;
a description of the group of people whose data has been leaked;
the type or types of personal data that have been leaked;
the date on which the leak occurred, or the period within which the leak
occurred if no exact date is known;
the date and time at which the leak became known to the Processor or to a third party or subcontractor engaged by him;
whether the data is encrypted, hashed or otherwise made incomprehensible or inaccessible to unauthorized persons;
and what the planned and already taken measures are to close the leak and to limit the consequences of the leak.

Article 8.3.
The responsible party assesses itself whether it will inform the relevant authorities and / or person (s) involved and is itself responsible for compliance with (legal) reporting obligations. If privacy laws and regulations require this, Processor will cooperate in informing the relevant authorities or parties involved.

Article 9. Processing requests from involved parties

Article 9.1.
If a data subject wishes to exercise one of his legal rights and the request for this is addressed to Processor, Processor will forward this request to Controller. The person responsible will then take care of the handling of the request. Processor may inform the data subject thereof.

Article 9.2.
In the event that a data subject submits a request to the Controller to exercise one of his legal rights, the Processor will, if the Controller requires this, cooperate as far as possible and insofar as this is reasonable. Processor may charge the responsible party reasonable costs for this.

Article 10. Confidentiality

Article 10.1.
All personal data that Processor receives from the Controller or that Processor collects itself in the context of this Processor Agreement is subject to a confidentiality obligation towards third parties.

Article 10.2.
This confidentiality obligation does not apply to the extent that the Controller has given explicit permission to provide the information to third parties, if the provision of the information to third parties is logically necessary for the execution of the Processor Agreement, or if there is a legal obligation to transfer the information to third parties. to provide a third party.

Article 10.3.
If Processor is legally obliged to provide information to a third party, Processor will inform the Controller of this as soon as possible to the extent permitted by law.

Article 11. Audit

Article 11.1.
The controller has the right to have audits carried out by an independent third party expert who is bound by confidentiality to check the security requirements as agreed in Article 7 of the Processor Agreement.

Article 11.2.
The audit referred to in Article 11.1 only takes place if there is a concrete suspicion of abuse that has been demonstrated by the Controller. The audit initiated by the Responsible Party takes place two weeks after prior announcement by the Responsible Party.

Article 11.3.
Processor shall cooperate with the audit and make all information reasonably relevant to the audit, including supporting data such as system logs, and staff available as soon as possible and within a reasonable period, whereby a maximum period of two weeks is reasonable.

Article 11.4.
The findings arising from the audit will be assessed by the Parties in mutual consultation and, as a result thereof, may or may not be implemented by one of the Parties or by both Parties jointly.

Article 11.5.
The costs of the audit are borne by the Controller.

Article 12. Liability

Article 12.1.
For the liability of the Parties for damage as a result of an attributable shortcoming in the fulfillment of the Processor Agreement, or as a result of an unlawful act or otherwise, the liability arrangement agreed in the Agreement (including the General Terms and Conditions of Processor) is declared applicable .

Article 13. Duration and termination

Article 13.1.
This Processor Agreement is entered into for the duration as stipulated in the Agreement and, in the absence thereof, in any case for the duration of the cooperation between the Parties. This Processor Agreement cannot be canceled in the interim.

Article 13.2.
Parties may only amend this Processor Agreement with mutual consent, but will fully cooperate in adapting the Processor Agreement to any new or amended privacy laws and regulations.

Article 13.3.
After termination of the Processor Agreement, Processor will destroy all personal data that is present with it, unless the Parties agree otherwise.

Hide

Want work with us?

We are excited to work with services and complicated applications,
so if your project one of those you will get a small discount