securiti.ai
Open in
urlscan Pro
2606:4700:20::ac43:44b9
Public Scan
Submitted URL: https://email.securiti.ai/NjQxLUdZSi04ODcAAAGO2FkeY_pl2tkkYNpHQapxWE_5tRWwMbNUonZMTHLDYssBEbTZHeGdO3tsut50sM7JFJ58Vlw=
Effective URL: https://securiti.ai/terms/?mkt_tok=NjQxLUdZSi04ODcAAAGO2FkeY_w5HRcBzaW45DH4IfJQoyqELzh0QmWcfMwf_tceEVfXsAiIt_1yKIpkQ...
Submission: On October 17 via api from QA — Scanned from DE
Effective URL: https://securiti.ai/terms/?mkt_tok=NjQxLUdZSi04ODcAAAGO2FkeY_w5HRcBzaW45DH4IfJQoyqELzh0QmWcfMwf_tceEVfXsAiIt_1yKIpkQ...
Submission: On October 17 via api from QA — Scanned from DE
Form analysis
2 forms found in the DOM<form class="mktoForm mkto-no-label mktoHasWidth mktoLayoutLeft" data-formid="1725" style="min-height: 100px; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 861px;" id="_16975218664130.12103258573414899"
novalidate="novalidate">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoDownloadButton .mktoButton {
position: relative;
display: inline-block;
vertical-align: top;
height: 36px;
line-height: 35px;
padding: 0 20px;
font-size: 13px;
color: white;
text-align: center;
text-decoration: none;
text-shadow: 0 -1px rgba(0, 0, 0, 0.4);
background-clip: padding-box;
border: 1px solid;
border-radius: 2px;
cursor: pointer;
-webkit-box-shadow: inset 0 1px rgba(255, 255, 255, 0.1), inset 0 0 0 1px rgba(255, 255, 255, 0.08), 0 1px 2px rgba(0, 0, 0, 0.25);
box-shadow: inset 0 1px rgba(255, 255, 255, 0.1), inset 0 0 0 1px rgba(255, 255, 255, 0.08), 0 1px 2px rgba(0, 0, 0, 0.25);
background: #3b5ca0;
border-color: #2d477b #2d477b #263c68;
background-image: -webkit-linear-gradient(top, #4369b6, #3b5ca0 66%, #365391);
background-image: -moz-linear-gradient(top, #4369b6, #3b5ca0 66%, #365391);
background-image: -o-linear-gradient(top, #4369b6, #3b5ca0 66%, #365391);
background-image: linear-gradient(to bottom, #4369b6, #3b5ca0 66%, #365391);
}
.mktoForm .mktoButtonWrap.mktoDownloadButton .mktoButton:before {
content: "";
position: absolute;
top: 0;
bottom: 0;
left: 0;
right: 0;
pointer-events: none;
background-image: -webkit-radial-gradient(center top, farthest-corner, rgba(255, 255, 255, 0.08), rgba(255, 255, 255, 0));
background-image: -moz-radial-gradient(center top, farthest-corner, rgba(255, 255, 255, 0.08), rgba(255, 255, 255, 0));
background-image: -o-radial-gradient(center top, farthest-corner, rgba(255, 255, 255, 0.08), rgba(255, 255, 255, 0));
background-image: radial-gradient(center top, farthest-corner, rgba(255, 255, 255, 0.08), rgba(255, 255, 255, 0));
}
.mktoForm .mktoButtonWrap.mktoDownloadButton .mktoButton:hover:before {
background-image: -webkit-radial-gradient(farthest-corner, rgba(255, 255, 255, 0.18), rgba(255, 255, 255, 0.03));
background-image: -moz-radial-gradient(farthest-corner, rgba(255, 255, 255, 0.18), rgba(255, 255, 255, 0.03));
background-image: -o-radial-gradient(farthest-corner, rgba(255, 255, 255, 0.18), rgba(255, 255, 255, 0.03));
background-image: radial-gradient(farthest-corner, rgba(255, 255, 255, 0.18), rgba(255, 255, 255, 0.03));
}
.mktoForm .mktoButtonWrap.mktoDownloadButton .mktoButton:active {
background: #3b5ca0;
border-color: #263c68 #2d477b #2d477b;
-webkit-box-shadow: inset 0 1px 2px rgba(0, 0, 0, 0.2);
box-shadow: inset 0 1px 2px rgba(0, 0, 0, 0.2);
}
.mktoForm .mktoButtonWrap.mktoDownloadButton .mktoButton:active:before {
content: none;
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email_16975218664130.12103258573414899" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 420px;">
<div class="mktoAsterix">*</div>Work Email:
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email_16975218664130.12103258573414899" name="Email" placeholder="* Work Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 420px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap"><label for="mktoEmailable_16975218664130.12103258573414899" id="LblmktoEmailable" class="mktoLabel mktoHasWidth" style="width: 420px;">
<div class="mktoAsterix">*</div>I consent to receive marketing emails. I understand I can unsubscribe at any time and agree to terms outlined in Securiti’s
<a href="https://securiti.ai/terms/#privacy-policy" target="_blank" id="">privacy policy</a>.
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div>
<div class="mktoLogicalField mktoCheckboxList mktoHasWidth" style="width: 26px;">
<div class="checker" id="uniform-mktoEmailable_16975218664130.12103258573414899"><span class=""><input name="mktoEmailable" id="mktoEmailable_16975218664130.12103258573414899" type="checkbox" value="yes"
aria-labelledby="LblmktoEmailable InstructmktoEmailable" class="mktoField" placeholder=""></span></div><label for="mktoEmailable" id="LblmktoEmailable"></label>
</div><span id="InstructmktoEmailable" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="mktoUTMCampaign" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;" placeholder="">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="mktoUTMMedium" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;" placeholder="">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="mktoUTMSource" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;" placeholder="">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="trackingcode" class="mktoField mktoFieldDescriptor mktoFormCol" value="na" style="margin-bottom: 10px;" placeholder="">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Country" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;" placeholder="">
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoDownloadButton" style="margin-left: 11px;"><button type="submit" class="mktoButton" form="_16975218664130.12103258573414899">Subscribe</button></span></div><input type="hidden"
name="formid" class="mktoField mktoFieldDescriptor" value="1725" placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="641-GYJ-887" placeholder="">
</form>
<form class="mktoForm mkto-no-label mktoHasWidth mktoLayoutLeft" data-formid="1725"
style="min-height: 100px; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" novalidate="novalidate"></form>
Text Content
Cookie Richtlinie Diese Website verwendet cookies, um die Navigation auf der Website zu verbessern, die Nutzung der Website zu analysieren, unsere Marketingbemühungen zu unterstützen und Ihnen die bestmögliche Erfahrung zu bieten. Erfahren Sie mehr Akzeptiere CookiesCookies ablehnen Cookie Voreinstellungen IDC Names Securiti a Worldwide Leader in Data Privacy View * Events * Spotlight Talks * Education en * en * pt-br Contact Us Schedule a Demo * Products By Use Cases By Roles Data Command Center View * Learn more Asset and Data Discovery Discover dark and native data assets * Learn more Data Access Intelligence & Governance Identify which users have access to sensitive data and prevent unauthorized access * Learn more Data Privacy Automation PrivacyCenter.Cloud | Data Mapping | DSR Automation | Assessment Automation | Vendor Assessment | Breach Management | Privacy Notice * Learn more Sensitive Data Intelligence Discover & Classify Structured and Unstructured Data | People Data Graph * Learn more Data Flow Intelligence & Governance Prevent sensitive data sprawl through real-time streaming platforms * Learn more Data Consent Automation First Party Consent | Third Party & Cookie Consent * Learn more Data Security Posture Management Secure sensitive data in hybrid multicloud and SaaS environments * Learn more Data Breach Impact Analysis & Response Analyze impact of a data breach and coordinate response per global regulatory obligations * Learn more Data Catalog Automatically catalog datasets and enable users to find, understand, trust and access data * Learn more Data Lineage Track changes and transformations of data throughout its lifecycle Data Controls Orchestrator View Data Command Center View Sensitive Data Intelligence View * Asset Discovery * Data Discovery & Classification * Sensitive Data Catalog * People Data Graph Learn more Privacy Automate compliance with global privacy regulations * Data Mapping Automation View * Data Subject Request Automation View * People Data Graph View * Assessment Automation View * Cookie Consent View * Universal Consent View * Vendor Risk Assessment View * Breach Management View * Privacy Policy Management View * Privacy Center View Learn more Security Identify data risk and enable protection & control * Data Security Posture Management View * Data Access Intelligence & Governance View * Data Risk Management View * Data Breach Analysis View Learn more Governance Optimize Data Governance with granular insights into your data * Data Catalog View * Data Lineage View * Data Quality View Data Controls Orchestrator View * Solutions Technologies Covering you everywhere with 1000+ integrations across data systems. * Snowflake View * AWS View * Microsoft 365 View * Salesforce View * Workday View * GCP View * Azure View * Oracle View Learn more Regulations Automate compliance with global privacy regulations. * US California CCPA View * US California CPRA View * European Union GDPR View * Thailand’s PDPA View * China PIPL View * Canada PIPEDA View * Brazil's LGPD View * + More View Learn more Roles Identify data risk and enable protection & control. * Privacy View * Security View * Governance View * Marketing View * Resources Blog Read through our articles written by industry experts Collateral Product brochures, white papers, infographics, analyst reports and more. Knowledge Center Learn about the data privacy, security and governance landscape. Securiti Education Courses and Certifications for data privacy, security and governance professionals. * Company About Us Learn all about Securiti, our mission and history Partner Program Join our Partner Program Contact Us Contact us to learn more or schedule a demo News Coverage Read about Securiti in the news Press Releases Find our latest press releases Careers Join the talented Securiti team TERMS & POLICIES WHAT IS CCPA? CCPA ADDENDUM SYSTEM DESCRIPTION COOKIES POLICY PORTAL REFERRAL ADDENDUM TERMS & CONDITIONS DATA PROCESSING AGREEMENT / ADDENDUM HIPAA BAA PLATFORM PRODUCTS SPECIFIC TERM PRIVACY POLICY AFFILIATE PROGRAM POLICIES AFFILIATE PROGRAM AGREEMENT CONTENT USAGE GUIDELINES WHAT IS CCPA? WHAT IS CCPA? The California Consumer Privacy Act (“CCPA”) 2018, which took effect on 1 January 2020, creates new rights for California consumers relating to the access to, deletion of, and sharing of personal information that is collected by certain types of businesses. The CCPA also requires the California Attorney General to adopt regulations to further clarify the CCPA, establish procedures to facilitate consumers’ new rights under the CCPA and provide guidance to businesses for how to comply (the Regulations). On 10 October 2019, the California Attorney General published draft Regulations for public consultation. The draft Regulations have been subject to a number of public hearings and are not expected to be finalized and enforced before July 1, 2020. There is therefore some uncertainty regarding the final text of the Regulations. You can find out more about the CCPA by visiting the California Attorney General’s CCPA page here. WHAT IS SECURITI DOING TO COMPLY WITH THE CCPA? Securiti is dedicated to ensuring compliance with the CCPA and the Regulations (once finalized). At this current time, Securiti does not consider that it meets the thresholds to be a “Business” under the CCPA and has identified itself as a “Service Provider”. Similar to the concept of a data processor under the GDPR, a Service Provider under the CCPA processes personal information on behalf of a Business for a specific purpose, such as providing services to the Business. Here is a brief overview of the steps Securiti has taken or is in the process of taking in response to the CCPA: * Conducting a privacy assessment across our organization, including mapping all of the personal information we hold. * Updating our Privacy Policy (available here). * Updating our internal policies and terms to include CCPA language. * Implementing a process to respond to California consumer requests. * Ensuring that our security measures are in line with the California Attorney General’s CIS standards (available here). * Actively monitoring the developments in the law with a view to ensuring compliance. Please note that these changes do not affect your use of our services and products and you may continue to use our services in accordance with our updated policies and terms. If you have any questions regarding Securiti’s privacy program or the CCPA please feel free to contact us at privacy@securiti.ai CCPA ADDENDUM CCPA ADDENDUM This CCPA Addendum (this “Addendum”) is effective as of _______________ (the "Addendum Effective Date") forms a part of the _______________Agreement between Securiti Inc. (the “Supplier”) and _______________, its parent company and affiliates (collectively, the “Customer”) dated _____________, including all amendments and work orders thereto and extensions and renewals thereof (the “Agreement”). The parties agree as follows: 1. Definitions. For purposes of this Addendum, the following terms shall mean as follows: * “Business”, “Business Purpose”, “Consumer”, “Delete”, “Personal Information”, “Request to Delete”, “Request to Know” “Sell”, and “Service Provider” shall have the meaning set forth in the CCPA. * “CCPA” means the California Consumer Privacy Act. * * “Services” means performance of the services and activities provided pursuant to or in connection with the Agreement previously entered into between Supplier and Customer. * 2. Subject Matter. In order for Supplier to provide Services to Customer, Supplier may have to Process Personal Information on behalf of Customer. This Addendum applies to the Processing by Supplier of Customer Personal Information in connection with the Agreement. Customer shall, in its use of the Services and provision of Personal Information to Supplier in connection with the Services, comply at all times with the obligations, requirements and laws, and regulations applicable to Businesses and Customer shall indemnify, hold harmless and defend Supplier for any breach or violation related thereto. Supplier and Customer acknowledge and agree that Supplier is acting as a Service Provider in its provision of the Services to Customer. 3. Prohibited Use. Supplier, as a Service Provider, certifies that Supplier will not Sell Customer's Personal Information. Supplier further agrees not to retain, use or disclose Personal Information obtained from Customer, except to the extent permitted by the CCPA, (i) outside the direct business relationship between Customer and Supplier, and (ii) for any purposes other than for the specific Business Purpose of performing the Services specified in the Agreement. For the avoidance of doubt, Customer hereby approves the transfers of Personal Information by Supplier to Supplier’s other entities (including, without limitation, affiliates and subsidiaries), service providers, third parties and vendors, in order to provide the Services to Customer. 4. Deletion. Upon Customer’s written request, and subject to, and in accordance with the CCPA and this Addendum, , Supplier, as a Service Provider, agrees to promptly Delete Customer Personal Information. In any event, to the extent required or allowed by applicable law, Supplier may retain Personal Information for evidence purposes and/or for the establishment, exercise or defense of legal claims and/or to comply with applicable laws and regulations. 5. Consumer's Requests. Where required by CCPA, Supplier agrees to provide reasonable assistance to, and comply with reasonable instructions from, Customer related to valid Consumer requests. If Supplier receives a Request to Know or Request to Delete from a Consumer, Supplier shall, to the extent legally permitted, promptly notify and forward such Consumer requests to Customer. 6. Limitation of Liability. Supplier’s (including, without limitation, Supplier’s affiliates’ and subsidiaries’) entire, total and aggregate liability, related to personal data or information, privacy, or for breach of, this Addendum and/or CCPA, including, without limitation, if any, any indemnification obligation under the Agreement or applicable law regarding data protection or privacy, shall be subject to the limitation of liability under the Agreement. 7. Duration and Survival. This Addendum will become legally binding upon the later of the Addendum Effective Date, or the date that the parties sign this Addendum. This Addendum shall automatically terminate upon the termination or expiration of the Agreement under which the Services are provided. Section 6 and Section 7 of this Addendum shall survive the termination or expiration of this Addendum for any reason. This Addendum cannot, in principle, be terminated separately to the Agreement, except where the processing of Personal Information ends before the termination of the Agreement, in which case, this Addendum shall automatically terminate. 8. Miscellaneous. This Addendum may not be amended or modified except by a written instrument which is signed by both parties. This Addendum may be executed in counterparts. Supplier may assign this Addendum or its rights or obligations hereunder to any affiliate thereof, or to a successor or any affiliate thereof, in connection with a merger, consolidation or acquisition of all or substantially all of its shares, assets or business relating to this Addendum or the Agreement. SECURITI INC.: Signature: Legal Name: Print Name: Title: Date: CUSTOMER Signature: Legal Name: Print Name: Title: Date: SYSTEM DESCRIPTION SYSTEM DESCRIPTION SECURITI PLATFORM Securiti is the leader in AI-Powered Security, Privacy, Governance and Compliance for SaaS and data systems across multi-cloud and hybrid environments. Organizations globally rely on Securiti to secure and govern data systems, meet global privacy regulations and stay compliant. Securiti provides a comprehensive platform to manage security, privacy, and compliance risks across multi-cloud, SaaS, and on-premise environments with multiple well-integrated modular offerings. The Securiti platform instances are available in multiple geographically distributed datacenters provided by IaaS vendors (AWS and GCP). Each instance caters to customers from specific geography as a standalone offering with no data exchange between the instances. The solution is deployed with high redundancy and availability to meet our commitments to uptime and performance. Daily backups are copied over to a different data center in a different region for disaster recovery. Critical infrastructure services are provisioned in the Disaster Recovery region using the pilot light strategy for a quick recovery of the service. Failover strategy for Securiti’s SaaS cloud makes use of the multiple availability zones in a given region. All the compute nodes and storage services are spread across a minimum of two availability zones. If an AZ suffers an outage, excess capacity is spun in the other AZ or a different AZ (most regions have 3 or more AZs). Storage services use either active/standby failover model or distributed replica model across multiple nodes in different AZs. Entire region's failure is a rare occurrence - when an entire region fails, DR procedures kick in to restore the service in a different region with an RTO of 24 hours and RPO of 24 hours. The following diagram illustrates the above strategy in simple terms for AWS. An identical architecture is employed for GCP. Securiti uses various security tools to scan its environment and services. We also engage professional security vendors to perform third-party penetration tests and audits of our environment on an annual basis, respectively, while internal system scans are performed weekly. Securiti platform is certified for the SOC2 Type II and ISO 27001 standards. ACCESS TO CUSTOMER DATA A subset of Securiti’s Personnel has access to customer data as necessary to support the platform. Individual access is granted based on the role and job responsibilities of the individual. Access to systems containing customer data is reviewed on a regular basis and is monitored on an ongoing basis. SECURE DATA HANDLING AND DESTRUCTION IaaS vendors are responsible for the security of the underlying cloud infrastructure and SECURITI takes the responsibility of securing workloads we deploy in the cloud environments. Computing environments are continuously audited, with certifications from accreditation bodies across geographies and verticals, including ISO 27001, FedRAMP, DoD CSM, and PCI DSS. Any device storing any data is subjected to data-at-rest encryption. Thus, a decommissioned device cannot be misused. Securiti makes use of per-customer, virtual database instances to logically separate one customer’s data from other customers’ data. When a customer stops using the service, securiti destroys the corresponding virtual database instance. Any customer data that is identified and cataloged by SECURITI as personal data is subjected to a one-way, irreversible hash and stored in the virtual database instance of the customer. At no point, personal data is captured in clear-text in logs or databases. CUSTOMER RESPONSIBILITIES Securiti platform is provided as a multi-tenant, cloud-based service, accessible on the internet via web browsers such as Chrome, Firefox, etc. As a user of the Securiti platform, customers should be proactive in recognizing the value, sensitivity, and need to safeguard the information provided by the service and access to the policy enforcement capabilities. This document details Securiti customer responsibilities as they relate to use of the Securiti platform. It is the responsibility of Securiti customers to familiarize themselves with the information and procedures set forth below and comply with them. SAFEGUARDING OF ASSETS & INFORMATION To safeguard information assets and policy enforcement capabilities available in the Securiti platform, the customers’ IT governance processes should include end-user training regarding appropriate use and awareness of the need for securing access to their Securiti platform account credentials. As with most cloud services, access to the Securiti platform requires a login ID and password (with optional two-factor authentication) or integration with a Single-Sign-On (SSO) provider. When an organization subscribes to the Securiti platform service, it is the customer’s responsibility to manage which end users should be given access. Customers should also define when access should be taken away from the end users. For example, access should be revoked upon end user’s separation from employment or as part of departmental changes that result in change of duties or responsibilities. Only valid account credentials should be used by authorized users to access the Securiti platform service. Securiti’s platform service should be considered sensitive and confidential by Securiti platform users. Users should follow information security best practices in ensuring access to their account credentials is appropriately limited, as well as ensuring that the information and functionality provided by the Securiti platform service is protected and restricted from unauthorized use. Securiti platform users are responsible for maintaining the security and confidentiality of their user credentials (e.g., Login ID and Password), and are responsible for all activities and uses performed under their account credentials whether authorized by them or not. By establishing user credentials and accessing the Securiti platform, end users of the Securiti platform service agree to comply with these requirements to safeguard assets and account information. PASSWORD MANAGEMENT Securiti platform service is accessible to the global Internet public, as a result, great care must be exercised by Securiti platform users in protecting their subscription against unauthorized access and use of their credentials. By establishing user credentials and accessing the Securiti platform service, end users agree to proactively protect the security and confidentiality of their user credentials and never share service account credentials, disclose any passwords or user identifications to any unauthorized persons, or permit any unauthorized person to use or access their Securiti platform accounts. Any loss of control of passwords or user identifications could result in the loss of “Personally Identifiable Data (PII)” and the culpable account owner(s) may be liable for the actions taken under their service account credentials whether they authorized the activity or not. Additionally, when establishing Securiti platform account credentials, end users are required to establish strong passwords following password strength and complexity best practices; passwords should not be easily guessable. Users are advised to make use of other security measures such as multi-factor authentication, IP address restrictions and single-sign-on configuration. REPORTING OPERATIONAL ISSUES All Securiti services are monitored 24×7 and the status of the platform is updated at support.securiti.ai (or status.eu.securiti.ai for our EU platform). Any scheduled maintenance is also posted on the status page. On the occasion that Securiti users observe performance issues, problems or service outages, users can open a ticket at support.securiti.ai (requires Securiti subscription) or email support@securiti.ai to report such issues. INCIDENTS AND BREACHES By establishing Securiti platform account credentials or accessing its service, end users of the service agree to notify Securiti immediately of any security incident, including any suspected or confirmed breach of security by opening a support ticket at support.securiti.ai (requires Security subscription) or by emailing support@securiti.ai or security-team@securiti.ai. Also, users of the service agree to logout or exit the service immediately at the end of each session to provide further protection against unauthorized use and intrusion. Securiti platform users should also notify Securiti immediately if they observe any activity or communications in other forums that may indicate that other Securiti customers have had their accounts compromised. Lastly, Securiti encourages users to practice responsible disclosure by notifying Securiti of any identified security vulnerabilities. Securiti is dedicated to providing secure services to clients, and will triage all security vulnerabilities that are reported. Furthermore, Securiti will prioritize and fix security vulnerabilities in accordance with the risk that they pose. COMPLIANCE ISSUES Regulatory requirements and industry mandates are continuously increasing in scope & depth and can vary from industry to industry. Securiti users agree to abide by the regulatory requirements, industry mandates, and other compliance requirements imposed on their organizations and understand that use of cloud-based services does not exclude the organizations from responsibilities for restricting access to application information and functionality. RESPONSIBLE DISCLOSURE POLICY Securiti is dedicated to keeping its cloud platform safe from all types of security issues thereby providing a safe and secure environment to our customers. Data security is a matter of utmost importance and a top priority for us. If you are a dedicated security researcher or vulnerability hunter and have discovered a security flaw in the Securiti platform including the cloud application and infrastructure, we appreciate your support in disclosing the issue to us in a responsible manner. Our responsible disclosure process is managed by the security team at Securiti. We are always ready to recognize the efforts of security researchers by rewarding them with a token of appreciation, provided the reported security issue is of high severity and not known to us. While reporting the security vulnerability to Securiti’s Security team, please refrain from disclosing the vulnerability details to the public outside of this process without explicit permission. Please provide the complete details. We determine the impact of vulnerability by looking into the ease of exploitation and business risks associated with the vulnerability. RESPONSE As a security researcher, if you identify or discover a security vulnerability in compliance with the responsible disclosure guidelines, Securiti’s security team commits to: * Acknowledge the receipt of reported security vulnerability in a timely fashion * Notify you when the vulnerability is remediated * Extend our gratitude by providing a token of appreciation in supporting us to make our customers safe and secure Please send the details of the discovered vulnerability or any security issue to: security-team@securiti.ai. INTERNET FACING ASSETS GLOBAL PRODUCTION CLOUD app.securiti.ai Management Console privacy-central.securiti.ai Data subject portal status.securiti.ai Status page cdn-prod.securiti.ai CDN for Consent banner and SDK packages.securiti.ai Appliance images docs.securiti.ai Documentation EU PRODUCTION CLOUD app.eu.securiti.ai Management Console privacy-central.eu.securiti.ai Data subject portal status.eu.securiti.ai Status page cdn-prod.eu.securiti.ai CDN for Consent banner and SDK packages.eu.securiti.ai Appliance images docs.eu.securiti.ai Documentation GLOBAL PRODUCTION CLOUD 1 app1.securiti.ai Management Console privacy-central1.securiti.ai Data subject portal status1.securiti.ai Status page packages1.securiti.ai Appliance images docs.securiti.ai Documentation GLOBAL PRODUCTION CLOUD 2 app2.securiti.ai Management Console privacy-central2.securiti.ai Data subject portal status2.securiti.ai Status page packages2.securiti.ai Appliance images docs2.securiti.ai Documentation MISCELLANEOUS support.securiti.ai: Customer support COOKIES POLICY COOKIES POLICY Last revised on July 27, 2019 effective as of August 1, 2019 If your browser is configured to accept cookies, we may collect non-personally identifiable information passively using "cookies" and "page tags". It is SECURITI's policy to respect your privacy regarding any information we may collect while operating our website. Please read this policy carefully to understand how we handle and treat your personal information. -------------------------------------------------------------------------------- WHAT'S A COOKIE? "Cookies" are small text files that can be placed on your computer or mobile device in order to identify your Web browser and the activities of your computer on the Securiti Service and other websites. -------------------------------------------------------------------------------- WHAT'S A PAGE TAG? "Page tags," also known as web beacons or gif tags, are a web technology used to help track website or email usage information, such as how many times a specific page or email has been viewed. Page tags are invisible to you, and any portion of the SecuritiService, including advertisements, or email sent on our behalf, may contain page tags. -------------------------------------------------------------------------------- DOES SECURITI USE COOKIES, AND WHY? Yes. We use cookies to personalize your experience on the Securiti websites (such as dynamically generating content on webpages specifically designed for you), to assist you in using the Securiti Service (such as saving time by not having to reenter your name each time you use the Securiti Service), to allow us to statistically monitor how you are using the Securiti Service so that we can improve our offerings, and to target certain advertisements to your browser which may be of interest to you or to determine the popularity of certain content. By using cookies and page tags together, we are able to improve the Securiti Service and measure the effectiveness of our advertising and marketing campaigns. Please be aware that this cookie policy does not govern the use of third-party websites or services or providers of third-party services. -------------------------------------------------------------------------------- DO I HAVE TO ACCEPT THEM? You do not have to accept cookies to use the Securiti Service. If you reject cookies, certain features or resources of the Securiti websites may not work properly or at all and you may have a degraded experience. Although most browsers are initially set to accept cookies, you can change your browser settings to notify you when you receive a cookie or to reject cookies generally. To learn more about how to control privacy settings and cookie management, click the link for your browser below. * Microsoft Internet Explorer * Mozilla Firefox * Google Chrome * Apple Safari To learn more about cookies; how to control, disable or delete them, please visit http://www.aboutcookies.org. Some third party advertising networks, like Google, allow you to opt out of or customize preferences associated with your internet browsing. For more information on how Google lets you customize these preferences, see their documentation. All cookies, on our website and everywhere else on the web, fall into one of four categories: * Strictly Necessary * Performance * Functionality * Targeting/Advertising -------------------------------------------------------------------------------- LIST OF COOKIES WE USE ON OUR WEBSITE Scroll left/right to view the table below cookie Purpose category _gat_gtag_UA_* Google Google Analytics cookies which provides us with data on unique browser visits to our website Performance _gid Google Used to distinguish users Performance _ga Google Used to distinguish users Performance _gat Google Used to throttle request rate Performance __adroll_fpc AdRoll Used to identify the visitor across visits and devices. This allows the website to present the visitor with relevant advertisement - The service is provided by third party advertisement hubs, which facilitate real-time bidding for advertisers. Advertising __ar_v4 Google Advertisement conversion rate tracking. Used by DoubleClick advertising service from Google Advertising _mkto_trk Marketo Used to link visitor behavior to marketing campaign, to measure campaign effectiveness Performance _fbp Facebook We use this cookie to deliver a series of advertisement products such as real time bidding from third party advertisers Advertising __privaci_cookie_consent_generated Securiti Consent Management Essential __privaci_cookie_consent_uuid Securiti Consent Management Essential -------------------------------------------------------------------------------- LOG FILES We collect non-personal information through our Internet log files, which record data such as browser types, domain names, and other anonymous statistical data involving the use of the Securiti services. This information may be used to analyze trends, to administer the Securiti services, to monitor the use of the Securiti services, and to gather general demographic information. We may link this information to personal information for these and other purposes such as personalizing your experience on the Securiti services and evaluating the Securiti services in general. PORTAL REFERRAL ADDENDUM BACKGROUND The person or entity (the “Reseller”) accepting this Portal Referral Addendum (this “Addendum”) has entered into a Reseller Agreement (the “Reseller Agreement”) with Securiti, Inc. (“Securiti”). Reseller and Securiti now desire to enter into this Addendum in order to allow Reseller to refer Customers to Securiti via the Securiti Referral Portal (defined below), on the terms and conditions set forth in this Addendum. RESELLER ACCEPTS AND AGREES TO BE BOUND BY THIS ADDENDUM BY ACKNOWLEDGING SUCH ACCEPTANCE DURING THE REGISTRATION PROCESS. IF THE PERSON ACCEPTING THIS ADDENDUM IS DOING SO ON BEHALF OF A COMPANY OR OTHER LEGAL ENTITY, SUCH PERSON REPRESENTS THAT HE/SHE HAS THE AUTHORITY TO BIND SUCH ENTITY TO THIS ADDENDUM. NOW, THEREFORE, in consideration of the mutual representations and agreements set forth herein, and other good and valuable consideration, the receipt and adequacy of which are hereby acknowledged, the parties hereto, intending to be legally bound, hereby agree as follows: 1. Any capitalized terms set forth in this Addendum that are not otherwise defined herein shall have the meanings attributed to such terms in the Reseller Agreement. 2. The Reseller Agreement and its terms are hereby incorporated into this Addendum by reference. Except as expressly amended in this Addendum, the Reseller Agreement remains in full force and effect, and shall continue in effect in accordance with its terms. 3. The “Securiti Referral Portal” is an entry point on the Securiti Product platform that allows new Customers to order the Securiti Product, or portions or specific offerings thereof. When a prospective Customer is directed by Reseller to the Securiti Referral Portal either via a link provided by Securiti to Reseller, or when a prospective Customer enters a specific code during the ordering process, or follows some other procedure that identifies Reseller as the referral source for the new Customer, then Reseller will receive a referral fee (the “Referral Fee”) from Securiti, in accordance with the Referral Fee terms set forth on Annex A, attached hereto. Securiti may reject a referred Customer for any reason in its discretion. Reseller shall not be entitled to receive any Referral Fees or any other payments under this Addendum other than commissions or payments earned or accrued prior to termination of this Addendum. 4. Referral Fees are calculated based upon only the subscription fees paid under an initial order placed by a referred Customer and only for the first four years of such associated subscription fees. For initial orders that have subscription terms in excess of one (1) year, Referral Fees are payable only with respect to the years paid and shall be determined proportionately to the total subscription fees payable pursuant to the initial order. For clarity, Reseller shall only receive Referral Fees on a referred Customer’s orders for the first four years and Referral Fees will accrue and be payable for, at most, four years from such initial order. The Referral Fees are calculated based on a percentage of eligible subscription fees received by Securiti, less discounts and any refunds. Securiti may deduct from Referral Fee payments the amount of any Referral Fees paid on subscription fees that were subsequently refunded by Securiti to a Customer. Referral Fees shall become payable and be paid to Reseller within thirty (30) days of the end of the calendar quarter in which subscription fees attributed to a referred Customer are paid to Securiti. For each referred Customer, Referral Fees to Reseller shall be capped at the amounts listed on Annex A, if applicable, for the applicable Referral Fee percentage (“Maximum Payment”). Notwithstanding anything in this Addendum to the contrary, in a case where more than one reseller claims right to receive Referral Fees for a single Customer, Securiti, may in its discretion, determine an equitable allocation of such Referral Fees so that Securiti is not required to pay more than the amount of a single Referral Fee. Also, if after reasonable diligence, Securiti is unable to identify a Customer as having been referred by Reseller to the Securiti Referral Portal, then Securiti will have no obligation to pay Referral Fees to Reseller for such Customer’s purchases. 5. Securiti may at any time, and without any liability to Reseller, modify or terminate this Addendum and the referral program, and may change the Referral Fee amounts, calculations and terms. 6. This Addendum supersedes and replaces for all purposes any other written or oral agreements between the parties applicable to the subject matter hereof. -------------------------------------------------------------------------------- ANNEX A REFERRAL FEES AND TERMS Partners under the referral model will receive a 30% commission fee based on the subscription fees actually paid by end-users referred by the partner for the first year. Additional Terms and Conditions: Payment to Reseller under this Addendum may be postponed until the Reseller’s accrued commissions payable is greater than $200. The transfer will not, however, be postponed for more than one (1) year. If either party terminates the Agreement, the Reseller’s account will be paid within 30 days. -------------------------------------------------------------------------------- COMMISSION SCHEDULE Referral Fee Percentage: 30% Maximum Payment: N/A TERMS & CONDITIONS TERMS & CONDITIONS SECURITI CUSTOMER AGREEMENT Effective as of March 15, 2023 THIS CUSTOMER AGREEMENT AND ITS CORRESPONDING ORDER FORM(S) (COLLECTIVELY REFERRED TO AS THIS “AGREEMENT”) GOVERN CUSTOMER’S USE OF SECURITI, INC.’S (“SECURITI”) SECURITI PRODUCT (DEFINED BELOW). PLEASE READ THE TERMS AND CONDITIONS OF THIS AGREEMENT CAREFULLY BEFORE USING THE SECURITI PRODUCT. BY EXECUTING AN ORDER FORM FOR THE SECURITI PRODUCT EITHER DIRECTLY OR INDIRECTLY, OR BY ACCEPTING THIS AGREEMENT BY ANY ONLINE OR DIGITAL PROCESS, CUSTOMER HEREBY ACCEPTS THE TERMS AND CONDITIONS SET OUT BELOW. THE INDIVIDUAL ACCEPTING THIS AGREEMENT HEREBY REPRESENTS THAT SUCH INDIVIDUAL IS AN AUTHORIZED REPRESENTATIVE OF THE CUSTOMER LISTED ON AN ORDER FORM AND IS AUTHORIZED TO OBLIGATE SUCH CUSTOMER TO ALL TERMS AND CONDITIONS IN THIS AGREEMENT, AND SUCH INDIVIDUAL ACKNOWLEDGES THAT SECURITI RELIES ON SUCH REPRESENTATION IN ENTERING INTO THIS AGREEMENT. SECURITI MAY MODIFY THIS AGREEMENT FROM TIME TO TIME, AND CHANGES TO THIS AGREEMENT WILL BE POSTED ON THE SECURITI WEBSITE AND REVISIONS WILL BE INDICATED BY VERSION DATE. CUSTOMER AGREES TO BE BOUND TO ANY CHANGES TO THIS AGREEMENT WHEN CUSTOMER USES THE SECURITI PRODUCT AFTER ANY SUCH MODIFICATION BECOMES EFFECTIVE. MODIFICATIONS TO THIS AGREEMENT WILL BECOME EFFECTIVE UPON THE RENEWAL OF AN ORDER FORM. THE “EFFECTIVE DATE” OF THIS AGREEMENT IS THE DATE THIS AGREEMENT IS ACCEPTED BY CUSTOMER. THESE TERMS ARE ONLY AVAILABLE FOR ONLINE PURCHASES OF THE SECURITI AGREEMENT AND MAY NOT BE USED OR REFERRED TO FOR PURCHASES OF THE SECURITI PRODUCT THROUGH ANY OTHER CHANNEL. -------------------------------------------------------------------------------- BACKGROUND Securiti is the developer of Data Privacy, Security, Governance and Compliance solutions across hybrid and multi cloud environments. -------------------------------------------------------------------------------- 1. DEFINITIONS The following terms, when used in this Agreement will have the following meanings: “Affiliates” means an entity that directly or indirectly Controls, is Controlled by, or is under common Control with another entity, so long as such Control exists. For the purposes of this definition, “Control” means beneficial ownership of 50% or more of the voting power or equity in an entity. “Authorized Users” means the employees, contractors and service providers of Customer or its Affiliates who are authorized to access and use the Securiti Product on behalf of Customer and its Affiliates. “CCPA” means the California Consumer Privacy Act of 2018, Cal. Civ. Code, 1798.100 - 1798.198, as amended. “Confidential Information” means any information or data disclosed by either party that is marked or otherwise designated as confidential or proprietary or that should otherwise be reasonably understood to be confidential in light of the nature of the information and the circumstances surrounding disclosure. However, “Confidential Information” will not include any information which (a) is in the public domain through no fault of receiving party; (b) was properly known to receiving party, without restriction, prior to disclosure by the disclosing party; (c) was properly disclosed to receiving party, without restriction, by another person with the legal authority to do so; or (d) is independently developed by the receiving party without use of or reference to the disclosing party’s Confidential Information. Customer Data and any data or information that identifies Customer’s business or business practices (e.g., number of Customer Data records, number of consumer requests or responses processed) is the Confidential Information of Customer. The Securiti Product is the Confidential Information of Securiti. “Customer Data” means Personal Information, as defined in the CCPA or Personal Data, as defined in the GDPR or the UK GDPR that is uploaded by, or on behalf of, Customer to the Securiti Product (excluding the components downloaded to Customer's environment). “Documentation” means the printed and digital instructions, on-line help files, technical documentation and user manuals made available by Securiti for the Securiti Product. “Order Form” means an order form, quote or other similar document that sets forth the specific Securiti Product and pricing therefor, and that references this Agreement and is mutually executed by the parties. “Professional Services” means any implementation, training, configuration, consulting, data migration, conversion, integration setup, or other services provided by Securiti to Customer, as set forth in an Order Form. “Securiti Product” means the web-based application, as well as certain downloadable components that must deployed within Customer’s environment, made available to Customer by Securiti via a subscription. Securiti will host and operate such web-based application on computer servers accessible by Customer over the Internet. “Securiti Product” excludes any Customer Data contained or processed therein. -------------------------------------------------------------------------------- 2. SECURITI PRODUCT 2.1 PROVISION OF SECURITI PRODUCT. Subject to the terms and conditions of this Agreement and the Service Level Agreement (SLA) attached in Exhibit A, Securiti will make certain functions of the Securiti Product available to Customer pursuant to this Agreement and the applicable Order Form, and hereby grants Customer a non-exclusive right to access and use the Securiti Product for its privacy compliance purposes. Customer may extend the rights granted herein to its Affiliates, provided that it will ensure their compliance with this Agreement and be responsible for their acts and omissions hereunder, in each case as if they were Customer hereunder. Customer hereby grants to Securiti a royalty-free, worldwide, non-exclusive, fully paid-up license to use the Customer Data (as defined below) in order to perform and provide the Securiti Product and Professional Services for the benefit of Customer or for the purpose of enhancing product or services in accordance with the terms of this Agreement. 2.2 DATA SECURITY. Securiti will maintain a security program materially in accordance with industry standards that is designed to reasonably (i) ensure the security and integrity of Customer Data uploaded by, or on behalf of, Customer to the Securiti Product ; (ii) protect against threats or hazards to the security or integrity of Customer Data; and (iii) prevent unauthorized access to Customer Data. Securiti’s security safeguards include measures for preventing access, use, modification or disclosure of Customer Data by Securiti personnel except (a) to provide the Securiti Product and prevent or address service or technical problems, (b) as required by applicable law, or (c) as Customer expressly permits in writing or under this Agreement. Securiti will comply with the Security Exhibit attached hereto as Exhibit B, and will provide to Customer, upon request, Securiti’s most recently completed Service Organization Control 2 (SOC2) audit reports or industry-standard successor report ("Controls Reports"). Securiti will not materially diminish the protections provided in this Section during the term of this Agreement. 2.3 CUSTOMER LIMITATIONS. The rights granted herein are subject to the following restrictions. Customer will not directly or indirectly: a. reverse engineer, decompile, disassemble, modify, create derivative works of or otherwise create, attempt to create or derive, or permit or assist any third party to create or derive, the source code underlying the Securiti Product; b. attempt to probe, scan or test the vulnerability of the Securiti Product, breach the security or authentication measures of the Securiti Product without proper authorization or wilfully render any part of the Securiti Product unusable; c. use or access the Securiti Product to develop a product or service that is competitive with Securiti’s products or engage in competitive analysis or benchmarking; d. transfer, distribute, resell, lease, license, or assign the Securiti Product or otherwise offer the Securiti Product on a standalone basis; or e. otherwise use the Securiti Product outside the scope expressly permitted hereunder and in the applicable Order Form. 2.4 AUTHORIZED USERS. Customer may permit its Authorized Users to use the Securiti Product and such access rights shall not be shared with any third parties other than Authorized Users. The number of Authorized Users accessing the Securiti Product shall not exceed the maximum number of Authorized Users specified in the Order Form. 2.5 CUSTOMER RESPONSIBILITIES. a. Customer acknowledges that Securiti’s provision of the Securiti Product is dependent on Customer providing all reasonably required cooperation, and Customer will provide all such cooperation in a diligent and timely manner. b. Customer will (i) be responsible for all use of the Securiti Product under its account by parties other than Securiti and its Affiliates (whether or not authorized), (ii) use commercially reasonable efforts to prevent unauthorized access to or use of the Securiti Product and notify Securiti promptly of any such unauthorized access or use and (iii) be responsible for obtaining and maintaining any equipment, software and ancillary services needed to connect to, access or otherwise use the Securiti Product, in each case as set forth in the Documentation. Customer will be solely responsible for its failure to maintain such equipment, software and services, and Securiti will have no liability for such failure (including under any service level agreement, if applicable). c. Customer understands that the Securiti Product provides a platform whereby Customer is able to manage personal data and/or personal information, including, without limitation, the Customer Data, that may be governed by U.S., federal or state, law, including without limitation, the CCPA, as well as General Data Protection Regulation ("as implemented in the EU and in the UK ("GDPR" and "UK GDPR"), and foreign data protection and privacy laws (together, the “Applicable Laws”). The Applicable Laws regulate personal data in terms of collection, retention and transfer of such information. Customer acknowledges that under Applicable Laws, Customer assumes full responsibility as the controller (or equivalent term) of Customer Data. The Securiti Product contains tools and functions that allow the Securiti Product to be configured by Customer as necessary for its compliance with Applicable Laws. Customer assumes the responsibility as the controller (or equivalent term) of Customer Data that may be collected and reside in the Securiti Product and Customer hereby warrants, represents and, to the extent relevant, covenants, that it has or will (i) complied with all applicable transparency-related obligations under Applicable Laws (including, without limitation, displaying any and all relevant and required privacy notices or policies); (ii) obtained any and all required informed consents and/or (will) have any and all legal bases; and (iii) complied/comply at all times with any and all Applicable Laws, in order to collect, process and transfer to Securiti the Customer Data (including, without limitation, personal data), to authorize the processing by Securiti of the Customer Data and any other applicable requirements and to ensure that the Securiti Product is configured by Customer to comply with any and all Applicable Laws. For avoidance of doubt, it is Customer’s responsibility to confer as needed with legal counsel to confirm and maintain compliance by Customer with Applicable Laws. d. To the extent Customer needs Securiti to execute a Data Processing Agreement (“DPA”) subject to the GDPR or the UK GDPR, Customer shall download and execute Securiti’s DPA from Securiti’s website, which shall be deemed attached to and a part of this Agreement. To the extent Customer needs Securiti to execute a service provider addendum subject to the CCPA (“Service Provider Addendum”), Customer shall be responsible for providing such Service Provider Addendum to Securiti, which shall be negotiated in good faith by the parties. e. In the event Customer fails to comply with any Applicable Law and/or any provision of the DPA and/or Service Provider Addendum (to the extent applicable), and/or fails to return an executed version of the DPA to Securiti or provide a Service Provider Addendum to Securiti where required, then: (a) to the maximum extent permitted by law, Customer shall be solely and fully responsible and liable for and shall indemnify, defend and hold harmless Securiti and its Affiliates from, any resulting liability; and (b) the limitation of Customer’s liability under Section 7 below shall not apply in connection with Section 2.5(d) above. 2.6 CHANGES. Securiti may, from time to time, implement enhancements, upgrades, updates, improvements, modifications, extensions and other changes to the Securiti Product. Securiti shall provide Customer with access to all such changes to the specific Securiti Product subscribed to by Customer in an existing Order Form without separate charge. 2.7 SERVICE LEVEL AGREEMENT. Securiti agrees to comply with the Service Level Agreement attached hereto as Exhibit A. -------------------------------------------------------------------------------- 3. FEES 3.1 FEES. Customer will pay Securiti the fees set forth in an Order Form. Except as otherwise specified herein or in any applicable Order Form, (a) fees are quoted and payable in United States dollars and (b) payment obligations are non-cancelable and non-pro-ratable for partial months, and fees paid are non-refundable, except as otherwise expressly provided herein. Customer is not liable for any expenses incurred by Securiti (including travel, meals and hotels) except as otherwise pre-approved in writing by Customer. 3.2 LATE PAYMENT. Securiti may suspend access to the Securiti Product immediately upon notice to Customer if Customer fails to pay any non-disputed amounts hereunder at least thirty (30) days past the applicable due date. 3.3 TAXES. All amounts payable hereunder are exclusive of any sales, use and other taxes or duties, however designated (collectively “Taxes”). Customer will be solely responsible for payment of all Taxes, except for those taxes based on the income of Securiti. Customer will not withhold any taxes from any amounts due to Securiti, provided that if Customer is required by law to withhold any taxes then the invoiced amount shall be deemed increased so that the amount payable by Customer after such withholding equals the invoiced amount. -------------------------------------------------------------------------------- 4. PROPRIETARY RIGHTS AND CONFIDENTIALITY 4.1 PROPRIETARY RIGHTS. As between the parties, Securiti exclusively owns all right, title and interest in and to the Securiti Product (including any Securiti Product trademarks), and Securiti’s Confidential Information, including all System Data. “System Data” means anonymized user and other data collected by Securiti regarding the Securiti Product that may be used to generate logs, statistics and reports regarding performance, availability, integrity and security of the Securiti Product. Customer exclusively owns all right, title and interest in and to the Customer Data and Customer’s Confidential Information. 4.2 FEEDBACK. Customer may from time to time provide Securiti suggestions or comments for enhancements or improvements, new features or functionality or other feedback with respect to the Securiti Product. Securiti will have full discretion to determine whether or not to proceed with the development of any requested enhancements, new features or functionality. Securiti will have the full, unencumbered right, without any obligation to compensate or reimburse Customer, to use, incorporate and otherwise fully exercise and exploit any such feedback in connection with its products and services. 4.3 CONFIDENTIALITY. Each party agrees that it will use the Confidential Information of the other party solely in accordance with the provisions of this Agreement and it will not disclose, or permit to be disclosed, the same directly or indirectly, to any third party without the other party’s prior written consent, except as otherwise expressly permitted hereunder. However, either party may disclose Confidential Information (a) to its employees, officers, directors, attorneys, auditors, financial advisors and other representatives who have a need to know and are legally bound to keep such information confidential by confidentiality obligations consistent with those of this Agreement; and (b) as required by law (in which case the receiving party will provide the disclosing party with prior written notification thereof, will provide the disclosing party with the opportunity to contest such disclosure, and will use its reasonable efforts to minimize such disclosure to the extent permitted by applicable law). Neither party will disclose the terms of this Agreement to any third party, except that either party may confidentially disclose such terms to actual or potential lenders, investors or acquirers. Each party agrees to exercise due care in protecting the Confidential Information from unauthorized use and disclosure. In the event of actual or threatened breach of the provisions of this Section or the restrictions in Section 2.3 hereof, the non-breaching party will be entitled to seek immediate injunctive and other equitable relief, without waiving any other rights or remedies available to it. Each party will promptly notify the other in writing if it becomes aware of any violations of the confidentiality obligations set forth in this Agreement. The non-use, non-disclosure and other restrictions in this Section protecting Confidential Information shall be the sole terms that govern the protection of Confidential Information disclosed between the parties during the performance of this Agreement and any prior agreement executed between the parties addressing the protection of confidential information is superseded and replaced by this provision for all purposes. -------------------------------------------------------------------------------- 5. WARRANTIES AND DISCLAIMERS 5.1 MUTUAL. Both parties. Each party warrants that it has the authority to enter into this Agreement and, in connection with its performance of this Agreement, shall comply with all laws and regulations applicable to such party. 5.2 SECURITI. Securiti warrants that the Securiti Products will (i) substantially meet the requirements described in the relevant Order Form during the term of the Order Form consistent with prevailing industry standards, (ii) will substantially conform with the Documentation, and (iii) be free of viruses, malware, malicious code, time bombs, Trojan horses, back doors, drop dead devices, worms, self-replicating or other code of any kind that when used in Customer’s network environment, may alter, destroy, inhibit, disable, or disable or discontinue effective use of the Customer’s systems. The functionality of the Securiti Products ordered will not be materially decreased during the term of this Agreement without Securiti providing a reasonable workaround for such functionality. Securiti will perform any Professional Services in a professional and workmanlike manner. For a material breach of the foregoing express warranties contained this Section 5.2, Customer’s exclusive remedy shall be the re-performance of the deficient Securiti Product or Professional Services or, if Securiti cannot re-perform such deficient Securiti Product or Professional Services as warranted, Customer shall be entitled to terminate this Agreement for breach, any Order Form or applicable portion of the Order Form covering such Securiti Product or Professional Services in accordance with Section 8.2 and recover a pro-rata portion of the fees paid to Securiti for such deficient Securiti Product or Professional Services. 5.3 CUSTOMER. Customer warrants that it has all rights necessary to provide any information, data or other materials that it provides hereunder, and to permit Securiti to use the same as contemplated hereunder. 5.4 DISCLAIMERS. EXCEPT AS EXPRESSLY SET FORTH HEREIN, SECURITI DISCLAIMS ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY, TITLE, NON-INFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMER ACKNOWLEDGES THAT THE SECURITI PRODUCT IS INTENDED ONLY TO AUGMENT CUSTOMER’S PRIVACY PRACTICES, BUT NOT REPLACE, LEGAL AND OTHER PROFESSIONAL ADVISORS. CUSTOMER IS A DATA CONTROLLER, RESPONSIBLE FOR WHICH DATA IT COLLECTS, AND IS RESPONSIBLE FOR ITS OWN PRIVACY POLICIES. EXCEPT AS EXPRESSLY SET FORTH HEREIN, SECURITI DOES NOT WARRANT THAT ACCESS TO THE SECURITI PRODUCTS WILL BE UNINTERRUPTED OR ERROR-FREE, THAT ALL DEFECTS AND ERRORS IN THE SECURITI PRODUCTS WILL BE CORRECTED, OR THAT THE SECURITI PRODUCTS AND SERVICES WILL MEET CUSTOMER’S PARTICULAR REQUIREMENTS OR EXPECTATIONS. SECURITI SHALL NOT BE LIABLE OR RESPONSIBLE FOR ANY DELAYS, INTERRUPTIONS, SERVICE FAILURES, AND ANY OTHER PROBLEMS ARISING FROM CUSTOMER’S USE OF THE INTERNET, ELECTRONIC COMMUNICATIONS OR ANY OTHER SYSTEMS. THE PROVISIONS OF THIS SECTION ALLOCATE THE RISKS UNDER THIS AGREEMENT BETWEEN SECURITI AND CUSTOMER. SECURITI’S PRICING REFLECTS THIS ALLOCATION OF RISK AND THE LIMITED WARRANTIES SPECIFIED HEREIN. -------------------------------------------------------------------------------- 6. INDEMNIFICATION 6.1 INDEMNITY BY SECURITI. Securiti will defend Customer against any claim, demand, suit, or proceeding made or brought against Customer by a third party (“Claim”) (i) alleging that the use of the Securiti Product as permitted hereunder infringes or misappropriates a United States patent, copyright or trade secret or trademark of any third party, or (ii) arising out of any use or disclosure of Customer Data by Securiti in breach of this Agreement and in respect of each Claim described in (i) and (ii) above, Securiti will indemnify Customer for any liabilities, awards, penalties or costs (including reasonable attorneys' fees) in connection with any such Claim (“Costs”); provided that (a) Customer will promptly notify Securiti of such Claim (provided that the failure to provide such notice shall not relieve Securiti of its indemnification obligations except to the extent of any material prejudice directly resulting from such failure), (b) Securiti will have the sole and exclusive authority to defend and/or settle any such Claim (provided that Securiti may not settle any Claim without Customer’s prior written consent, which will not be unreasonably withheld, unless it unconditionally releases Customer of all related liability) and (c) Customer reasonably cooperates with Securiti in connection therewith. If the use of the Securiti Product by Customer has become, or in Securiti’s opinion is likely to become, the subject of any claim of infringement, Securiti may at its option and expense (i) procure for Customer the right to continue using and receiving the Securiti Product as set forth hereunder; (ii) replace or modify the Securiti Product to make it non-infringing (with comparable functionality); or (iii) if the options in clauses (i) or (ii) are determined by Securiti to not be reasonably practicable, terminate this Agreement and provide refund of any prepaid unused fees corresponding to the terminated portion of the applicable subscription term. Securiti will have no liability or obligation with respect to any Claim to the extent such Claim results from (A) compliance with designs, guidelines, plans or specifications provided by Customer, or the use or inclusion of Customer Data; (B) use of the Securiti Product by Customer not in accordance with this Agreement or in violation of any applicable law; (C) modification of the Securiti Product by any party other than Securiti without Securiti’s express consent; (D) Customer Confidential Information or (E) the combination, operation or use of the Securiti Product with other applications, portions of applications, product(s) or services in a manner not reasonably required where the Securiti Product would not by itself be infringing (clauses (A) through (E), “Excluded Claims”). This Section states Securiti’s sole and exclusive liability and obligation, and Customer’s exclusive remedy, for any claim of any nature related to infringement or misappropriation of intellectual property. 6.2 INDEMNIFICATION BY CUSTOMER. Customer will defend Securiti against any Claim made or brought against Securiti by a third party arising out of the Excluded Claims, and Customer will indemnify Securiti for any Costs in connection with any such Claim; provided that (a) Securiti will promptly notify Customer of such Claim (provided that the failure to provide such notice shall not relieve Customer of its indemnification obligations except to the extent of any material prejudice directly resulting from such failure), (b) Customer will have the sole and exclusive authority to defend and/or settle any such Claim (provided that Customer may not settle any Claim without Securiti’s prior written consent, which will not be unreasonably withheld, unless it unconditionally releases Securiti of all liability) and (c) Securiti reasonably cooperates with Customer in connection therewith. -------------------------------------------------------------------------------- 7. LIMITATION OF LIABILITY UNDER NO LEGAL THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, WILL EITHER PARTY OR ITS AFFILIATES, OR THEIR RESPECTIVE DIRECTORS, OFFICERS, EMPLOYEES, AGENTS OR CONTRACTORS, BE LIABLE TO THE OTHER UNDER THIS AGREEMENT FOR (A) ANY INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL OR PUNITIVE DAMAGES OF ANY CHARACTER, INCLUDING DAMAGES FOR LOSS OF GOODWILL, LOST PROFITS, LOST SALES OR BUSINESS, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, LOST CONTENT OR DATA, EVEN IF A REPRESENTATIVE OF SUCH PARTY HAS BEEN ADVISED, KNEW OR SHOULD HAVE KNOWN OF THE POSSIBILITY OF SUCH DAMAGES, OR (B) EXCLUDING CUSTOMER’S PAYMENT OBLIGATIONS, ANY DIRECT DAMAGES, COSTS, OR LIABILITIES IN EXCESS OF THE AMOUNTS PAID BY CUSTOMER UNDER THE APPLICABLE ORDER FORM DURING THE THIRTY SIX (36) MONTHS PRECEDING THE INCIDENT OR CLAIM. -------------------------------------------------------------------------------- 8. TERMINATION 8.1 TERM. The term of this Agreement will commence on the Effective Date and continue until terminated as set forth below. The initial term of each Order Form will begin on the Order Form effective date of such Order Form and will continue for the subscription term set forth therein. Except as set forth in such Order Form, the term of such Order Form will automatically renew for successive renewal terms equal to the length of the initial term of such Order Form, unless either party provides the other party with written notice of non-renewal at least thirty (30) days prior to the end of the then-current term. 8.2 TERMINATION. Each party may terminate this Agreement upon written notice to the other party if there are no Order Forms then in effect. Each party may also terminate this Agreement or the applicable Order Form upon written notice in the event (a) the other party commits any material breach of this Agreement or the applicable Order Form and fails to remedy such breach within thirty (30) days after written notice of such breach or (b) subject to applicable law, upon the other party’s liquidation, commencement of dissolution proceedings or assignment of substantially all its assets for the benefit of creditors, or if the other party become the subject of bankruptcy or similar proceeding that is not dismissed within sixty (60) days. 8.3 EFFECT OF TERMINATION. Upon any termination or expiration of this Agreement: (i) Securiti will terminate Customer’s access to the Securiti Product and will cease providing such services; (ii) Customer shall immediately cease any and all use of and access to any Securiti Products; and (iii) each party hereunder shall return to the other party any and all Confidential Information of the other party in its possession. Termination shall not relieve Customer of the obligation to pay Securiti the fees agreed in an Order Form. 8.4 SURVIVAL. Upon termination of this Agreement all rights and obligations will immediately terminate except that any terms or conditions that by their nature should survive such termination will survive, including the restrictions in Section 2.3 hereof, and terms and conditions relating to proprietary rights and confidentiality, payment, disclaimers, indemnification, limitations of liability and termination and the general provisions below. -------------------------------------------------------------------------------- 9. GENERAL 9.1 EXPORT COMPLIANCE. Each party will comply with the export laws and regulations of the United States, European Union and other applicable jurisdictions in providing and using the Securiti Product. 9.2 PUBLICITY. Customer agrees that Securiti may refer to Customer’s name and trademarks in Securiti’s marketing materials and website and case studies, provided Customer is allowed to review such use prior to publication. Securiti will not refer to Customer or its business in a press release without Customer’s prior written consent. In addition, Customer agrees to become part of Securiti’s reference program by working with a representative from Securiti’s marketing team to develop a customer profile for use on Securiti’s website. The profile will include a quote from an executive of Customer and Customer’s logo. 9.3 ASSIGNMENT; DELEGATION. Neither party hereto may assign or otherwise transfer this Agreement, in whole or in part, without the other party’s prior written consent, except that either party may assign this Agreement without consent to a successor to all or substantially all of its assets or business related to this Agreement. Any attempted assignment, delegation, or transfer by either party in violation hereof will be null and void. Subject to the foregoing, this Agreement will be binding on the parties and their successors and assigns. 9.4 AMENDMENT; WAIVER. No amendment or modification to this Agreement, nor any waiver of any rights hereunder, will be effective unless assented to in writing by both parties. Any such waiver will be only to the specific provision and under the specific circumstances for which it was given, and will not apply with respect to any repeated or continued violation of the same provision or any other provision. Failure or delay by either party to enforce any provision of this Agreement will not be deemed a waiver of future enforcement of that or any other provision. 9.5 RELATIONSHIP. Nothing contained herein will in any way constitute any association, partnership, agency, employment or joint venture between the parties hereto, or be construed to evidence the intention of the parties to establish any such relationship. Neither party will have the authority to obligate or bind the other in any manner, and nothing herein contained will give rise or is intended to give rise to any rights of any kind to any third parties. 9.6 UNENFORCEABILITY. If a court of competent jurisdiction determines that any provision of this Agreement is invalid, illegal, or otherwise unenforceable, such provision will be enforced as nearly as possible in accordance with the stated intention of the parties, while the remainder of this Agreement will remain in full force and effect and bind the parties according to its terms. 9.7 GOVERNING LAW; VENUE. This Agreement will be governed by the laws of the State of California, exclusive of its rules governing choice of law and conflict of laws. The parties agree to submit to the exclusive jurisdiction of (i) the state courts located in Santa Clara County in the State of California and (ii) the federal courts located in the Northern District of California, with respect to disputes hereunder. This Agreement will not be governed by the United Nations Convention on Contracts for the International Sale of Goods or by Uniform Computer Information Transactions Act (UCITA). 9.8 NOTICES. Any notice required or permitted to be given hereunder will be given in writing by personal delivery, certified mail, return receipt requested, by overnight delivery, or by email or fax. Notices will be deemed given upon verifiable receipt 9.9 ENTIRE AGREEMENT. This Agreement comprises the entire agreement between Customer and Securiti with respect to its subject matter, and supersedes all prior and contemporaneous proposals, statements, sales materials or presentations and agreements (oral and written). No oral or written information or advice given by Securiti, its agents or employees will create a warranty or in any way increase the scope of the warranties in this Agreement. 9.10 FORCE MAJEURE. Neither Party will be deemed in breach hereunder for any cessation, interruption or delay in the performance of its obligations due to causes beyond its reasonable control (“Force Majeure Event”), including earthquake, flood, or other natural disaster, act of god, labor controversy, civil disturbance, terrorism, war (whether or not officially declared), cyber-attacks (e.g., denial of service attacks), or the inability to obtain sufficient supplies, transportation, or other essential commodity or service required in the conduct of its business, or any change in or the adoption of any law, regulation, judgment or decree. -------------------------------------------------------------------------------- EXHIBIT A SUPPORT SERVICES AND AVAILABILITY SLA CUSTOMER SUPPORT. Securiti provides the following support services: * Support Services: * For Critical issues, Securiti support team provides support 24 hours a day, 7 days a week, 52 weeks a year. * For priorities High, Medium, and Low, Securiti support team delivers technical support on a 24x5 follow-the-sun model. Limited technical support during weekends and US national holidays. * Customers can reach Securiti Support Services in the following ways: * By email at: support@securiti.ai * Via the Securiti Portal at https://app.securiti.ai/#/customer-support (https://app.eu.securiti.ai in case of the EU Production Cloud) * Securiti provides the following response times for service issues: Issue Severity Initial Contact Status Update Critical- Priority 1 (P1) Service is down. No workaround available. 2 hours 4 hours High – Priority 2 (P2) The Customer can access the Securiti service, however one or more significant features are unavailable. 4 hours 12 hours Medium – Priority 3 (P3) General support questions or other issues that prevent the Customer from using a feature of the Securiti service 8 hours 2 business days Low – Priority 4 (P4) Product function is not impaired and has no impact on Customer business. 24 hours 4 business days Communication Channels: EMAIL COMMUNICATION TOOL support@securiti.ai Open a support ticket athttps://app.securiti.ai/#/customer-support or https://app.eu.securiti.ai/#/customer-support Customer Technical Contact(s): NAME(S) EMAIL(S) Live technical support will not be available on Christmas Day (December 25) and New Year’s Day (January 1). Limited technical support will be available during the hours listed above during Securiti holidays. The current Securiti holidays are set forth below: * Presidents Day (third Monday of February) * Memorial Day (last Monday of May) * Independence Day (July 4) * Labor Day (first Monday of September) * Thanksgiving Day (fourth Thursday in November) * Christmas Eve (December 24) * New Year’s Eve (December 31) Initial privileged customer support accounts will be created for the customer contacts listed above. Additional privileged customer support accounts may be created based on a documented authorization request from a designated customer contact above or by Customer directly. AVAILABILITY COMMITMENT. To the extent hosted and operated by or on behalf of Securiti, the Securiti Product will be Available for the percentage of the time listed below, measured on a calendar monthly basis (the “Availability Commitment”). “Availability” means that the Securiti Product is available for use by the Customer. Availability measures will not include downtime resulting from: * Software Upgrades: Customer will receive prior notice by email of Securiti’s upgrade windows, which will be scheduled between 2pm and midnight Pacific Time to the extent feasible. Downtime due to upgrades will not exceed 2 hours per month. All upgrades will be in-service software upgrades. List of upcoming upgrades can be found on the status.securiti.ai site. * Pre-scheduled maintenance periods: Customer will receive at least 24 hours prior notification by email of pre-scheduled maintenance periods. Maintenance shall be scheduled between 2pm and midnight Pacific Time. Downtime due to pre-scheduled maintenance will not exceed 2 hours per month. List of pre-scheduled maintenance can be found on the status.securiti.ai site. Securiti will strive to perform the needed maintenance without impacting any functionality. * Emergency maintenance periods: Customer will receive prior notification by email on a commercially reasonable efforts basis. These maintenance periods will involve applying critical security patches and other emergency repairs to the Securiti infrastructure. In order to receive the above notification emails, customer should subscribe to notifications on https://status.securiti.ai (or https://status.eu.securiti.ai for our EU Production cloud). Notifications will also be delivered via the portal 60 minutes prior to an upgrade or scheduled maintenance. The Availability Commitment does not apply to any downtime of the Securiti Product that results from: * Account suspension or termination due to Customer’s breach of the Agreement; * Disengagement of functionality of the Securiti Product due to Customer’s request; * Force Majeure Events; or * Customer’s or its service provider’s equipment, software or other technology. Securiti will provide Customer with reports on Availability upon request. CREDIT. If Securiti fails to achieve an Availability Commitment of 99.5% for the Securiti Product, Customer may claim a credit as provided below. PERCENTAGE AVAILABILITY PER MONTH CREDIT 99.5-100.0 0% 97.0-99.49 4% 94.0-96.99 6% 92.0-93.99 10% Notwithstanding the above, if Securiti fails to achieve an Availability Commitment of 99.95% for the following five (5) Securiti Products, Customer may claim a credit as provided below: (1) Website Scanning and Consent, (2) Universal Consent Management, (3) Workflow Automation, (4) DSR Portal and Workbench ,and (5) Privacy Notice Management: PERCENTAGE AVAILABILITY PER MONTH CREDIT 99.95-100.0 0% 97.0-99.94 4% 94.0-96.99 6% 92.0-93.99 10% Customer will not be entitled to a credit if it is in breach of its Agreement with Securiti, including payment obligations. To receive a credit, a Customer must file a claim for such credit within fifteen (15) days following the end of the month in which the Availability Commitment was not met by contacting Securiti at support@securiti.ai (or by opening a customer support ticket at https://app.securiti.ai/#/customer-support or https://app.eu.securiti.ai/#/customer-support in case of our EU Production cloud) with a complete description of the downtime, how Customer was adversely affected, and for how long. The credit remedy set forth in this Service Level Agreement is Customer’s sole and exclusive remedy for the unavailability of the Securiti Product; provided that Customer shall have the right to terminate this Agreement if Securiti fails to achieve an Availability Commitment of 92% or better in three consecutive months; provided further that notwithstanding anything to the contrary in the Agreement, Customer shall have no payment obligations for services to be performed following such termination. If Customer has purchased the Securiti Product through a third party, then any credit shall be calculated based upon fees received by Securiti from the third party that are associated with Customer’s purchase of the Securiti Product. -------------------------------------------------------------------------------- EXHIBIT B SECURITY EXHIBIT Securiti maintains a comprehensive, written information security program that contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope and type of Securiti’s business; (b) the type of information that Securiti will store; and (c) the need for security and confidentiality of such information. Securiti’s security program includes: 1. SECURITY AWARENESS AND TRAINING. A mandatory security awareness and training program for all members of Securiti’s workforce (including management), which includes: * Training on how to implement and comply with its Information Security Program; and * Promoting a culture of security awareness through periodic communications from senior management with employees. 2. ACCESS CONTROLS. Policies, procedures, and logical controls: * To limit access to its information systems and the facility or facilities in which they are housed to properly authorized persons; * To prevent those workforce members and others who should not have access from obtaining access; and * To remove access in a timely basis in the event of a change in job responsibilities or job status. 3. PHYSICAL AND ENVIRONMENTAL SECURITY. Controls that provide reasonable assurance that access to physical servers at the production data center, if applicable, is limited to properly authorized individuals and that environmental controls are established to detect, prevent and control destruction due to environmental extremes. These controls are implemented by Amazon Web Services (AWS) and they are listed here: https://aws.amazon.com/compliance/data-center/controls/. Specific to Securiti: * Logging and monitoring of unauthorized access attempts to the data center by the data center security personnel; * Camera surveillance systems at critical internal and external entry points to the data center, with retention of data per legal or compliance requirements; * Systems that monitor and control the air temperature and humidity at appropriate levels for the computing equipment; and * Redundant power supply modules and backup generators that provide backup power in the event of an electrical failure, 24 hours a day. 4. SECURITY INCIDENT PROCEDURES. A security incident response plan that includes procedures to be followed in the event of any Security Breach. Such procedures include: * Roles and responsibilities: formation of an internal incident response team with a response leader; * Investigation: assessing the risk the incident poses and determining who may be affected; * Communication: internal reporting as well as a notification process in the event of unauthorized disclosure of Customer Data; * Recordkeeping: keeping a record of what was done and by whom to help in later analysis and possible legal action; and * Audit: conducting and documenting root cause analysis and remediation plan. 5. CONTINGENCY PLANNING. Policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, pandemic flu, and natural disaster) that could damage Customer Data or production systems that contain Customer Data. Such procedures include: * Data Backups: A policy for performing periodic backups of production data sources, as applicable, according to a defined schedule; * Disaster Recovery: A formal disaster recovery plan for the production data center, including: * Requirements for the disaster plan to be tested on a regular basis, currently twice a year; and * A documented executive summary of the Disaster Recovery testing, at least annually, which is available upon request to customers. * Business Continuity Plan: A formal process to address the framework by which an unplanned event might be managed in order to minimize the loss of vital resources. 6. AUDIT CONTROLS. Hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic information. 7. DATA INTEGRITY. Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. 8. STORAGE AND TRANSMISSION SECURITY. Security measures to guard against unauthorized access to Customer Data that is being transmitted over a public electronic communications network or stored electronically. Such measures include requiring encryption of any Customer Data stored on desktops, laptops or other removable storage devices. 9. SECURE DISPOSAL. Policies and procedures regarding the secure disposal of tangible property containing Customer Data, taking into account available technology so that Customer Data cannot be practicably read or reconstructed. 10. ASSIGNED SECURITY RESPONSIBILITY. Assigning responsibility for the development, implementation, and maintenance of Securiti’s security program, including: * Designating a security official with overall responsibility; * Defining security roles and responsibilities for individuals with security responsibilities; and * Designating a Security Council consisting of cross-functional management representatives to meet on a regular basis. 11. TESTING. Regularly testing the key controls, systems and procedures of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified. Where applicable, such testing includes: * Internal risk assessments; * Service Organization Control 2 (SOC2) audit reports (or industry-standard successor reports). 12. MONITORING. Network and systems monitoring, including error logs on servers, disks and security events for any potential problems. Such monitoring includes: * Reviewing changes affecting systems handling authentication, authorization, and auditing; * Reviewing privileged access to Securiti production systems; and * Engaging third parties to perform network vulnerability assessments and penetration testing on a regular basis. 13. CHANGE AND CONFIGURATION MANAGEMENT. Maintaining policies and procedures for managing changes Securiti makes to production systems, applications, and databases. Such policies and procedures include: * process for documenting, testing and approving the patching and maintenance of the Securiti Product; * A security patching process that requires patching systems in a timely manner based on a risk analysis; and * A process for Securiti to utilize a third party to conduct application level security assessments. These assessments generally include testing, where applicable, for: * * Cross-site request forgery * Services scanning * Improper input handling (e.g. cross-site scripting, SQL injection, XML injection, cross-site flashing) * XML and SOAP attacks * Weak session management * Data validation flaws and data model constraint inconsistencies * Insufficient authentication * Insufficient authorization 14. PROGRAM ADJUSTMENTS. Monitoring, evaluating, and adjusting, as appropriate, the security program in light of: * Any relevant changes in technology and any internal or external threats to Securiti or the Customer Data; * Security and data privacy regulations applicable to Securiti; and * Securiti’s own changing business arrangements, such as mergers and acquisitions, alliances and joint ventures, outsourcing arrangements, and changes to information systems. 15. DEVICES. Ensuring that all laptop and desktop computing devices utilized by Securiti and any subcontractors when accessing Customer Data: * will be equipped with a minimum of AES 128 bit full hard disk drive encryption; * will have up to date virus and malware detection and prevention software installed with virus definitions updated on a regular basis; and * will maintain virus and malware detection and prevention software so as to remain on a supported release. This will include, but not be limited to, promptly implementing any applicable security-related enhancement or fix made available by the supplier of such software. 16. DATA SECURITY BREACH. " Security Breach" means any security incident if there is a reason to believe Customer Data has been or may have been accessed by an unauthorized party. * Securiti will notify Customer of a Security Breach as soon as practicable, but no later than seventy two (72) hours after Securiti becomes aware of it, by e-mailing Customer with a read receipt at a Customer designated email address, with a copy by e-mail to Securiti’s primary business contact within Customer. * Securiti agrees that unless required by law, it shall not inform any third party that a Security Breach without Approval. Further, Securiti agrees that Customer shall have the sole right to determine whether notice of the Security Breach is to be provided to consumers associated with Customer Data. 17. RETURN OR DESTRUCTION OF CUSTOMER DATA. * Customer Data may be deleted by Securiti following the termination or suspension of Customer’s use of the Securiti Product. * Customer may request that Securiti delete Customer Data by notifying the Securiti support team via a ticket filed using the Customer Support link in a Securiti account, or via an email to support@securiti.ai. Upon Securiti receiving confirmation from Customer of the deletion request, Securiti will delete all Customer Data from online systems within one business week of such confirmation. * Securiti may retain Customer Data to the extent required by applicable laws and only to the extent and for such period as required by applicable law. 18. INSURANCE At all times Securiti accesses, processes or stores Customer Data, Securiti will maintain: Errors & Omissions/Professional Liability /Cyber Insurance, in an amount not less than $3,000,000 per claim and annual aggregate, covering all acts, errors, omissions, negligence, and in the performance of services for Customer or on behalf of Customer hereunder. Securiti’s policy will provide for Data Security & Privacy “Cyber” coverage (including coverage for unauthorized access and use, failure of security, breach of confidential information, of privacy perils, as well as breach mitigation costs and regulatory coverage). Such insurance shall be maintained in force at all times during the term of the Agreement and for a period of two years thereafter for services completed during the term of the Agreement. Customer shall be given at least 30 days’ notice of the cancellation or expiration of the aforementioned insurance for any reason. DATA PROCESSING AGREEMENT / ADDENDUM DATA PROCESSING AGREEMENT/ADDENDUM This Data Processing Agreement (“DPA”), made and entered into as of this ____ day of ____, 2022, forms part of the Securiti Customer Agreement (the “Agreement”). You acknowledge that you, on behalf of [______] incorporated under __________ law, with its principal offices located at ____________________ (“Organization”) (collectively, ”You”, ”Your”, “Client”, or “Data Controller”) have read and understood and agree to comply with this DPA, and are entering into a binding legal agreement with Securiti as defined below (“Securiti”, ”Us”, ”We”, ”Our”, “Service Provider” or “Data Processor”) to reflect the parties’ agreement with regard to the Processing of Client Personal Data (as such terms are defined below). Both parties shall be referred to as the “Parties” and each, a “Party”. WHEREAS, Securiti shall provide the services set forth in the Agreement (collectively, the “Services”) for Client, as described in the Agreement; and WHEREAS, In the course of providing the Services pursuant to the Agreement, we may process Client Personal Data on your behalf, in the capacity of a “Data Processor”; and the Parties wish to set forth the arrangements concerning the processing of Client Personal Data (defined below) within the context of the Services and agree to comply with the following provisions with respect to any Client Personal Data, each acting reasonably and in good faith. NOW THEREFORE, in consideration of the mutual promises set forth herein and other good and valuable consideration, the receipt and sufficiency of which are hereby acknowledged by the Parties, the parties, intending to be legally bound, agree as follows: 1. INTERPRETATION AND DEFINITIONS 1. The headings contained in this DPA are for convenience only and shall not be interpreted to limit or otherwise affect the provisions of this DPA. 2. References to clauses or sections are references to the clauses or sections of this DPA unless otherwise stated. 3. Words used in the singular include the plural and vice versa, as the context may require. 4. Capitalized terms not defined herein shall have the meanings assigned to such terms in the Agreement. 5. Definitions: 1. “Affiliate” means an entity that directly or indirectly Controls, is Controlled by, or is under common Control with another entity, so long as such Control exists. For the purposes of this definition, “Control” means direct or indirect ownership or control of more than 50% of the voting interests of the subject entity. 2. “Authorized Affiliate” means any of Client’s Affiliate(s) which (a) is subject to the Data Protection Laws And Regulations of the European Union, the European Economic Area and/or their member states, Switzerland and/or the United Kingdom, and (b) is permitted to use the Services pursuant to the Agreement between Client and Securiti, but has not signed its own agreement with Securiti and is not a “Customer” as defined under the Agreement. 3. “Client Personal Data” means any Personal Data Processed by Securiti on behalf of Client or a third party Data Controller (as applicable) in connection with the Services. 4. “Controller” or “Data Controller” means the entity which determines the purposes and means of the Processing of Personal Data as defined by the GDPR. For the purposes of this DPA only, and except where indicated otherwise, the term “Data Controller” shall include the Organization and/or the Organization’s Authorized Affiliates. 5. “Data Protection Laws and Regulations” means (i) the GDPR, as defined herein; (ii) the Data Protection Act 2018 of the United Kingdom, as amended from time to time, and including any substantially similar legislation that replaces the DPA 2018; (iii) the national legislation of the Swiss Confederation on the protection of Data Subjects with regard to the processing of Personal Data and on the free movement of such data, as amended from time to time, and other data protection or privacy legislation in force from time to time in the Swiss Confederation; and (iv) the Personal Information Protection and Electronic Documents Act of Canada (“PIPEDA”) and all Canadian provincial laws related to privacy and data security; 6. “Data Subject” means the identified or identifiable person to whom the Personal Data relates. 7. “Member State” means a country that belongs to the European Union and/or the European Economic Area. “Union” means the European Union. 8. “GDPR” means (i) Regulation (EU) 2016/679 together with applicable legislation implementing or supplementing the same or otherwise relating to the processing of Personal Data of natural persons; and (ii) the retained Regulation (EU) 2016/679 in the United Kingdom (“UK GDPR”). 9. “Personal Data” means any information relating to an identified or identifiable natural person; an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person. 10. “Process(ing)” means any operation or set of operations which is performed upon Personal Data, whether or not by automatic means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction. 11. “Processor” or “Data Processor” means the entity which Processes Personal Data on behalf of the Controller as defined by the GDPR. 12. “Security Documentation” means the Security Documentation applicable to the specific Services purchased by Client, as updated from time to time, and as made reasonably available by Securiti. 13. “Securiti” means Securiti Inc. and any of its affiliates or subsidiaries. 14. “Securiti Group” means Securiti and its Affiliates engaged in the Processing of Personal Data. 15. “Sub-processor” means any Processor engaged by Securiti to Process Personal Data on behalf of Client. 16. “Supervisory Authority” means an independent public authority which is established by an EU Member State or the United Kingdom pursuant to the GDPR. 2. PROCESSING OF CLIENT PERSONAL DATA 1. Roles of the Parties. This DPA applies to the Processing of Client Personal Data by Securiti. For the purposes of this DPA, (i) Client is the Data Controller; (ii) with respect to Client Personal Data for which Client is the Data Controller, Securiti is the Data Processor Processing such Client Personal Data on Client’s behalf; (iii) with respect to Client Personal Data for which Client is a Data Processor for a third party Data Controller, Securiti is a Sub-processor to Process Client Personal Data on the third party Data Controller’s behalf. To the extent Securiti acts as a Sub-processor to a third party Data Controller, (a) Client will convey to Securiti any notifications given by the third party Data Controller insofar as they relate to the Services provided by Securiti; b) any instructions or authorizations given by Client to Securiti under this DPA or otherwise relating to the Processing of Client Personal Data are the instructions and authorizations given by the third party Data Controller. 2. Client’s Processing of Personal Data. Client shall, in its use of the Services, Process Personal Data in accordance with the requirements of Data Protection Laws and Regulations and comply at all times with the obligations applicable to Data Controllers under Data Protection Laws and Regulations, as applicable, (including, without limitation, Article 24 of the GDPR), to the extent Client acts as a Controller under the Ag reement. For the avoidance of doubt, Client’s instructions for the Processing of Personal Data shall comply with Data Protection Laws and Regulations. Client shall have sole responsibility for the means by which Client acquired Personal Data. Without limitation and in any case, Client shall comply with any and all transparency-related obligations under Data Protection Laws and Regulations as applicable (including, without limitation, displaying any and all relevant and required privacy notices or policies) and shall at all times have any and all ongoing legal bases, consents, and authorizations required by applicable Data Protection Laws and Regulations in order to collect, Process and transfer to Securiti the Client Personal Data and to authorize the Processing by Securiti of Client Personal Data. In particular, and without limiting the foregoing, Client shall be responsible for ensuring that any Data Subjects whose Client Personal Data is subject to PIPEDA have received notice of, and have provided consent as may be required for, the transfer of data to the United States for Processing by Securiti. Client shall defend, hold harmless and indemnify Securiti, its Affiliates and subsidiaries (including without limitation their directors, officers, agents, subcontractors and/or employees) from and against any liability of any kind related to any breach, violation or infringement by Client and/or its authorized users of any Data Protection Laws and Regulations and/or this DPA and/or this Section. 3. Securiti’s Processing of Client Personal Data. 1. Subject to the Agreement, Securiti shall Process Client Personal Data in accordance with Client’s documented instructions, including as necessary for the performance of the Services and for the performance of the Agreement and this DPA, unless otherwise required by Union or Member State law or any other applicable to which Securiti is subject, in which case Securiti shall inform the Client of the legal requirement before processing, unless that law prohibits such information on important grounds of public interest. The duration of the Processing, the nature and purposes of the Processing, as well as the types of Personal Data Processed and categories of Data Subjects under this DPA are further specified in Schedule 1 (Details of the Processing) to this DPA. 2. To the extent that Securiti considers such an instruction issued by Client to be unlawful, Securiti (i) shall inform Client of its determination, (ii) may, without any kind of liability towards Client, temporarily cease all Processing of the affected Client Personal Data (other than securely storing those data), and (iii) if the Parties do not agree on a resolution to the issue in question and the costs thereof, each Party may, as its sole remedy, terminate the Agreement and this DPA solely with respect to the affected Processing, and Client shall pay to Securiti all the amounts owed to Securiti or due before the date of termination. Client will have no further claims against Securiti (including, without limitation, requesting refunds for Services) due to the termination of the Agreement and/or the DPA in accordance with this paragraph (excluding the obligations relating to the termination of this DPA set forth below). 3. Securiti will not be liable in the event of any claim brought by a third party, including, without limitation, a Data Subject, arising from any act or omission of Securiti, to the extent that such is a result of Client’s instructions. 4. If Client provides Securiti or any of the entities of the Securiti Group with instructions, requests, suggestions, comments or feedback (whether orally or in writing) with respect to the Services, Client acknowledges that any and all rights, including intellectual property rights, therein shall belong exclusively to Securiti and that such shall be considered Securiti’s intellectual property without restrictions or limitations of any kind, and Client hereby irrevocably and fully transfers and assigns to Securiti any and all intellectual property rights therein and waives any and all moral rights that Client may have in respect thereto. 3. RIGHTS OF DATA SUBJECTS If Securiti receives a request from a Data Subject to exercise its right to be informed, right of access, right to rectification, erasure, restriction of Processing, data portability, right to object, or its right not to be subject to a decision solely based on automated processing, including profiling (“Data Subject Request”), Securiti shall, to the extent legally permitted, promptly notify and forward such Data Subject Request to Client. Taking into account the nature of the Processing, Securiti shall use commercially reasonable efforts to assist Client using appropriate technical and organizational measures, insofar as this is possible, for the fulfilment of Client’s obligation to respond to a Data Subject Request under Data Protection Laws and Regulations. To the extent legally permitted, Client shall be responsible for any costs arising from Securiti’s provision of such assistance. 4. SECURITI PERSONNEL 1. Confidentiality. Securiti shall ensure that authorized persons engaged in the Processing of Client Personal Data have committed themselves to confidentiality or are under an appropriate statutory or other obligation of confidentiality. 2. Securiti may disclose and Process the Client Personal Data (a) as permitted hereunder (b) to the extent required by a court of competent jurisdiction or other Supervisory Authority and/or otherwise as required by applicable laws or applicable Data Protection Laws and Regulations. 5. AUTHORIZATION REGARDING SUB-PROCESSORS 1. General Authorization for Use of Sub-processors. Client hereby expressly and generally authorizes Securiti to engage Sub-processors to Process Client Personal Data, and Securiti’s current list of Sub-processors is enclosed in Schedule 2 to the DPA. 2. Notification for Change in Sub-processors. Securiti shall provide notification of any new Sub-processor(s) before authorizing such new Sub-processor(s) to Process Client Personal Data in connection with the provision of the Services. In order to receive such notification, Client shall subscribe to notifications of new Sub-processors on the Securiti website, available at https://status.securiti.ai. 3. Objection Right for New Sub-processors. Client may reasonably object to Securiti’s use of a new Sub-processor for reasons related to the GDPR by notifying Securiti promptly in writing at privacy@securiti.ai within three (3) business days after receipt of Securiti’s notice in accordance with the mechanism set out in Section 5.2, and such written objection shall include the reasons related to the GDPR for objecting to Securiti’s use of such new Sub-processor. Failure to object to such new Sub-processor in writing within three (3) business days following Securiti’s notice shall be deemed as acceptance of the new Sub-Processor. In the event Client reasonably objects to a new Sub-processor, Securiti will use reasonable efforts to make available to Client a change in the Services or recommend a commercially reasonable change to Client’s use of the Services to avoid Processing of Client Personal Data by the objected-to new Sub-processor without unreasonably burdening the Client. If Securiti is unable to make available such change within a reasonable period of time, which shall not exceed thirty (30) days, Client may, as a sole remedy, terminate the Agreement and this DPA solely with respect to those Services which cannot be provided by Securiti without the use of the objected-to new Sub-processor. Client must exercise this remedy by providing written notice to Securiti, provided that all amounts due under the Agreement before the termination date with respect to the Processing at issue shall be duly paid to Securiti. Until a decision is made regarding the new Sub-processor, Securiti may temporarily suspend the Processing of the affected Personal Data. Client will have no further claims against Securiti due to the termination of the Agreement (including, without limitation, requesting refunds) and/or the DPA in accordance with this paragraph. 4. Agreements with Sub-processors. Securiti, in engaging Sub-processors to Process Client Personal Data, agrees to impose contractual terms on such Sub-processors that are materially as protective as those set forth in this DPA. For the avoidance of doubt, this Section 5.3 shall not apply to subcontractors of Securiti that provide ancillary services to support the performance of this DPA and do not directly receive Client Personal Data from Securiti, such as telecommunication services, maintenance and user services, cleaning staff or auditors. 6. SECURITY 1. Controls for the Protection of Client Personal Data. Taking into account the state of the art, the costs of implementation, the scope, context, purposes of the Processing, as well as the risk of varying likelihood and impact on the rights and freedoms of natural persons, Securiti shall maintain appropriate technical and organizational measures pursuant to Article 32 of the GDPR for protection of the security (including protection against unauthorized or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorized disclosure of, or access to, Personal Data), confidentiality and integrity of Personal Data, as set forth in the Security Documentation which are hereby approved by Client. Any amendment to such agreed measures that is necessitated by Articles 32 to 36 of GDPR due to a change in the types of Personal Data Processed shall be dealt with via an agreed change control process between Securiti and Client. 2. Third-Party Certifications and Audits. At Client’s cost and expense, and in accordance with this Section 6.2, Securiti shall allow for and contribute to audits, including inspections of Securiti, conducted by the Client (only to the extent that Client is not a competitor of Securiti) or another auditor mandated by Client (who is not a direct or indirect competitor of Securiti) provided that the parties shall agree on the scope, methodology, timing and conditions of such audits and inspections. Upon Client’s written request once per year during the term of this DPA, and subject to the confidentiality obligations set forth in the Agreement and this DPA, Securiti shall make available to Client (only to the extent that Client is not a competitor of Securiti), or Client’s independent, third-party auditor that is not a competitor of Securiti, a copy of Securiti’s then most recent third-party audits or certifications, as applicable (provided, however, that such audits, certifications and the results therefrom, including the documents reflecting the outcome of the audit and/or the certifications, shall only be used by Client to assess compliance with this DPA and/or with applicable Data Protection Laws and Regulations, and shall not be used for any other purpose or disclosed to any third party without Securiti’s prior written approval and, upon Securiti’s request, Client shall return all records or documentation in Client’s possession or control in the context of the audit and/or the certification).. Notwithstanding anything to the contrary, such audits and/or inspections shall not contain, involve, or impact any information that does not belong to the Client. 7. PERSONAL DATA INCIDENT MANAGEMENT AND NOTIFICATION To the extent required under applicable Data Protection Laws and Regulations, Securiti shall notify Client without undue delay after becoming aware of a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Client Personal Data (a “Personal Data Incident”). Securiti shall make reasonable efforts to identify the cause of such Personal Data Incident and take those steps as Securiti deems necessary and reasonable in order to remediate the cause of such a Personal Data Incident. The obligations herein shall not apply to incidents that are caused by Client or Client’s users. In any event, Client will be the party responsible for notifying supervisory authorities and/or concerned data subjects (where required by Data Protection Laws and Regulations). 8. RETURN AND DELETION OF CLIENT PERSONAL DATA Subject to the Agreement, Securiti shall, at the choice of Client, delete or return Client Personal Data to Client upon termination or expiry of the Agreement, and shall delete existing copies unless applicable law requires storage of Client Personal Data. If the Client requests Client Personal Data to be returned, Client Personal Data shall be returned in the format generally available for Securiti’s Clients. In any event, to the extent required or allowed by applicable law, Securiti may retain Client Personal Data for evidence purposes and/or for the establishment, exercise or defence of legal claims and/or to comply with applicable laws and regulations. 9. AUTHORIZED AFFILIATES 1. Contractual Relationship. The Parties acknowledge and agree that, by executing the DPA, the Client enters into the DPA on behalf of itself and, as applicable, in the name and on behalf of its Authorized Affiliates. Each Authorized Affiliate agrees to be bound by the obligations under this DPA. All access to and use of the Services by Authorized Affiliates must comply with the terms and conditions of the Agreement and this DPA and any violation of the terms and conditions therein by an Authorized Affiliate shall be deemed a violation by Client. 2. Communication. The Client shall remain responsible for coordinating all communication with Securiti under the Agreement and this DPA and shall be entitled to make and receive any communication in relation to this DPA on behalf of its Authorized Affiliates. 10. TRANSFERS OF DATA 1. Transfers to countries that offer adequate level of data protection. Client Personal Data may be transferred from the EU Member States, the three EEA member countries (Norway, Liechtenstein and Iceland) (collectively, “EEA”) and the United Kingdom to countries that offer adequate level of data protection under or pursuant to the adequacy decisions published by the relevant data protection authorities of the EEA, the Union, the Member States, the European Commission, or the United Kingdom (“Adequacy Decisions”), without any further safeguard being necessary. 2. Transfers to other countries. If the Processing of Client Personal Data includes transfers from the EEA to countries outside the EEA which are not subject to an Adequacy Decision (“Other Countries”), the Parties shall enter into the standard data protection clauses adopted by the relevant data protection authorities of the EEA, the Union, the Member States, the European Commission, or the United Kingdom Information Commissioner’s Office (“Standard Contractual Clauses”) or comply with any of the other mechanisms provided for in the GDPR for transferring Personal Data to such Other Countries. To the maximum extent permitted by law, to the extent that Client and Securiti use Standard Contractual Clauses as a mechanism to transfer Client Personal Data, the rights and obligations of the parties shall be performed in accordance with and subject to this DPA. With respect to transfers of Client Personal Data made under this section, where Client is a Controller and Securiti is a Processor, the Standard Contractual Clauses for transfers from Controller to Processor (available in Schedule 3A of this DPA) shall apply; where Client is a Processor and Securiti is a Sub-processor, the Standard Contractual Clauses for transfers and from Processor to Processor (available in Schedule 3B of this DPA), shall apply. With respect to transfers of Client Personal Data from the United Kingdom made under this section, the Standard Contractual Clauses approved by the ICO for transfers of United Kingdom Personal Data (available in Schedule 3C of this DPA) shall apply. 11. TERMINATION This DPA shall automatically terminate upon the termination or expiration of the Agreement under which the Services are provided. Sections 2.2, 2.3.3, 2.3.4 12, and 13 shall survive the termination or expiration of this DPA for any reason. This DPA cannot, in principle, be terminated separately from the Agreement, except where the Processing ends before the termination of the Agreement, in which case, this DPA shall automatically terminate. 12. RELATIONSHIP WITH AGREEMENT In the event of any conflict between the provisions of this DPA and the provisions of the Agreement, the provisions of this DPA shall prevail over the conflicting provisions of the Agreement. 13. LIMITATION OF LIABILITY Securiti’s (including, without limitation, Supplier’s affiliates’ and subsidiaries’) entire, total and aggregate liability, related to personal data or information privacy, or for breach of, this DPA and/or Data Protection Laws and Regulations, including, without limitation, if any, any indemnification obligation under the Agreement or applicable law regarding data protection or privacy, shall be subject to the limitation of liability under the Agreement. 14. AMENDMENTS This DPA may be amended at any time by a written instrument duly signed by each of the Parties. 15. LEGAL EFFECT This DPA shall only become legally binding between Client and Securiti when the formalities steps set out in the Section “INSTRUCTIONS ON HOW TO EXECUTE THIS DPA” below have been fully completed. Securiti may assign this DPA or its rights or obligations hereunder to any Affiliate therefor, or to a successor or any Affiliate thereof, in connection with a merger, consolidation or acquisition of all or substantially all of its shares, assets or business relating to this DPA or the Agreement. Any Securiti obligation hereunder may be performed (in whole or in part) and any Securiti right (including invoice and payment rights) or remedy may be exercised (in whole or in part) by an Affiliate of Securiti. 16. SIGNATURE The Parties represent and warrant that they each have the power to enter into, execute, perform and be bound by this DPA. You, as the signing person on behalf of Client, represent and warrant that you have, or you were granted, full authority to bind the Organization and, as applicable, its Authorized Affiliates to this DPA. If you cannot, or do not have authority to, bind the Organization and/or its Authorized Affiliates, you shall not supply or provide Personal Data to Securiti. By signing this DPA, Client enters into this DPA on behalf of itself and, to the extent required or permitted under applicable Data Protection Laws and Regulations, in the name and on behalf of its Authorized Affiliates, if and to the extent that Securiti processes Personal Data for which such Authorized Affiliates qualify as the/a “data controller”. This DPA has been pre-signed on behalf of Securiti. Instructions on how to execute this DPA. 1. To complete this DPA, you must complete the missing information; and 2. Send the completed and signed DPA to us by email, indicating the Client’s name, to privacy@securiti.ai. LIST OF SCHEDULES * SCHEDULE 1 - DETAILS OF THE PROCESSING * SCHEDULE 2 - SUB-PROCESSOR LIST * SCHEDULE 3 – STANDARD CONTRACTUAL CLAUSES FOR CUSTOMERS * SCHEDULE 3A – CONTROLLER TO PROCESSOR * SCHEDULE 3B – PROCESSOR TO PROCESSOR * SCHEDULE 3C – UNITED KINGDOM STANDARD CONTRACTUAL CLAUSES The parties’ authorized signatories have duly executed this Agreement: CLIENT: SECURITI INC. Signature: Signature: Client Legal Name: Client Legal Name: Print Name: Print Name: Title: Title: Date: Date: -------------------------------------------------------------------------------- SCHEDULE 1 - DETAILS OF THE PROCESSING Subject matter and duration The subject matter and duration of the Processing of the Client Personal Data are set out in the sections of the Agreement addressing scope of services and term and as set forth in this DPA. Nature and Purpose of Processing The nature and purpose of the Processing of the Client Personal Data are set out in the sections of the Agreement addressing scope of services and term. TYPE OF PERSONAL DATA Client may submit Personal Data to the Services, the extent of which is determined and controlled by Client in its sole discretion, includes: * First name * Last name * Address * Phone number * Email address * Payment information * Any other Personal Data or information that the Client decides to provide to the Securiti or the Services. In some limited circumstances Personal Data may also come from others sources, for example, in the case of anti-money laundering research, fraud detection or as required by applicable law. CATEGORIES OF DATA SUBJECTS Client may submit Personal Data to the Services, the extent of which is determined and controlled by Client in its sole discretion, and which may include, but is not limited to Personal Data relating to the following categories of data subjects: * Client’s customers and/or clients * Client’s users authorized by Client to use the Services * Employees, agents, advisors, freelancers of Client (who are natural persons) * Prospects, Clients, business partners and vendors of Client (who are natural persons) * Employees or contact persons of Client’s prospects, Clients, business partners and vendors -------------------------------------------------------------------------------- SCHEDULE 2 – SUB-PROCESSOR LIST Entity Name Sub-Processing Activities Entity Country Amazon Web Services, Inc. Cloud Service Provider United States AWS Jakarta Cloud Service Provider Indonesia Amazon Web Services EMEA SARL Cloud Service Provider European Union Amazon Web Services Canada, Inc Cloud Service Provider Canada Amazon web Services Australia, Pty Ltd Cloud Service Provider Australia Google Cloud Platform Cloud Service Provider United States Zendesk, Inc. Cloud Customer Support United States -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- SCHEDULE 3 – STANDARD CONTRACTUAL CLAUSES Schedule 3A To DPA between Securiti and Client Standard Contractual Clauses CONTROLLER TO PROCESSOR SECTION I Clause 1 Purpose and scope (a) The purpose of these standard contractual clauses is to ensure compliance with the requirements of Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) ([1]) for the transfer of data to a third country. (b) The Parties: (i) the natural or legal person(s), public authority/ies, agency/ies or other body/ies (hereinafter ‘entity/ies’) transferring the personal data, as listed in Annex I.A (hereinafter each ‘data exporter’), and (ii) the entity/ies in a third country receiving the personal data from the data exporter, directly or indirectly via another entity also Party to these Clauses, as listed in Annex I.A (hereinafter each ‘data importer’) have agreed to these standard contractual clauses (hereinafter: ‘Clauses’). (c) These Clauses apply with respect to the transfer of personal data as specified in Annex I.B. (d) The Appendix to these Clauses containing the Annexes referred to therein forms an integral part of these Clauses. Clause 2 Effect and invariability of the Clauses (a) These Clauses set out appropriate safeguards, including enforceable data subject rights and effective legal remedies, pursuant to Article 46(1) and Article 46(2)(c) of Regulation (EU) 2016/679 and, with respect to data transfers from controllers to processors and/or processors to processors, standard contractual clauses pursuant to Article 28(7) of Regulation (EU) 2016/679, provided they are not modified, except to select the appropriate Module(s) or to add or update information in the Appendix. This does not prevent the Parties from including the standard contractual clauses laid down in these Clauses in a wider contract and/or to add other clauses or additional safeguards, provided that they do not contradict, directly or indirectly, these Clauses or prejudice the fundamental rights or freedoms of data subjects. (b) These Clauses are without prejudice to obligations to which the data exporter is subject by virtue of Regulation (EU) 2016/679. Clause 3 Third-party beneficiaries (a) Data subjects may invoke and enforce these Clauses, as third-party beneficiaries, against the data exporter and/or data importer, with the following exceptions: (i) Clause 1, Clause 2, Clause 3, Clause 6, Clause 7; (ii) Clause 8 – Module One: Clause 8.5 (e) and Clause 8.9(b); Module Two: Clause 8.1(b), 8.9(a), (c), (d) and (e); Module Three: Clause 8.1(a), (c) and (d) and Clause 8.9(a), (c), (d), (e), (f) and (g); Module Four: Clause 8.1 (b) and Clause 8.3(b); (iii) Clause 9 – Module Two: Clause 9(a), (c), (d) and (e); Module Three: Clause 9(a), (c), (d) and (e); (iv) Clause 12 – Module One: Clause 12(a) and (d); Modules Two and Three: Clause 12(a), (d) and (f); (v) Clause 13; (vi) Clause 15.1(c), (d) and (e); (vii) Clause 16(e); (viii) Clause 18 – Modules One, Two and Three: Clause 18(a) and (b); Module Four: Clause 18. (b) Paragraph (a) is without prejudice to rights of data subjects under Regulation (EU) 2016/679. Clause 4 Interpretation (a) Where these Clauses use terms that are defined in Regulation (EU) 2016/679, those terms shall have the same meaning as in that Regulation. (b) These Clauses shall be read and interpreted in the light of the provisions of Regulation (EU) 2016/679. (c) These Clauses shall not be interpreted in a way that conflicts with rights and obligations provided for in Regulation (EU) 2016/679. Clause 5 Hierarchy In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties, existing at the time these Clauses are agreed or entered into thereafter, these Clauses shall prevail. Clause 6 Description of the transfer(s) The details of the transfer(s), and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred, are specified in Annex I.B. Clause 7 – Not applicable SECTION II – OBLIGATIONS OF THE PARTIES Clause 8 Data protection safeguards The data exporter warrants that it has used reasonable efforts to determine that the data importer is able, through the implementation of appropriate technical and organisational measures, to satisfy its obligations under these Clauses. 8.1 Instructions (a) The data importer shall process the personal data only on documented instructions from the data exporter. The data exporter may give such instructions throughout the duration of the contract. (b) The data importer shall immediately inform the data exporter if it is unable to follow those instructions. 8.2 Purpose limitation The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I.B, unless on further instructions from the data exporter. 8.3 Transparency On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including the measures described in Annex II and personal data, the data exporter may redact part of the text of the Appendix to these Clauses prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand the its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information. This Clause is without prejudice to the obligations of the data exporter under Articles 13 and 14 of Regulation (EU) 2016/679. 8.4 Accuracy If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to erase or rectify the data. 8.5 Duration of processing and erasure or return of data Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the data exporter and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a). 8.6 Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. (b) The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. (c) In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. (d) The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer. 8.7 Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B. 8.8 Onward transfers The data importer shall only disclose the personal data to a third party on documented instructions from the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union ([2]) (in the same country as the data importer or in another third country, hereinafter ‘onward transfer’) if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if: (i) the onward transfer is to a country benefitting from an adequacy decision pursuant to Article 45 of Regulation (EU) 2016/679 that covers the onward transfer; (ii) the third party otherwise ensures appropriate safeguards pursuant to Articles 46 or 47 Regulation of (EU) 2016/679 with respect to the processing in question; (iii) the onward transfer is necessary for the establishment, exercise or defence of legal claims in the context of specific administrative, regulatory or judicial proceedings; or (iv) the onward transfer is necessary in order to protect the vital interests of the data subject or of another natural person. Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation. 8.9 Documentation and compliance (a) The data importer shall promptly and adequately deal with enquiries from the data exporter that relate to the processing under these Clauses. (b) The Parties shall be able to demonstrate compliance with these Clauses. In particular, the data importer shall keep appropriate documentation on the processing activities carried out on behalf of the data exporter. (c) The data importer shall make available to the data exporter all information necessary to demonstrate compliance with the obligations set out in these Clauses and at the data exporter’s request, allow for and contribute to audits of the processing activities covered by these Clauses, at reasonable intervals or if there are indications of non-compliance. In deciding on a review or audit, the data exporter may take into account relevant certifications held by the data importer. (d) The data exporter may choose to conduct the audit by itself or mandate an independent auditor. Audits may include inspections at the premises or physical facilities of the data importer and shall, where appropriate, be carried out with reasonable notice. (e) The Parties shall make the information referred to in paragraphs (b) and (c), including the results of any audits, available to the competent supervisory authority on request. Clause 9 Use of sub-processors (a) The data importer has the data exporter’s general authorisation for the engagement of sub-processor(s) from an agreed list. The data importer shall specifically inform the data exporter in writing of any intended changes to that list through the addition or replacement of sub-processors at least 3 business days in advance, thereby giving the data exporter sufficient time to be able to object to such changes prior to the engagement of the sub-processor(s). The data importer shall provide the data exporter with the information necessary to enable the data exporter to exercise its right to object. (b) Where the data importer engages a sub-processor to carry out specific processing activities (on behalf of the data exporter), it shall do so by way of a written contract that provides for, in substance, the same data protection obligations as those binding the data importer under these Clauses, including in terms of third-party beneficiary rights for data subjects. ([3]) The Parties agree that, by complying with this Clause, the data importer fulfils its obligations under Clause 8.8. The data importer shall ensure that the sub-processor complies with the obligations to which the data importer is subject pursuant to these Clauses. (c) The data importer shall provide, at the data exporter’s request, a copy of such a sub-processor agreement and any subsequent amendments to the data exporter. To the extent necessary to protect business secrets or other confidential information, including personal data, the data importer may redact the text of the agreement prior to sharing a copy. (d) The data importer shall remain fully responsible to the data exporter for the performance of the sub-processor’s obligations under its contract with the data importer. The data importer shall notify the data exporter of any failure by the sub-processor to fulfil its obligations under that contract. (e) The data importer shall agree a third-party beneficiary clause with the sub-processor whereby – in the event the data importer has factually disappeared, ceased to exist in law or has become insolvent – the data exporter shall have the right to terminate the sub-processor contract and to instruct the sub-processor to erase or return the personal data. Clause 10 Data subject rights (a) The data importer shall promptly notify the data exporter of any request it has received from a data subject. It shall not respond to that request itself unless it has been authorised to do so by the data exporter. (b) The data importer shall assist the data exporter in fulfilling its obligations to respond to data subjects’ requests for the exercise of their rights under Regulation (EU) 2016/679. In this regard, the Parties shall set out in Annex II the appropriate technical and organisational measures, taking into account the nature of the processing, by which the assistance shall be provided, as well as the scope and the extent of the assistance required. (c) In fulfilling its obligations under paragraphs (a) and (b), the data importer shall comply with the instructions from the data exporter. Clause 11 Redress (a) The data importer shall inform data subjects in a transparent and easily accessible format, through individual notice or on its website, of a contact point authorised to handle complaints. It shall deal promptly with any complaints it receives from a data subject. (b) In case of a dispute between a data subject and one of the Parties as regards compliance with these Clauses, that Party shall use its best efforts to resolve the issue amicably in a timely fashion. The Parties shall keep each other informed about such disputes and, where appropriate, cooperate in resolving them. (c) Where the data subject invokes a third-party beneficiary right pursuant to Clause 3, the data importer shall accept the decision of the data subject to: (i) lodge a complaint with the supervisory authority in the Member State of his/her habitual residence or place of work, or the competent supervisory authority pursuant to Clause 13; (ii) refer the dispute to the competent courts within the meaning of Clause 18. (d) The Parties accept that the data subject may be represented by a not-for-profit body, organisation or association under the conditions set out in Article 80(1) of Regulation (EU) 2016/679. (e) The data importer shall abide by a decision that is binding under the applicable EU or Member State law. (f) The data importer agrees that the choice made by the data subject will not prejudice his/her substantive and procedural rights to seek remedies in accordance with applicable laws. Clause 12 Liability (a) Each Party shall be liable to the other Party/ies for any damages it causes the other Party/ies by any breach of these Clauses. (b) The data importer shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data importer or its sub-processor causes the data subject by breaching the third-party beneficiary rights under these Clauses. (c) Notwithstanding paragraph (b), the data exporter shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data exporter or the data importer (or its sub-processor) causes the data subject by breaching the third-party beneficiary rights under these Clauses. This is without prejudice to the liability of the data exporter and, where the data exporter is a processor acting on behalf of a controller, to the liability of the controller under Regulation (EU) 2016/679 or Regulation (EU) 2018/1725, as applicable. (d) The Parties agree that if the data exporter is held liable under paragraph (c) for damages caused by the data importer (or its sub-processor), it shall be entitled to claim back from the data importer that part of the compensation corresponding to the data importer’s responsibility for the damage. (e) Where more than one Party is responsible for any damage caused to the data subject as a result of a breach of these Clauses, all responsible Parties shall be jointly and severally liable and the data subject is entitled to bring an action in court against any of these Parties. (f) The Parties agree that if one Party is held liable under paragraph (e), it shall be entitled to claim back from the other Party/ies that part of the compensation corresponding to its/their responsibility for the damage. (g) The data importer may not invoke the conduct of a sub-processor to avoid its own liability. Clause 13 Supervision 1. Where the data exporter is established in an EU Member State: The supervisory authority with responsibility for ensuring compliance by the data exporter with Regulation (EU) 2016/679 as regards the data transfer, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) and has appointed a representative pursuant to Article 27(1) of Regulation (EU) 2016/679: The supervisory authority of the Member State in which the representative within the meaning of Article 27(1) of Regulation (EU) 2016/679 is established, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) without however having to appoint a representative pursuant to Article 27(2) of Regulation (EU) 2016/679: The supervisory authority of one of the Member States in which the data subjects whose personal data is transferred under these Clauses in relation to the offering of goods or services to them, or whose behaviour is monitored, are located, as indicated in Annex I.C, shall act as competent supervisory authority. (b) The data importer agrees to submit itself to the jurisdiction of and cooperate with the competent supervisory authority in any procedures aimed at ensuring compliance with these Clauses. In particular, the data importer agrees to respond to enquiries, submit to audits and comply with the measures adopted by the supervisory authority, including remedial and compensatory measures. It shall provide the supervisory authority with written confirmation that the necessary actions have been taken. SECTION III – LOCAL LAWS AND OBLIGATIONS IN CASE OF ACCESS BY PUBLIC AUTHORITIES Clause 14 Local laws and practices affecting compliance with the Clauses (a) The Parties warrant that they have no reason to believe that the laws and practices in the third country of destination applicable to the processing of the personal data by the data importer, including any requirements to disclose personal data or measures authorising access by public authorities, prevent the data importer from fulfilling its obligations under these Clauses. This is based on the understanding that laws and practices that respect the essence of the fundamental rights and freedoms and do not exceed what is necessary and proportionate in a democratic society to safeguard one of the objectives listed in Article 23(1) of Regulation (EU) 2016/679, are not in contradiction with these Clauses. (b) The Parties declare that in providing the warranty in paragraph (a), they have taken due account in particular of the following elements: (i) the specific circumstances of the transfer, including the length of the processing chain, the number of actors involved and the transmission channels used; intended onward transfers; the type of recipient; the purpose of processing; the categories and format of the transferred personal data; the economic sector in which the transfer occurs; the storage location of the data transferred; (ii) the laws and practices of the third country of destination– including those requiring the disclosure of data to public authorities or authorising access by such authorities – relevant in light of the specific circumstances of the transfer, and the applicable limitations and safeguards ([4]); (iii) any relevant contractual, technical or organisational safeguards put in place to supplement the safeguards under these Clauses, including measures applied during transmission and to the processing of the personal data in the country of destination. (c) The data importer warrants that, in carrying out the assessment under paragraph (b), it has made its best efforts to provide the data exporter with relevant information and agrees that it will continue to cooperate with the data exporter in ensuring compliance with these Clauses. (d) The Parties agree to document the assessment under paragraph (b) and make it available to the competent supervisory authority on request. (e) The data importer agrees to notify the data exporter promptly if, after having agreed to these Clauses and for the duration of the contract, it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under paragraph (a), including following a change in the laws of the third country or a measure (such as a disclosure request) indicating an application of such laws in practice that is not in line with the requirements in paragraph (a). (f) Following a notification pursuant to paragraph (e), or if the data exporter otherwise has reason to believe that the data importer can no longer fulfil its obligations under these Clauses, the data exporter shall promptly identify appropriate measures (e.g. technical or organisational measures to ensure security and confidentiality) to be adopted by the data exporter and/or data importer to address the situation. The data exporter shall suspend the data transfer if it considers that no appropriate safeguards for such transfer can be ensured, or if instructed by the competent supervisory authority to do so. In this case, the data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses. If the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. Where the contract is terminated pursuant to this Clause, Clause 16(d) and (e) shall apply. Clause 15 Obligations of the data importer in case of access by public authorities 15.1 Notification (a) The data importer agrees to notify the data exporter and, where possible, the data subject promptly (if necessary with the help of the data exporter) if it: (i) receives a legally binding request from a public authority, including judicial authorities, under the laws of the country of destination for the disclosure of personal data transferred pursuant to these Clauses; such notification shall include information about the personal data requested, the requesting authority, the legal basis for the request and the response provided; or (ii) becomes aware of any direct access by public authorities to personal data transferred pursuant to these Clauses in accordance with the laws of the country of destination; such notification shall include all information available to the importer. (b) If the data importer is prohibited from notifying the data exporter and/or the data subject under the laws of the country of destination, the data importer agrees to use its best efforts to obtain a waiver of the prohibition, with a view to communicating as much information as possible, as soon as possible. The data importer agrees to document its best efforts in order to be able to demonstrate them on request of the data exporter. (c) Where permissible under the laws of the country of destination, the data importer agrees to provide the data exporter, at regular intervals for the duration of the contract, with as much relevant information as possible on the requests received (in particular, number of requests, type of data requested, requesting authority/ies, whether requests have been challenged and the outcome of such challenges, etc.). (d) The data importer agrees to preserve the information pursuant to paragraphs (a) to (c) for the duration of the contract and make it available to the competent supervisory authority on request. (e) Paragraphs (a) to (c) are without prejudice to the obligation of the data importer pursuant to Clause 14(e) and Clause 16 to inform the data exporter promptly where it is unable to comply with these Clauses. 15.2 Review of legality and data minimisation (a) The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e). (b) The data importer agrees to document its legal assessment and any challenge to the request for disclosure and, to the extent permissible under the laws of the country of destination, make the documentation available to the data exporter. It shall also make it available to the competent supervisory authority on request. (c) The data importer agrees to provide the minimum amount of information permissible when responding to a request for disclosure, based on a reasonable interpretation of the request. SECTION IV – FINAL PROVISIONS Clause 16 Non-compliance with the Clauses and termination (a) The data importer shall promptly inform the data exporter if it is unable to comply with these Clauses, for whatever reason. (b) In the event that the data importer is in breach of these Clauses or unable to comply with these Clauses, the data exporter shall suspend the transfer of personal data to the data importer until compliance is again ensured or the contract is terminated. This is without prejudice to Clause 14(f). (c) The data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses, where: (i) the data exporter has suspended the transfer of personal data to the data importer pursuant to paragraph (b) and compliance with these Clauses is not restored within a reasonable time and in any event within one month of suspension; (ii) the data importer is in substantial or persistent breach of these Clauses; or (iii) the data importer fails to comply with a binding decision of a competent court or supervisory authority regarding its obligations under these Clauses. In these cases, it shall inform the competent supervisory authority of such non-compliance. Where the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. (d) Personal data that has been transferred prior to the termination of the contract pursuant to paragraph (c) shall at the choice of the data exporter immediately be returned to the data exporter or deleted in its entirety. The same shall apply to any copies of the data. The data importer shall certify the deletion of the data to the data exporter. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit the return or deletion of the transferred personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process the data to the extent and for as long as required under that local law. (e) Either Party may revoke its agreement to be bound by these Clauses where (i) the European Commission adopts a decision pursuant to Article 45(3) of Regulation (EU) 2016/679 that covers the transfer of personal data to which these Clauses apply; or (ii) Regulation (EU) 2016/679 becomes part of the legal framework of the country to which the personal data is transferred. This is without prejudice to other obligations applying to the processing in question under Regulation (EU) 2016/679. Clause 17 Governing law These Clauses shall be governed by the law of one of the EU Member States, provided such law allows for third-party beneficiary rights. The Parties agree that this shall be the law of Republic of Ireland. Clause 18 Choice of forum and jurisdiction (a) Any dispute arising from these Clauses shall be resolved by the courts of an EU Member State. (b) The Parties agree that those shall be the courts of courts of Dublin, Ireland, as their choice of forum and jurisdiction. (c) A data subject may also bring legal proceedings against the data exporter and/or data importer before the courts of the Member State in which he/she has his/her habitual residence. (d) The Parties agree to submit themselves to the jurisdiction of such courts. -------------------------------------------------------------------------------- APPENDIX 1 TO THE STANDARD CONTRACTUAL CLAUSES This Appendix forms part of the Clauses and must be completed and signed by the Parties ANNEX I A. LIST OF PARTIES Data exporter(s): Name: As defined in the Agreement Address: As defined in the Agreement Contact person’s name, position and contact details: As defined in the Agreement Activities relevant to the data transferred under these Clauses: To receive the services from the data importer. Signature and date: The effective date of the Agreement. Role: Data Controller Data importer(s): Name: Securiti, Inc. Address: 300 Santana Row Suite 450. San Jose, CA 95128 Contact person’s name, position and contact details: James Stoddard, VP Finance, 408-401-1160, james.stoddard@securiti.ai Activities relevant to the data transferred under these Clauses: To provide the services to the data exporter. Signature and date: The effective date of the Agreement. Role: Data Processor (Sub-Processor) B. DESCRIPTION OF TRANSFER Data subjects The personal data transferred concern the following categories of data subjects: See Schedule 1 of the DPA Categories of data The personal data transferred concern the following categories of data: See Schedule 1 of the DPA Special categories of data (if appropriate) The personal data transferred concern the following special categories of data: See Schedule 1 of the DPA Processing operations The personal data transferred will be subject to the following basic processing activities: See Schedule 1 of the DPA The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis). Transfers will occur on an ongoing basis as reasonably required under the Agreement. Nature Of Processing As described in Schedule 1 of the DPA Purpose(s) of the data transfer and further processing As described in Schedule 1 of the DPA. The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period For the duration of the Agreement and in accordance with the DPA. For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing As described in Schedule 1 of the DPA. C. COMPETENT SUPERVISORY AUTHORITY The Irish competent supervisory authority identified above. Authorised Signature ………………… DATA IMPORTER Name: James Stoddard Authorised Signature ………………… -------------------------------------------------------------------------------- ANNEX II TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA Securiti maintains a comprehensive, written information security program that contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope and type of Securiti’s business; (b) the type of information that Securiti will store; and (c) the need for security and confidentiality of such information. Securiti’s security program includes: 1. Security Awareness and Training. A mandatory security awareness and training program for all members of Securiti’s workforce (including management), which includes: * Training on how to implement and comply with its Information Security Program; and * Promoting a culture of security awareness through periodic communications from senior management with employees. 2. Access Controls. Policies, procedures, and logical controls: * To limit access to its information systems and the facility or facilities in which they are housed to properly authorized persons; * To prevent those workforce members and others who should not have access from obtaining access; and * To remove access in a timely basis in the event of a change in job responsibilities or job status. 3. Physical and Environmental Security. Controls that provide reasonable assurance that access to physical servers at the production data center, if applicable, is limited to properly authorized individuals and that environmental controls are established to detect, prevent and control destruction due to environmental extremes. These controls are implemented by Amazon Web Services (AWS) and they are listed here: https://aws.amazon.com/compliance/data-center/controls/. Specific to Securiti: * Logging and monitoring of unauthorized access attempts to the data center by the data center security personnel; * Camera surveillance systems at critical internal and external entry points to the data center, with retention of data per legal or compliance requirements; * Systems that monitor and control the air temperature and humidity at appropriate levels for the computing equipment; and * Redundant power supply modules and backup generators that provide backup power in the event of an electrical failure, 24 hours a day. 4. Security Incident Procedures. A security incident response plan that includes procedures to be followed in the event of any Security Breach. Such procedures include: * Roles and responsibilities: formation of an internal incident response team with a response leader; * Investigation: assessing the risk the incident poses and determining who may be affected; * Communication: internal reporting as well as a notification process in the event of unauthorized disclosure of Customer Data; * Recordkeeping: keeping a record of what was done and by whom to help in later analysis and possible legal action; and * Audit: conducting and documenting root cause analysis and remediation plan. 5. Contingency Planning. Policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, pandemic flu, and natural disaster) that could damage Customer Data or production systems that contain Customer Data. Such procedures include: * Data Backups: A policy for performing periodic backups of production data sources, as applicable, according to a defined schedule; * Disaster Recovery: A formal disaster recovery plan for the production data center, including: * Requirements for the disaster plan to be tested on a regular basis, currently twice a year; and * A documented executive summary of the Disaster Recovery testing, at least annually, which is available upon request to customers. * Business Continuity Plan: A formal process to address the framework by which an unplanned event might be managed in order to minimize the loss of vital resources. 6. Audit Controls. Hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic information. 7. Data Integrity. Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. 8. Storage and Transmission Security. Security measures to guard against unauthorized access to Customer Data that is being transmitted over a public electronic communications network or stored electronically. Such measures include requiring encryption of any Customer Data stored on desktops, laptops or other removable storage devices. 9. Secure Disposal. Policies and procedures regarding the secure disposal of tangible property containing Customer Data, taking into account available technology so that Customer Data cannot be practicably read or reconstructed. 10. Assigned Security Responsibility. Assigning responsibility for the development, implementation, and maintenance of Securiti’s security program, including: * Designating a security official with overall responsibility; * Defining security roles and responsibilities for individuals with security responsibilities; and * Designating a Security Council consisting of cross-functional management representatives to meet on a regular basis. 11. Testing. Regularly testing the key controls, systems and procedures of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified. Where applicable, such testing includes: * Internal risk assessments; * Service Organization Control 2 (SOC2) audit reports (or industry-standard successor reports). 12. Monitoring. Network and systems monitoring, including error logs on servers, disks and security events for any potential problems. Such monitoring includes: * Reviewing changes affecting systems handling authentication, authorization, and auditing; * Reviewing privileged access to Securiti production systems; and * Engaging third parties to perform network vulnerability assessments and penetration testing on a regular basis. 13. Change and Configuration Management. Maintaining policies and procedures for managing changes Securiti makes to production systems, applications, and databases. Such policies and procedures include: * process for documenting, testing and approving the patching and maintenance of the Securiti Product; * A security patching process that requires patching systems in a timely manner based on a risk analysis; and * A process for Securiti to utilize a third party to conduct application level security assessments. These assessments generally include testing, where applicable, for: * Cross-site request forgery * Services scanning * Improper input handling (e.g. cross-site scripting, SQL injection, XML injection, cross-site flashing) * XML and SOAP attacks * Weak session management * Data validation flaws and data model constraint inconsistencies * Insufficient authentication * Insufficient authorization 14. Program Adjustments. Monitoring, evaluating, and adjusting, as appropriate, the security program in light of: * Any relevant changes in technology and any internal or external threats to Securiti or the Customer Data; * Security and data privacy regulations applicable to Securiti; and * Securiti’s own changing business arrangements, such as mergers and acquisitions, alliances and joint ventures, outsourcing arrangements, and changes to information systems. 15. Devices – Ensuring that all laptop and desktop computing devices utilized by Securiti and any subcontractors when accessing Customer Data: * will be equipped with a minimum of AES 128 bit full hard disk drive encryption; * will have up to date virus and malware detection and prevention software installed with virus definitions updated on a regular basis; and * will maintain virus and malware detection and prevention software so as to remain on a supported release. This will include, but not be limited to, promptly implementing any applicable security-related enhancement or fix made available by the supplier of such software. 16. Data Security Breach. “Security Breach” means any security incident if there is a reason to believe Customer Data has been or may have been accessed by an unauthorized party. * Securiti will notify Customer of a Security Breach as soon as practicable, but no later than twenty-four (24) hours after Securiti becomes aware of it, by e-mailing Customer with a read receipt at a Customer designated email address, with a copy by e-mail to Securiti’s primary business contact within Customer. * Securiti agrees that unless required by law, it shall not inform any third party that a Security Breach without Approval. Further, Securiti agrees that Customer shall have the sole right to determine whether notice of the Security Breach is to be provided to consumers associated with Customer Data. 17. Return or Destruction of Customer Data. * Customer Data may be deleted by Securiti following the termination or suspension of Customer’s use of the Securiti Product. * Customer may request that Securiti delete Customer Data by notifying the Securiti support team via a ticket filed using the Customer Support link in a Securiti account, or via an email to support@securiti.ai. Upon Securiti receiving confirmation from Customer of the deletion request, Securiti will delete all Customer Data from online systems within one business week of such confirmation. * Securiti may retain Customer Data to the extent required by applicable laws and only to the extent and for such period as required by applicable law. 1. ANNEX III LIST OF SUB-PROCESSORS As described in the Sub-processors List of Securiti’s DPA. Entity Name Sub-Processing Activities Entity Country Amazon Web Services, Inc. Cloud Service Provider United States AWS Jakarta Cloud Service Provider Indonesia Amazon Web Services EMEA SARL Cloud Service Provider European Union Google Cloud Platform Cloud Service Provider United States Zendesk, Inc. Cloud Customer Support United States Schedule 3B STANDARD CONTRACTUAL CLAUSES Processor to Processor SECTION I Clause 1 Purpose and scope (a) The purpose of these standard contractual clauses is to ensure compliance with the requirements of Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) ([5]) for the transfer of personal data to a third country. (b) The Parties: (i) the natural or legal person(s), public authority/ies, agency/ies or other body/ies (hereinafter ‘entity/ies’) transferring the personal data, as listed in Annex I.A (hereinafter each ‘data exporter’), and (ii) the entity/ies in a third country receiving the personal data from the data exporter, directly or indirectly via another entity also Party to these Clauses, as listed in Annex I.A (hereinafter each ‘data importer’) have agreed to these standard contractual clauses (hereinafter: ‘Clauses’). (c) These Clauses apply with respect to the transfer of personal data as specified in Annex I.B. (d) The Appendix to these Clauses containing the Annexes referred to therein forms an integral part of these Clauses. Clause 2 Effect and invariability of the Clauses (a) These Clauses set out appropriate safeguards, including enforceable data subject rights and effective legal remedies, pursuant to Article 46(1) and Article 46(2)(c) of Regulation (EU) 2016/679 and, with respect to data transfers from controllers to processors and/or processors to processors, standard contractual clauses pursuant to Article 28(7) of Regulation (EU) 2016/679, provided they are not modified, except to select the appropriate Module(s) or to add or update information in the Appendix. This does not prevent the Parties from including the standard contractual clauses laid down in these Clauses in a wider contract and/or to add other clauses or additional safeguards, provided that they do not contradict, directly or indirectly, these Clauses or prejudice the fundamental rights or freedoms of data subjects. (b) These Clauses are without prejudice to obligations to which the data exporter is subject by virtue of Regulation (EU) 2016/679. Clause 3 Third-party beneficiaries (a) Data subjects may invoke and enforce these Clauses, as third-party beneficiaries, against the data exporter and/or data importer, with the following exceptions: (i) Clause 1, Clause 2, Clause 3, Clause 6, Clause 7; (ii) Clause 8 – Module One: Clause 8.5 (e) and Clause 8.9(b); Module Two: Clause 8.1(b), 8.9(a), (c), (d) and (e); Module Three: Clause 8.1(a), (c) and (d) and Clause 8.9(a), (c), (d), (e), (f) and (g); Module Four: Clause 8.1 (b) and Clause 8.3(b); (iii) Clause 9 – Module Two: Clause 9(a), (c), (d) and (e); Module Three: Clause 9(a), (c), (d) and (e); (iv) Clause 12 – Module One: Clause 12(a) and (d); Modules Two and Three: Clause 12(a), (d) and (f); (v) Clause 13; (vi) Clause 15.1(c), (d) and (e); (vii) Clause 16(e); (viii) Clause 18 – Modules One, Two and Three: Clause 18(a) and (b); Module Four: Clause 18. (b) Paragraph (a) is without prejudice to rights of data subjects under Regulation (EU) 2016/679. Clause 4 Interpretation (a) Where these Clauses use terms that are defined in Regulation (EU) 2016/679, those terms shall have the same meaning as in that Regulation. (b) These Clauses shall be read and interpreted in the light of the provisions of Regulation (EU) 2016/679. (c) These Clauses shall not be interpreted in a way that conflicts with rights and obligations provided for in Regulation (EU) 2016/679. Clause 5 Hierarchy In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties, existing at the time these Clauses are agreed or entered into thereafter, these Clauses shall prevail. Clause 6 Description of the transfer(s) The details of the transfer(s), and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred, are specified in Annex I.B. Clause 7 – Not applicable SECTION II – OBLIGATIONS OF THE PARTIES Clause 8 Data protection safeguards The data exporter warrants that it has used reasonable efforts to determine that the data importer is able, through the implementation of appropriate technical and organisational measures, to satisfy its obligations under these Clauses. 8.1 Instructions (a) The data exporter has informed the data importer that it acts as processor under the instructions of its controller(s), which the data exporter shall make available to the data importer prior to processing. (b) The data importer shall process the personal data only on documented instructions from the controller, as communicated to the data importer by the data exporter, and any additional documented instructions from the data exporter. Such additional instructions shall not conflict with the instructions from the controller. The controller or data exporter may give further documented instructions regarding the data processing throughout the duration of the contract. (c) The data importer shall immediately inform the data exporter if it is unable to follow those instructions. Where the data importer is unable to follow the instructions from the controller, the data exporter shall immediately notify the controller. (d) The data exporter warrants that it has imposed the same data protection obligations on the data importer as set out in the contract or other legal act under Union or Member State law between the controller and the data exporter ([6]). 8.2 Purpose limitation The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I.B., unless on further instructions from the controller, as communicated to the data importer by the data exporter, or from the data exporter. 8.3 Transparency On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including personal data, the data exporter may redact part of the text of the Appendix prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information. 8.4 Accuracy If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to rectify or erase the data. 8.5 Duration of processing and erasure or return of data Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the controller and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a). 8.6 Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, they shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subject. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter or the controller. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. (b) The data importer shall grant access to the data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. (c) In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify, without undue delay, the data exporter and, where appropriate and feasible, the controller after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the data breach, including measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. (d) The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify its controller so that the latter may in turn notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer. 8.7 Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards set out in Annex I.B. 8.8 Onward transfers The data importer shall only disclose the personal data to a third party on documented instructions from the controller, as communicated to the data importer by the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union ([7]) (in the same country as the data importer or in another third country, hereinafter ‘onward transfer’) if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if: (i) the onward transfer is to a country benefitting from an adequacy decision pursuant to Article 45 of Regulation (EU) 2016/679 that covers the onward transfer; (ii) the third party otherwise ensures appropriate safeguards pursuant to Articles 46 or 47 of Regulation (EU) 2016/679; (iii) the onward transfer is necessary for the establishment, exercise or defence of legal claims in the context of specific administrative, regulatory or judicial proceedings; or (iv) the onward transfer is necessary in order to protect the vital interests of the data subject or of another natural person. Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation. 8.9 Documentation and compliance (a) The data importer shall promptly and adequately deal with enquiries from the data exporter or the controller that relate to the processing under these Clauses. (b) The Parties shall be able to demonstrate compliance with these Clauses. In particular, the data importer shall keep appropriate documentation on the processing activities carried out on behalf of the controller. (c) The data importer shall make all information necessary to demonstrate compliance with the obligations set out in these Clauses available to the data exporter, which shall provide it to the controller. (d) The data importer shall allow for and contribute to audits by the data exporter of the processing activities covered by these Clauses, at reasonable intervals or if there are indications of non-compliance. The same shall apply where the data exporter requests an audit on instructions of the controller. In deciding on an audit, the data exporter may take into account relevant certifications held by the data importer. (e) Where the audit is carried out on the instructions of the controller, the data exporter shall make the results available to the controller. (f) The data exporter may choose to conduct the audit by itself or mandate an independent auditor. Audits may include inspections at the premises or physical facilities of the data importer and shall, where appropriate, be carried out with reasonable notice. (g) The Parties shall make the information referred to in paragraphs (b) and (c), including the results of any audits, available to the competent supervisory authority on request. Clause 9 Use of sub-processors (a) The data importer has the controller’s general authorisation for the engagement of sub-processor(s) from an agreed list. The data importer shall specifically inform the controller in writing of any intended changes to that list through the addition or replacement of sub-processors at least 3 business days in advance, thereby giving the controller sufficient time to be able to object to such changes prior to the engagement of the sub-processor(s). The data importer shall provide the controller with the information necessary to enable the controller to exercise its right to object. The data importer shall inform the data exporter of the engagement of the sub-processor(s). (b) Where the data importer engages a sub-processor to carry out specific processing activities (on behalf of the controller), it shall do so by way of a written contract that provides for, in substance, the same data protection obligations as those binding the data importer under these Clauses, including in terms of third-party beneficiary rights for data subjects. ([8]) The Parties agree that, by complying with this Clause, the data importer fulfils its obligations under Clause 8.8. The data importer shall ensure that the sub-processor complies with the obligations to which the data importer is subject pursuant to these Clauses. (c) The data importer shall provide, at the data exporter’s or controller’s request, a copy of such a sub-processor agreement and any subsequent amendments. To the extent necessary to protect business secrets or other confidential information, including personal data, the data importer may redact the text of the agreement prior to sharing a copy. (d) The data importer shall remain fully responsible to the data exporter for the performance of the sub-processor’s obligations under its contract with the data importer. The data importer shall notify the data exporter of any failure by the sub-processor to fulfil its obligations under that contract. (e) The data importer shall agree a third-party beneficiary clause with the sub-processor whereby – in the event the data importer has factually disappeared, ceased to exist in law or has become insolvent – the data exporter shall have the right to terminate the sub-processor contract and to instruct the sub-processor to erase or return the personal data. Clause 10 Data subject rights (a) The data importer shall promptly notify the data exporter and, where appropriate, the controller of any request it has received from a data subject, without responding to that request unless it has been authorised to do so by the controller. (b) The data importer shall assist, where appropriate in cooperation with the data exporter, the controller in fulfilling its obligations to respond to data subjects’ requests for the exercise of their rights under Regulation (EU) 2016/679 or Regulation (EU) 2018/1725, as applicable. In this regard, the Parties shall set out in Annex II the appropriate technical and organisational measures, taking into account the nature of the processing, by which the assistance shall be provided, as well as the scope and the extent of the assistance required. (c) In fulfilling its obligations under paragraphs (a) and (b), the data importer shall comply with the instructions from the controller, as communicated by the data exporter. Clause 11 Redress (a) The data importer shall inform data subjects in a transparent and easily accessible format, through individual notice or on its website, of a contact point authorised to handle complaints. It shall deal promptly with any complaints it receives from a data subject. (b) In case of a dispute between a data subject and one of the Parties as regards compliance with these Clauses, that Party shall use its best efforts to resolve the issue amicably in a timely fashion. The Parties shall keep each other informed about such disputes and, where appropriate, cooperate in resolving them. (c) Where the data subject invokes a third-party beneficiary right pursuant to Clause 3, the data importer shall accept the decision of the data subject to: (i) lodge a complaint with the supervisory authority in the Member State of his/her habitual residence or place of work, or the competent supervisory authority pursuant to Clause 13; (ii) refer the dispute to the competent courts within the meaning of Clause 18. (d) The Parties accept that the data subject may be represented by a not-for-profit body, organisation or association under the conditions set out in Article 80(1) of Regulation (EU) 2016/679. (e) The data importer shall abide by a decision that is binding under the applicable EU or Member State law. (f) The data importer agrees that the choice made by the data subject will not prejudice his/her substantive and procedural rights to seek remedies in accordance with applicable laws. Clause 12 Liability (a) Each Party shall be liable to the other Party/ies for any damages it causes the other Party/ies by any breach of these Clauses. (b) The data importer shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data importer or its sub-processor causes the data subject by breaching the third-party beneficiary rights under these Clauses. (c) Notwithstanding paragraph (b), the data exporter shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data exporter or the data importer (or its sub-processor) causes the data subject by breaching the third-party beneficiary rights under these Clauses. This is without prejudice to the liability of the data exporter and, where the data exporter is a processor acting on behalf of a controller, to the liability of the controller under Regulation (EU) 2016/679 or Regulation (EU) 2018/1725, as applicable. (d) The Parties agree that if the data exporter is held liable under paragraph (c) for damages caused by the data importer (or its sub-processor), it shall be entitled to claim back from the data importer that part of the compensation corresponding to the data importer’s responsibility for the damage. (e) Where more than one Party is responsible for any damage caused to the data subject as a result of a breach of these Clauses, all responsible Parties shall be jointly and severally liable and the data subject is entitled to bring an action in court against any of these Parties. (f) The Parties agree that if one Party is held liable under paragraph (e), it shall be entitled to claim back from the other Party/ies that part of the compensation corresponding to its/their responsibility for the damage. (g) The data importer may not invoke the conduct of a sub-processor to avoid its own liability. Clause 13 Supervision 1. Where the data exporter is established in an EU Member State: The supervisory authority with responsibility for ensuring compliance by the data exporter with Regulation (EU) 2016/679 as regards the data transfer, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) and has appointed a representative pursuant to Article 27(1) of Regulation (EU) 2016/679: The supervisory authority of the Member State in which the representative within the meaning of Article 27(1) of Regulation (EU) 2016/679 is established, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) without however having to appoint a representative pursuant to Article 27(2) of Regulation (EU) 2016/679: The supervisory authority of one of the Member States in which the data subjects whose personal data is transferred under these Clauses in relation to the offering of goods or services to them, or whose behaviour is monitored, are located, as indicated in Annex I.C, shall act as competent supervisory authority. (b) The data importer agrees to submit itself to the jurisdiction of and cooperate with the competent supervisory authority in any procedures aimed at ensuring compliance with these Clauses. In particular, the data importer agrees to respond to enquiries, submit to audits and comply with the measures adopted by the supervisory authority, including remedial and compensatory measures. It shall provide the supervisory authority with written confirmation that the necessary actions have been taken. SECTION III – LOCAL LAWS AND OBLIGATIONS IN CASE OF ACCESS BY PUBLIC AUTHORITIES Clause 14 Local laws and practices affecting compliance with the Clauses (a) The Parties warrant that they have no reason to believe that the laws and practices in the third country of destination applicable to the processing of the personal data by the data importer, including any requirements to disclose personal data or measures authorising access by public authorities, prevent the data importer from fulfilling its obligations under these Clauses. This is based on the understanding that laws and practices that respect the essence of the fundamental rights and freedoms and do not exceed what is necessary and proportionate in a democratic society to safeguard one of the objectives listed in Article 23(1) of Regulation (EU) 2016/679, are not in contradiction with these Clauses. (b) The Parties declare that in providing the warranty in paragraph (a), they have taken due account in particular of the following elements: (i) the specific circumstances of the transfer, including the length of the processing chain, the number of actors involved and the transmission channels used; intended onward transfers; the type of recipient; the purpose of processing; the categories and format of the transferred personal data; the economic sector in which the transfer occurs; the storage location of the data transferred; (ii) the laws and practices of the third country of destination– including those requiring the disclosure of data to public authorities or authorising access by such authorities – relevant in light of the specific circumstances of the transfer, and the applicable limitations and safeguards ([9]); (iii) any relevant contractual, technical or organisational safeguards put in place to supplement the safeguards under these Clauses, including measures applied during transmission and to the processing of the personal data in the country of destination. (c) The data importer warrants that, in carrying out the assessment under paragraph (b), it has made its best efforts to provide the data exporter with relevant information and agrees that it will continue to cooperate with the data exporter in ensuring compliance with these Clauses. (d) The Parties agree to document the assessment under paragraph (b) and make it available to the competent supervisory authority on request. (e) The data importer agrees to notify the data exporter promptly if, after having agreed to these Clauses and for the duration of the contract, it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under paragraph (a), including following a change in the laws of the third country or a measure (such as a disclosure request) indicating an application of such laws in practice that is not in line with the requirements in paragraph (a). The data exporter shall forward the notification to the controller. (f) Following a notification pursuant to paragraph (e), or if the data exporter otherwise has reason to believe that the data importer can no longer fulfil its obligations under these Clauses, the data exporter shall promptly identify appropriate measures (e.g. technical or organisational measures to ensure security and confidentiality) to be adopted by the data exporter and/or data importer to address the situation, if appropriate in consultation with the controller. The data exporter shall suspend the data transfer if it considers that no appropriate safeguards for such transfer can be ensured, or if instructed by the controller or the competent supervisory authority to do so. In this case, the data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses. If the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. Where the contract is terminated pursuant to this Clause, Clause 16(d) and (e) shall apply. Clause 15 Obligations of the data importer in case of access by public authorities 15.1 Notification (a) The data importer agrees to notify the data exporter and, where possible, the data subject promptly (if necessary with the help of the data exporter) if it: (i) receives a legally binding request from a public authority, including judicial authorities, under the laws of the country of destination for the disclosure of personal data transferred pursuant to these Clauses; such notification shall include information about the personal data requested, the requesting authority, the legal basis for the request and the response provided; or (ii) becomes aware of any direct access by public authorities to personal data transferred pursuant to these Clauses in accordance with the laws of the country of destination; such notification shall include all information available to the importer. The data exporter shall forward the notification to the controller. 2. If the data importer is prohibited from notifying the data exporter and/or the data subject under the laws of the country of destination, the data importer agrees to use its best efforts to obtain a waiver of the prohibition, with a view to communicating as much information as possible, as soon as possible. The data importer agrees to document its best efforts in order to be able to demonstrate them on request of the data exporter. 3. Where permissible under the laws of the country of destination, the data importer agrees to provide the data exporter, at regular intervals for the duration of the contract, with as much relevant information as possible on the requests received (in particular, number of requests, type of data requested, requesting authority/ies, whether requests have been challenged and the outcome of such challenges, etc.). The data exporter shall forward the information to the controller. 4. The data importer agrees to preserve the information pursuant to paragraphs (a) to (c) for the duration of the contract and make it available to the competent supervisory authority on request. 5. Paragraphs (a) to (c) are without prejudice to the obligation of the data importer pursuant to Clause 14(e) and Clause 16 to inform the data exporter promptly where it is unable to comply with these Clauses. 15.2 Review of legality and data minimization (a) The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e). (b) The data importer agrees to document its legal assessment and any challenge to the request for disclosure and, to the extent permissible under the laws of the country of destination, make the documentation available to the data exporter. It shall also make it available to the competent supervisory authority on request. The data exporter shall make the assessment available to the controller. (c) The data importer agrees to provide the minimum amount of information permissible when responding to a request for disclosure, based on a reasonable interpretation of the request. SECTION IV – FINAL PROVISIONS Clause 16 Non-compliance with the Clauses and termination (a) The data importer shall promptly inform the data exporter if it is unable to comply with these Clauses, for whatever reason. (b) In the event that the data importer is in breach of these Clauses or unable to comply with these Clauses, the data exporter shall suspend the transfer of personal data to the data importer until compliance is again ensured or the contract is terminated. This is without prejudice to Clause 14(f). (c) The data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses, where: (i) the data exporter has suspended the transfer of personal data to the data importer pursuant to paragraph (b) and compliance with these Clauses is not restored within a reasonable time and in any event within one month of suspension; (ii) the data importer is in substantial or persistent breach of these Clauses; or (iii) the data importer fails to comply with a binding decision of a competent court or supervisory authority regarding its obligations under these Clauses. In these cases, it shall inform the competent supervisory authority and the controller of such non-compliance. Where the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. (d) Personal data that has been transferred prior to the termination of the contract pursuant to paragraph (c) shall at the choice of the data exporter immediately be returned to the data exporter or deleted in its entirety. The same shall apply to any copies of the data. The data importer shall certify the deletion of the data to the data exporter. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit the return or deletion of the transferred personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process the data to the extent and for as long as required under that local law. (e) Either Party may revoke its agreement to be bound by these Clauses where (i) the European Commission adopts a decision pursuant to Article 45(3) of Regulation (EU) 2016/679 that covers the transfer of personal data to which these Clauses apply; or (ii) Regulation (EU) 2016/679 becomes part of the legal framework of the country to which the personal data is transferred. This is without prejudice to other obligations applying to the processing in question under Regulation (EU) 2016/679. Clause 17 Governing law These Clauses shall be governed by the law of one of the EU Member States, provided such law allows for third-party beneficiary rights. The Parties agree that this shall be the law of the Republic of Ireland. Clause 18 Choice of forum and jurisdiction (a) Any dispute arising from these Clauses shall be resolved by the courts of an EU Member State. (b) The Parties agree that those shall be the courts of Dublin, Ireland. (c) A data subject may also bring legal proceedings against the data exporter and/or data importer before the courts of the Member State in which he/she has his/her habitual residence. (d) The Parties agree to submit themselves to the jurisdiction of such courts. APPENDIX ANNEX I A. LIST OF PARTIES Data exporter(s): Name: As defined in the Agreement Address: As defined in the Agreement Contact person’s name, position and contact details: As defined in the Agreement Activities relevant to the data transferred under these Clauses: To receive the services from the data importer. Signature and date: The effective date of the Agreement. Role: Data Processor Data importer(s): Name: Securiti, Inc. Address: 300 Santana Row Suite 450. San Jose, CA 95128 Contact person’s name, position and contact details: James Stoddard, VP Finance, 408-401-1160, james.stoddard@securiti.ai Activities relevant to the data transferred under these Clauses: To provide the services to the data exporter. Signature and date: The effective date of the Agreement. Role: Data Processor (Sub-Processor) B. DESCRIPTION OF TRANSFER Categories of data subjects whose personal data is transferred As described in Schedule 1 of the DPA Categories of personal data transferred As described in Schedule 1 of the DPA. Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures. As described in Schedule 1 of Securiti’s DPA [https://securiti.ai/terms/]. The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis). Transfers will occur on an ongoing basis as reasonably required under the Agreement. Nature of the processing As described in Schedule 1 of the DPA. Purpose(s) of the data transfer and further processing As described in Schedule 1 of the DPA. The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period For the duration of the Agreement and in accordance with the DPA. For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing As described in Schedule 1 of the DPA. C. COMPETENT SUPERVISORY AUTHORITY The Irish competent supervisory authority identified above. -------------------------------------------------------------------------------- ANNEX II TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA Securiti maintains a comprehensive, written information security program that contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope and type of Securiti’s business; (b) the type of information that Securiti will store; and (c) the need for security and confidentiality of such information. Securiti’s security program includes: 1. Security Awareness and Training. A mandatory security awareness and training program for all members of Securiti’s workforce (including management), which includes: * Training on how to implement and comply with its Information Security Program; and * Promoting a culture of security awareness through periodic communications from senior management with employees. 2. Access Controls. Policies, procedures, and logical controls: * To limit access to its information systems and the facility or facilities in which they are housed to properly authorized persons; * To prevent those workforce members and others who should not have access from obtaining access; and * To remove access in a timely basis in the event of a change in job responsibilities or job status. 3. Physical and Environmental Security. Controls that provide reasonable assurance that access to physical servers at the production data center, if applicable, is limited to properly authorized individuals and that environmental controls are established to detect, prevent and control destruction due to environmental extremes. These controls are implemented by Amazon Web Services (AWS) and they are listed here: https://aws.amazon.com/compliance/data-center/controls/. Specific to Securiti: * Logging and monitoring of unauthorized access attempts to the data center by the data center security personnel; * Camera surveillance systems at critical internal and external entry points to the data center, with retention of data per legal or compliance requirements; * Systems that monitor and control the air temperature and humidity at appropriate levels for the computing equipment; and * Redundant power supply modules and backup generators that provide backup power in the event of an electrical failure, 24 hours a day. 4. Security Incident Procedures. A security incident response plan that includes procedures to be followed in the event of any Security Breach. Such procedures include: * Roles and responsibilities: formation of an internal incident response team with a response leader; * Investigation: assessing the risk the incident poses and determining who may be affected; * Communication: internal reporting as well as a notification process in the event of unauthorized disclosure of Customer Data; * Recordkeeping: keeping a record of what was done and by whom to help in later analysis and possible legal action; and * Audit: conducting and documenting root cause analysis and remediation plan. 5. Contingency Planning. Policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, pandemic flu, and natural disaster) that could damage Customer Data or production systems that contain Customer Data. Such procedures include: * Data Backups: A policy for performing periodic backups of production data sources, as applicable, according to a defined schedule; * Disaster Recovery: A formal disaster recovery plan for the production data center, including: * Requirements for the disaster plan to be tested on a regular basis, currently twice a year; and * A documented executive summary of the Disaster Recovery testing, at least annually, which is available upon request to customers. * Business Continuity Plan: A formal process to address the framework by which an unplanned event might be managed in order to minimize the loss of vital resources. 6. Audit Controls. Hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic information. 7. Data Integrity. Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. 8. Storage and Transmission Security. Security measures to guard against unauthorized access to Customer Data that is being transmitted over a public electronic communications network or stored electronically. Such measures include requiring encryption of any Customer Data stored on desktops, laptops or other removable storage devices. 9. Secure Disposal. Policies and procedures regarding the secure disposal of tangible property containing Customer Data, taking into account available technology so that Customer Data cannot be practicably read or reconstructed. 10. Assigned Security Responsibility. Assigning responsibility for the development, implementation, and maintenance of Securiti’s security program, including: * Designating a security official with overall responsibility; * Defining security roles and responsibilities for individuals with security responsibilities; and * Designating a Security Council consisting of cross-functional management representatives to meet on a regular basis. 11. Testing. Regularly testing the key controls, systems and procedures of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified. Where applicable, such testing includes: * Internal risk assessments; * Service Organization Control 2 (SOC2) audit reports (or industry-standard successor reports). 12. Monitoring. Network and systems monitoring, including error logs on servers, disks and security events for any potential problems. Such monitoring includes: * Reviewing changes affecting systems handling authentication, authorization, and auditing; * Reviewing privileged access to Securiti production systems; and * Engaging third parties to perform network vulnerability assessments and penetration testing on a regular basis. 13. Change and Configuration Management. Maintaining policies and procedures for managing changes Securiti makes to production systems, applications, and databases. Such policies and procedures include: * process for documenting, testing and approving the patching and maintenance of the Securiti Product; * A security patching process that requires patching systems in a timely manner based on a risk analysis; and * A process for Securiti to utilize a third party to conduct application level security assessments. These assessments generally include testing, where applicable, for: * Cross-site request forgery * Services scanning * Improper input handling (e.g. cross-site scripting, SQL injection, XML injection, cross-site flashing) * XML and SOAP attacks * Weak session management * Data validation flaws and data model constraint inconsistencies * Insufficient authentication * Insufficient authorization 14. Program Adjustments. Monitoring, evaluating, and adjusting, as appropriate, the security program in light of: * Any relevant changes in technology and any internal or external threats to Securiti or the Customer Data; * Security and data privacy regulations applicable to Securiti; and * Securiti’s own changing business arrangements, such as mergers and acquisitions, alliances and joint ventures, outsourcing arrangements, and changes to information systems. 15. Devices – Ensuring that all laptop and desktop computing devices utilized by Securiti and any subcontractors when accessing Customer Data: * will be equipped with a minimum of AES 128 bit full hard disk drive encryption; * will have up to date virus and malware detection and prevention software installed with virus definitions updated on a regular basis; and * will maintain virus and malware detection and prevention software so as to remain on a supported release. This will include, but not be limited to, promptly implementing any applicable security-related enhancement or fix made available by the supplier of such software. 16. Data Security Breach. “Security Breach” means any security incident if there is a reason to believe Customer Data has been or may have been accessed by an unauthorized party. * Securiti will notify Customer of a Security Breach as soon as practicable, but no later than twenty-four (24) hours after Securiti becomes aware of it, by e-mailing Customer with a read receipt at a Customer designated email address, with a copy by e-mail to Securiti’s primary business contact within Customer. * Securiti agrees that unless required by law, it shall not inform any third party that a Security Breach without Approval. Further, Securiti agrees that Customer shall have the sole right to determine whether notice of the Security Breach is to be provided to consumers associated with Customer Data. 17. Return or Destruction of Customer Data. * Customer Data may be deleted by Securiti following the termination or suspension of Customer’s use of the Securiti Product. * Customer may request that Securiti delete Customer Data by notifying the Securiti support team via a ticket filed using the Customer Support link in a Securiti account, or via an email to support@securiti.ai. Upon Securiti receiving confirmation from Customer of the deletion request, Securiti will delete all Customer Data from online systems within one business week of such confirmation. * Securiti may retain Customer Data to the extent required by applicable laws and only to the extent and for such period as required by applicable law. -------------------------------------------------------------------------------- ANNEX III LIST OF SUB-PROCESSORS The controller has authorized the use of the following sub-processors. As described in the Sub-processors List of Securiti’s DPA. DATA PROCESSING AGREEMENT/ADDENDUM This Data Processing Agreement (“DPA”), made and entered into as of this ____ day of ____, 2022, forms part of the Securiti Customer Agreement (the “Agreement”). You acknowledge that you, on behalf of [______] incorporated under __________ law, with its principal offices located at ____________________ (“Organization”) (collectively, ”You”, ”Your”, “Client”, or “Data Controller”) have read and understood and agree to comply with this DPA, and are entering into a binding legal agreement with Securiti as defined below (“Securiti”, ”Us”, ”We”, ”Our”, “Service Provider” or “Data Processor”) to reflect the parties’ agreement with regard to the Processing of Client Personal Data (as such terms are defined below). Both parties shall be referred to as the “Parties” and each, a “Party”. WHEREAS, Securiti shall provide the services set forth in the Agreement (collectively, the “Services”) for Client, as described in the Agreement; and WHEREAS, In the course of providing the Services pursuant to the Agreement, we may process Client Personal Data on your behalf, in the capacity of a “Data Processor”; and the Parties wish to set forth the arrangements concerning the processing of Client Personal Data (defined below) within the context of the Services and agree to comply with the following provisions with respect to any Client Personal Data, each acting reasonably and in good faith. NOW THEREFORE, in consideration of the mutual promises set forth herein and other good and valuable consideration, the receipt and sufficiency of which are hereby acknowledged by the Parties, the parties, intending to be legally bound, agree as follows: 1. INTERPRETATION AND DEFINITIONS 1. The headings contained in this DPA are for convenience only and shall not be interpreted to limit or otherwise affect the provisions of this DPA. 2. References to clauses or sections are references to the clauses or sections of this DPA unless otherwise stated. 3. Words used in the singular include the plural and vice versa, as the context may require. 4. Capitalized terms not defined herein shall have the meanings assigned to such terms in the Agreement. 5. Definitions: 1. “Affiliate” means an entity that directly or indirectly Controls, is Controlled by, or is under common Control with another entity, so long as such Control exists. For the purposes of this definition, “Control” means direct or indirect ownership or control of more than 50% of the voting interests of the subject entity. 2. “Authorized Affiliate” means any of Client’s Affiliate(s) which (a) is subject to the Data Protection Laws And Regulations of the European Union, the European Economic Area and/or their member states, Switzerland and/or the United Kingdom, and (b) is permitted to use the Services pursuant to the Agreement between Client and Securiti, but has not signed its own agreement with Securiti and is not a “Customer” as defined under the Agreement. 3. “Client Personal Data” means any Personal Data Processed by Securiti on behalf of Client or a third party Data Controller (as applicable) in connection with the Services. 4. “Controller” or “Data Controller” means the entity which determines the purposes and means of the Processing of Personal Data as defined by the GDPR. For the purposes of this DPA only, and except where indicated otherwise, the term “Data Controller” shall include the Organization and/or the Organization’s Authorized Affiliates. 5. “Data Protection Laws and Regulations” means (i) the GDPR, as defined herein; (ii) the Data Protection Act 2018 of the United Kingdom, as amended from time to time, and including any substantially similar legislation that replaces the DPA 2018; and (iii) the national legislation of the Swiss Confederation on the protection of Data Subjects with regard to the processing of Personal Data and on the free movement of such data, as amended from time to time, and other data protection or privacy legislation in force from time to time in the Swiss Confederation; 6. “Data Subject” means the identified or identifiable person to whom the Personal Data relates. 7. “Member State” means a country that belongs to the European Union and/or the European Economic Area. “Union” means the European Union. 8. “GDPR” means (i) Regulation (EU) 2016/679 together with applicable legislation implementing or supplementing the same or otherwise relating to the processing of Personal Data of natural persons; and (ii) the retained Regulation (EU) 2016/679 in the United Kingdom (“UK GDPR”). 9. “Personal Data” means any information relating to an identified or identifiable natural person; an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person. 10. “Process(ing)” means any operation or set of operations which is performed upon Personal Data, whether or not by automatic means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction. 11. “Processor” or “Data Processor” means the entity which Processes Personal Data on behalf of the Controller as defined by the GDPR. 12. “Security Documentation” means the Security Documentation applicable to the specific Services purchased by Client, as updated from time to time, and as made reasonably available by Securiti. 13. “Securiti” means Securiti Inc. and any of its affiliates or subsidiaries. 14. “Securiti Group” means Securiti and its Affiliates engaged in the Processing of Personal Data. 15. “Sub-processor” means any Processor engaged by Securiti to Process Personal Data on behalf of Client. 16. “Supervisory Authority” means an independent public authority which is established by an EU Member State or the United Kingdom pursuant to the GDPR. 2. PROCESSING OF CLIENT PERSONAL DATA 1. Roles of the Parties. This DPA applies to the Processing of Client Personal Data by Securiti. For the purposes of this DPA, (i) Client is the Data Controller; (ii) with respect to Client Personal Data for which Client is the Data Controller, Securiti is the Data Processor Processing such Client Personal Data on Client’s behalf; (iii) with respect to Client Personal Data for which Client is a Data Processor for a third party Data Controller, Securiti is a Sub-processor to Process Client Personal Data on the third party Data Controller’s behalf. To the extent Securiti acts as a Sub-processor to a third party Data Controller, (a) Client will convey to Securiti any notifications given by the third party Data Controller insofar as they relate to the Services provided by Securiti; b) any instructions or authorizations given by Client to Securiti under this DPA or otherwise relating to the Processing of Client Personal Data are the instructions and authorizations given by the third party Data Controller. 2. Client’s Processing of Personal Data. Client shall, in its use of the Services, Process Personal Data in accordance with the requirements of Data Protection Laws and Regulations and comply at all times with the obligations applicable to Data Controllers under Data Protection Laws and Regulations, as applicable, (including, without limitation, Article 24 of the GDPR), to the extent Client acts as a Controller under the Ag reement. For the avoidance of doubt, Client’s instructions for the Processing of Personal Data shall comply with Data Protection Laws and Regulations. Client shall have sole responsibility for the means by which Client acquired Personal Data. Without limitation and in any case, Client shall comply with any and all transparency-related obligations under Data Protection Laws and Regulations as applicable (including, without limitation, displaying any and all relevant and required privacy notices or policies) and shall at all times have any and all ongoing legal bases, consents, and authorizations required by applicable Data Protection Laws and Regulations in order to collect, Process and transfer to Securiti the Client Personal Data and to authorize the Processing by Securiti of Client Personal Data. In particular, and without limiting the foregoing, Client shall be responsible for ensuring that any Data Subjects whose Client Personal Data is subject to PIPEDA have received notice of, and have provided consent as may be required for, the transfer of data to the United States for Processing by Securiti. Client shall defend, hold harmless and indemnify Securiti, its Affiliates and subsidiaries (including without limitation their directors, officers, agents, subcontractors and/or employees) from and against any liability of any kind related to any breach, violation or infringement by Client and/or its authorized users of any Data Protection Laws and Regulations and/or this DPA and/or this Section. 3. Securiti’s Processing of Client Personal Data. 1. Subject to the Agreement, Securiti shall Process Client Personal Data in accordance with Client’s documented instructions, including as necessary for the performance of the Services and for the performance of the Agreement and this DPA, unless otherwise required by Union or Member State law or any other applicable to which Securiti is subject, in which case Securiti shall inform the Client of the legal requirement before processing, unless that law prohibits such information on important grounds of public interest. The duration of the Processing, the nature and purposes of the Processing, as well as the types of Personal Data Processed and categories of Data Subjects under this DPA are further specified in Schedule 1 (Details of the Processing) to this DPA. 2. To the extent that Securiti considers such an instruction issued by Client to be unlawful, Securiti (i) shall inform Client of its determination, (ii) may, without any kind of liability towards Client, temporarily cease all Processing of the affected Client Personal Data (other than securely storing those data), and (iii) if the Parties do not agree on a resolution to the issue in question and the costs thereof, each Party may, as its sole remedy, terminate the Agreement and this DPA solely with respect to the affected Processing, and Client shall pay to Securiti all the amounts owed to Securiti or due before the date of termination. Client will have no further claims against Securiti (including, without limitation, requesting refunds for Services) due to the termination of the Agreement and/or the DPA in accordance with this paragraph (excluding the obligations relating to the termination of this DPA set forth below). 3. Securiti will not be liable in the event of any claim brought by a third party, including, without limitation, a Data Subject, arising from any act or omission of Securiti, to the extent that such is a result of Client’s instructions. 4. If Client provides Securiti or any of the entities of the Securiti Group with instructions, requests, suggestions, comments or feedback (whether orally or in writing) with respect to the Services, Client acknowledges that any and all rights, including intellectual property rights, therein shall belong exclusively to Securiti and that such shall be considered Securiti’s intellectual property without restrictions or limitations of any kind, and Client hereby irrevocably and fully transfers and assigns to Securiti any and all intellectual property rights therein and waives any and all moral rights that Client may have in respect thereto. 3. RIGHTS OF DATA SUBJECTS If Securiti receives a request from a Data Subject to exercise its right to be informed, right of access, right to rectification, erasure, restriction of Processing, data portability, right to object, or its right not to be subject to a decision solely based on automated processing, including profiling (“Data Subject Request”), Securiti shall, to the extent legally permitted, promptly notify and forward such Data Subject Request to Client. Taking into account the nature of the Processing, Securiti shall use commercially reasonable efforts to assist Client using appropriate technical and organizational measures, insofar as this is possible, for the fulfilment of Client’s obligation to respond to a Data Subject Request under Data Protection Laws and Regulations. To the extent legally permitted, Client shall be responsible for any costs arising from Securiti’s provision of such assistance. 4. SECURITI PERSONNEL 1. Confidentiality. Securiti shall ensure that authorized persons engaged in the Processing of Client Personal Data have committed themselves to confidentiality or are under an appropriate statutory or other obligation of confidentiality. 2. Securiti may disclose and Process the Client Personal Data (a) as permitted hereunder (b) to the extent required by a court of competent jurisdiction or other Supervisory Authority and/or otherwise as required by applicable laws or applicable Data Protection Laws and Regulations. 5. AUTHORIZATION REGARDING SUB-PROCESSORS 1. General Authorization for Use of Sub-processors. Client hereby expressly and generally authorizes Securiti to engage Sub-processors to Process Client Personal Data, and Securiti’s current list of Sub-processors is enclosed in Schedule 2 to the DPA. 2. Notification for Change in Sub-processors. Securiti shall provide notification of any new Sub-processor(s) before authorizing such new Sub-processor(s) to Process Client Personal Data in connection with the provision of the Services. In order to receive such notification, Client shall subscribe to notifications of new Sub-processors on the Securiti website, available at https://status.securiti.ai. 3. Objection Right for New Sub-processors. Client may reasonably object to Securiti’s use of a new Sub-processor for reasons related to the GDPR by notifying Securiti promptly in writing at privacy@securiti.ai within three (3) business days after receipt of Securiti’s notice in accordance with the mechanism set out in Section 5.2, and such written objection shall include the reasons related to the GDPR for objecting to Securiti’s use of such new Sub-processor. Failure to object to such new Sub-processor in writing within three (3) business days following Securiti’s notice shall be deemed as acceptance of the new Sub-Processor. In the event Client reasonably objects to a new Sub-processor, Securiti will use reasonable efforts to make available to Client a change in the Services or recommend a commercially reasonable change to Client’s use of the Services to avoid Processing of Client Personal Data by the objected-to new Sub-processor without unreasonably burdening the Client. If Securiti is unable to make available such change within a reasonable period of time, which shall not exceed thirty (30) days, Client may, as a sole remedy, terminate the Agreement and this DPA solely with respect to those Services which cannot be provided by Securiti without the use of the objected-to new Sub-processor. Client must exercise this remedy by providing written notice to Securiti, provided that all amounts due under the Agreement before the termination date with respect to the Processing at issue shall be duly paid to Securiti. Until a decision is made regarding the new Sub-processor, Securiti may temporarily suspend the Processing of the affected Personal Data. Client will have no further claims against Securiti due to the termination of the Agreement (including, without limitation, requesting refunds) and/or the DPA in accordance with this paragraph. 4. Agreements with Sub-processors. Securiti, in engaging Sub-processors to Process Client Personal Data, agrees to impose contractual terms on such Sub-processors that are materially as protective as those set forth in this DPA. For the avoidance of doubt, this Section 5.3 shall not apply to subcontractors of Securiti that provide ancillary services to support the performance of this DPA and do not directly receive Client Personal Data from Securiti, such as telecommunication services, maintenance and user services, cleaning staff or auditors. 6. SECURITY 1. Controls for the Protection of Client Personal Data. Taking into account the state of the art, the costs of implementation, the scope, context, purposes of the Processing, as well as the risk of varying likelihood and impact on the rights and freedoms of natural persons, Securiti shall maintain appropriate technical and organizational measures pursuant to Article 32 of the GDPR for protection of the security (including protection against unauthorized or unlawful Processing and against accidental or unlawful destruction, loss or alteration or damage, unauthorized disclosure of, or access to, Personal Data), confidentiality and integrity of Personal Data, as set forth in the Security Documentation which are hereby approved by Client. Any amendment to such agreed measures that is necessitated by Articles 32 to 36 of GDPR due to a change in the types of Personal Data Processed shall be dealt with via an agreed change control process between Securiti and Client. 2. Third-Party Certifications and Audits. At Client’s cost and expense, and in accordance with this Section 6.2, Securiti shall allow for and contribute to audits, including inspections of Securiti, conducted by the Client (only to the extent that Client is not a competitor of Securiti) or another auditor mandated by Client (who is not a direct or indirect competitor of Securiti) provided that the parties shall agree on the scope, methodology, timing and conditions of such audits and inspections. Upon Client’s written request once per year during the term of this DPA, and subject to the confidentiality obligations set forth in the Agreement and this DPA, Securiti shall make available to Client (only to the extent that Client is not a competitor of Securiti), or Client’s independent, third-party auditor that is not a competitor of Securiti, a copy of Securiti’s then most recent third-party audits or certifications, as applicable (provided, however, that such audits, certifications and the results therefrom, including the documents reflecting the outcome of the audit and/or the certifications, shall only be used by Client to assess compliance with this DPA and/or with applicable Data Protection Laws and Regulations, and shall not be used for any other purpose or disclosed to any third party without Securiti’s prior written approval and, upon Securiti’s request, Client shall return all records or documentation in Client’s possession or control in the context of the audit and/or the certification).. Notwithstanding anything to the contrary, such audits and/or inspections shall not contain, involve, or impact any information that does not belong to the Client. 7. PERSONAL DATA INCIDENT MANAGEMENT AND NOTIFICATION To the extent required under applicable Data Protection Laws and Regulations, Securiti shall notify Client without undue delay after becoming aware of a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Client Personal Data (a “Personal Data Incident”). Securiti shall make reasonable efforts to identify the cause of such Personal Data Incident and take those steps as Securiti deems necessary and reasonable in order to remediate the cause of such a Personal Data Incident. The obligations herein shall not apply to incidents that are caused by Client or Client’s users. In any event, Client will be the party responsible for notifying supervisory authorities and/or concerned data subjects (where required by Data Protection Laws and Regulations). 8. RETURN AND DELETION OF CLIENT PERSONAL DATA Subject to the Agreement, Securiti shall, at the choice of Client, delete or return Client Personal Data to Client upon termination or expiry of the Agreement, and shall delete existing copies unless applicable law requires storage of Client Personal Data. If the Client requests Client Personal Data to be returned, Client Personal Data shall be returned in the format generally available for Securiti’s Clients. In any event, to the extent required or allowed by applicable law, Securiti may retain Client Personal Data for evidence purposes and/or for the establishment, exercise or defence of legal claims and/or to comply with applicable laws and regulations. 9. AUTHORIZED AFFILIATES 1. Contractual Relationship. The Parties acknowledge and agree that, by executing the DPA, the Client enters into the DPA on behalf of itself and, as applicable, in the name and on behalf of its Authorized Affiliates. Each Authorized Affiliate agrees to be bound by the obligations under this DPA. All access to and use of the Services by Authorized Affiliates must comply with the terms and conditions of the Agreement and this DPA and any violation of the terms and conditions therein by an Authorized Affiliate shall be deemed a violation by Client. 2. Communication. The Client shall remain responsible for coordinating all communication with Securiti under the Agreement and this DPA and shall be entitled to make and receive any communication in relation to this DPA on behalf of its Authorized Affiliates. 10. TRANSFERS OF DATA 1. Transfers to countries that offer adequate level of data protection. Client Personal Data may be transferred from the EU Member States, the three EEA member countries (Norway, Liechtenstein and Iceland) (collectively, “EEA”) and the United Kingdom to countries that offer adequate level of data protection under or pursuant to the adequacy decisions published by the relevant data protection authorities of the EEA, the Union, the Member States, the European Commission, or the United Kingdom (“Adequacy Decisions”), without any further safeguard being necessary. 2. Transfers to other countries. If the Processing of Client Personal Data includes transfers from the EEA to countries outside the EEA which are not subject to an Adequacy Decision (“Other Countries”), the Parties shall enter into the standard data protection clauses adopted by the relevant data protection authorities of the EEA, the Union, the Member States, the European Commission, or the United Kingdom Information Commissioner’s Office (“Standard Contractual Clauses”) or comply with any of the other mechanisms provided for in the GDPR for transferring Personal Data to such Other Countries. To the maximum extent permitted by law, to the extent that Client and Securiti use Standard Contractual Clauses as a mechanism to transfer Client Personal Data, the rights and obligations of the parties shall be performed in accordance with and subject to this DPA. With respect to transfers of Client Personal Data made under this section, where Client is a Controller and Securiti is a Processor, the Standard Contractual Clauses for transfers from Controller to Processor (available in Schedule 3A of this DPA) shall apply; where Client is a Processor and Securiti is a Sub-processor, the Standard Contractual Clauses for transfers and from Processor to Processor (available in Schedule 3B of this DPA), shall apply. With respect to transfers of Client Personal Data from the United Kingdom made under this section, the Standard Contractual Clauses approved by the ICO for transfers of United Kingdom Personal Data (available in Schedule 3C of this DPA) shall apply. 11. TERMINATION This DPA shall automatically terminate upon the termination or expiration of the Agreement under which the Services are provided. Sections 2.2, 2.3.3, 2.3.4 12, and 13 shall survive the termination or expiration of this DPA for any reason. This DPA cannot, in principle, be terminated separately from the Agreement, except where the Processing ends before the termination of the Agreement, in which case, this DPA shall automatically terminate. 12. RELATIONSHIP WITH AGREEMENT In the event of any conflict between the provisions of this DPA and the provisions of the Agreement, the provisions of this DPA shall prevail over the conflicting provisions of the Agreement. 13. LIMITATION OF LIABILITY Securiti’s (including, without limitation, Supplier’s affiliates’ and subsidiaries’) entire, total and aggregate liability, related to personal data or information privacy, or for breach of, this DPA and/or Data Protection Laws and Regulations, including, without limitation, if any, any indemnification obligation under the Agreement or applicable law regarding data protection or privacy, shall be subject to the limitation of liability under the Agreement. 14. AMENDMENTS This DPA may be amended at any time by a written instrument duly signed by each of the Parties. 15. LEGAL EFFECT This DPA shall only become legally binding between Client and Securiti when the formalities steps set out in the Section “INSTRUCTIONS ON HOW TO EXECUTE THIS DPA” below have been fully completed. Securiti may assign this DPA or its rights or obligations hereunder to any Affiliate therefor, or to a successor or any Affiliate thereof, in connection with a merger, consolidation or acquisition of all or substantially all of its shares, assets or business relating to this DPA or the Agreement. Any Securiti obligation hereunder may be performed (in whole or in part) and any Securiti right (including invoice and payment rights) or remedy may be exercised (in whole or in part) by an Affiliate of Securiti. 16. SIGNATURE The Parties represent and warrant that they each have the power to enter into, execute, perform and be bound by this DPA. You, as the signing person on behalf of Client, represent and warrant that you have, or you were granted, full authority to bind the Organization and, as applicable, its Authorized Affiliates to this DPA. If you cannot, or do not have authority to, bind the Organization and/or its Authorized Affiliates, you shall not supply or provide Personal Data to Securiti. By signing this DPA, Client enters into this DPA on behalf of itself and, to the extent required or permitted under applicable Data Protection Laws and Regulations, in the name and on behalf of its Authorized Affiliates, if and to the extent that Securiti processes Personal Data for which such Authorized Affiliates qualify as the/a “data controller”. This DPA has been pre-signed on behalf of Securiti. Instructions on how to execute this DPA. 1. To complete this DPA, you must complete the missing information; and 2. Send the completed and signed DPA to us by email, indicating the Client’s name, to privacy@securiti.ai. LIST OF SCHEDULES * SCHEDULE 1 - DETAILS OF THE PROCESSING * SCHEDULE 2 - SUB-PROCESSOR LIST * SCHEDULE 3 – STANDARD CONTRACTUAL CLAUSES FOR CUSTOMERS * SCHEDULE 3A – CONTROLLER TO PROCESSOR * SCHEDULE 3B – PROCESSOR TO PROCESSOR * SCHEDULE 3C – UNITED KINGDOM STANDARD CONTRACTUAL CLAUSES The parties’ authorized signatories have duly executed this Agreement: CLIENT: SECURITI INC. Signature: Signature: Client Legal Name: Client Legal Name: Print Name: Print Name: Title: Title: Date: Date: -------------------------------------------------------------------------------- SCHEDULE 1 - DETAILS OF THE PROCESSING Subject matter and duration The subject matter and duration of the Processing of the Client Personal Data are set out in the sections of the Agreement addressing scope of services and term and as set forth in this DPA. Nature and Purpose of Processing The nature and purpose of the Processing of the Client Personal Data are set out in the sections of the Agreement addressing scope of services and term. TYPE OF PERSONAL DATA Client may submit Personal Data to the Services, the extent of which is determined and controlled by Client in its sole discretion, includes: * First name * Last name * Address * Phone number * Email address * Payment information * Any other Personal Data or information that the Client decides to provide to the Securiti or the Services. In some limited circumstances Personal Data may also come from others sources, for example, in the case of anti-money laundering research, fraud detection or as required by applicable law. CATEGORIES OF DATA SUBJECTS Client may submit Personal Data to the Services, the extent of which is determined and controlled by Client in its sole discretion, and which may include, but is not limited to Personal Data relating to the following categories of data subjects: * Client’s customers and/or clients * Client’s users authorized by Client to use the Services * Employees, agents, advisors, freelancers of Client (who are natural persons) * Prospects, Clients, business partners and vendors of Client (who are natural persons) * Employees or contact persons of Client’s prospects, Clients, business partners and vendors -------------------------------------------------------------------------------- SCHEDULE 2 – SUB-PROCESSOR LIST Entity Name Sub-Processing Activities Entity Country Amazon Web Services, Inc. Cloud Service Provider United States AWS Jakarta Cloud Service Provider Indonesia Amazon Web Services EMEA SARL Cloud Service Provider European Union Google Cloud Platform Cloud Service Provider United States Zendesk, Inc. Cloud Customer Support United States -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- SCHEDULE 3 – STANDARD CONTRACTUAL CLAUSES Schedule 3A To DPA between Securiti and Client Standard Contractual Clauses CONTROLLER TO PROCESSOR SECTION I Clause 1 Purpose and scope (a) The purpose of these standard contractual clauses is to ensure compliance with the requirements of Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) ([1]) for the transfer of data to a third country. (b) The Parties: (i) the natural or legal person(s), public authority/ies, agency/ies or other body/ies (hereinafter ‘entity/ies’) transferring the personal data, as listed in Annex I.A (hereinafter each ‘data exporter’), and (ii) the entity/ies in a third country receiving the personal data from the data exporter, directly or indirectly via another entity also Party to these Clauses, as listed in Annex I.A (hereinafter each ‘data importer’) have agreed to these standard contractual clauses (hereinafter: ‘Clauses’). (c) These Clauses apply with respect to the transfer of personal data as specified in Annex I.B. (d) The Appendix to these Clauses containing the Annexes referred to therein forms an integral part of these Clauses. Clause 2 Effect and invariability of the Clauses (a) These Clauses set out appropriate safeguards, including enforceable data subject rights and effective legal remedies, pursuant to Article 46(1) and Article 46(2)(c) of Regulation (EU) 2016/679 and, with respect to data transfers from controllers to processors and/or processors to processors, standard contractual clauses pursuant to Article 28(7) of Regulation (EU) 2016/679, provided they are not modified, except to select the appropriate Module(s) or to add or update information in the Appendix. This does not prevent the Parties from including the standard contractual clauses laid down in these Clauses in a wider contract and/or to add other clauses or additional safeguards, provided that they do not contradict, directly or indirectly, these Clauses or prejudice the fundamental rights or freedoms of data subjects. (b) These Clauses are without prejudice to obligations to which the data exporter is subject by virtue of Regulation (EU) 2016/679. Clause 3 Third-party beneficiaries (a) Data subjects may invoke and enforce these Clauses, as third-party beneficiaries, against the data exporter and/or data importer, with the following exceptions: (i) Clause 1, Clause 2, Clause 3, Clause 6, Clause 7; (ii) Clause 8 – Module One: Clause 8.5 (e) and Clause 8.9(b); Module Two: Clause 8.1(b), 8.9(a), (c), (d) and (e); Module Three: Clause 8.1(a), (c) and (d) and Clause 8.9(a), (c), (d), (e), (f) and (g); Module Four: Clause 8.1 (b) and Clause 8.3(b); (iii) Clause 9 – Module Two: Clause 9(a), (c), (d) and (e); Module Three: Clause 9(a), (c), (d) and (e); (iv) Clause 12 – Module One: Clause 12(a) and (d); Modules Two and Three: Clause 12(a), (d) and (f); (v) Clause 13; (vi) Clause 15.1(c), (d) and (e); (vii) Clause 16(e); (viii) Clause 18 – Modules One, Two and Three: Clause 18(a) and (b); Module Four: Clause 18. (b) Paragraph (a) is without prejudice to rights of data subjects under Regulation (EU) 2016/679. Clause 4 Interpretation (a) Where these Clauses use terms that are defined in Regulation (EU) 2016/679, those terms shall have the same meaning as in that Regulation. (b) These Clauses shall be read and interpreted in the light of the provisions of Regulation (EU) 2016/679. (c) These Clauses shall not be interpreted in a way that conflicts with rights and obligations provided for in Regulation (EU) 2016/679. Clause 5 Hierarchy In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties, existing at the time these Clauses are agreed or entered into thereafter, these Clauses shall prevail. Clause 6 Description of the transfer(s) The details of the transfer(s), and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred, are specified in Annex I.B. Clause 7 – Not applicable SECTION II – OBLIGATIONS OF THE PARTIES Clause 8 Data protection safeguards The data exporter warrants that it has used reasonable efforts to determine that the data importer is able, through the implementation of appropriate technical and organisational measures, to satisfy its obligations under these Clauses. 8.1 Instructions (a) The data importer shall process the personal data only on documented instructions from the data exporter. The data exporter may give such instructions throughout the duration of the contract. (b) The data importer shall immediately inform the data exporter if it is unable to follow those instructions. 8.2 Purpose limitation The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I.B, unless on further instructions from the data exporter. 8.3 Transparency On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including the measures described in Annex II and personal data, the data exporter may redact part of the text of the Appendix to these Clauses prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand the its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information. This Clause is without prejudice to the obligations of the data exporter under Articles 13 and 14 of Regulation (EU) 2016/679. 8.4 Accuracy If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to erase or rectify the data. 8.5 Duration of processing and erasure or return of data Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the data exporter and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a). 8.6 Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. (b) The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. (c) In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. (d) The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer. 8.7 Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B. 8.8 Onward transfers The data importer shall only disclose the personal data to a third party on documented instructions from the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union ([2]) (in the same country as the data importer or in another third country, hereinafter ‘onward transfer’) if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if: (i) the onward transfer is to a country benefitting from an adequacy decision pursuant to Article 45 of Regulation (EU) 2016/679 that covers the onward transfer; (ii) the third party otherwise ensures appropriate safeguards pursuant to Articles 46 or 47 Regulation of (EU) 2016/679 with respect to the processing in question; (iii) the onward transfer is necessary for the establishment, exercise or defence of legal claims in the context of specific administrative, regulatory or judicial proceedings; or (iv) the onward transfer is necessary in order to protect the vital interests of the data subject or of another natural person. Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation. 8.9 Documentation and compliance (a) The data importer shall promptly and adequately deal with enquiries from the data exporter that relate to the processing under these Clauses. (b) The Parties shall be able to demonstrate compliance with these Clauses. In particular, the data importer shall keep appropriate documentation on the processing activities carried out on behalf of the data exporter. (c) The data importer shall make available to the data exporter all information necessary to demonstrate compliance with the obligations set out in these Clauses and at the data exporter’s request, allow for and contribute to audits of the processing activities covered by these Clauses, at reasonable intervals or if there are indications of non-compliance. In deciding on a review or audit, the data exporter may take into account relevant certifications held by the data importer. (d) The data exporter may choose to conduct the audit by itself or mandate an independent auditor. Audits may include inspections at the premises or physical facilities of the data importer and shall, where appropriate, be carried out with reasonable notice. (e) The Parties shall make the information referred to in paragraphs (b) and (c), including the results of any audits, available to the competent supervisory authority on request. Clause 9 Use of sub-processors (a) The data importer has the data exporter’s general authorisation for the engagement of sub-processor(s) from an agreed list. The data importer shall specifically inform the data exporter in writing of any intended changes to that list through the addition or replacement of sub-processors at least 3 business days in advance, thereby giving the data exporter sufficient time to be able to object to such changes prior to the engagement of the sub-processor(s). The data importer shall provide the data exporter with the information necessary to enable the data exporter to exercise its right to object. (b) Where the data importer engages a sub-processor to carry out specific processing activities (on behalf of the data exporter), it shall do so by way of a written contract that provides for, in substance, the same data protection obligations as those binding the data importer under these Clauses, including in terms of third-party beneficiary rights for data subjects. ([3]) The Parties agree that, by complying with this Clause, the data importer fulfils its obligations under Clause 8.8. The data importer shall ensure that the sub-processor complies with the obligations to which the data importer is subject pursuant to these Clauses. (c) The data importer shall provide, at the data exporter’s request, a copy of such a sub-processor agreement and any subsequent amendments to the data exporter. To the extent necessary to protect business secrets or other confidential information, including personal data, the data importer may redact the text of the agreement prior to sharing a copy. (d) The data importer shall remain fully responsible to the data exporter for the performance of the sub-processor’s obligations under its contract with the data importer. The data importer shall notify the data exporter of any failure by the sub-processor to fulfil its obligations under that contract. (e) The data importer shall agree a third-party beneficiary clause with the sub-processor whereby – in the event the data importer has factually disappeared, ceased to exist in law or has become insolvent – the data exporter shall have the right to terminate the sub-processor contract and to instruct the sub-processor to erase or return the personal data. Clause 10 Data subject rights (a) The data importer shall promptly notify the data exporter of any request it has received from a data subject. It shall not respond to that request itself unless it has been authorised to do so by the data exporter. (b) The data importer shall assist the data exporter in fulfilling its obligations to respond to data subjects’ requests for the exercise of their rights under Regulation (EU) 2016/679. In this regard, the Parties shall set out in Annex II the appropriate technical and organisational measures, taking into account the nature of the processing, by which the assistance shall be provided, as well as the scope and the extent of the assistance required. (c) In fulfilling its obligations under paragraphs (a) and (b), the data importer shall comply with the instructions from the data exporter. Clause 11 Redress (a) The data importer shall inform data subjects in a transparent and easily accessible format, through individual notice or on its website, of a contact point authorised to handle complaints. It shall deal promptly with any complaints it receives from a data subject. (b) In case of a dispute between a data subject and one of the Parties as regards compliance with these Clauses, that Party shall use its best efforts to resolve the issue amicably in a timely fashion. The Parties shall keep each other informed about such disputes and, where appropriate, cooperate in resolving them. (c) Where the data subject invokes a third-party beneficiary right pursuant to Clause 3, the data importer shall accept the decision of the data subject to: (i) lodge a complaint with the supervisory authority in the Member State of his/her habitual residence or place of work, or the competent supervisory authority pursuant to Clause 13; (ii) refer the dispute to the competent courts within the meaning of Clause 18. (d) The Parties accept that the data subject may be represented by a not-for-profit body, organisation or association under the conditions set out in Article 80(1) of Regulation (EU) 2016/679. (e) The data importer shall abide by a decision that is binding under the applicable EU or Member State law. (f) The data importer agrees that the choice made by the data subject will not prejudice his/her substantive and procedural rights to seek remedies in accordance with applicable laws. Clause 12 Liability (a) Each Party shall be liable to the other Party/ies for any damages it causes the other Party/ies by any breach of these Clauses. (b) The data importer shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data importer or its sub-processor causes the data subject by breaching the third-party beneficiary rights under these Clauses. (c) Notwithstanding paragraph (b), the data exporter shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data exporter or the data importer (or its sub-processor) causes the data subject by breaching the third-party beneficiary rights under these Clauses. This is without prejudice to the liability of the data exporter and, where the data exporter is a processor acting on behalf of a controller, to the liability of the controller under Regulation (EU) 2016/679 or Regulation (EU) 2018/1725, as applicable. (d) The Parties agree that if the data exporter is held liable under paragraph (c) for damages caused by the data importer (or its sub-processor), it shall be entitled to claim back from the data importer that part of the compensation corresponding to the data importer’s responsibility for the damage. (e) Where more than one Party is responsible for any damage caused to the data subject as a result of a breach of these Clauses, all responsible Parties shall be jointly and severally liable and the data subject is entitled to bring an action in court against any of these Parties. (f) The Parties agree that if one Party is held liable under paragraph (e), it shall be entitled to claim back from the other Party/ies that part of the compensation corresponding to its/their responsibility for the damage. (g) The data importer may not invoke the conduct of a sub-processor to avoid its own liability. Clause 13 Supervision 1. Where the data exporter is established in an EU Member State: The supervisory authority with responsibility for ensuring compliance by the data exporter with Regulation (EU) 2016/679 as regards the data transfer, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) and has appointed a representative pursuant to Article 27(1) of Regulation (EU) 2016/679: The supervisory authority of the Member State in which the representative within the meaning of Article 27(1) of Regulation (EU) 2016/679 is established, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) without however having to appoint a representative pursuant to Article 27(2) of Regulation (EU) 2016/679: The supervisory authority of one of the Member States in which the data subjects whose personal data is transferred under these Clauses in relation to the offering of goods or services to them, or whose behaviour is monitored, are located, as indicated in Annex I.C, shall act as competent supervisory authority. (b) The data importer agrees to submit itself to the jurisdiction of and cooperate with the competent supervisory authority in any procedures aimed at ensuring compliance with these Clauses. In particular, the data importer agrees to respond to enquiries, submit to audits and comply with the measures adopted by the supervisory authority, including remedial and compensatory measures. It shall provide the supervisory authority with written confirmation that the necessary actions have been taken. SECTION III – LOCAL LAWS AND OBLIGATIONS IN CASE OF ACCESS BY PUBLIC AUTHORITIES Clause 14 Local laws and practices affecting compliance with the Clauses (a) The Parties warrant that they have no reason to believe that the laws and practices in the third country of destination applicable to the processing of the personal data by the data importer, including any requirements to disclose personal data or measures authorising access by public authorities, prevent the data importer from fulfilling its obligations under these Clauses. This is based on the understanding that laws and practices that respect the essence of the fundamental rights and freedoms and do not exceed what is necessary and proportionate in a democratic society to safeguard one of the objectives listed in Article 23(1) of Regulation (EU) 2016/679, are not in contradiction with these Clauses. (b) The Parties declare that in providing the warranty in paragraph (a), they have taken due account in particular of the following elements: (i) the specific circumstances of the transfer, including the length of the processing chain, the number of actors involved and the transmission channels used; intended onward transfers; the type of recipient; the purpose of processing; the categories and format of the transferred personal data; the economic sector in which the transfer occurs; the storage location of the data transferred; (ii) the laws and practices of the third country of destination– including those requiring the disclosure of data to public authorities or authorising access by such authorities – relevant in light of the specific circumstances of the transfer, and the applicable limitations and safeguards ([4]); (iii) any relevant contractual, technical or organisational safeguards put in place to supplement the safeguards under these Clauses, including measures applied during transmission and to the processing of the personal data in the country of destination. (c) The data importer warrants that, in carrying out the assessment under paragraph (b), it has made its best efforts to provide the data exporter with relevant information and agrees that it will continue to cooperate with the data exporter in ensuring compliance with these Clauses. (d) The Parties agree to document the assessment under paragraph (b) and make it available to the competent supervisory authority on request. (e) The data importer agrees to notify the data exporter promptly if, after having agreed to these Clauses and for the duration of the contract, it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under paragraph (a), including following a change in the laws of the third country or a measure (such as a disclosure request) indicating an application of such laws in practice that is not in line with the requirements in paragraph (a). (f) Following a notification pursuant to paragraph (e), or if the data exporter otherwise has reason to believe that the data importer can no longer fulfil its obligations under these Clauses, the data exporter shall promptly identify appropriate measures (e.g. technical or organisational measures to ensure security and confidentiality) to be adopted by the data exporter and/or data importer to address the situation. The data exporter shall suspend the data transfer if it considers that no appropriate safeguards for such transfer can be ensured, or if instructed by the competent supervisory authority to do so. In this case, the data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses. If the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. Where the contract is terminated pursuant to this Clause, Clause 16(d) and (e) shall apply. Clause 15 Obligations of the data importer in case of access by public authorities 15.1 Notification (a) The data importer agrees to notify the data exporter and, where possible, the data subject promptly (if necessary with the help of the data exporter) if it: (i) receives a legally binding request from a public authority, including judicial authorities, under the laws of the country of destination for the disclosure of personal data transferred pursuant to these Clauses; such notification shall include information about the personal data requested, the requesting authority, the legal basis for the request and the response provided; or (ii) becomes aware of any direct access by public authorities to personal data transferred pursuant to these Clauses in accordance with the laws of the country of destination; such notification shall include all information available to the importer. (b) If the data importer is prohibited from notifying the data exporter and/or the data subject under the laws of the country of destination, the data importer agrees to use its best efforts to obtain a waiver of the prohibition, with a view to communicating as much information as possible, as soon as possible. The data importer agrees to document its best efforts in order to be able to demonstrate them on request of the data exporter. (c) Where permissible under the laws of the country of destination, the data importer agrees to provide the data exporter, at regular intervals for the duration of the contract, with as much relevant information as possible on the requests received (in particular, number of requests, type of data requested, requesting authority/ies, whether requests have been challenged and the outcome of such challenges, etc.). (d) The data importer agrees to preserve the information pursuant to paragraphs (a) to (c) for the duration of the contract and make it available to the competent supervisory authority on request. (e) Paragraphs (a) to (c) are without prejudice to the obligation of the data importer pursuant to Clause 14(e) and Clause 16 to inform the data exporter promptly where it is unable to comply with these Clauses. 15.2 Review of legality and data minimisation (a) The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e). (b) The data importer agrees to document its legal assessment and any challenge to the request for disclosure and, to the extent permissible under the laws of the country of destination, make the documentation available to the data exporter. It shall also make it available to the competent supervisory authority on request. (c) The data importer agrees to provide the minimum amount of information permissible when responding to a request for disclosure, based on a reasonable interpretation of the request. SECTION IV – FINAL PROVISIONS Clause 16 Non-compliance with the Clauses and termination (a) The data importer shall promptly inform the data exporter if it is unable to comply with these Clauses, for whatever reason. (b) In the event that the data importer is in breach of these Clauses or unable to comply with these Clauses, the data exporter shall suspend the transfer of personal data to the data importer until compliance is again ensured or the contract is terminated. This is without prejudice to Clause 14(f). (c) The data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses, where: (i) the data exporter has suspended the transfer of personal data to the data importer pursuant to paragraph (b) and compliance with these Clauses is not restored within a reasonable time and in any event within one month of suspension; (ii) the data importer is in substantial or persistent breach of these Clauses; or (iii) the data importer fails to comply with a binding decision of a competent court or supervisory authority regarding its obligations under these Clauses. In these cases, it shall inform the competent supervisory authority of such non-compliance. Where the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. (d) Personal data that has been transferred prior to the termination of the contract pursuant to paragraph (c) shall at the choice of the data exporter immediately be returned to the data exporter or deleted in its entirety. The same shall apply to any copies of the data. The data importer shall certify the deletion of the data to the data exporter. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit the return or deletion of the transferred personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process the data to the extent and for as long as required under that local law. (e) Either Party may revoke its agreement to be bound by these Clauses where (i) the European Commission adopts a decision pursuant to Article 45(3) of Regulation (EU) 2016/679 that covers the transfer of personal data to which these Clauses apply; or (ii) Regulation (EU) 2016/679 becomes part of the legal framework of the country to which the personal data is transferred. This is without prejudice to other obligations applying to the processing in question under Regulation (EU) 2016/679. Clause 17 Governing law These Clauses shall be governed by the law of one of the EU Member States, provided such law allows for third-party beneficiary rights. The Parties agree that this shall be the law of Republic of Ireland. Clause 18 Choice of forum and jurisdiction (a) Any dispute arising from these Clauses shall be resolved by the courts of an EU Member State. (b) The Parties agree that those shall be the courts of courts of Dublin, Ireland, as their choice of forum and jurisdiction. (c) A data subject may also bring legal proceedings against the data exporter and/or data importer before the courts of the Member State in which he/she has his/her habitual residence. (d) The Parties agree to submit themselves to the jurisdiction of such courts. -------------------------------------------------------------------------------- APPENDIX 1 TO THE STANDARD CONTRACTUAL CLAUSES This Appendix forms part of the Clauses and must be completed and signed by the Parties ANNEX I A. LIST OF PARTIES Data exporter(s): Name: As defined in the Agreement Address: As defined in the Agreement Contact person’s name, position and contact details: As defined in the Agreement Activities relevant to the data transferred under these Clauses: To receive the services from the data importer. Signature and date: The effective date of the Agreement. Role: Data Controller Data importer(s): Name: Securiti, Inc. Address: 300 Santana Row Suite 450. San Jose, CA 95128 Contact person’s name, position and contact details: James Stoddard, VP Finance, 408-401-1160, james.stoddard@securiti.ai Activities relevant to the data transferred under these Clauses: To provide the services to the data exporter. Signature and date: The effective date of the Agreement. Role: Data Processor (Sub-Processor) B. DESCRIPTION OF TRANSFER Data subjects The personal data transferred concern the following categories of data subjects: See Schedule 1 of the DPA Categories of data The personal data transferred concern the following categories of data: See Schedule 1 of the DPA Special categories of data (if appropriate) The personal data transferred concern the following special categories of data: See Schedule 1 of the DPA Processing operations The personal data transferred will be subject to the following basic processing activities: See Schedule 1 of the DPA The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis). Transfers will occur on an ongoing basis as reasonably required under the Agreement. Nature Of Processing As described in Schedule 1 of the DPA Purpose(s) of the data transfer and further processing As described in Schedule 1 of the DPA. The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period For the duration of the Agreement and in accordance with the DPA. For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing As described in Schedule 1 of the DPA. C. COMPETENT SUPERVISORY AUTHORITY The Irish competent supervisory authority identified above. Authorised Signature ………………… DATA IMPORTER Name: James Stoddard Authorised Signature ………………… -------------------------------------------------------------------------------- ANNEX II TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA Securiti maintains a comprehensive, written information security program that contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope and type of Securiti’s business; (b) the type of information that Securiti will store; and (c) the need for security and confidentiality of such information. Securiti’s security program includes: 1. Security Awareness and Training. A mandatory security awareness and training program for all members of Securiti’s workforce (including management), which includes: * Training on how to implement and comply with its Information Security Program; and * Promoting a culture of security awareness through periodic communications from senior management with employees. 2. Access Controls. Policies, procedures, and logical controls: * To limit access to its information systems and the facility or facilities in which they are housed to properly authorized persons; * To prevent those workforce members and others who should not have access from obtaining access; and * To remove access in a timely basis in the event of a change in job responsibilities or job status. 3. Physical and Environmental Security. Controls that provide reasonable assurance that access to physical servers at the production data center, if applicable, is limited to properly authorized individuals and that environmental controls are established to detect, prevent and control destruction due to environmental extremes. These controls are implemented by Amazon Web Services (AWS) and they are listed here: https://aws.amazon.com/compliance/data-center/controls/. Specific to Securiti: * Logging and monitoring of unauthorized access attempts to the data center by the data center security personnel; * Camera surveillance systems at critical internal and external entry points to the data center, with retention of data per legal or compliance requirements; * Systems that monitor and control the air temperature and humidity at appropriate levels for the computing equipment; and * Redundant power supply modules and backup generators that provide backup power in the event of an electrical failure, 24 hours a day. 4. Security Incident Procedures. A security incident response plan that includes procedures to be followed in the event of any Security Breach. Such procedures include: * Roles and responsibilities: formation of an internal incident response team with a response leader; * Investigation: assessing the risk the incident poses and determining who may be affected; * Communication: internal reporting as well as a notification process in the event of unauthorized disclosure of Customer Data; * Recordkeeping: keeping a record of what was done and by whom to help in later analysis and possible legal action; and * Audit: conducting and documenting root cause analysis and remediation plan. 5. Contingency Planning. Policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, pandemic flu, and natural disaster) that could damage Customer Data or production systems that contain Customer Data. Such procedures include: * Data Backups: A policy for performing periodic backups of production data sources, as applicable, according to a defined schedule; * Disaster Recovery: A formal disaster recovery plan for the production data center, including: * Requirements for the disaster plan to be tested on a regular basis, currently twice a year; and * A documented executive summary of the Disaster Recovery testing, at least annually, which is available upon request to customers. * Business Continuity Plan: A formal process to address the framework by which an unplanned event might be managed in order to minimize the loss of vital resources. 6. Audit Controls. Hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic information. 7. Data Integrity. Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. 8. Storage and Transmission Security. Security measures to guard against unauthorized access to Customer Data that is being transmitted over a public electronic communications network or stored electronically. Such measures include requiring encryption of any Customer Data stored on desktops, laptops or other removable storage devices. 9. Secure Disposal. Policies and procedures regarding the secure disposal of tangible property containing Customer Data, taking into account available technology so that Customer Data cannot be practicably read or reconstructed. 10. Assigned Security Responsibility. Assigning responsibility for the development, implementation, and maintenance of Securiti’s security program, including: * Designating a security official with overall responsibility; * Defining security roles and responsibilities for individuals with security responsibilities; and * Designating a Security Council consisting of cross-functional management representatives to meet on a regular basis. 11. Testing. Regularly testing the key controls, systems and procedures of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified. Where applicable, such testing includes: * Internal risk assessments; * Service Organization Control 2 (SOC2) audit reports (or industry-standard successor reports). 12. Monitoring. Network and systems monitoring, including error logs on servers, disks and security events for any potential problems. Such monitoring includes: * Reviewing changes affecting systems handling authentication, authorization, and auditing; * Reviewing privileged access to Securiti production systems; and * Engaging third parties to perform network vulnerability assessments and penetration testing on a regular basis. 13. Change and Configuration Management. Maintaining policies and procedures for managing changes Securiti makes to production systems, applications, and databases. Such policies and procedures include: * process for documenting, testing and approving the patching and maintenance of the Securiti Product; * A security patching process that requires patching systems in a timely manner based on a risk analysis; and * A process for Securiti to utilize a third party to conduct application level security assessments. These assessments generally include testing, where applicable, for: * Cross-site request forgery * Services scanning * Improper input handling (e.g. cross-site scripting, SQL injection, XML injection, cross-site flashing) * XML and SOAP attacks * Weak session management * Data validation flaws and data model constraint inconsistencies * Insufficient authentication * Insufficient authorization 14. Program Adjustments. Monitoring, evaluating, and adjusting, as appropriate, the security program in light of: * Any relevant changes in technology and any internal or external threats to Securiti or the Customer Data; * Security and data privacy regulations applicable to Securiti; and * Securiti’s own changing business arrangements, such as mergers and acquisitions, alliances and joint ventures, outsourcing arrangements, and changes to information systems. 15. Devices – Ensuring that all laptop and desktop computing devices utilized by Securiti and any subcontractors when accessing Customer Data: * will be equipped with a minimum of AES 128 bit full hard disk drive encryption; * will have up to date virus and malware detection and prevention software installed with virus definitions updated on a regular basis; and * will maintain virus and malware detection and prevention software so as to remain on a supported release. This will include, but not be limited to, promptly implementing any applicable security-related enhancement or fix made available by the supplier of such software. 16. Data Security Breach. “Security Breach” means any security incident if there is a reason to believe Customer Data has been or may have been accessed by an unauthorized party. * Securiti will notify Customer of a Security Breach as soon as practicable, but no later than twenty-four (24) hours after Securiti becomes aware of it, by e-mailing Customer with a read receipt at a Customer designated email address, with a copy by e-mail to Securiti’s primary business contact within Customer. * Securiti agrees that unless required by law, it shall not inform any third party that a Security Breach without Approval. Further, Securiti agrees that Customer shall have the sole right to determine whether notice of the Security Breach is to be provided to consumers associated with Customer Data. 17. Return or Destruction of Customer Data. * Customer Data may be deleted by Securiti following the termination or suspension of Customer’s use of the Securiti Product. * Customer may request that Securiti delete Customer Data by notifying the Securiti support team via a ticket filed using the Customer Support link in a Securiti account, or via an email to support@securiti.ai. Upon Securiti receiving confirmation from Customer of the deletion request, Securiti will delete all Customer Data from online systems within one business week of such confirmation. * Securiti may retain Customer Data to the extent required by applicable laws and only to the extent and for such period as required by applicable law. 1. ANNEX III LIST OF SUB-PROCESSORS As described in the Sub-processors List of Securiti’s DPA. Entity Name Sub-Processing Activities Entity Country Amazon Web Services, Inc. Cloud Service Provider United States AWS Jakarta Cloud Service Provider Indonesia Amazon Web Services EMEA SARL Cloud Service Provider European Union Google Cloud Platform Cloud Service Provider United States Zendesk, Inc. Cloud Customer Support United States Schedule 3B STANDARD CONTRACTUAL CLAUSES Processor to Processor SECTION I Clause 1 Purpose and scope (a) The purpose of these standard contractual clauses is to ensure compliance with the requirements of Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) ([5]) for the transfer of personal data to a third country. (b) The Parties: (i) the natural or legal person(s), public authority/ies, agency/ies or other body/ies (hereinafter ‘entity/ies’) transferring the personal data, as listed in Annex I.A (hereinafter each ‘data exporter’), and (ii) the entity/ies in a third country receiving the personal data from the data exporter, directly or indirectly via another entity also Party to these Clauses, as listed in Annex I.A (hereinafter each ‘data importer’) have agreed to these standard contractual clauses (hereinafter: ‘Clauses’). (c) These Clauses apply with respect to the transfer of personal data as specified in Annex I.B. (d) The Appendix to these Clauses containing the Annexes referred to therein forms an integral part of these Clauses. Clause 2 Effect and invariability of the Clauses (a) These Clauses set out appropriate safeguards, including enforceable data subject rights and effective legal remedies, pursuant to Article 46(1) and Article 46(2)(c) of Regulation (EU) 2016/679 and, with respect to data transfers from controllers to processors and/or processors to processors, standard contractual clauses pursuant to Article 28(7) of Regulation (EU) 2016/679, provided they are not modified, except to select the appropriate Module(s) or to add or update information in the Appendix. This does not prevent the Parties from including the standard contractual clauses laid down in these Clauses in a wider contract and/or to add other clauses or additional safeguards, provided that they do not contradict, directly or indirectly, these Clauses or prejudice the fundamental rights or freedoms of data subjects. (b) These Clauses are without prejudice to obligations to which the data exporter is subject by virtue of Regulation (EU) 2016/679. Clause 3 Third-party beneficiaries (a) Data subjects may invoke and enforce these Clauses, as third-party beneficiaries, against the data exporter and/or data importer, with the following exceptions: (i) Clause 1, Clause 2, Clause 3, Clause 6, Clause 7; (ii) Clause 8 – Module One: Clause 8.5 (e) and Clause 8.9(b); Module Two: Clause 8.1(b), 8.9(a), (c), (d) and (e); Module Three: Clause 8.1(a), (c) and (d) and Clause 8.9(a), (c), (d), (e), (f) and (g); Module Four: Clause 8.1 (b) and Clause 8.3(b); (iii) Clause 9 – Module Two: Clause 9(a), (c), (d) and (e); Module Three: Clause 9(a), (c), (d) and (e); (iv) Clause 12 – Module One: Clause 12(a) and (d); Modules Two and Three: Clause 12(a), (d) and (f); (v) Clause 13; (vi) Clause 15.1(c), (d) and (e); (vii) Clause 16(e); (viii) Clause 18 – Modules One, Two and Three: Clause 18(a) and (b); Module Four: Clause 18. (b) Paragraph (a) is without prejudice to rights of data subjects under Regulation (EU) 2016/679. Clause 4 Interpretation (a) Where these Clauses use terms that are defined in Regulation (EU) 2016/679, those terms shall have the same meaning as in that Regulation. (b) These Clauses shall be read and interpreted in the light of the provisions of Regulation (EU) 2016/679. (c) These Clauses shall not be interpreted in a way that conflicts with rights and obligations provided for in Regulation (EU) 2016/679. Clause 5 Hierarchy In the event of a contradiction between these Clauses and the provisions of related agreements between the Parties, existing at the time these Clauses are agreed or entered into thereafter, these Clauses shall prevail. Clause 6 Description of the transfer(s) The details of the transfer(s), and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred, are specified in Annex I.B. Clause 7 – Not applicable SECTION II – OBLIGATIONS OF THE PARTIES Clause 8 Data protection safeguards The data exporter warrants that it has used reasonable efforts to determine that the data importer is able, through the implementation of appropriate technical and organisational measures, to satisfy its obligations under these Clauses. 8.1 Instructions (a) The data exporter has informed the data importer that it acts as processor under the instructions of its controller(s), which the data exporter shall make available to the data importer prior to processing. (b) The data importer shall process the personal data only on documented instructions from the controller, as communicated to the data importer by the data exporter, and any additional documented instructions from the data exporter. Such additional instructions shall not conflict with the instructions from the controller. The controller or data exporter may give further documented instructions regarding the data processing throughout the duration of the contract. (c) The data importer shall immediately inform the data exporter if it is unable to follow those instructions. Where the data importer is unable to follow the instructions from the controller, the data exporter shall immediately notify the controller. (d) The data exporter warrants that it has imposed the same data protection obligations on the data importer as set out in the contract or other legal act under Union or Member State law between the controller and the data exporter ([6]). 8.2 Purpose limitation The data importer shall process the personal data only for the specific purpose(s) of the transfer, as set out in Annex I.B., unless on further instructions from the controller, as communicated to the data importer by the data exporter, or from the data exporter. 8.3 Transparency On request, the data exporter shall make a copy of these Clauses, including the Appendix as completed by the Parties, available to the data subject free of charge. To the extent necessary to protect business secrets or other confidential information, including personal data, the data exporter may redact part of the text of the Appendix prior to sharing a copy, but shall provide a meaningful summary where the data subject would otherwise not be able to understand its content or exercise his/her rights. On request, the Parties shall provide the data subject with the reasons for the redactions, to the extent possible without revealing the redacted information. 8.4 Accuracy If the data importer becomes aware that the personal data it has received is inaccurate, or has become outdated, it shall inform the data exporter without undue delay. In this case, the data importer shall cooperate with the data exporter to rectify or erase the data. 8.5 Duration of processing and erasure or return of data Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the controller and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a). 8.6 Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, they shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subject. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter or the controller. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. (b) The data importer shall grant access to the data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. (c) In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify, without undue delay, the data exporter and, where appropriate and feasible, the controller after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the data breach, including measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. (d) The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify its controller so that the latter may in turn notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer. 8.7 Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards set out in Annex I.B. 8.8 Onward transfers The data importer shall only disclose the personal data to a third party on documented instructions from the controller, as communicated to the data importer by the data exporter. In addition, the data may only be disclosed to a third party located outside the European Union ([7]) (in the same country as the data importer or in another third country, hereinafter ‘onward transfer’) if the third party is or agrees to be bound by these Clauses, under the appropriate Module, or if: (i) the onward transfer is to a country benefitting from an adequacy decision pursuant to Article 45 of Regulation (EU) 2016/679 that covers the onward transfer; (ii) the third party otherwise ensures appropriate safeguards pursuant to Articles 46 or 47 of Regulation (EU) 2016/679; (iii) the onward transfer is necessary for the establishment, exercise or defence of legal claims in the context of specific administrative, regulatory or judicial proceedings; or (iv) the onward transfer is necessary in order to protect the vital interests of the data subject or of another natural person. Any onward transfer is subject to compliance by the data importer with all the other safeguards under these Clauses, in particular purpose limitation. 8.9 Documentation and compliance (a) The data importer shall promptly and adequately deal with enquiries from the data exporter or the controller that relate to the processing under these Clauses. (b) The Parties shall be able to demonstrate compliance with these Clauses. In particular, the data importer shall keep appropriate documentation on the processing activities carried out on behalf of the controller. (c) The data importer shall make all information necessary to demonstrate compliance with the obligations set out in these Clauses available to the data exporter, which shall provide it to the controller. (d) The data importer shall allow for and contribute to audits by the data exporter of the processing activities covered by these Clauses, at reasonable intervals or if there are indications of non-compliance. The same shall apply where the data exporter requests an audit on instructions of the controller. In deciding on an audit, the data exporter may take into account relevant certifications held by the data importer. (e) Where the audit is carried out on the instructions of the controller, the data exporter shall make the results available to the controller. (f) The data exporter may choose to conduct the audit by itself or mandate an independent auditor. Audits may include inspections at the premises or physical facilities of the data importer and shall, where appropriate, be carried out with reasonable notice. (g) The Parties shall make the information referred to in paragraphs (b) and (c), including the results of any audits, available to the competent supervisory authority on request. Clause 9 Use of sub-processors (a) The data importer has the controller’s general authorisation for the engagement of sub-processor(s) from an agreed list. The data importer shall specifically inform the controller in writing of any intended changes to that list through the addition or replacement of sub-processors at least 3 business days in advance, thereby giving the controller sufficient time to be able to object to such changes prior to the engagement of the sub-processor(s). The data importer shall provide the controller with the information necessary to enable the controller to exercise its right to object. The data importer shall inform the data exporter of the engagement of the sub-processor(s). (b) Where the data importer engages a sub-processor to carry out specific processing activities (on behalf of the controller), it shall do so by way of a written contract that provides for, in substance, the same data protection obligations as those binding the data importer under these Clauses, including in terms of third-party beneficiary rights for data subjects. ([8]) The Parties agree that, by complying with this Clause, the data importer fulfils its obligations under Clause 8.8. The data importer shall ensure that the sub-processor complies with the obligations to which the data importer is subject pursuant to these Clauses. (c) The data importer shall provide, at the data exporter’s or controller’s request, a copy of such a sub-processor agreement and any subsequent amendments. To the extent necessary to protect business secrets or other confidential information, including personal data, the data importer may redact the text of the agreement prior to sharing a copy. (d) The data importer shall remain fully responsible to the data exporter for the performance of the sub-processor’s obligations under its contract with the data importer. The data importer shall notify the data exporter of any failure by the sub-processor to fulfil its obligations under that contract. (e) The data importer shall agree a third-party beneficiary clause with the sub-processor whereby – in the event the data importer has factually disappeared, ceased to exist in law or has become insolvent – the data exporter shall have the right to terminate the sub-processor contract and to instruct the sub-processor to erase or return the personal data. Clause 10 Data subject rights (a) The data importer shall promptly notify the data exporter and, where appropriate, the controller of any request it has received from a data subject, without responding to that request unless it has been authorised to do so by the controller. (b) The data importer shall assist, where appropriate in cooperation with the data exporter, the controller in fulfilling its obligations to respond to data subjects’ requests for the exercise of their rights under Regulation (EU) 2016/679 or Regulation (EU) 2018/1725, as applicable. In this regard, the Parties shall set out in Annex II the appropriate technical and organisational measures, taking into account the nature of the processing, by which the assistance shall be provided, as well as the scope and the extent of the assistance required. (c) In fulfilling its obligations under paragraphs (a) and (b), the data importer shall comply with the instructions from the controller, as communicated by the data exporter. Clause 11 Redress (a) The data importer shall inform data subjects in a transparent and easily accessible format, through individual notice or on its website, of a contact point authorised to handle complaints. It shall deal promptly with any complaints it receives from a data subject. (b) In case of a dispute between a data subject and one of the Parties as regards compliance with these Clauses, that Party shall use its best efforts to resolve the issue amicably in a timely fashion. The Parties shall keep each other informed about such disputes and, where appropriate, cooperate in resolving them. (c) Where the data subject invokes a third-party beneficiary right pursuant to Clause 3, the data importer shall accept the decision of the data subject to: (i) lodge a complaint with the supervisory authority in the Member State of his/her habitual residence or place of work, or the competent supervisory authority pursuant to Clause 13; (ii) refer the dispute to the competent courts within the meaning of Clause 18. (d) The Parties accept that the data subject may be represented by a not-for-profit body, organisation or association under the conditions set out in Article 80(1) of Regulation (EU) 2016/679. (e) The data importer shall abide by a decision that is binding under the applicable EU or Member State law. (f) The data importer agrees that the choice made by the data subject will not prejudice his/her substantive and procedural rights to seek remedies in accordance with applicable laws. Clause 12 Liability (a) Each Party shall be liable to the other Party/ies for any damages it causes the other Party/ies by any breach of these Clauses. (b) The data importer shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data importer or its sub-processor causes the data subject by breaching the third-party beneficiary rights under these Clauses. (c) Notwithstanding paragraph (b), the data exporter shall be liable to the data subject, and the data subject shall be entitled to receive compensation, for any material or non-material damages the data exporter or the data importer (or its sub-processor) causes the data subject by breaching the third-party beneficiary rights under these Clauses. This is without prejudice to the liability of the data exporter and, where the data exporter is a processor acting on behalf of a controller, to the liability of the controller under Regulation (EU) 2016/679 or Regulation (EU) 2018/1725, as applicable. (d) The Parties agree that if the data exporter is held liable under paragraph (c) for damages caused by the data importer (or its sub-processor), it shall be entitled to claim back from the data importer that part of the compensation corresponding to the data importer’s responsibility for the damage. (e) Where more than one Party is responsible for any damage caused to the data subject as a result of a breach of these Clauses, all responsible Parties shall be jointly and severally liable and the data subject is entitled to bring an action in court against any of these Parties. (f) The Parties agree that if one Party is held liable under paragraph (e), it shall be entitled to claim back from the other Party/ies that part of the compensation corresponding to its/their responsibility for the damage. (g) The data importer may not invoke the conduct of a sub-processor to avoid its own liability. Clause 13 Supervision 1. Where the data exporter is established in an EU Member State: The supervisory authority with responsibility for ensuring compliance by the data exporter with Regulation (EU) 2016/679 as regards the data transfer, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) and has appointed a representative pursuant to Article 27(1) of Regulation (EU) 2016/679: The supervisory authority of the Member State in which the representative within the meaning of Article 27(1) of Regulation (EU) 2016/679 is established, as indicated in Annex I.C, shall act as competent supervisory authority. Where the data exporter is not established in an EU Member State, but falls within the territorial scope of application of Regulation (EU) 2016/679 in accordance with its Article 3(2) without however having to appoint a representative pursuant to Article 27(2) of Regulation (EU) 2016/679: The supervisory authority of one of the Member States in which the data subjects whose personal data is transferred under these Clauses in relation to the offering of goods or services to them, or whose behaviour is monitored, are located, as indicated in Annex I.C, shall act as competent supervisory authority. (b) The data importer agrees to submit itself to the jurisdiction of and cooperate with the competent supervisory authority in any procedures aimed at ensuring compliance with these Clauses. In particular, the data importer agrees to respond to enquiries, submit to audits and comply with the measures adopted by the supervisory authority, including remedial and compensatory measures. It shall provide the supervisory authority with written confirmation that the necessary actions have been taken. SECTION III – LOCAL LAWS AND OBLIGATIONS IN CASE OF ACCESS BY PUBLIC AUTHORITIES Clause 14 Local laws and practices affecting compliance with the Clauses (a) The Parties warrant that they have no reason to believe that the laws and practices in the third country of destination applicable to the processing of the personal data by the data importer, including any requirements to disclose personal data or measures authorising access by public authorities, prevent the data importer from fulfilling its obligations under these Clauses. This is based on the understanding that laws and practices that respect the essence of the fundamental rights and freedoms and do not exceed what is necessary and proportionate in a democratic society to safeguard one of the objectives listed in Article 23(1) of Regulation (EU) 2016/679, are not in contradiction with these Clauses. (b) The Parties declare that in providing the warranty in paragraph (a), they have taken due account in particular of the following elements: (i) the specific circumstances of the transfer, including the length of the processing chain, the number of actors involved and the transmission channels used; intended onward transfers; the type of recipient; the purpose of processing; the categories and format of the transferred personal data; the economic sector in which the transfer occurs; the storage location of the data transferred; (ii) the laws and practices of the third country of destination– including those requiring the disclosure of data to public authorities or authorising access by such authorities – relevant in light of the specific circumstances of the transfer, and the applicable limitations and safeguards ([9]); (iii) any relevant contractual, technical or organisational safeguards put in place to supplement the safeguards under these Clauses, including measures applied during transmission and to the processing of the personal data in the country of destination. (c) The data importer warrants that, in carrying out the assessment under paragraph (b), it has made its best efforts to provide the data exporter with relevant information and agrees that it will continue to cooperate with the data exporter in ensuring compliance with these Clauses. (d) The Parties agree to document the assessment under paragraph (b) and make it available to the competent supervisory authority on request. (e) The data importer agrees to notify the data exporter promptly if, after having agreed to these Clauses and for the duration of the contract, it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under paragraph (a), including following a change in the laws of the third country or a measure (such as a disclosure request) indicating an application of such laws in practice that is not in line with the requirements in paragraph (a). The data exporter shall forward the notification to the controller. (f) Following a notification pursuant to paragraph (e), or if the data exporter otherwise has reason to believe that the data importer can no longer fulfil its obligations under these Clauses, the data exporter shall promptly identify appropriate measures (e.g. technical or organisational measures to ensure security and confidentiality) to be adopted by the data exporter and/or data importer to address the situation, if appropriate in consultation with the controller. The data exporter shall suspend the data transfer if it considers that no appropriate safeguards for such transfer can be ensured, or if instructed by the controller or the competent supervisory authority to do so. In this case, the data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses. If the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. Where the contract is terminated pursuant to this Clause, Clause 16(d) and (e) shall apply. Clause 15 Obligations of the data importer in case of access by public authorities 15.1 Notification (a) The data importer agrees to notify the data exporter and, where possible, the data subject promptly (if necessary with the help of the data exporter) if it: (i) receives a legally binding request from a public authority, including judicial authorities, under the laws of the country of destination for the disclosure of personal data transferred pursuant to these Clauses; such notification shall include information about the personal data requested, the requesting authority, the legal basis for the request and the response provided; or (ii) becomes aware of any direct access by public authorities to personal data transferred pursuant to these Clauses in accordance with the laws of the country of destination; such notification shall include all information available to the importer. The data exporter shall forward the notification to the controller. 2. If the data importer is prohibited from notifying the data exporter and/or the data subject under the laws of the country of destination, the data importer agrees to use its best efforts to obtain a waiver of the prohibition, with a view to communicating as much information as possible, as soon as possible. The data importer agrees to document its best efforts in order to be able to demonstrate them on request of the data exporter. 3. Where permissible under the laws of the country of destination, the data importer agrees to provide the data exporter, at regular intervals for the duration of the contract, with as much relevant information as possible on the requests received (in particular, number of requests, type of data requested, requesting authority/ies, whether requests have been challenged and the outcome of such challenges, etc.). The data exporter shall forward the information to the controller. 4. The data importer agrees to preserve the information pursuant to paragraphs (a) to (c) for the duration of the contract and make it available to the competent supervisory authority on request. 5. Paragraphs (a) to (c) are without prejudice to the obligation of the data importer pursuant to Clause 14(e) and Clause 16 to inform the data exporter promptly where it is unable to comply with these Clauses. 15.2 Review of legality and data minimization (a) The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e). (b) The data importer agrees to document its legal assessment and any challenge to the request for disclosure and, to the extent permissible under the laws of the country of destination, make the documentation available to the data exporter. It shall also make it available to the competent supervisory authority on request. The data exporter shall make the assessment available to the controller. (c) The data importer agrees to provide the minimum amount of information permissible when responding to a request for disclosure, based on a reasonable interpretation of the request. SECTION IV – FINAL PROVISIONS Clause 16 Non-compliance with the Clauses and termination (a) The data importer shall promptly inform the data exporter if it is unable to comply with these Clauses, for whatever reason. (b) In the event that the data importer is in breach of these Clauses or unable to comply with these Clauses, the data exporter shall suspend the transfer of personal data to the data importer until compliance is again ensured or the contract is terminated. This is without prejudice to Clause 14(f). (c) The data exporter shall be entitled to terminate the contract, insofar as it concerns the processing of personal data under these Clauses, where: (i) the data exporter has suspended the transfer of personal data to the data importer pursuant to paragraph (b) and compliance with these Clauses is not restored within a reasonable time and in any event within one month of suspension; (ii) the data importer is in substantial or persistent breach of these Clauses; or (iii) the data importer fails to comply with a binding decision of a competent court or supervisory authority regarding its obligations under these Clauses. In these cases, it shall inform the competent supervisory authority and the controller of such non-compliance. Where the contract involves more than two Parties, the data exporter may exercise this right to termination only with respect to the relevant Party, unless the Parties have agreed otherwise. (d) Personal data that has been transferred prior to the termination of the contract pursuant to paragraph (c) shall at the choice of the data exporter immediately be returned to the data exporter or deleted in its entirety. The same shall apply to any copies of the data. The data importer shall certify the deletion of the data to the data exporter. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit the return or deletion of the transferred personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process the data to the extent and for as long as required under that local law. (e) Either Party may revoke its agreement to be bound by these Clauses where (i) the European Commission adopts a decision pursuant to Article 45(3) of Regulation (EU) 2016/679 that covers the transfer of personal data to which these Clauses apply; or (ii) Regulation (EU) 2016/679 becomes part of the legal framework of the country to which the personal data is transferred. This is without prejudice to other obligations applying to the processing in question under Regulation (EU) 2016/679. Clause 17 Governing law These Clauses shall be governed by the law of one of the EU Member States, provided such law allows for third-party beneficiary rights. The Parties agree that this shall be the law of the Republic of Ireland. Clause 18 Choice of forum and jurisdiction (a) Any dispute arising from these Clauses shall be resolved by the courts of an EU Member State. (b) The Parties agree that those shall be the courts of Dublin, Ireland. (c) A data subject may also bring legal proceedings against the data exporter and/or data importer before the courts of the Member State in which he/she has his/her habitual residence. (d) The Parties agree to submit themselves to the jurisdiction of such courts. APPENDIX ANNEX I A. LIST OF PARTIES Data exporter(s): Name: As defined in the Agreement Address: As defined in the Agreement Contact person’s name, position and contact details: As defined in the Agreement Activities relevant to the data transferred under these Clauses: To receive the services from the data importer. Signature and date: The effective date of the Agreement. Role: Data Processor Data importer(s): Name: Securiti, Inc. Address: 300 Santana Row Suite 450. San Jose, CA 95128 Contact person’s name, position and contact details: James Stoddard, VP Finance, 408-401-1160, james.stoddard@securiti.ai Activities relevant to the data transferred under these Clauses: To provide the services to the data exporter. Signature and date: The effective date of the Agreement. Role: Data Processor (Sub-Processor) B. DESCRIPTION OF TRANSFER Categories of data subjects whose personal data is transferred As described in Schedule 1 of the DPA Categories of personal data transferred As described in Schedule 1 of the DPA. Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialised training), keeping a record of access to the data, restrictions for onward transfers or additional security measures. As described in Schedule 1 of Securiti’s DPA [https://securiti.ai/terms/]. The frequency of the transfer (e.g. whether the data is transferred on a one-off or continuous basis). Transfers will occur on an ongoing basis as reasonably required under the Agreement. Nature of the processing As described in Schedule 1 of the DPA. Purpose(s) of the data transfer and further processing As described in Schedule 1 of the DPA. The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period For the duration of the Agreement and in accordance with the DPA. For transfers to (sub-) processors, also specify subject matter, nature and duration of the processing As described in Schedule 1 of the DPA. C. COMPETENT SUPERVISORY AUTHORITY The Irish competent supervisory authority identified above. -------------------------------------------------------------------------------- ANNEX II TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA Securiti maintains a comprehensive, written information security program that contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope and type of Securiti’s business; (b) the type of information that Securiti will store; and (c) the need for security and confidentiality of such information. Securiti’s security program includes: 1. Security Awareness and Training. A mandatory security awareness and training program for all members of Securiti’s workforce (including management), which includes: * Training on how to implement and comply with its Information Security Program; and * Promoting a culture of security awareness through periodic communications from senior management with employees. 2. Access Controls. Policies, procedures, and logical controls: * To limit access to its information systems and the facility or facilities in which they are housed to properly authorized persons; * To prevent those workforce members and others who should not have access from obtaining access; and * To remove access in a timely basis in the event of a change in job responsibilities or job status. 3. Physical and Environmental Security. Controls that provide reasonable assurance that access to physical servers at the production data center, if applicable, is limited to properly authorized individuals and that environmental controls are established to detect, prevent and control destruction due to environmental extremes. These controls are implemented by Amazon Web Services (AWS) and they are listed here: https://aws.amazon.com/compliance/data-center/controls/. Specific to Securiti: * Logging and monitoring of unauthorized access attempts to the data center by the data center security personnel; * Camera surveillance systems at critical internal and external entry points to the data center, with retention of data per legal or compliance requirements; * Systems that monitor and control the air temperature and humidity at appropriate levels for the computing equipment; and * Redundant power supply modules and backup generators that provide backup power in the event of an electrical failure, 24 hours a day. 4. Security Incident Procedures. A security incident response plan that includes procedures to be followed in the event of any Security Breach. Such procedures include: * Roles and responsibilities: formation of an internal incident response team with a response leader; * Investigation: assessing the risk the incident poses and determining who may be affected; * Communication: internal reporting as well as a notification process in the event of unauthorized disclosure of Customer Data; * Recordkeeping: keeping a record of what was done and by whom to help in later analysis and possible legal action; and * Audit: conducting and documenting root cause analysis and remediation plan. 5. Contingency Planning. Policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, pandemic flu, and natural disaster) that could damage Customer Data or production systems that contain Customer Data. Such procedures include: * Data Backups: A policy for performing periodic backups of production data sources, as applicable, according to a defined schedule; * Disaster Recovery: A formal disaster recovery plan for the production data center, including: * Requirements for the disaster plan to be tested on a regular basis, currently twice a year; and * A documented executive summary of the Disaster Recovery testing, at least annually, which is available upon request to customers. * Business Continuity Plan: A formal process to address the framework by which an unplanned event might be managed in order to minimize the loss of vital resources. 6. Audit Controls. Hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic information. 7. Data Integrity. Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data and protect it from disclosure, improper alteration, or destruction. 8. Storage and Transmission Security. Security measures to guard against unauthorized access to Customer Data that is being transmitted over a public electronic communications network or stored electronically. Such measures include requiring encryption of any Customer Data stored on desktops, laptops or other removable storage devices. 9. Secure Disposal. Policies and procedures regarding the secure disposal of tangible property containing Customer Data, taking into account available technology so that Customer Data cannot be practicably read or reconstructed. 10. Assigned Security Responsibility. Assigning responsibility for the development, implementation, and maintenance of Securiti’s security program, including: * Designating a security official with overall responsibility; * Defining security roles and responsibilities for individuals with security responsibilities; and * Designating a Security Council consisting of cross-functional management representatives to meet on a regular basis. 11. Testing. Regularly testing the key controls, systems and procedures of its information security program to validate that they are properly implemented and effective in addressing the threats and risks identified. Where applicable, such testing includes: * Internal risk assessments; * Service Organization Control 2 (SOC2) audit reports (or industry-standard successor reports). 12. Monitoring. Network and systems monitoring, including error logs on servers, disks and security events for any potential problems. Such monitoring includes: * Reviewing changes affecting systems handling authentication, authorization, and auditing; * Reviewing privileged access to Securiti production systems; and * Engaging third parties to perform network vulnerability assessments and penetration testing on a regular basis. 13. Change and Configuration Management. Maintaining policies and procedures for managing changes Securiti makes to production systems, applications, and databases. Such policies and procedures include: * process for documenting, testing and approving the patching and maintenance of the Securiti Product; * A security patching process that requires patching systems in a timely manner based on a risk analysis; and * A process for Securiti to utilize a third party to conduct application level security assessments. These assessments generally include testing, where applicable, for: * Cross-site request forgery * Services scanning * Improper input handling (e.g. cross-site scripting, SQL injection, XML injection, cross-site flashing) * XML and SOAP attacks * Weak session management * Data validation flaws and data model constraint inconsistencies * Insufficient authentication * Insufficient authorization 14. Program Adjustments. Monitoring, evaluating, and adjusting, as appropriate, the security program in light of: * Any relevant changes in technology and any internal or external threats to Securiti or the Customer Data; * Security and data privacy regulations applicable to Securiti; and * Securiti’s own changing business arrangements, such as mergers and acquisitions, alliances and joint ventures, outsourcing arrangements, and changes to information systems. 15. Devices – Ensuring that all laptop and desktop computing devices utilized by Securiti and any subcontractors when accessing Customer Data: * will be equipped with a minimum of AES 128 bit full hard disk drive encryption; * will have up to date virus and malware detection and prevention software installed with virus definitions updated on a regular basis; and * will maintain virus and malware detection and prevention software so as to remain on a supported release. This will include, but not be limited to, promptly implementing any applicable security-related enhancement or fix made available by the supplier of such software. 16. Data Security Breach. “Security Breach” means any security incident if there is a reason to believe Customer Data has been or may have been accessed by an unauthorized party. * Securiti will notify Customer of a Security Breach as soon as practicable, but no later than twenty-four (24) hours after Securiti becomes aware of it, by e-mailing Customer with a read receipt at a Customer designated email address, with a copy by e-mail to Securiti’s primary business contact within Customer. * Securiti agrees that unless required by law, it shall not inform any third party that a Security Breach without Approval. Further, Securiti agrees that Customer shall have the sole right to determine whether notice of the Security Breach is to be provided to consumers associated with Customer Data. 17. Return or Destruction of Customer Data. * Customer Data may be deleted by Securiti following the termination or suspension of Customer’s use of the Securiti Product. * Customer may request that Securiti delete Customer Data by notifying the Securiti support team via a ticket filed using the Customer Support link in a Securiti account, or via an email to support@securiti.ai. Upon Securiti receiving confirmation from Customer of the deletion request, Securiti will delete all Customer Data from online systems within one business week of such confirmation. * Securiti may retain Customer Data to the extent required by applicable laws and only to the extent and for such period as required by applicable law. -------------------------------------------------------------------------------- ANNEX III LIST OF SUB-PROCESSORS The controller has authorized the use of the following sub-processors. As described in the Sub-processors List of Securiti’s DPA. Entity Name Sub-Processing Activities Entity Country Amazon Web Services, Inc. Cloud Service Provider United States AWS Jakarta Cloud Service Provider Indonesia Amazon Web Services EMEA SARL Cloud Service Provider European Union Google Cloud Platform Cloud Service Provider United States Zendesk, Inc. Cloud Customer Support United States Schedule 3C United Kingdom Standard Contractual Clauses STANDARD DATA PROTECTION CLAUSES TO BE ISSUED BY THE COMMISSIONER UNDER S119A(1) DATA PROTECTION ACT 2018 INTERNATIONAL DATA TRANSFER AGREEMENT VERSION A1.0, in force 21 September 2022 This IDTA has been issued by the Information Commissioner for Parties making Restricted Transfers. The Information Commissioner considers that it provides Appropriate Safeguards for Restricted Transfers when it is entered into as a legally binding contract. PART 1: TABLES TABLE 1: PARTIES AND SIGNATURES Start date The Parties Exporter (who sends the Restricted Transfer) Importer (who receives the Restricted Transfer) Parties’ details Full legal name: Trading name (if different): Main address (if a company registered address): Official registration number (if any) (company number or similar identifier): Full legal name: Securiti Inc. Main address (if a company registered address): Securiti Inc. Official registration number (if any) (company number or similar identifier): 83-2500426 Key Contact Full Name (optional): Job Title: Contact details including email: Full Name (optional): James Stoddard Job Title: VP Finance Contact details including email: Importer Data Subject Contact Job Title: DPO Contact details including email: Chaks Chigurupati chaks.chigurupati@securiti.ai Signatures confirming each Party agrees to be bound by this IDTA Signed for and on behalf of the Exporter set out above Signed: Date of signature: Full name: Job title: Signed for and on behalf of the Importer set out above Signed: Date of signature: Full name: Job title: TABLE 2: TRANSFER DETAILS UK country’s law that governs the IDTA: ⬜ England and Wales ⬜ Northern Ireland ⬜ Scotland Primary place for legal claims to be made by the Parties ⬜ England and Wales ⬜ Northern Ireland ⬜ Scotland The status of the Exporter In relation to the Processing of the Transferred Data: ⬜ Exporter is a Controller ⬜ Exporter is a Processor or Sub-Processor The status of the Importer In relation to the Processing of the Transferred Data: ⬜ Importer is a Controller ☒ Importer is the Exporter’s Processor or Sub-Processor ⬜ Importer is not the Exporter’s Processor or Sub-Processor (and the Importer has been instructed by a Third Party Controller) Whether UK GDPR applies to the Importer ☒ UK GDPR applies to the Importer’s Processing of the Transferred Data ⬜ UK GDPR does not apply to the Importer’s Processing of the Transferred Data Linked Agreement If the Importer is the Exporter’s Processor or Sub-Processor – the agreement(s) between the Parties which sets out the Processor’s or Sub-Processor’s instructions for Processing the Transferred Data: Name of agreement: Date of agreement: Parties to the agreement: Reference (if any): Other agreements – any agreement(s) between the Parties which set out additional obligations in relation to the Transferred Data, such as a data sharing agreement or service agreement: Name of agreement: Date of agreement: Parties to the agreement: Reference (if any): If the Exporter is a Processor or Sub-Processor – the agreement(s) between the Exporter and the Party(s) which sets out the Exporter’s instructions for Processing the Transferred Data: Name of agreement: Date of agreement: Parties to the agreement: Reference (if any): Term The Importer may Process the Transferred Data for the following time period: ☒ the period for which the Linked Agreement is in force ⬜ time period: ⬜ (only if the Importer is a Controller or not the Exporter’s Processor or Sub-Processor) no longer than is necessary for the Purpose. Ending the IDTA before the end of the Term ⬜ the Parties cannot end the IDTA before the end of the Term unless there is a breach of the IDTA or the Parties agree in writing. ⬜ the Parties can end the IDTA before the end of the Term by serving: months’ written notice, as set out in Section 29 (How to end this IDTA without there being a breach). Ending the IDTA when the Approved IDTA changes Which Parties may end the IDTA as set out in Section 29.2: ⬜ Importer ⬜ Exporter ⬜ neither Party Can the Importer make further transfers of the Transferred Data? ⬜ The Importer MAY transfer on the Transferred Data to another organisation or person (who is a different legal entity) in accordance with Section 16.1 (Transferring on the Transferred Data). ⬜ The Importer MAY NOT transfer on the Transferred Data to another organisation or person (who is a different legal entity) in accordance with Section 16.1 (Transferring on the Transferred Data). Specific restrictions when the Importer may transfer on the Transferred Data The Importer MAY ONLY forward the Transferred Data in accordance with Section 16.1: ⬜ if the Exporter tells it in writing that it may do so. ⬜ to: ⬜ to the authorised receivers (or the categories of authorised receivers) set out in: ⬜ there are no specific restrictions. Review Dates ⬜ No review is needed as this is a one-off transfer and the Importer does not retain any Transferred Data First review date: The Parties must review the Security Requirements at least once: ⬜ each month(s) ⬜ each quarter ⬜ each 6 months ⬜ each year ⬜ each year(s) ⬜ each time there is a change to the Transferred Data, Purposes, Importer Information, TRA or risk assessment TABLE 3: TRANSFERRED DATA Transferred Data The personal data to be sent to the Importer under this IDTA consists of: ☒ The categories of Transferred Data will update automatically if the information is updated in the Linked Agreement referred to. ⬜ The categories of Transferred Data will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. Special Categories of Personal Data and criminal convictions and offences The Transferred Data includes data relating to: ⬜ racial or ethnic origin ⬜ political opinions ⬜ religious or philosophical beliefs ⬜ trade union membership ⬜ genetic data ⬜ biometric data for the purpose of uniquely identifying a natural person ⬜ physical or mental health ⬜ sex life or sexual orientation ⬜ criminal convictions and offences ⬜ none of the above ⬜ set out in: And: ⬜ The categories of special category and criminal records data will update automatically if the information is updated in the Linked Agreement referred to. ⬜ The categories of special category and criminal records data will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. Relevant Data Subjects The Data Subjects of the Transferred Data are: ☒ The categories of Data Subjects will update automatically if the information is updated in the Linked Agreement referred to. ⬜ The categories of Data Subjects will not update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. Purpose ⬜ The Importer may Process the Transferred Data for the following purposes: ⬜ The Importer may Process the Transferred Data for the purposes set out in: In both cases, any other purposes which are compatible with the purposes set out above. ☒ The purposes will update automatically if the information is updated in the Linked Agreement referred to. ⬜ The purposes will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. TABLE 4: SECURITY REQUIREMENTS Security of Transmission Security of Storage Security of Processing Organisational security measures Technical security minimum requirements Updates to the Security Requirements ☒ The Security Requirements will update automatically if the information is updated in the Linked Agreement referred to. ⬜ The Security Requirements will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. PART 2: EXTRA PROTECTION CLAUSES Extra Protection Clauses: (i) Extra technical security protections (ii) Extra organisational protections (iii) Extra contractual protections PART 3: COMMERCIAL CLAUSES Commercial Clauses PART 4: MANDATORY CLAUSES INFORMATION THAT HELPS YOU TO UNDERSTAND THIS IDTA 1. This IDTA and Linked Agreements 1. Each Party agrees to be bound by the terms and conditions set out in the IDTA, in exchange for the other Party also agreeing to be bound by the IDTA. 2. This IDTA is made up of: 1. Part one: Tables; 2. Part two: Extra Protection Clauses; 3. Part three: Commercial Clauses; and 4. Part four: Mandatory Clauses. 3. The IDTA starts on the Start Date and ends as set out in Sections 29 or 30. 4. If the Importer is a Processor or Sub-Processor instructed by the Exporter: the Exporter must ensure that, on or before the Start Date and during the Term, there is a Linked Agreement which is enforceable between the Parties and which complies with Article 28 UK GDPR (and which they will ensure continues to comply with Article 28 UK GDPR). 5. References to the Linked Agreement or to the Commercial Clauses are to that Linked Agreement or to those Commercial Clauses only in so far as they are consistent with the Mandatory Clauses. 2. Legal Meaning of Words 1. If a word starts with a capital letter it has the specific meaning set out in the Legal Glossary in Section 36. 2. To make it easier to read and understand, this IDTA contains headings and guidance notes. Those are not part of the binding contract which forms the IDTA. 3. You have provided all the information required 1. The Parties must ensure that the information contained in Part one: Tables is correct and complete at the Start Date and during the Term. 2. In Table 2: Transfer Details, if the selection that the Parties are Controllers, Processors or Sub-Processors is wrong (either as a matter of fact or as a result of applying the UK Data Protection Laws) then: 1. the terms and conditions of the Approved IDTA which apply to the correct option which was not selected will apply; and 2. the Parties and any Relevant Data Subjects are entitled to enforce the terms and conditions of the Approved IDTA which apply to that correct option. 3. In Table 2: Transfer Details, if the selection that the UK GDPR applies is wrong (either as a matter of fact or as a result of applying the UK Data Protection Laws), then the terms and conditions of the IDTA will still apply to the greatest extent possible. 4. How to sign the IDTA 1. The Parties may choose to each sign (or execute): 1. the same copy of this IDTA; 2. two copies of the IDTA. In that case, each identical copy is still an original of this IDTA, and together all those copies form one agreement; 3. a separate, identical copy of the IDTA. In that case, each identical copy is still an original of this IDTA, and together all those copies form one agreement, unless signing (or executing) in this way would mean that the IDTA would not be binding on the Parties under Local Laws. 5. Changing this IDTA 1. Each Party must not change the Mandatory Clauses as set out in the Approved IDTA, except only: 1. to ensure correct cross-referencing: cross-references to Part one: Tables (or any Table), Part two: Extra Protections, and/or Part three: Commercial Clauses can be changed where the Parties have set out the information in a different format, so that the cross-reference is to the correct location of the same information, or where clauses have been removed as they do not apply, as set out below; 2. to remove those Sections which are expressly stated not to apply to the selections made by the Parties in Table 2: Transfer Details, that the Parties are Controllers, Processors or Sub-Processors and/or that the Importer is subject to, or not subject to, the UK GDPR. The Exporter and Importer understand and acknowledge that any removed Sections may still apply and form a part of this IDTA if they have been removed incorrectly, including because the wrong selection is made in Table 2: Transfer Details; 3. so the IDTA operates as a multi-party agreement if there are more than two Parties to the IDTA. This may include nominating a lead Party or lead Parties which can make decisions on behalf of some or all of the other Parties which relate to this IDTA (including reviewing Table 4: Security Requirements and Part two: Extra Protection Clauses, and making updates to Part one: Tables (or any Table), Part two: Extra Protection Clauses, and/or Part three: Commercial Clauses); and/or 4. to update the IDTA to set out in writing any changes made to the Approved IDTA under Section 5.4, if the Parties want to. The changes will apply automatically without updating them as described in Section 5.4; provided that the changes do not reduce the Appropriate Safeguards. 2. If the Parties wish to change the format of the information included in Part one: Tables, Part two: Extra Protection Clauses or Part three: Commercial Clauses of the Approved IDTA, they may do so by agreeing to the change in writing, provided that the change does not reduce the Appropriate Safeguards. 3. If the Parties wish to change the information included in Part one: Tables, Part two: Extra Protection Clauses or Part three: Commercial Clauses of this IDTA (or the equivalent information), they may do so by agreeing to the change in writing, provided that the change does not reduce the Appropriate Safeguards. 4. From time to time, the ICO may publish a revised Approved IDTA which: 1. makes reasonable and proportionate changes to the Approved IDTA, including correcting errors in the Approved IDTA; and/or 2. reflects changes to UK Data Protection Laws. The revised Approved IDTA will specify the start date from which the changes to the Approved IDTA are effective and whether an additional Review Date is required as a result of the changes. This IDTA is automatically amended as set out in the revised Approved IDTA from the start date specified. 6. Understanding this IDTA 1. This IDTA must always be interpreted in a manner that is consistent with UK Data Protection Laws and so that it fulfils the Parties’ obligation to provide the Appropriate Safeguards. 2. If there is any inconsistency or conflict between UK Data Protection Laws and this IDTA, the UK Data Protection Laws apply. 3. If the meaning of the IDTA is unclear or there is more than one meaning, the meaning which most closely aligns with the UK Data Protection Laws applies. 4. Nothing in the IDTA (including the Commercial Clauses or the Linked Agreement) limits or excludes either Party’s liability to Relevant Data Subjects or to the ICO under this IDTA or under UK Data Protection Laws. 5. If any wording in Parts one, two or three contradicts the Mandatory Clauses, and/or seeks to limit or exclude any liability to Relevant Data Subjects or to the ICO, then that wording will not apply. 6. The Parties may include provisions in the Linked Agreement which provide the Parties with enhanced rights otherwise covered by this IDTA. These enhanced rights may be subject to commercial terms, including payment, under the Linked Agreement, but this will not affect the rights granted under this IDTA. 7. If there is any inconsistency or conflict between this IDTA and a Linked Agreement or any other agreement, this IDTA overrides that Linked Agreement or any other agreements, even if those agreements have been negotiated by the Parties. The exceptions to this are where (and in so far as): 1. the inconsistent or conflicting terms of the Linked Agreement or other agreement provide greater protection for the Relevant Data Subject’s rights, in which case those terms will override the IDTA; and 2. a Party acts as Processor and the inconsistent or conflicting terms of the Linked Agreement are obligations on that Party expressly required by Article 28 UK GDPR, in which case those terms will override the inconsistent or conflicting terms of the IDTA in relation to Processing by that Party as Processor. 8. The words “include”, “includes”, “including”, “in particular” are used to set out examples and not to set out a finite list. 9. References to: 1. singular or plural words or people, also includes the plural or singular of those words or people; 2. legislation (or specific provisions of legislation) means that legislation (or specific provision) as it may change over time. This includes where that legislation (or specific provision) has been consolidated, re-enacted and/or replaced after this IDTA has been signed; and 3. any obligation not to do something, includes an obligation not to allow or cause that thing to be done by anyone else. 7. Which laws apply to this IDTA 1. This IDTA is governed by the laws of the UK country set out in Table 2: Transfer Details. If no selection has been made, it is the laws of England and Wales. This does not apply to Section 35 which is always governed by the laws of England and Wales. HOW THIS IDTA PROVIDES APPROPRIATE SAFEGUARDS 8. The Appropriate Safeguards 1. The purpose of this IDTA is to ensure that the Transferred Data has Appropriate Safeguards when Processed by the Importer during the Term. This standard is met when and for so long as: 1. both Parties comply with the IDTA, including the Security Requirements and any Extra Protection Clauses; and 2. the Security Requirements and any Extra Protection Clauses provide a level of security which is appropriate to the risk of a Personal Data Breach occurring and the impact on Relevant Data Subjects of such a Personal Data Breach, including considering any Special Category Data within the Transferred Data. 2. The Exporter must: 1. ensure and demonstrate that this IDTA (including any Security Requirements and Extra Protection Clauses) provides Appropriate Safeguards; and 2. (if the Importer reasonably requests) provide it with a copy of any TRA. 3. The Importer must: 1. before receiving any Transferred Data, provide the Exporter with all relevant information regarding Local Laws and practices and the protections and risks which apply to the Transferred Data when it is Processed by the Importer, including any information which may reasonably be required for the Exporter to carry out any TRA (the “Importer Information”); 2. co-operate with the Exporter to ensure compliance with the Exporter’s obligations under the UK Data Protection Laws; 3. review whether any Importer Information has changed, and whether any Local Laws contradict its obligations in this IDTA and take reasonable steps to verify this, on a regular basis. These reviews must be at least as frequent as the Review Dates; and 4. inform the Exporter as soon as it becomes aware of any Importer Information changing, and/or any Local Laws which may prevent or limit the Importer complying with its obligations in this IDTA. This information then forms part of the Importer Information. 4. The Importer must ensure that at the Start Date and during the Term: 1. the Importer Information is accurate; 2. it has taken reasonable steps to verify whether there are any Local Laws which contradict its obligations in this IDTA or any additional information regarding Local Laws which may be relevant to this IDTA. 5. Each Party must ensure that the Security Requirements and Extra Protection Clauses provide a level of security which is appropriate to the risk of a Personal Data Breach occurring and the impact on Relevant Data Subjects of such a Personal Data Breach. 9. Reviews to ensure the Appropriate Safeguards continue 1. Each Party must: 1. review this IDTA (including the Security Requirements and Extra Protection Clauses and the Importer Information) at regular intervals, to ensure that the IDTA remains accurate and up to date and continues to provide the Appropriate Safeguards. Each Party will carry out these reviews as frequently as the relevant Review Dates or sooner; and 2. inform the other party in writing as soon as it becomes aware if any information contained in either this IDTA, any TRA or Importer Information is no longer accurate and up to date. 2. If, at any time, the IDTA no longer provides Appropriate Safeguards the Parties must Without Undue Delay: 1. pause transfers and Processing of Transferred Data whilst a change to the Tables is agreed. The Importer may retain a copy of the Transferred Data during this pause, in which case the Importer must carry out any Processing required to maintain, so far as possible, the measures it was taking to achieve the Appropriate Safeguards prior to the time the IDTA no longer provided Appropriate Safeguards, but no other Processing; 2. agree a change to Part one: Tables or Part two: Extra Protection Clauses which will maintain the Appropriate Safeguards (in accordance with Section 5); and 3. where a change to Part one: Tables or Part two: Extra Protection Clauses which maintains the Appropriate Safeguards cannot be agreed, the Exporter must end this IDTA by written notice on the Importer. 10. The ICO 1. Each Party agrees to comply with any reasonable requests made by the ICO in relation to this IDTA or its Processing of the Transferred Data. 2. The Exporter will provide a copy of any TRA, the Importer Information and this IDTA to the ICO, if the ICO requests. 3. The Importer will provide a copy of any Importer Information and this IDTA to the ICO, if the ICO requests. THE EXPORTER 11. Exporter’s obligations 1. The Exporter agrees that UK Data Protection Laws apply to its Processing of the Transferred Data, including transferring it to the Importer. 2. The Exporter must: 1. comply with the UK Data Protection Laws in transferring the Transferred Data to the Importer; 2. comply with the Linked Agreement as it relates to its transferring the Transferred Data to the Importer; and 3. carry out reasonable checks on the Importer’s ability to comply with this IDTA, and take appropriate action including under Section 9.2, Section 29 or Section 30, if at any time it no longer considers that the Importer is able to comply with this IDTA or to provide Appropriate Safeguards. 3. The Exporter must comply with all its obligations in the IDTA, including any in the Security Requirements, and any Extra Protection Clauses and any Commercial Clauses. 4. The Exporter must co-operate with reasonable requests of the Importer to pass on notices or other information to and from Relevant Data Subjects or any Third Party Controller where it is not reasonably practical for the Importer to do so. The Exporter may pass these on via a third party if it is reasonable to do so. 5. The Exporter must co-operate with and provide reasonable assistance to the Importer, so that the Importer is able to comply with its obligations to the Relevant Data Subjects under Local Law and this IDTA. THE IMPORTER 12. General Importer obligations 1. The Importer must: 1. only Process the Transferred Data for the Purpose; 2. comply with all its obligations in the IDTA, including in the Security Requirements, any Extra Protection Clauses and any Commercial Clauses; 3. comply with all its obligations in the Linked Agreement which relate to its Processing of the Transferred Data; 4. keep a written record of its Processing of the Transferred Data, which demonstrate its compliance with this IDTA, and provide this written record if asked to do so by the Exporter; 5. if the Linked Agreement includes rights for the Exporter to obtain information or carry out an audit, provide the Exporter with the same rights in relation to this IDTA; and 6. if the ICO requests, provide the ICO with the information it would be required on request to provide to the Exporter under this Section 12.1 (including the written record of its Processing, and the results of audits and inspections). 2. The Importer must co-operate with and provide reasonable assistance to the Exporter and any Third Party Controller, so that the Exporter and any Third Party Controller are able to comply with their obligations under UK Data Protection Laws and this IDTA. 13. Importer’s obligations if it is subject to the UK Data Protection Laws 1. If the Importer’s Processing of the Transferred Data is subject to UK Data Protection Laws, it agrees that: 1. UK Data Protection Laws apply to its Processing of the Transferred Data, and the ICO has jurisdiction over it in that respect; and 2. it has and will comply with the UK Data Protection Laws in relation to the Processing of the Transferred Data. 2. If Section 13.1 applies and the Importer complies with Section 13.1, it does not need to comply with: * Section 14 (Importer’s obligations to comply with key data protection principles); * Section 15 (What happens if there is an Importer Personal Data Breach); * Section 15 (How Relevant Data Subjects can exercise their data subject rights); and * Section 21 (How Relevant Data Subjects can exercise their data subject rights – if the Importer is the Exporter’s Processor or Sub-Processor). 14. Importer’s obligations to comply with key data protection principles 1. The Importer does not need to comply with this Section 14 if it is the Exporter’s Processor or Sub-Processor. 2. The Importer must: 1. ensure that the Transferred Data it Processes is adequate, relevant and limited to what is necessary for the Purpose; 2. ensure that the Transferred Data it Processes is accurate and (where necessary) kept up to date, and (where appropriate considering the Purposes) correct or delete any inaccurate Transferred Data it becomes aware of Without Undue Delay; and 3. ensure that it Processes the Transferred Data for no longer than is reasonably necessary for the Purpose. 15. What happens if there is an Importer Personal Data Breach 1. If there is an Importer Personal Data Breach, the Importer must: 1. take reasonable steps to fix it, including to minimise the harmful effects on Relevant Data Subjects, stop it from continuing, and prevent it happening again. If the Importer is the Exporter’s Processor or Sub-Processor: these steps must comply with the Exporter’s instructions and the Linked Agreement and be in co-operation with the Exporter and any Third Party Controller; and 2. ensure that the Security Requirements continue to provide (or are changed in accordance with this IDTA so they do provide) a level of security which is appropriate to the risk of a Personal Data Breach occurring and the impact on Relevant Data Subjects of such a Personal Data Breach. 2. If the Importer is a Processor or Sub-Processor: if there is an Importer Personal Data Breach, the Importer must: 1. notify the Exporter Without Undue Delay after becoming aware of the breach, providing the following information: 1. a description of the nature of the Importer Personal Data Breach; 2. (if and when possible) the categories and approximate number of Data Subjects and Transferred Data records concerned; 3. likely consequences of the Importer Personal Data Breach; 4. steps taken (or proposed to be taken) to fix the Importer Personal Data Breach (including to minimise the harmful effects on Relevant Data Subjects, stop it from continuing, and prevent it happening again) and to ensure that Appropriate Safeguards are in place; 5. contact point for more information; and 6. any other information reasonably requested by the Exporter, 2. if it is not possible for the Importer to provide all the above information at the same time, it may do so in phases, Without Undue Delay; and 3. assist the Exporter (and any Third Party Controller) so the Exporter (or any Third Party Controller) can inform Relevant Data Subjects or the ICO or any other relevant regulator or authority about the Importer Personal Data Breach Without Undue Delay. 3. If the Importer is a Controller: if the Importer Personal Data Breach is likely to result in a risk to the rights or freedoms of any Relevant Data Subject the Importer must notify the Exporter Without Undue Delay after becoming aware of the breach, providing the following information: 1. a description of the nature of the Importer Personal Data Breach; 2. (if and when possible) the categories and approximate number of Data Subjects and Transferred Data records concerned; 3. likely consequences of the Importer Personal Data Breach; 4. steps taken (or proposed to be taken) to fix the Importer Personal Data Breach (including to minimise the harmful effects on Relevant Data Subjects, stop it from continuing, and prevent it happening again) and to ensure that Appropriate Safeguards are in place; 5. contact point for more information; and 6. any other information reasonably requested by the Exporter. If it is not possible for the Importer to provide all the above information at the same time, it may do so in phases, Without Undue Delay. 4. If the Importer is a Controller: if the Importer Personal Data Breach is likely to result in a high risk to the rights or freedoms of any Relevant Data Subject, the Importer must inform those Relevant Data Subjects Without Undue Delay, except in so far as it requires disproportionate effort, and provided the Importer ensures that there is a public communication or similar measures whereby Relevant Data Subjects are informed in an equally effective manner. 5. The Importer must keep a written record of all relevant facts relating to the Importer Personal Data Breach, which it will provide to the Exporter and the ICO on request. This record must include the steps it takes to fix the Importer Personal Data Breach (including to minimise the harmful effects on Relevant Data Subjects, stop it from continuing, and prevent it happening again) and to ensure that Security Requirements continue to provide a level of security which is appropriate to the risk of a Personal Data Breach occurring and the impact on Relevant Data Subjects of such a Personal Data Breach. 16. Transferring on the Transferred Data 1. The Importer may only transfer on the Transferred Data to a third party if it is permitted to do so in Table 2: Transfer Details Table, the transfer is for the Purpose, the transfer does not breach the Linked Agreement, and one or more of the following apply: 1. the third party has entered into a written contract with the Importer containing the same level of protection for Data Subjects as contained in this IDTA (based on the role of the recipient as controller or processor), and the Importer has conducted a risk assessment to ensure that the Appropriate Safeguards will be protected by that contract; or 2. the third party has been added to this IDTA as a Party; or 3. if the Importer was in the UK, transferring on the Transferred Data would comply with Article 46 UK GDPR; or 4. if the Importer was in the UK transferring on the Transferred Data would comply with one of the exceptions in Article 49 UK GDPR; or 5. the transfer is to the UK or an Adequate Country. 2. The Importer does not need to comply with Section 16.1 if it is transferring on Transferred Data and/or allowing access to the Transferred Data in accordance with Section 23 (Access Requests and Direct Access). 17. Importer’s responsibility if it authorises others to perform its obligations 1. The Importer may sub-contract its obligations in this IDTA to a Processor or Sub-Processor (provided it complies with Section 16). 2. If the Importer is the Exporter’s Processor or Sub-Processor: it must also comply with the Linked Agreement or be with the written consent of the Exporter. 3. The Importer must ensure that any person or third party acting under its authority, including a Processor or Sub-Processor, must only Process the Transferred Data on its instructions. 4. The Importer remains fully liable to the Exporter, the ICO and Relevant Data Subjects for its obligations under this IDTA where it has sub-contracted any obligations to its Processors and Sub-Processors, or authorised an employee or other person to perform them (and references to the Importer in this context will include references to its Processors, Sub-Processors or authorised persons). WHAT RIGHTS DO INDIVIDUALS HAVE? 18. The right to a copy of the IDTA 1. If a Party receives a request from a Relevant Data Subject for a copy of this IDTA: 1. it will provide the IDTA to the Relevant Data Subject and inform the other Party, as soon as reasonably possible; 2. it does not need to provide copies of the Linked Agreement, but it must provide all the information from those Linked Agreements referenced in the Tables; 3. it may redact information in the Tables or the information provided from the Linked Agreement if it is reasonably necessary to protect business secrets or confidential information, so long as it provides the Relevant Data Subject with a summary of those redactions so that the Relevant Data Subject can understand the content of the Tables or the information provided from the Linked Agreement. 19. The right to Information about the Importer and its Processing 1. The Importer does not need to comply with this Section 19 if it is the Exporter’s Processor or Sub-Processor. 2. The Importer must ensure that each Relevant Data Subject is provided with details of: * the Importer (including contact details and the Importer Data Subject Contact); * the Purposes; and * any recipients (or categories of recipients) of the Transferred Data; The Importer can demonstrate it has complied with this Section 19.2 if the information is given (or has already been given) to the Relevant Data Subjects by the Exporter or another party. The Importer does not need to comply with this Section 19.2 in so far as to do so would be impossible or involve a disproportionate effort, in which case, the Importer must make the information publicly available. 3. The Importer must keep the details of the Importer Data Subject Contact up to date and publicly available. This includes notifying the Exporter in writing of any such changes. 4. The Importer must make sure those contact details are always easy to access for all Relevant Data Subjects and be able to easily communicate with Data Subjects in the English language Without Undue Delay. 20. How Relevant Data Subjects can exercise their data subject rights 1. The Importer does not need to comply with this Section 20 if it is the Exporter’s Processor or Sub-Processor. 2. If an individual requests, the Importer must confirm whether it is Processing their Personal Data as part of the Transferred Data. 3. The following Sections of this Section 20, relate to a Relevant Data Subject’s Personal Data which forms part of the Transferred Data the Importer is Processing. 4. If the Relevant Data Subject requests, the Importer must provide them with a copy of their Transferred Data: 1. Without Undue Delay (and in any event within one month); 2. at no greater cost to the Relevant Data Subject than it would be able to charge if it were subject to the UK Data Protection Laws; 3. in clear and plain English that is easy to understand; and 4. in an easily accessible form together with 5. (if needed) a clear and plain English explanation of the Transferred Data so that it is understandable to the Relevant Data Subject; and 6. information that the Relevant Data Subject has the right to bring a claim for compensation under this IDTA. 5. If a Relevant Data Subject requests, the Importer must: 1. rectify inaccurate or incomplete Transferred Data; 2. erase Transferred Data if it is being Processed in breach of this IDTA; 3. cease using it for direct marketing purposes; and 4. comply with any other reasonable request of the Relevant Data Subject, which the Importer would be required to comply with if it were subject to the UK Data Protection Laws. 6. The Importer must not use the Transferred Data to make decisions about the Relevant Data Subject based solely on automated processing, including profiling (the “Decision-Making”), which produce legal effects concerning the Relevant Data Subject or similarly significantly affects them, except if it is permitted by Local Law and: 1. the Relevant Data Subject has given their explicit consent to such Decision-Making; or 2. Local Law has safeguards which provide sufficiently similar protection for the Relevant Data Subjects in relation to such Decision-Making, as to the relevant protection the Relevant Data Subject would have if such Decision-Making was in the UK; or 3. the Extra Protection Clauses provide safeguards for the Decision-Making which provide sufficiently similar protection for the Relevant Data Subjects in relation to such Decision-Making, as to the relevant protection the Relevant Data Subject would have if such Decision-Making was in the UK. 21. How Relevant Data Subjects can exercise their data subject rights– if the Importer is the Exporter’s Processor or Sub-Processor 1. Where the Importer is the Exporter’s Processor or Sub-Processor: If the Importer receives a request directly from an individual which relates to the Transferred Data it must pass that request on to the Exporter Without Undue Delay. The Importer must only respond to that individual as authorised by the Exporter or any Third Party Controller. 22. Rights of Relevant Data Subjects are subject to the exemptions in the UK Data Protection Laws 1. The Importer is not required to respond to requests or provide information or notifications under Sections 18, 19, 20, 21 and 23 if: 1. it is unable to reasonably verify the identity of an individual making the request; or 2. the requests are manifestly unfounded or excessive, including where requests are repetitive. In that case the Importer may refuse the request or may charge the Relevant Data Subject a reasonable fee; or 3. a relevant exemption would be available under UK Data Protection Laws, were the Importer subject to the UK Data Protection Laws. If the Importer refuses an individual’s request or charges a fee under Section 22.1.2 it will set out in writing the reasons for its refusal or charge, and inform the Relevant Data Subject that they are entitled to bring a claim for compensation under this IDTA in the case of any breach of this IDTA. HOW TO GIVE THIRD PARTIES ACCESS TO TRANSFERRED DATA UNDER LOCAL LAWS 23. Access requests and direct access 1. In this Section 23 an “Access Request” is a legally binding request (except for requests only binding by contract law) to access any Transferred Data and “Direct Access” means direct access to any Transferred Data by public authorities of which the Importer is aware. 2. The Importer may disclose any requested Transferred Data in so far as it receives an Access Request, unless in the circumstances it is reasonable for it to challenge that Access Request on the basis there are significant grounds to believe that it is unlawful. 3. In so far as Local Laws allow and it is reasonable to do so, the Importer will Without Undue Delay provide the following with relevant information about any Access Request or Direct Access: the Exporter; any Third Party Controller; and where the Importer is a Controller, any Relevant Data Subjects. 4. In so far as Local Laws allow, the Importer must: 1. make and keep a written record of Access Requests and Direct Access, including (if known): the dates, the identity of the requestor/accessor, the purpose of the Access Request or Direct Access, the type of data requested or accessed, whether it was challenged or appealed, and the outcome; and the Transferred Data which was provided or accessed; and 2. provide a copy of this written record to the Exporter on each Review Date and any time the Exporter or the ICO reasonably requests. 24. Giving notice 1. If a Party is required to notify any other Party in this IDTA it will be marked for the attention of the relevant Key Contact and sent by e-mail to the e-mail address given for the Key Contact. 2. If the notice is sent in accordance with Section 24.1, it will be deemed to have been delivered at the time the e-mail was sent, or if that time is outside of the receiving Party’s normal business hours, the receiving Party’s next normal business day, and provided no notice of non-delivery or bounceback is received. 3. The Parties agree that any Party can update their Key Contact details by giving 14 days’ (or more) notice in writing to the other Party. 25. General clauses 1. In relation to the transfer of the Transferred Data to the Importer and the Importer’s Processing of the Transferred Data, this IDTA and any Linked Agreement: 1. contain all the terms and conditions agreed by the Parties; and 2. override all previous contacts and arrangements, whether oral or in writing. 2. If one Party made any oral or written statements to the other before entering into this IDTA (which are not written in this IDTA) the other Party confirms that it has not relied on those statements and that it will not have a legal remedy if those statements are untrue or incorrect, unless the statement was made fraudulently. 3. Neither Party may novate, assign or obtain a legal charge over this IDTA (in whole or in part) without the written consent of the other Party, which may be set out in the Linked Agreement. 4. Except as set out in Section 17.1, neither Party may sub contract its obligations under this IDTA without the written consent of the other Party, which may be set out in the Linked Agreement. 5. This IDTA does not make the Parties a partnership, nor appoint one Party to act as the agent of the other Party. 6. If any Section (or part of a Section) of this IDTA is or becomes illegal, invalid or unenforceable, that will not affect the legality, validity and enforceability of any other Section (or the rest of that Section) of this IDTA. 7. If a Party does not enforce, or delays enforcing, its rights or remedies under or in relation to this IDTA, this will not be a waiver of those rights or remedies. In addition, it will not restrict that Party’s ability to enforce those or any other right or remedy in future. 8. If a Party chooses to waive enforcing a right or remedy under or in relation to this IDTA, then this waiver will only be effective if it is made in writing. Where a Party provides such a written waiver: 1. it only applies in so far as it explicitly waives specific rights or remedies; 2. it shall not prevent that Party from exercising those rights or remedies in the future (unless it has explicitly waived its ability to do so); and 3. it will not prevent that Party from enforcing any other right or remedy in future. WHAT HAPPENS IF THERE IS A BREACH OF THIS IDTA? 26. Breaches of this IDTA 1. Each Party must notify the other Party in writing (and with all relevant details) if it: 1. has breached this IDTA; or 2. it should reasonably anticipate that it may breach this IDTA, and provide any information about this which the other Party reasonably requests. 2. In this IDTA “Significant Harmful Impact” means that there is more than a minimal risk of a breach of the IDTA causing (directly or indirectly) significant damage to any Relevant Data Subject or the other Party. 27. Breaches of this IDTA by the Importer 1. If the Importer has breached this IDTA, and this has a Significant Harmful Impact, the Importer must take steps Without Undue Delay to end the Significant Harmful Impact, and if that is not possible to reduce the Significant Harmful Impact as much as possible. 2. Until there is no ongoing Significant Harmful Impact on Relevant Data Subjects: 1. the Exporter must suspend sending Transferred Data to the Importer; 2. If the Importer is the Exporter’s Processor or Sub-Processor: if the Exporter requests, the importer must securely delete all Transferred Data or securely return it to the Exporter (or a third party named by the Exporter); and 3. if the Importer has transferred on the Transferred Data to a third party receiver under Section 16, and the breach has a Significant Harmful Impact on Relevant Data Subject when it is Processed by or on behalf of that third party receiver, the Importer must: 1. notify the third party receiver of the breach and suspend sending it Transferred Data; and 2. if the third party receiver is the Importer’s Processor or Sub-Processor: make the third party receiver securely delete all Transferred Data being Processed by it or on its behalf, or securely return it to the Importer (or a third party named by the Importer). 3. If the breach cannot be corrected Without Undue Delay, so there is no ongoing Significant Harmful Impact on Relevant Data Subjects, the Exporter must end this IDTA under Section 30.1. 28. Breaches of this IDTA by the Exporter 1. If the Exporter has breached this IDTA, and this has a Significant Harmful Impact, the Exporter must take steps Without Undue Delay to end the Significant Harmful Impact and if that is not possible to reduce the Significant Harmful Impact as much as possible. 2. Until there is no ongoing risk of a Significant Harmful Impact on Relevant Data Subjects, the Exporter must suspend sending Transferred Data to the Importer. 3. If the breach cannot be corrected Without Undue Delay, so there is no ongoing Significant Harmful Impact on Relevant Data Subjects, the Importer must end this IDTA under Section 30.1. ENDING THE IDTA 29. How to end this IDTA without there being a breach 1. The IDTA will end: 1. at the end of the Term stated in Table 2: Transfer Details; or 2. if in Table 2: Transfer Details, the Parties can end this IDTA by providing written notice to the other: at the end of the notice period stated; 3. at any time that the Parties agree in writing that it will end; or 4. at the time set out in Section 29.2. 2. If the ICO issues a revised Approved IDTA under Section 5.4, if any Party selected in Table 2 “Ending the IDTA when the Approved IDTA changes”, will as a direct result of the changes in the Approved IDTA have a substantial, disproportionate and demonstrable increase in: 1. its direct costs of performing its obligations under the IDTA; and/or 2. its risk under the IDTA, and in either case it has first taken reasonable steps to reduce that cost or risk so that it is not substantial and disproportionate, that Party may end the IDTA at the end of a reasonable notice period, by providing written notice for that period to the other Party before the start date of the revised Approved IDTA. 30. How to end this IDTA if there is a breach 1. A Party may end this IDTA immediately by giving the other Party written notice if: 1. the other Party has breached this IDTA and this has a Significant Harmful Impact. This includes repeated minor breaches which taken together have a Significant Harmful Impact, and 1. the breach can be corrected so there is no Significant Harmful Impact, and the other Party has failed to do so Without Undue Delay (which cannot be more than 14 days of being required to do so in writing); or 2. the breach and its Significant Harmful Impact cannot be corrected; 2. the Importer can no longer comply with Section 8.3, as there are Local Laws which mean it cannot comply with this IDTA and this has a Significant Harmful Impact. 31. What must the Parties do when the IDTA ends? 1. If the parties wish to bring this IDTA to an end or this IDTA ends in accordance with any provision in this IDTA, but the Importer must comply with a Local Law which requires it to continue to keep any Transferred Data then this IDTA will remain in force in respect of any retained Transferred Data for as long as the retained Transferred Data is retained, and the Importer must: 1. notify the Exporter Without Undue Delay, including details of the relevant Local Law and the required retention period; 2. retain only the minimum amount of Transferred Data it needs to comply with that Local Law, and the Parties must ensure they maintain the Appropriate Safeguards, and change the Tables and Extra Protection Clauses, together with any TRA to reflect this; and 3. stop Processing the Transferred Data as soon as permitted by that Local Law and the IDTA will then end and the rest of this Section 29 will apply. 2. When this IDTA ends (no matter what the reason is): 1. the Exporter must stop sending Transferred Data to the Importer; and 2. if the Importer is the Exporter’s Processor or Sub-Processor: the Importer must delete all Transferred Data or securely return it to the Exporter (or a third party named by the Exporter), as instructed by the Exporter; 3. if the Importer is a Controller and/or not the Exporter’s Processor or Sub-Processor: the Importer must securely delete all Transferred Data. 4. the following provisions will continue in force after this IDTA ends (no matter what the reason is): * Section 1 (This IDTA and Linked Agreements); * Section 2 (Legal Meaning of Words); * Section 6 (Understanding this IDTA); * Section 7 (Which laws apply to this IDTA); * Section 10 (The ICO); * Sections 11.1 and 11.4 (Exporter’s obligations); * Sections 12.1.2, 12.1.3, 12.1.4, 12.1.5 and 12.1.6 (General Importer obligations); * Section 13.1 (Importer’s obligations if it is subject to UK Data Protection Laws); * Section 17 (Importer’s responsibility if it authorised others to perform its obligations); * Section 24 (Giving notice); * Section 25 (General clauses); * Section 31 (What must the Parties do when the IDTA ends); * Section 32 (Your liability); * Section 33 (How Relevant Data Subjects and the ICO may bring legal claims); * Section 34 (Courts legal claims can be brought in); * Section 35 (Arbitration); and * Section 36 (Legal Glossary). HOW TO BRING A LEGAL CLAIM UNDER THIS IDTA 32. Your liability 1. The Parties remain fully liable to Relevant Data Subjects for fulfilling their obligations under this IDTA and (if they apply) under UK Data Protection Laws. 2. Each Party (in this Section, “Party One”) agrees to be fully liable to Relevant Data Subjects for the entire damage suffered by the Relevant Data Subject, caused directly or indirectly by: 1. Party One’s breach of this IDTA; and/or 2. where Party One is a Processor, Party One’s breach of any provisions regarding its Processing of the Transferred Data in the Linked Agreement; 3. where Party One is a Controller, a breach of this IDTA by the other Party if it involves Party One’s Processing of the Transferred Data (no matter how minimal) in each case unless Party One can prove it is not in any way responsible for the event giving rise to the damage. 3. If one Party has paid compensation to a Relevant Data Subject under Section 32.2, it is entitled to claim back from the other Party that part of the compensation corresponding to the other Party’s responsibility for the damage, so that the compensation is fairly divided between the Parties. 4. The Parties do not exclude or restrict their liability under this IDTA or UK Data Protection Laws, on the basis that they have authorised anyone who is not a Party (including a Processor) to perform any of their obligations, and they will remain responsible for performing those obligations. 33. How Relevant Data Subjects and the ICO may bring legal claims 1. The Relevant Data Subjects are entitled to bring claims against the Exporter and/or Importer for breach of the following (including where their Processing of the Transferred Data is involved in a breach of the following by either Party): * Section 1 (This IDTA and Linked Agreements); * Section 3 (You have provided all the information required by Part one: Tables and Part two: Extra Protection Clauses); * Section 8 (The Appropriate Safeguards); * Section 9 (Reviews to ensure the Appropriate Safeguards continue); * Section 11 (Exporter’s obligations); * Section 12 (General Importer Obligations); * Section 13 (Importer’s obligations if it is subject to UK Data Protection Laws); * Section 14 (Importer’s obligations to comply with key data protection laws); * Section 15 (What happens if there is an Importer Personal Data Breach); * Section 16 (Transferring on the Transferred Data); * Section 17 (Importer’s responsibility if it authorises others to perform its obligations); * Section 18 (The right to a copy of the IDTA); * Section 19 (The Importer’s contact details for the Relevant Data Subjects); * Section 20 (How Relevant Data Subjects can exercise their data subject rights); * Section 21 (How Relevant Data Subjects can exercise their data subject rights– if the Importer is the Exporter’s Processor or Sub-Processor); * Section 23 (Access Requests and Direct Access); * Section 26 (Breaches of this IDTA); * Section 27 (Breaches of this IDTA by the Importer); * Section 28 (Breaches of this IDTA by the Exporter); * Section 30 (How to end this IDTA if there is a breach); * Section 31 (What must the Parties do when the IDTA ends); and * any other provision of the IDTA which expressly or by implication benefits the Relevant Data Subjects. 1. The ICO is entitled to bring claims against the Exporter and/or Importer for breach of the following Sections: Section 10 (The ICO), Sections 11.1 and 11.2 (Exporter’s obligations), Section 12.1.6 (General Importer obligations) and Section 13 (Importer’s obligations if it is subject to UK Data Protection Laws). 2. No one else (who is not a Party) can enforce any part of this IDTA (including under the Contracts (Rights of Third Parties) Act 1999). 3. The Parties do not need the consent of any Relevant Data Subject or the ICO to make changes to this IDTA, but any changes must be made in accordance with its terms. 4. In bringing a claim under this IDTA, a Relevant Data Subject may be represented by a not-for-profit body, organisation or association under the same conditions set out in Article 80(1) UK GDPR and sections 187 to 190 of the Data Protection Act 2018. 34. Courts legal claims can be brought in 1. The courts of the UK country set out in Table 2: Transfer Details have non-exclusive jurisdiction over any claim in connection with this IDTA (including non-contractual claims). 2. The Exporter may bring a claim against the Importer in connection with this IDTA (including non-contractual claims) in any court in any country with jurisdiction to hear the claim. 3. The Importer may only bring a claim against the Exporter in connection with this IDTA (including non-contractual claims) in the courts of the UK country set out in the Table 2: Transfer Details 4. Relevant Data Subjects and the ICO may bring a claim against the Exporter and/or the Importer in connection with this IDTA (including non-contractual claims) in any court in any country with jurisdiction to hear the claim. 5. Each Party agrees to provide to the other Party reasonable updates about any claims or complaints brought against it by a Relevant Data Subject or the ICO in connection with the Transferred Data (including claims in arbitration). 35. Arbitration 1. Instead of bringing a claim in a court under Section 34, any Party, or a Relevant Data Subject may elect to refer any dispute arising out of or in connection with this IDTA (including non-contractual claims) to final resolution by arbitration under the Rules of the London Court of International Arbitration, and those Rules are deemed to be incorporated by reference into this Section 35. 2. The Parties agree to submit to any arbitration started by another Party or by a Relevant Data Subject in accordance with this Section 35. 3. There must be only one arbitrator. The arbitrator (1) must be a lawyer qualified to practice law in one or more of England and Wales, or Scotland, or Northern Ireland and (2) must have experience of acting or advising on disputes relating to UK Data Protection Laws. 4. London shall be the seat or legal place of arbitration. It does not matter if the Parties selected a different UK country as the ‘primary place for legal claims to be made’ in Table 2: Transfer Details. 5. The English language must be used in the arbitral proceedings. 6. English law governs this Section 35. This applies regardless of whether or not the parties selected a different UK country’s law as the ‘UK country’s law that governs the IDTA’ in Table 2: Transfer Details. 36. Legal Glossary Word or Phrase Legal definition (this is how this word or phrase must be interpreted in the IDTA) Access Request As defined in Section 23, as a legally binding request (except for requests only binding by contract law) to access any Transferred Data. Adequate Country A third country, or: * a territory; * one or more sectors or organisations within a third country; * an international organisation; which the Secretary of State has specified by regulations provides an adequate level of protection of Personal Data in accordance with Section 17A of the Data Protection Act 2018. Appropriate Safeguards The standard of protection over the Transferred Data and of the Relevant Data Subject’s rights, which is required by UK Data Protection Laws when you are making a Restricted Transfer relying on standard data protection clauses under Article 46(2)(d) UK GDPR. Approved IDTA The template IDTA A1.0 issued by the ICO and laid before Parliament in accordance with s119A of the Data Protection Act 2018 on 2 February 2022, as it is revised under Section 5.4. Commercial Clauses The commercial clauses set out in Part three. Controller As defined in the UK GDPR. Damage All material and non-material loss and damage. Data Subject As defined in the UK GDPR. Decision-Making As defined in Section 20.6, as decisions about the Relevant Data Subjects based solely on automated processing, including profiling, using the Transferred Data. Direct Access As defined in Section 23 as direct access to any Transferred Data by public authorities of which the Importer is aware. Exporter The exporter identified in Table 1: Parties & Signature. Extra Protection Clauses The clauses set out in Part two: Extra Protection Clauses. ICO The Information Commissioner. Importer The importer identified in Table 1: Parties & Signature. Importer Data Subject Contact The Importer Data Subject Contact identified in Table 1: Parties & Signature, which may be updated in accordance with Section 19. Importer Information As defined in Section 8.3.1, as all relevant information regarding Local Laws and practices and the protections and risks which apply to the Transferred Data when it is Processed by the Importer, including for the Exporter to carry out any TRA. Importer Personal Data Breach A ‘personal data breach’ as defined in UK GDPR, in relation to the Transferred Data when Processed by the Importer. Linked Agreement The linked agreements set out in Table 2: Transfer Details (if any). Local Laws Laws which are not the laws of the UK and which bind the Importer. Mandatory Clauses Part four: Mandatory Clauses of this IDTA. Notice Period As set out in Table 2: Transfer Details. Party/Parties The parties to this IDTA as set out in Table 1: Parties & Signature. Personal Data As defined in the UK GDPR. Personal Data Breach As defined in the UK GDPR. Processing As defined in the UK GDPR. When the IDTA refers to Processing by the Importer, this includes where a third party Sub-Processor of the Importer is Processing on the Importer’s behalf. Processor As defined in the UK GDPR. Purpose The ‘Purpose’ set out in Table 2: Transfer Details, including any purposes which are not incompatible with the purposes stated or referred to. Relevant Data Subject A Data Subject of the Transferred Data. Restricted Transfer A transfer which is covered by Chapter V of the UK GDPR Review Dates The review dates or period for the Security Requirements set out in Table 2: Transfer Details, and any review dates set out in any revised Approved IDTA. Significant Harmful Impact As defined in Section 26.2 as where there is more than a minimal risk of the breach causing (directly or indirectly) significant harm to any Relevant Data Subject or the other Party. Special Category Data As described in the UK GDPR, together with criminal conviction or criminal offence data. Start Date As set out in Table 1: Parties and signature. Sub-Processor A Processor appointed by another Processor to Process Personal Data on its behalf. This includes Sub-Processors of any level, for example a Sub-Sub-Processor. Tables The Tables set out in Part one of this IDTA. Term As set out in Table 2: Transfer Details. Third Party Controller The Controller of the Transferred Data where the Exporter is a Processor or Sub-Processor If there is not a Third Party Controller this can be disregarded. Transfer Risk Assessment or TRA A risk assessment in so far as it is required by UK Data Protection Laws to demonstrate that the IDTA provides the Appropriate Safeguards Transferred Data Any Personal Data which the Parties transfer, or intend to transfer under this IDTA, as described in Table 2: Transfer Details UK Data Protection Laws All laws relating to data protection, the processing of personal data, privacy and/or electronic communications in force from time to time in the UK, including the UK GDPR and the Data Protection Act 2018. UK GDPR As defined in Section 3 of the Data Protection Act 2018. Without Undue Delay Without undue delay, as that phase is interpreted in the UK GDPR. ALTERNATIVE PART 4 MANDATORY CLAUSES: Mandatory Clauses Part 4: Mandatory Clauses of the Approved IDTA, being the template IDTA A.1.0 issued by the ICO and laid before Parliament in accordance with s119A of the Data Protection Act 2018 on 2 February 2022, as it is revised under Section 5.4 of those Mandatory Clauses. -------------------------------------------------------------------------------- Schedule 3C United Kingdom Standard Contractual Clauses STANDARD DATA PROTECTION CLAUSES TO BE ISSUED BY THE COMMISSIONER UNDER S119A(1) DATA PROTECTION ACT 2018 INTERNATIONAL DATA TRANSFER AGREEMENT VERSION A1.0, in force 21 September 2022 This IDTA has been issued by the Information Commissioner for Parties making Restricted Transfers. The Information Commissioner considers that it provides Appropriate Safeguards for Restricted Transfers when it is entered into as a legally binding contract. PART 1: TABLES TABLE 1: PARTIES AND SIGNATURES Start date The Parties Exporter (who sends the Restricted Transfer) Importer (who receives the Restricted Transfer) Parties’ details Full legal name: Trading name (if different): Main address (if a company registered address): Official registration number (if any) (company number or similar identifier): Full legal name: Securiti Inc. Main address (if a company registered address): Securiti Inc. Official registration number (if any) (company number or similar identifier): 83-2500426 Key Contact Full Name (optional): Job Title: Contact details including email: Full Name (optional): James Stoddard Job Title: VP Finance Contact details including email: Importer Data Subject Contact Job Title: DPO Contact details including email: Chaks Chigurupati chaks.chigurupati@securiti.ai Signatures confirming each Party agrees to be bound by this IDTA Signed for and on behalf of the Exporter set out above Signed: Date of signature: Full name: Job title: Signed for and on behalf of the Importer set out above Signed: Date of signature: Full name: Job title: TABLE 2: TRANSFER DETAILS UK country’s law that governs the IDTA: ⬜ England and Wales ⬜ Northern Ireland ⬜ Scotland Primary place for legal claims to be made by the Parties ⬜ England and Wales ⬜ Northern Ireland ⬜ Scotland The status of the Exporter In relation to the Processing of the Transferred Data: ⬜ Exporter is a Controller ⬜ Exporter is a Processor or Sub-Processor The status of the Importer In relation to the Processing of the Transferred Data: ⬜ Importer is a Controller ☒ Importer is the Exporter’s Processor or Sub-Processor ⬜ Importer is not the Exporter’s Processor or Sub-Processor (and the Importer has been instructed by a Third Party Controller) Whether UK GDPR applies to the Importer ☒ UK GDPR applies to the Importer’s Processing of the Transferred Data ⬜ UK GDPR does not apply to the Importer’s Processing of the Transferred Data Linked Agreement If the Importer is the Exporter’s Processor or Sub-Processor – the agreement(s) between the Parties which sets out the Processor’s or Sub-Processor’s instructions for Processing the Transferred Data: Name of agreement: Date of agreement: Parties to the agreement: Reference (if any): Other agreements – any agreement(s) between the Parties which set out additional obligations in relation to the Transferred Data, such as a data sharing agreement or service agreement: Name of agreement: Date of agreement: Parties to the agreement: Reference (if any): If the Exporter is a Processor or Sub-Processor – the agreement(s) between the Exporter and the Party(s) which sets out the Exporter’s instructions for Processing the Transferred Data: Name of agreement: Date of agreement: Parties to the agreement: Reference (if any): Term The Importer may Process the Transferred Data for the following time period: ☒ the period for which the Linked Agreement is in force ⬜ time period: ⬜ (only if the Importer is a Controller or not the Exporter’s Processor or Sub-Processor) no longer than is necessary for the Purpose. Ending the IDTA before the end of the Term ⬜ the Parties cannot end the IDTA before the end of the Term unless there is a breach of the IDTA or the Parties agree in writing. ⬜ the Parties can end the IDTA before the end of the Term by serving: months’ written notice, as set out in Section 29 (How to end this IDTA without there being a breach). Ending the IDTA when the Approved IDTA changes Which Parties may end the IDTA as set out in Section 29.2: ⬜ Importer ⬜ Exporter ⬜ neither Party Can the Importer make further transfers of the Transferred Data? ⬜ The Importer MAY transfer on the Transferred Data to another organisation or person (who is a different legal entity) in accordance with Section 16.1 (Transferring on the Transferred Data). ⬜ The Importer MAY NOT transfer on the Transferred Data to another organisation or person (who is a different legal entity) in accordance with Section 16.1 (Transferring on the Transferred Data). Specific restrictions when the Importer may transfer on the Transferred Data The Importer MAY ONLY forward the Transferred Data in accordance with Section 16.1: ⬜ if the Exporter tells it in writing that it may do so. ⬜ to: ⬜ to the authorised receivers (or the categories of authorised receivers) set out in: ⬜ there are no specific restrictions. Review Dates ⬜ No review is needed as this is a one-off transfer and the Importer does not retain any Transferred Data First review date: The Parties must review the Security Requirements at least once: ⬜ each month(s) ⬜ each quarter ⬜ each 6 months ⬜ each year ⬜ each year(s) ⬜ each time there is a change to the Transferred Data, Purposes, Importer Information, TRA or risk assessment TABLE 3: TRANSFERRED DATA Transferred Data The personal data to be sent to the Importer under this IDTA consists of: ☒ The categories of Transferred Data will update automatically if the information is updated in the Linked Agreement referred to. ⬜ The categories of Transferred Data will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. Special Categories of Personal Data and criminal convictions and offences The Transferred Data includes data relating to: ⬜ racial or ethnic origin ⬜ political opinions ⬜ religious or philosophical beliefs ⬜ trade union membership ⬜ genetic data ⬜ biometric data for the purpose of uniquely identifying a natural person ⬜ physical or mental health ⬜ sex life or sexual orientation ⬜ criminal convictions and offences ⬜ none of the above ⬜ set out in: And: ⬜ The categories of special category and criminal records data will update automatically if the information is updated in the Linked Agreement referred to. ⬜ The categories of special category and criminal records data will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. Relevant Data Subjects The Data Subjects of the Transferred Data are: ☒ The categories of Data Subjects will update automatically if the information is updated in the Linked Agreement referred to. ⬜ The categories of Data Subjects will not update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. Purpose ⬜ The Importer may Process the Transferred Data for the following purposes: ⬜ The Importer may Process the Transferred Data for the purposes set out in: In both cases, any other purposes which are compatible with the purposes set out above. ☒ The purposes will update automatically if the information is updated in the Linked Agreement referred to. ⬜ The purposes will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. TABLE 4: SECURITY REQUIREMENTS Security of Transmission Security of Storage Security of Processing Organisational security measures Technical security minimum requirements Updates to the Security Requirements ☒ The Security Requirements will update automatically if the information is updated in the Linked Agreement referred to. ⬜ The Security Requirements will NOT update automatically if the information is updated in the Linked Agreement referred to. The Parties must agree a change under Section 5.3. PART 2: EXTRA PROTECTION CLAUSES Extra Protection Clauses: (i) Extra technical security protections (ii) Extra organisational protections (iii) Extra contractual protections PART 3: COMMERCIAL CLAUSES Commercial Clauses PART 4: MANDATORY CLAUSES INFORMATION THAT HELPS YOU TO UNDERSTAND THIS IDTA 1. This IDTA and Linked Agreements 1. Each Party agrees to be bound by the terms and conditions set out in the IDTA, in exchange for the other Party also agreeing to be bound by the IDTA. 2. This IDTA is made up of: 1. Part one: Tables; 2. Part two: Extra Protection Clauses; 3. Part three: Commercial Clauses; and 4. Part four: Mandatory Clauses. 3. The IDTA starts on the Start Date and ends as set out in Sections 29 or 30. 4. If the Importer is a Processor or Sub-Processor instructed by the Exporter: the Exporter must ensure that, on or before the Start Date and during the Term, there is a Linked Agreement which is enforceable between the Parties and which complies with Article 28 UK GDPR (and which they will ensure continues to comply with Article 28 UK GDPR). 5. References to the Linked Agreement or to the Commercial Clauses are to that Linked Agreement or to those Commercial Clauses only in so far as they are consistent with the Mandatory Clauses. 2. Legal Meaning of Words 1. If a word starts with a capital letter it has the specific meaning set out in the Legal Glossary in Section 36. 2. To make it easier to read and understand, this IDTA contains headings and guidance notes. Those are not part of the binding contract which forms the IDTA. 3. You have provided all the information required 1. The Parties must ensure that the information contained in Part one: Tables is correct and complete at the Start Date and during the Term. 2. In Table 2: Transfer Details, if the selection that the Parties are Controllers, Processors or Sub-Processors is wrong (either as a matter of fact or as a result of applying the UK Data Protection Laws) then: 1. the terms and conditions of the Approved IDTA which apply to the correct option which was not selected will apply; and 2. the Parties and any Relevant Data Subjects are entitled to enforce the terms and conditions of the Approved IDTA which apply to that correct option. 3. In Table 2: Transfer Details, if the selection that the UK GDPR applies is wrong (either as a matter of fact or as a result of applying the UK Data Protection Laws), then the terms and conditions of the IDTA will still apply to the greatest extent possible. 4. How to sign the IDTA 1. The Parties may choose to each sign (or execute): 1. the same copy of this IDTA; 2. two copies of the IDTA. In that case, each identical copy is still an original of this IDTA, and together all those copies form one agreement; 3. a separate, identical copy of the IDTA. In that case, each identical copy is still an original of this IDTA, and together all those copies form one agreement, unless signing (or executing) in this way would mean that the IDTA would not be binding on the Parties under Local Laws. 5. Changing this IDTA 1. Each Party must not change the Mandatory Clauses as set out in the Approved IDTA, except only: 1. to ensure correct cross-referencing: cross-references to Part one: Tables (or any Table), Part two: Extra Protections, and/or Part three: Commercial Clauses can be changed where the Parties have set out the information in a different format, so that the cross-reference is to the correct location of the same information, or where clauses have been removed as they do not apply, as set out below; 2. to remove those Sections which are expressly stated not to apply to the selections made by the Parties in Table 2: Transfer Details, that the Parties are Controllers, Processors or Sub-Processors and/or that the Importer is subject to, or not subject to, the UK GDPR. The Exporter and Importer understand and acknowledge that any removed Sections may still apply and form a part of this IDTA if they have been removed incorrectly, including because the wrong selection is made in Table 2: Transfer Details; 3. so the IDTA operates as a multi-party agreement if there are more than two Parties to the IDTA. This may include nominating a lead Party or lead Parties which can make decisions on behalf of some or all of the other Parties which relate to this IDTA (including reviewing Table 4: Security Requirements and Part two: Extra Protection Clauses, and making updates to Part one: Tables (or any Table), Part two: Extra Protection Clauses, and/or Part three: Commercial Clauses); and/or 4. to update the IDTA to set out in writing any changes made to the Approved IDTA under Section 5.4, if the Parties want to. The changes will apply automatically without updating them as described in Section 5.4; provided that the changes do not reduce the Appropriate Safeguards. 2. If the Parties wish to change the format of the information included in Part one: Tables, Part two: Extra Protection Clauses or Part three: Commercial Clauses of the Approved IDTA, they may do so by agreeing to the change in writing, provided that the change does not reduce the Appropriate Safeguards. 3. If the Parties wish to change the information included in Part one: Tables, Part two: Extra Protection Clauses or Part three: Commercial Clauses of this IDTA (or the equivalent information), they may do so by agreeing to the change in writing, provided that the change does not reduce the Appropriate Safeguards. 4. From time to time, the ICO may publish a revised Approved IDTA which: 1. makes reasonable and proportionate changes to the Approved IDTA, including correcting errors in the Approved IDTA; and/or 2. reflects changes to UK Data Protection Laws. The revised Approved IDTA will specify the start date from which the changes to the Approved IDTA are effective and whether an additional Review Date is required as a result of the changes. This IDTA is automatically amended as set out in the revised Approved IDTA from the start date specified. 6. Understanding this IDTA 1. This IDTA must always be interpreted in a manner that is consistent with UK Data Protection Laws and so that it fulfils the Parties’ obligation to provide the Appropriate Safeguards. 2. If there is any inconsistency or conflict between UK Data Protection Laws and this IDTA, the UK Data Protection Laws apply. 3. If the meaning of the IDTA is unclear or there is more than one meaning, the meaning which most closely aligns with the UK Data Protection Laws applies. 4. Nothing in the IDTA (including the Commercial Clauses or the Linked Agreement) limits or excludes either Party’s liability to Relevant Data Subjects or to the ICO under this IDTA or under UK Data Protection Laws. 5. If any wording in Parts one, two or three contradicts the Mandatory Clauses, and/or seeks to limit or exclude any liability to Relevant Data Subjects or to the ICO, then that wording will not apply. 6. The Parties may include provisions in the Linked Agreement which provide the Parties with enhanced rights otherwise covered by this IDTA. These enhanced rights may be subject to commercial terms, including payment, under the Linked Agreement, but this will not affect the rights granted under this IDTA. 7. If there is any inconsistency or conflict between this IDTA and a Linked Agreement or any other agreement, this IDTA overrides that Linked Agreement or any other agreements, even if those agreements have been negotiated by the Parties. The exceptions to this are where (and in so far as): 1. the inconsistent or conflicting terms of the Linked Agreement or other agreement provide greater protection for the Relevant Data Subject’s rights, in which case those terms will override the IDTA; and 2. a Party acts as Processor and the inconsistent or conflicting terms of the Linked Agreement are obligations on that Party expressly required by Article 28 UK GDPR, in which case those terms will override the inconsistent or conflicting terms of the IDTA in relation to Processing by that Party as Processor. 8. The words “include”, “includes”, “including”, “in particular” are used to set out examples and not to set out a finite list. 9. References to: 1. singular or plural words or people, also includes the plural or singular of those words or people; 2. legislation (or specific provisions of legislation) means that legislation (or specific provision) as it may change over time. This includes where that legislation (or specific provision) has been consolidated, re-enacted and/or replaced after this IDTA has been signed; and 3. any obligation not to do something, includes an obligation not to allow or cause that thing to be done by anyone else. 7. Which laws apply to this IDTA 1. This IDTA is governed by the laws of the UK country set out in Table 2: Transfer Details. If no selection has been made, it is the laws of England and Wales. This does not apply to Section 35 which is always governed by the laws of England and Wales. HOW THIS IDTA PROVIDES APPROPRIATE SAFEGUARDS 8. The Appropriate Safeguards 1. The purpose of this IDTA is to ensure that the Transferred Data has Appropriate Safeguards when Processed by the Importer during the Term. This standard is met when and for so long as: 1. both Parties comply with the IDTA, including the Security Requirements and any Extra Protection Clauses; and 2. the Security Requirements and any Extra Protection Clauses provide a level of security which is appropriate to the risk of a Personal Data Breach occurring and the impact on Relevant Data Subjects of such a Personal Data Breach, including considering any Special Category Data within the Transferred Data. 2. The Exporter must: 1. ensure and demonstrate that this IDTA (including any Security Requirements and Extra Protection Clauses) provides Appropriate Safeguards; and 2. (if the Importer reasonably requests) provide it with a copy of any TRA. 3. The Importer must: 1. before receiving any Transferred Data, provide the Exporter with all relevant information regarding Local Laws and practices and the protections and risks which apply to the Transferred Data when it is Processed by the Importer, including any information which may reasonably be required for the Exporter to carry out any TRA (the “Importer Information”); 2. co-operate with the Exporter to ensure compliance with the Exporter’s obligations under the UK Data Protection Laws; 3. review whether any Importer Information has changed, and whether any Local Laws contradict its obligations in this IDTA and take reasonable steps to verify this, on a regular basis. These reviews must be at least as frequent as the Review Dates; and 4. inform the Exporter as soon as it becomes aware of any Importer Information changing, and/or any Local Laws which may prevent or limit the Importer complying with its obligations in this IDTA. This information then forms part of the Importer Information. 4. The Importer must ensure that at the Start Date and during the Term: 1. the Importer Information is accurate; 2. it has taken reasonable steps to verify whether there are any Local Laws which contradict its obligations in this IDTA or any additional information regarding Local Laws which may be relevant to this IDTA. 5. Each Party must ensure that the Security Requirements and Extra Protection Clauses provide a level of security which is appropriate to the risk of a Personal Data Breach occurring and the impact on Relevant Data Subjects of such a Personal Data Breach. 9. Reviews to ensure the Appropriate Safeguards continue 1. Each Party must: 1. review this IDTA (including the Security Requirements and Extra Protection Clauses and the Importer Information) at regular intervals, to ensure that the IDTA remains accurate and up to date and continues to provide the Appropriate Safeguards. Each Party will carry out these reviews as frequently as the relevant Review Dates or sooner; and 2. inform the other party in writing as soon as it becomes aware if any information contained in either this IDTA, any TRA or Importer Information is no longer accurate and up to date. 2. If, at any time, the IDTA no longer provides Appropriate Safeguards the Parties must Without Undue Delay: 1. pause transfers and Processing of Transferred Data whilst a change to the Tables is agreed. The Importer may retain a copy of the Transferred Data during this pause, in which case the Importer must carry out any Processing required to maintain, so far as possible, the measures it was taking to achieve the Appropriate Safeguards prior to the time the IDTA no longer provided Appropriate Safeguards, but no other Processing; 2. agree a change to Part one: Tables or Part two: Extra Protection Clauses which will maintain the Appropriate Safeguards (in accordance with Section 5); and 3. where a change to Part one: Tables or Part two: Extra Protection Clauses which maintains the Appropriate Safeguards cannot be agreed, the Exporter must end this IDTA by written notice on the Importer. 10. The ICO 1. Each Party agrees to comply with any reasonable requests made by the ICO in relation to this IDTA or its Processing of the Transferred Data. 2. The Exporter will provide a copy of any TRA, the Importer Information and this IDTA to the ICO, if the ICO requests. 3. The Importer will provide a copy of any Importer Information and this IDTA to the ICO, if the ICO requests. THE EXPORTER 11. Exporter’s obligations 1. The Exporter agrees that UK Data Protection Laws apply to its Processing of the Transferred Data, including transferring it to the Importer. 2. The Exporter must: 1. comply with the UK Data Protection Laws in transferring the Transferred Data to the Importer; 2. comply with the Linked Agreement as it relates to its transferring the Transferred Data to the Importer; and 3. carry out reasonable checks on the Importer’s ability to comply with this IDTA, and take appropriate action including under Section 9.2, Section 29 or Section 30, if at any time it no longer considers that the Importer is able to comply with this IDTA or to provide Appropriate Safeguards. 3. The Exporter must comply with all its obligations in the IDTA, including any in the Security Requirements, and any Extra Protection Clauses and any Commercial Clauses. 4. The Exporter must co-operate with reasonable requests of the Importer to pass on notices or other information to and from Relevant Data Subjects or any Third Party Controller where it is not reasonably practical for the Importer to do so. The Exporter may pass these on via a third party if it is reasonable to do so. 5. The Exporter must co-operate with and provide reasonable assistance to the Importer, so that the Importer is able to comply with its obligations to the Relevant Data Subjects under Local Law and this IDTA. THE IMPORTER 12. General Importer obligations 1. The Importer must: 1. only Process the Transferred Data for the Purpose; 2. comply with all its obligations in the IDTA, including in the Security Requirements, any Extra Protection Clauses and any Commercial Clauses; 3. comply with all its obligations in the Linked Agreement which relate to its Processing of the Transferred Data; 4. keep a written record of its Processing of the Transferred Data, which demonstrate its compliance with this IDTA, and provide this written record if asked to do so by the Exporter; 5. if the Linked Agreement includes rights for the Exporter to obtain information or carry out an audit, provide the Exporter with the same rights in relation to this IDTA; and 6. if the ICO requests, provide the ICO with the information it would be required on request to provide to the Exporter under this Section 12.1 (including the written record of its Processing, and the results of audits and inspections). 2. The Importer must co-operate with and provide reasonable assistance to the Exporter and any Third Party Controller, so that the Exporter and any Third Party Controller are able to comply with their obligations under UK Data Protection Laws and this IDTA. 13. Importer’s obligations if it is subject to the UK Data Protection Laws 1. If the Importer’s Processing of the Transferred Data is subject to UK Data Protection Laws, it agrees that: 1. UK Data Protection Laws apply to its Processing of the Transferred Data, and the ICO has jurisdiction over it in that respect; and 2. it has and will comply with the UK Data Protection Laws in relation to the Processing of the Transferred Data. 2. If Section 13.1 applies and the Importer complies with Section 13.1, it does not need to comply with: * Section 14 (Importer’s obligations to comply with key data protection principles); * Section 15 (What happens if there is an Importer Personal Data Breach); * Section 15 (How Relevant Data Subjects can exercise their data subject rights); and * Section 21 (How Relevant Data Subjects can exercise their data subject rights – if the Importer is the Exporter’s Processor or Sub-Processor). 14. Importer’s obligations to comply with key data protection principles 1. The Importer does not need to comply with this Section 14 if it is the Exporter’s Processor or Sub-Processor. 2. The Importer must: 1. ensure that the Transferred Data it Processes is adequate, relevant and limited to what is necessary for the Purpose; 2. ensure that the Transferred Data it Processes is accurate and (where necessary) kept up to date, and (where appropriate considering the Purposes) correct or delete any inaccurate Transferred Data it becomes aware of Without Undue Delay; and 3. ensure that it Processes the Transferred Data for no longer than is reasonably necessary for the Purpose. 15. What happens if there is an Importer Personal Data Breach 1. If there is an Importer Personal Data Breach, the Importer must: 1. take reasonable steps to fix it, including to minimise the harmful effects on Relevant Data Subjects, stop it from continuing, and prevent it happening again. If the Importer is the Exporter’s Processor or Sub-Processor: these steps must comply with the Exporter’s instructions and the Linked Agreement and be in co-operation with the Exporter and any Third Party Controller; and 2. ensure that the Security Requirements continue to provide (or are changed in accordance with this IDTA so they do provide) a level of security which is appropriate to the risk of a Personal Data Breach occurring and the impact on Relevant Data Subjects of such a Personal Data Breach. 2. If the Importer is a Processor or Sub-Processor: if there is an Importer Personal Data Breach, the Importer must: 1. notify the Exporter Without Undue Delay after becoming aware of the breach, providing the following information: 1. a description of the nature of the Importer Personal Data Breach; 2. (if and when possible) the categories and approximate number of Data Subjects and Transferred Data records concerned; 3. likely consequences of the Importer Personal Data Breach; 4. steps taken (or proposed to be taken) to fix the Importer Personal Data Breach (including to minimise the harmful effects on Relevant Data Subjects, stop it from continuing, and prevent it happening again) and to ensure that Appropriate Safeguards are in place; 5. contact point for more information; and 6. any other information reasonably requested by the Exporter, 2. if it is not possible for the Importer to provide all the above information at the same time, it may do so in phases, Without Undue Delay; and 3. assist the Exporter (and any Third Party Controller) so the Exporter (or any Third Party Controller) can inform Relevant Data Subjects or the ICO or any other relevant regulator or authority about the Importer Personal Data Breach Without Undue Delay. 3. If the Importer is a Controller: if the Importer Personal Data Breach is likely to result in a risk to the rights or freedoms of any Relevant Data Subject the Importer must notify the Exporter Without Undue Delay after becoming aware of the breach, providing the following information: 1. a description of the nature of the Importer Personal Data Breach; 2. (if and when possible) the categories and approximate number of Data Subjects and Transferred Data records concerned; 3. likely consequences of the Importer Personal Data Breach; 4. steps taken (or proposed to be taken) to fix the Importer Personal Data Breach (including to minimise the harmful effects on Relevant Data Subjects, stop it from continuing, and prevent it happening again) and to ensure that Appropriate Safeguards are in place; 5. contact point for more information; and 6. any other information reasonably requested by the Exporter. If it is not possible for the Importer to provide all the above information at the same time, it may do so in phases, Without Undue Delay. 4. If the Importer is a Controller: if the Importer Personal Data Breach is likely to result in a high risk to the rights or freedoms of any Relevant Data Subject, the Importer must inform those Relevant Data Subjects Without Undue Delay, except in so far as it requires disproportionate effort, and provided the Importer ensures that there is a public communication or similar measures whereby Relevant Data Subjects are informed in an equally effective manner. 5. The Importer must keep a written record of all relevant facts relating to the Importer Personal Data Breach, which it will provide to the Exporter and the ICO on request. This record must include the steps it takes to fix the Importer Personal Data Breach (including to minimise the harmful effects on Relevant Data Subjects, stop it from continuing, and prevent it happening again) and to ensure that Security Requirements continue to provide a level of security which is appropriate to the risk of a Personal Data Breach occurring and the impact on Relevant Data Subjects of such a Personal Data Breach. 16. Transferring on the Transferred Data 1. The Importer may only transfer on the Transferred Data to a third party if it is permitted to do so in Table 2: Transfer Details Table, the transfer is for the Purpose, the transfer does not breach the Linked Agreement, and one or more of the following apply: 1. the third party has entered into a written contract with the Importer containing the same level of protection for Data Subjects as contained in this IDTA (based on the role of the recipient as controller or processor), and the Importer has conducted a risk assessment to ensure that the Appropriate Safeguards will be protected by that contract; or 2. the third party has been added to this IDTA as a Party; or 3. if the Importer was in the UK, transferring on the Transferred Data would comply with Article 46 UK GDPR; or 4. if the Importer was in the UK transferring on the Transferred Data would comply with one of the exceptions in Article 49 UK GDPR; or 5. the transfer is to the UK or an Adequate Country. 2. The Importer does not need to comply with Section 16.1 if it is transferring on Transferred Data and/or allowing access to the Transferred Data in accordance with Section 23 (Access Requests and Direct Access). 17. Importer’s responsibility if it authorises others to perform its obligations 1. The Importer may sub-contract its obligations in this IDTA to a Processor or Sub-Processor (provided it complies with Section 16). 2. If the Importer is the Exporter’s Processor or Sub-Processor: it must also comply with the Linked Agreement or be with the written consent of the Exporter. 3. The Importer must ensure that any person or third party acting under its authority, including a Processor or Sub-Processor, must only Process the Transferred Data on its instructions. 4. The Importer remains fully liable to the Exporter, the ICO and Relevant Data Subjects for its obligations under this IDTA where it has sub-contracted any obligations to its Processors and Sub-Processors, or authorised an employee or other person to perform them (and references to the Importer in this context will include references to its Processors, Sub-Processors or authorised persons). WHAT RIGHTS DO INDIVIDUALS HAVE? 18. The right to a copy of the IDTA 1. If a Party receives a request from a Relevant Data Subject for a copy of this IDTA: 1. it will provide the IDTA to the Relevant Data Subject and inform the other Party, as soon as reasonably possible; 2. it does not need to provide copies of the Linked Agreement, but it must provide all the information from those Linked Agreements referenced in the Tables; 3. it may redact information in the Tables or the information provided from the Linked Agreement if it is reasonably necessary to protect business secrets or confidential information, so long as it provides the Relevant Data Subject with a summary of those redactions so that the Relevant Data Subject can understand the content of the Tables or the information provided from the Linked Agreement. 19. The right to Information about the Importer and its Processing 1. The Importer does not need to comply with this Section 19 if it is the Exporter’s Processor or Sub-Processor. 2. The Importer must ensure that each Relevant Data Subject is provided with details of: * the Importer (including contact details and the Importer Data Subject Contact); * the Purposes; and * any recipients (or categories of recipients) of the Transferred Data; The Importer can demonstrate it has complied with this Section 19.2 if the information is given (or has already been given) to the Relevant Data Subjects by the Exporter or another party. The Importer does not need to comply with this Section 19.2 in so far as to do so would be impossible or involve a disproportionate effort, in which case, the Importer must make the information publicly available. 3. The Importer must keep the details of the Importer Data Subject Contact up to date and publicly available. This includes notifying the Exporter in writing of any such changes. 4. The Importer must make sure those contact details are always easy to access for all Relevant Data Subjects and be able to easily communicate with Data Subjects in the English language Without Undue Delay. 20. How Relevant Data Subjects can exercise their data subject rights 1. The Importer does not need to comply with this Section 20 if it is the Exporter’s Processor or Sub-Processor. 2. If an individual requests, the Importer must confirm whether it is Processing their Personal Data as part of the Transferred Data. 3. The following Sections of this Section 20, relate to a Relevant Data Subject’s Personal Data which forms part of the Transferred Data the Importer is Processing. 4. If the Relevant Data Subject requests, the Importer must provide them with a copy of their Transferred Data: 1. Without Undue Delay (and in any event within one month); 2. at no greater cost to the Relevant Data Subject than it would be able to charge if it were subject to the UK Data Protection Laws; 3. in clear and plain English that is easy to understand; and 4. in an easily accessible form together with 5. (if needed) a clear and plain English explanation of the Transferred Data so that it is understandable to the Relevant Data Subject; and 6. information that the Relevant Data Subject has the right to bring a claim for compensation under this IDTA. 5. If a Relevant Data Subject requests, the Importer must: 1. rectify inaccurate or incomplete Transferred Data; 2. erase Transferred Data if it is being Processed in breach of this IDTA; 3. cease using it for direct marketing purposes; and 4. comply with any other reasonable request of the Relevant Data Subject, which the Importer would be required to comply with if it were subject to the UK Data Protection Laws. 6. The Importer must not use the Transferred Data to make decisions about the Relevant Data Subject based solely on automated processing, including profiling (the “Decision-Making”), which produce legal effects concerning the Relevant Data Subject or similarly significantly affects them, except if it is permitted by Local Law and: 1. the Relevant Data Subject has given their explicit consent to such Decision-Making; or 2. Local Law has safeguards which provide sufficiently similar protection for the Relevant Data Subjects in relation to such Decision-Making, as to the relevant protection the Relevant Data Subject would have if such Decision-Making was in the UK; or 3. the Extra Protection Clauses provide safeguards for the Decision-Making which provide sufficiently similar protection for the Relevant Data Subjects in relation to such Decision-Making, as to the relevant protection the Relevant Data Subject would have if such Decision-Making was in the UK. 21. How Relevant Data Subjects can exercise their data subject rights– if the Importer is the Exporter’s Processor or Sub-Processor 1. Where the Importer is the Exporter’s Processor or Sub-Processor: If the Importer receives a request directly from an individual which relates to the Transferred Data it must pass that request on to the Exporter Without Undue Delay. The Importer must only respond to that individual as authorised by the Exporter or any Third Party Controller. 22. Rights of Relevant Data Subjects are subject to the exemptions in the UK Data Protection Laws 1. The Importer is not required to respond to requests or provide information or notifications under Sections 18, 19, 20, 21 and 23 if: 1. it is unable to reasonably verify the identity of an individual making the request; or 2. the requests are manifestly unfounded or excessive, including where requests are repetitive. In that case the Importer may refuse the request or may charge the Relevant Data Subject a reasonable fee; or 3. a relevant exemption would be available under UK Data Protection Laws, were the Importer subject to the UK Data Protection Laws. If the Importer refuses an individual’s request or charges a fee under Section 22.1.2 it will set out in writing the reasons for its refusal or charge, and inform the Relevant Data Subject that they are entitled to bring a claim for compensation under this IDTA in the case of any breach of this IDTA. HOW TO GIVE THIRD PARTIES ACCESS TO TRANSFERRED DATA UNDER LOCAL LAWS 23. Access requests and direct access 1. In this Section 23 an “Access Request” is a legally binding request (except for requests only binding by contract law) to access any Transferred Data and “Direct Access” means direct access to any Transferred Data by public authorities of which the Importer is aware. 2. The Importer may disclose any requested Transferred Data in so far as it receives an Access Request, unless in the circumstances it is reasonable for it to challenge that Access Request on the basis there are significant grounds to believe that it is unlawful. 3. In so far as Local Laws allow and it is reasonable to do so, the Importer will Without Undue Delay provide the following with relevant information about any Access Request or Direct Access: the Exporter; any Third Party Controller; and where the Importer is a Controller, any Relevant Data Subjects. 4. In so far as Local Laws allow, the Importer must: 1. make and keep a written record of Access Requests and Direct Access, including (if known): the dates, the identity of the requestor/accessor, the purpose of the Access Request or Direct Access, the type of data requested or accessed, whether it was challenged or appealed, and the outcome; and the Transferred Data which was provided or accessed; and 2. provide a copy of this written record to the Exporter on each Review Date and any time the Exporter or the ICO reasonably requests. 24. Giving notice 1. If a Party is required to notify any other Party in this IDTA it will be marked for the attention of the relevant Key Contact and sent by e-mail to the e-mail address given for the Key Contact. 2. If the notice is sent in accordance with Section 24.1, it will be deemed to have been delivered at the time the e-mail was sent, or if that time is outside of the receiving Party’s normal business hours, the receiving Party’s next normal business day, and provided no notice of non-delivery or bounceback is received. 3. The Parties agree that any Party can update their Key Contact details by giving 14 days’ (or more) notice in writing to the other Party. 25. General clauses 1. In relation to the transfer of the Transferred Data to the Importer and the Importer’s Processing of the Transferred Data, this IDTA and any Linked Agreement: 1. contain all the terms and conditions agreed by the Parties; and 2. override all previous contacts and arrangements, whether oral or in writing. 2. If one Party made any oral or written statements to the other before entering into this IDTA (which are not written in this IDTA) the other Party confirms that it has not relied on those statements and that it will not have a legal remedy if those statements are untrue or incorrect, unless the statement was made fraudulently. 3. Neither Party may novate, assign or obtain a legal charge over this IDTA (in whole or in part) without the written consent of the other Party, which may be set out in the Linked Agreement. 4. Except as set out in Section 17.1, neither Party may sub contract its obligations under this IDTA without the written consent of the other Party, which may be set out in the Linked Agreement. 5. This IDTA does not make the Parties a partnership, nor appoint one Party to act as the agent of the other Party. 6. If any Section (or part of a Section) of this IDTA is or becomes illegal, invalid or unenforceable, that will not affect the legality, validity and enforceability of any other Section (or the rest of that Section) of this IDTA. 7. If a Party does not enforce, or delays enforcing, its rights or remedies under or in relation to this IDTA, this will not be a waiver of those rights or remedies. In addition, it will not restrict that Party’s ability to enforce those or any other right or remedy in future. 8. If a Party chooses to waive enforcing a right or remedy under or in relation to this IDTA, then this waiver will only be effective if it is made in writing. Where a Party provides such a written waiver: 1. it only applies in so far as it explicitly waives specific rights or remedies; 2. it shall not prevent that Party from exercising those rights or remedies in the future (unless it has explicitly waived its ability to do so); and 3. it will not prevent that Party from enforcing any other right or remedy in future. WHAT HAPPENS IF THERE IS A BREACH OF THIS IDTA? 26. Breaches of this IDTA 1. Each Party must notify the other Party in writing (and with all relevant details) if it: 1. has breached this IDTA; or 2. it should reasonably anticipate that it may breach this IDTA, and provide any information about this which the other Party reasonably requests. 2. In this IDTA “Significant Harmful Impact” means that there is more than a minimal risk of a breach of the IDTA causing (directly or indirectly) significant damage to any Relevant Data Subject or the other Party. 27. Breaches of this IDTA by the Importer 1. If the Importer has breached this IDTA, and this has a Significant Harmful Impact, the Importer must take steps Without Undue Delay to end the Significant Harmful Impact, and if that is not possible to reduce the Significant Harmful Impact as much as possible. 2. Until there is no ongoing Significant Harmful Impact on Relevant Data Subjects: 1. the Exporter must suspend sending Transferred Data to the Importer; 2. If the Importer is the Exporter’s Processor or Sub-Processor: if the Exporter requests, the importer must securely delete all Transferred Data or securely return it to the Exporter (or a third party named by the Exporter); and 3. if the Importer has transferred on the Transferred Data to a third party receiver under Section 16, and the breach has a Significant Harmful Impact on Relevant Data Subject when it is Processed by or on behalf of that third party receiver, the Importer must: 1. notify the third party receiver of the breach and suspend sending it Transferred Data; and 2. if the third party receiver is the Importer’s Processor or Sub-Processor: make the third party receiver securely delete all Transferred Data being Processed by it or on its behalf, or securely return it to the Importer (or a third party named by the Importer). 3. If the breach cannot be corrected Without Undue Delay, so there is no ongoing Significant Harmful Impact on Relevant Data Subjects, the Exporter must end this IDTA under Section 30.1. 28. Breaches of this IDTA by the Exporter 1. If the Exporter has breached this IDTA, and this has a Significant Harmful Impact, the Exporter must take steps Without Undue Delay to end the Significant Harmful Impact and if that is not possible to reduce the Significant Harmful Impact as much as possible. 2. Until there is no ongoing risk of a Significant Harmful Impact on Relevant Data Subjects, the Exporter must suspend sending Transferred Data to the Importer. 3. If the breach cannot be corrected Without Undue Delay, so there is no ongoing Significant Harmful Impact on Relevant Data Subjects, the Importer must end this IDTA under Section 30.1. ENDING THE IDTA 29. How to end this IDTA without there being a breach 1. The IDTA will end: 1. at the end of the Term stated in Table 2: Transfer Details; or 2. if in Table 2: Transfer Details, the Parties can end this IDTA by providing written notice to the other: at the end of the notice period stated; 3. at any time that the Parties agree in writing that it will end; or 4. at the time set out in Section 29.2. 2. If the ICO issues a revised Approved IDTA under Section 5.4, if any Party selected in Table 2 “Ending the IDTA when the Approved IDTA changes”, will as a direct result of the changes in the Approved IDTA have a substantial, disproportionate and demonstrable increase in: 1. its direct costs of performing its obligations under the IDTA; and/or 2. its risk under the IDTA, and in either case it has first taken reasonable steps to reduce that cost or risk so that it is not substantial and disproportionate, that Party may end the IDTA at the end of a reasonable notice period, by providing written notice for that period to the other Party before the start date of the revised Approved IDTA. 30. How to end this IDTA if there is a breach 1. A Party may end this IDTA immediately by giving the other Party written notice if: 1. the other Party has breached this IDTA and this has a Significant Harmful Impact. This includes repeated minor breaches which taken together have a Significant Harmful Impact, and 1. the breach can be corrected so there is no Significant Harmful Impact, and the other Party has failed to do so Without Undue Delay (which cannot be more than 14 days of being required to do so in writing); or 2. the breach and its Significant Harmful Impact cannot be corrected; 2. the Importer can no longer comply with Section 8.3, as there are Local Laws which mean it cannot comply with this IDTA and this has a Significant Harmful Impact. 31. What must the Parties do when the IDTA ends? 1. If the parties wish to bring this IDTA to an end or this IDTA ends in accordance with any provision in this IDTA, but the Importer must comply with a Local Law which requires it to continue to keep any Transferred Data then this IDTA will remain in force in respect of any retained Transferred Data for as long as the retained Transferred Data is retained, and the Importer must: 1. notify the Exporter Without Undue Delay, including details of the relevant Local Law and the required retention period; 2. retain only the minimum amount of Transferred Data it needs to comply with that Local Law, and the Parties must ensure they maintain the Appropriate Safeguards, and change the Tables and Extra Protection Clauses, together with any TRA to reflect this; and 3. stop Processing the Transferred Data as soon as permitted by that Local Law and the IDTA will then end and the rest of this Section 29 will apply. 2. When this IDTA ends (no matter what the reason is): 1. the Exporter must stop sending Transferred Data to the Importer; and 2. if the Importer is the Exporter’s Processor or Sub-Processor: the Importer must delete all Transferred Data or securely return it to the Exporter (or a third party named by the Exporter), as instructed by the Exporter; 3. if the Importer is a Controller and/or not the Exporter’s Processor or Sub-Processor: the Importer must securely delete all Transferred Data. 4. the following provisions will continue in force after this IDTA ends (no matter what the reason is): * Section 1 (This IDTA and Linked Agreements); * Section 2 (Legal Meaning of Words); * Section 6 (Understanding this IDTA); * Section 7 (Which laws apply to this IDTA); * Section 10 (The ICO); * Sections 11.1 and 11.4 (Exporter’s obligations); * Sections 12.1.2, 12.1.3, 12.1.4, 12.1.5 and 12.1.6 (General Importer obligations); * Section 13.1 (Importer’s obligations if it is subject to UK Data Protection Laws); * Section 17 (Importer’s responsibility if it authorised others to perform its obligations); * Section 24 (Giving notice); * Section 25 (General clauses); * Section 31 (What must the Parties do when the IDTA ends); * Section 32 (Your liability); * Section 33 (How Relevant Data Subjects and the ICO may bring legal claims); * Section 34 (Courts legal claims can be brought in); * Section 35 (Arbitration); and * Section 36 (Legal Glossary). HOW TO BRING A LEGAL CLAIM UNDER THIS IDTA 32. Your liability 1. The Parties remain fully liable to Relevant Data Subjects for fulfilling their obligations under this IDTA and (if they apply) under UK Data Protection Laws. 2. Each Party (in this Section, “Party One”) agrees to be fully liable to Relevant Data Subjects for the entire damage suffered by the Relevant Data Subject, caused directly or indirectly by: 1. Party One’s breach of this IDTA; and/or 2. where Party One is a Processor, Party One’s breach of any provisions regarding its Processing of the Transferred Data in the Linked Agreement; 3. where Party One is a Controller, a breach of this IDTA by the other Party if it involves Party One’s Processing of the Transferred Data (no matter how minimal) in each case unless Party One can prove it is not in any way responsible for the event giving rise to the damage. 3. If one Party has paid compensation to a Relevant Data Subject under Section 32.2, it is entitled to claim back from the other Party that part of the compensation corresponding to the other Party’s responsibility for the damage, so that the compensation is fairly divided between the Parties. 4. The Parties do not exclude or restrict their liability under this IDTA or UK Data Protection Laws, on the basis that they have authorised anyone who is not a Party (including a Processor) to perform any of their obligations, and they will remain responsible for performing those obligations. 33. How Relevant Data Subjects and the ICO may bring legal claims 1. The Relevant Data Subjects are entitled to bring claims against the Exporter and/or Importer for breach of the following (including where their Processing of the Transferred Data is involved in a breach of the following by either Party): * Section 1 (This IDTA and Linked Agreements); * Section 3 (You have provided all the information required by Part one: Tables and Part two: Extra Protection Clauses); * Section 8 (The Appropriate Safeguards); * Section 9 (Reviews to ensure the Appropriate Safeguards continue); * Section 11 (Exporter’s obligations); * Section 12 (General Importer Obligations); * Section 13 (Importer’s obligations if it is subject to UK Data Protection Laws); * Section 14 (Importer’s obligations to comply with key data protection laws); * Section 15 (What happens if there is an Importer Personal Data Breach); * Section 16 (Transferring on the Transferred Data); * Section 17 (Importer’s responsibility if it authorises others to perform its obligations); * Section 18 (The right to a copy of the IDTA); * Section 19 (The Importer’s contact details for the Relevant Data Subjects); * Section 20 (How Relevant Data Subjects can exercise their data subject rights); * Section 21 (How Relevant Data Subjects can exercise their data subject rights– if the Importer is the Exporter’s Processor or Sub-Processor); * Section 23 (Access Requests and Direct Access); * Section 26 (Breaches of this IDTA); * Section 27 (Breaches of this IDTA by the Importer); * Section 28 (Breaches of this IDTA by the Exporter); * Section 30 (How to end this IDTA if there is a breach); * Section 31 (What must the Parties do when the IDTA ends); and * any other provision of the IDTA which expressly or by implication benefits the Relevant Data Subjects. 1. The ICO is entitled to bring claims against the Exporter and/or Importer for breach of the following Sections: Section 10 (The ICO), Sections 11.1 and 11.2 (Exporter’s obligations), Section 12.1.6 (General Importer obligations) and Section 13 (Importer’s obligations if it is subject to UK Data Protection Laws). 2. No one else (who is not a Party) can enforce any part of this IDTA (including under the Contracts (Rights of Third Parties) Act 1999). 3. The Parties do not need the consent of any Relevant Data Subject or the ICO to make changes to this IDTA, but any changes must be made in accordance with its terms. 4. In bringing a claim under this IDTA, a Relevant Data Subject may be represented by a not-for-profit body, organisation or association under the same conditions set out in Article 80(1) UK GDPR and sections 187 to 190 of the Data Protection Act 2018. 34. Courts legal claims can be brought in 1. The courts of the UK country set out in Table 2: Transfer Details have non-exclusive jurisdiction over any claim in connection with this IDTA (including non-contractual claims). 2. The Exporter may bring a claim against the Importer in connection with this IDTA (including non-contractual claims) in any court in any country with jurisdiction to hear the claim. 3. The Importer may only bring a claim against the Exporter in connection with this IDTA (including non-contractual claims) in the courts of the UK country set out in the Table 2: Transfer Details 4. Relevant Data Subjects and the ICO may bring a claim against the Exporter and/or the Importer in connection with this IDTA (including non-contractual claims) in any court in any country with jurisdiction to hear the claim. 5. Each Party agrees to provide to the other Party reasonable updates about any claims or complaints brought against it by a Relevant Data Subject or the ICO in connection with the Transferred Data (including claims in arbitration). 35. Arbitration 1. Instead of bringing a claim in a court under Section 34, any Party, or a Relevant Data Subject may elect to refer any dispute arising out of or in connection with this IDTA (including non-contractual claims) to final resolution by arbitration under the Rules of the London Court of International Arbitration, and those Rules are deemed to be incorporated by reference into this Section 35. 2. The Parties agree to submit to any arbitration started by another Party or by a Relevant Data Subject in accordance with this Section 35. 3. There must be only one arbitrator. The arbitrator (1) must be a lawyer qualified to practice law in one or more of England and Wales, or Scotland, or Northern Ireland and (2) must have experience of acting or advising on disputes relating to UK Data Protection Laws. 4. London shall be the seat or legal place of arbitration. It does not matter if the Parties selected a different UK country as the ‘primary place for legal claims to be made’ in Table 2: Transfer Details. 5. The English language must be used in the arbitral proceedings. 6. English law governs this Section 35. This applies regardless of whether or not the parties selected a different UK country’s law as the ‘UK country’s law that governs the IDTA’ in Table 2: Transfer Details. 36. Legal Glossary Word or Phrase Legal definition (this is how this word or phrase must be interpreted in the IDTA) Access Request As defined in Section 23, as a legally binding request (except for requests only binding by contract law) to access any Transferred Data. Adequate Country A third country, or: * a territory; * one or more sectors or organisations within a third country; * an international organisation; which the Secretary of State has specified by regulations provides an adequate level of protection of Personal Data in accordance with Section 17A of the Data Protection Act 2018. Appropriate Safeguards The standard of protection over the Transferred Data and of the Relevant Data Subject’s rights, which is required by UK Data Protection Laws when you are making a Restricted Transfer relying on standard data protection clauses under Article 46(2)(d) UK GDPR. Approved IDTA The template IDTA A1.0 issued by the ICO and laid before Parliament in accordance with s119A of the Data Protection Act 2018 on 2 February 2022, as it is revised under Section 5.4. Commercial Clauses The commercial clauses set out in Part three. Controller As defined in the UK GDPR. Damage All material and non-material loss and damage. Data Subject As defined in the UK GDPR. Decision-Making As defined in Section 20.6, as decisions about the Relevant Data Subjects based solely on automated processing, including profiling, using the Transferred Data. Direct Access As defined in Section 23 as direct access to any Transferred Data by public authorities of which the Importer is aware. Exporter The exporter identified in Table 1: Parties & Signature. Extra Protection Clauses The clauses set out in Part two: Extra Protection Clauses. ICO The Information Commissioner. Importer The importer identified in Table 1: Parties & Signature. Importer Data Subject Contact The Importer Data Subject Contact identified in Table 1: Parties & Signature, which may be updated in accordance with Section 19. Importer Information As defined in Section 8.3.1, as all relevant information regarding Local Laws and practices and the protections and risks which apply to the Transferred Data when it is Processed by the Importer, including for the Exporter to carry out any TRA. Importer Personal Data Breach A ‘personal data breach’ as defined in UK GDPR, in relation to the Transferred Data when Processed by the Importer. Linked Agreement The linked agreements set out in Table 2: Transfer Details (if any). Local Laws Laws which are not the laws of the UK and which bind the Importer. Mandatory Clauses Part four: Mandatory Clauses of this IDTA. Notice Period As set out in Table 2: Transfer Details. Party/Parties The parties to this IDTA as set out in Table 1: Parties & Signature. Personal Data As defined in the UK GDPR. Personal Data Breach As defined in the UK GDPR. Processing As defined in the UK GDPR. When the IDTA refers to Processing by the Importer, this includes where a third party Sub-Processor of the Importer is Processing on the Importer’s behalf. Processor As defined in the UK GDPR. Purpose The ‘Purpose’ set out in Table 2: Transfer Details, including any purposes which are not incompatible with the purposes stated or referred to. Relevant Data Subject A Data Subject of the Transferred Data. Restricted Transfer A transfer which is covered by Chapter V of the UK GDPR Review Dates The review dates or period for the Security Requirements set out in Table 2: Transfer Details, and any review dates set out in any revised Approved IDTA. Significant Harmful Impact As defined in Section 26.2 as where there is more than a minimal risk of the breach causing (directly or indirectly) significant harm to any Relevant Data Subject or the other Party. Special Category Data As described in the UK GDPR, together with criminal conviction or criminal offence data. Start Date As set out in Table 1: Parties and signature. Sub-Processor A Processor appointed by another Processor to Process Personal Data on its behalf. This includes Sub-Processors of any level, for example a Sub-Sub-Processor. Tables The Tables set out in Part one of this IDTA. Term As set out in Table 2: Transfer Details. Third Party Controller The Controller of the Transferred Data where the Exporter is a Processor or Sub-Processor If there is not a Third Party Controller this can be disregarded. Transfer Risk Assessment or TRA A risk assessment in so far as it is required by UK Data Protection Laws to demonstrate that the IDTA provides the Appropriate Safeguards Transferred Data Any Personal Data which the Parties transfer, or intend to transfer under this IDTA, as described in Table 2: Transfer Details UK Data Protection Laws All laws relating to data protection, the processing of personal data, privacy and/or electronic communications in force from time to time in the UK, including the UK GDPR and the Data Protection Act 2018. UK GDPR As defined in Section 3 of the Data Protection Act 2018. Without Undue Delay Without undue delay, as that phase is interpreted in the UK GDPR. ALTERNATIVE PART 4 MANDATORY CLAUSES: Mandatory Clauses Part 4: Mandatory Clauses of the Approved IDTA, being the template IDTA A.1.0 issued by the ICO and laid before Parliament in accordance with s119A of the Data Protection Act 2018 on 2 February 2022, as it is revised under Section 5.4 of those Mandatory Clauses. -------------------------------------------------------------------------------- HIPAA BAA SECURITI, INC. HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ("BAA") is entered into and effective on this day of ______________ 20__ ("Effective Date") by and between ________________("Covered Entity") and SECURITI, INC. ("Business Associate") (each a "Party" and collectively, the "Parties"). -------------------------------------------------------------------------------- RECITALS A. Covered Entity is a "Covered Entity" as that term is defined under the Health Insurance Portability and Accountability Act of 1996 (Public Law 104-91), as amended, ("HIPAA"), and the regulations promulgated thereunder by the Secretary of the U.S. Department of Health and Human Services ("Secretary"), including, without limitation, the regulations codified at 45 C.F.R. Parts 160 and 164 ("HIPAA Regulations"); B. Business Associate performs Services for or on behalf of Covered Entity, and in performing said Services, Business Associate creates, receives, maintains, or transmits Protected Health Information ("PHI"); C. The Parties intend to protect the privacy and provide for the security of PHI Disclosed by Covered Entity to Business Associate, or received or created by Business Associate, when providing Services in compliance with HIPAA, the Health Information Technology for Economic and Clinical Health Act (Public Law 111-005) ("the HITECH Act") and its implementing regulations and guidance issued by the Secretary, and other applicable state and federal laws, all as amended from time to time; D. As a Covered Entity, Covered Entity is required under HIPAA to enter into a BAA with Business Associate that meets certain requirements with respect to the Use and Disclosure of PHI, which are met by this BAA. AGREEMENT In consideration of the Recitals and for other good and valuable consideration, the receipt and adequacy of which is hereby acknowledged, the Parties agree as follows: -------------------------------------------------------------------------------- ARTICLE I DEFINITIONS The following terms shall have the meaning set forth below. Capitalized terms used in this BAA and not otherwise defined shall have the meanings ascribed to them in HIPAA, the HIPAA Regulations, or the HITECH Act, as applicable. * (I.1) "Breach" shall have the meaning given under 42 U.S.C. § 17921(1) and 45 C.F.R. § 164.402. * (I.2) "Designated Record Set" shall have the meaning given such term under 45 C.F.R. § 164.501. * (I.3) "Disclose" and "Disclosure" mean, with respect to PHI, the release, transfer, provision of access to, or divulging in any other manner of PHI outside of Business Associate or to other than members of its Workforce, as set forth in 45 C.F.R. § 160.103. * (I.4) "Electronic PHI" or "e-PHI" means PHI that is transmitted or maintained in electronic media, as set forth in 45 C.F.R. § 160.103. * (I.5) "Protected Health Information" and "PHI" mean any information, whether oral or recorded in any form or medium, that: (a) relates to the past, present or future physical or mental health or condition of an individual, the provision of health care to an individual, or the past, present or future payment for the provision of health care to an individual; (b) identifies the individual (or for which there is a reasonable basis for believing that the information can be used to identify the individual); and (c) shall have the meaning given to such term under the Privacy Rule, including, but not limited to, 45 C.F.R. § 160.103. Protected Health Information includes e-PHI. * (I.6) "Security Incident" shall have the meaning given to such term under 45 C.F.R. § 164.304. * (I.7) "Services" shall mean the services for or functions on behalf of Covered Entity performed by Business Associate pursuant to any service agreement(s) between Covered Entity and Business Associates which may be in effect now or from time to time ("Underlying Agreement"), or, if no such agreement is in effect, the services or functions performed by Business Associate that constitute a Business Associate relationship, as set forth in 45 C.F.R. § 160.103. * (I.8) "Unsecured PHI" shall have the meaning given to such term under 42 U.S.C. § 17932(h), 45 C.F.R. § 164.402, and guidance issued pursuant to the HITECH Act including, but not limited to the guidance issued on April 17, 2009 and published in 74 Federal Register 19006 (April 27, 2009) by the Secretary. * (I.9) "Use" or "Uses" mean, with respect to PHI, the sharing, employment, application, utilization, examination or analysis of such PHI within Business Associate’s internal operations, as set forth in 45 C.F.R. § 160.103. * (I.10) "Workforce" shall have the meaning given to such term under 45 C.F.R. § 160.103. -------------------------------------------------------------------------------- ARTICLE II OBLIGATIONS OF BUSINESS ASSOCIATE * (II.1) Permitted Uses and Disclosures of Protected Health Information Business Associate shall not Use or Disclose PHI other than for the purposes of performing the Services, as permitted or required by this BAA, or as Required by Law. Business Associate shall not Use or Disclose PHI in any manner that would constitute a violation of Subpart E of 45 C.F.R. Part 164 if so Used or Disclosed by Covered Entity. However, Business Associate may Use or Disclose PHI (i) for the proper management and administration of Business Associate; (ii) to carry out the legal responsibilities of Business Associate, provided that with respect to any such Disclosure either: (a) the Disclosure is Required by Law; or (b) Business Associate obtains a written agreement from the person to whom the PHI is to be Disclosed that such person will hold the PHI in confidence and will not Use and further Disclose such PHI except as Required by Law and for the purpose(s) for which it was Disclosed by Business Associate to such person, and that such person will notify Business Associate of any instances of which it is aware in which the confidentiality of the PHI has been breached; and (iii) for Data Aggregation purposes for the Health Care Operations of Covered Entity. To the extent that Business Associate carries out one or more of Covered Entity’s obligations under Subpart E of 45 C.F.R. Part 164, Business Associate must comply with the requirements of Subpart E that apply to the Covered Entity in the performance of such obligations. * (II.2) Prohibited Marketing and Sale of PHI Notwithstanding any other provision in this BAA, Business Associate shall comply with the following requirements: (i) Business Associate shall not Use or Disclose PHI for fundraising or marketing purposes, except to the extent expressly authorized or permitted by this BAA and consistent with the requirements of 42 U.S.C. § 17936, 45 C.F.R. §§ 164.514(f), and 164.508(a)(3)(ii), and (ii) Business Associate shall not directly or indirectly receive remuneration in exchange for PHI except with the prior written consent of Covered Entity and as permitted by the HITECH Act, 42 U.S.C. § 17935(d)(2), and 45 C.F.R. § 164.502(a)(5)(ii). * (II.3) Adequate Safeguards of PHI Business Associate shall implement and maintain appropriate safeguards to prevent Use or Disclosure of PHI other than as provided for by this BAA. Business Associate shall reasonably and appropriately protect the confidentiality, integrity, and availability of e-PHI that it creates, receives, maintains or transmits on behalf of Covered Entity in compliance with Subpart C of 45 C.F.R. Part 164 to prevent Use or Disclosure of PHI other than as provided for by this BAA. * (II.4) Mitigation Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate of a Use or Disclosure of PHI by Business Associate in violation of the requirements of this BAA. * (II.5) Reporting Non-Permitted Use or Disclosure * (II.5.1) Reporting Security Incidents and Non-Permitted Use or Disclosure Business Associate shall report to Covered Entity in writing each Security Incident or Use or Disclosure that is made by Business Associate, members of its Workforce or Subcontractors that is not permitted by this BAA no later than five (5) business days after becoming aware of such Security Incident or non-permitted Use or Disclosure, in accordance with the notice provisions set forth herein. Business Associate shall investigate each Security Incident or non-permitted Use or Disclosure of Covered Entity’s PHI that it discovers to determine whether such Security Incident or non-permitted Use or Disclosure constitutes a reportable Breach of Unsecured PHI. Business Associate shall document and retain records of its investigation of any Breach, including its reports to Covered Entity under this Section 2.5.1. Upon request of Covered Entity, Business Associate shall furnish to Covered Entity the documentation of its investigation and an assessment of whether such Security Incident or non-permitted Use or Disclosure constitutes a reportable Breach. If such Security Incident or non-permitted Use or Disclosure constitutes a reportable Breach of Unsecured PHI, then Business Associate shall comply with the additional requirements of Section 2.5.2 below. * (II.5.2) Breach of Unsecured PHI If Business Associate determines that a reportable Breach of Unsecured PHI has occurred, Business Associate shall provide a written report to Covered Entity without unreasonable delay but no later than thirty (30) calendar days after discovery of the Breach. To the extent that information is available to Business Associate, Business Associate’s written report to Covered Entity shall be in accordance with 45 C.F.R. §164.410(c). Business Associate shall cooperate with Covered Entity in meeting Covered Entity’s obligations under the HITECH Act with respect to such Breach. Covered Entity shall have sole control over the timing and method of providing notification of such Breach to the affected individual(s), the Secretary and, if applicable, the media, as required by the HITECH Act. * (II.6) Availability of Internal Practices, Books, and Records to Government Business Associate agrees to make its internal practices, books and records relating to the Use and Disclosure of PHI received from, or created or received by the Business Associate on behalf of Covered Entity available to the Secretary for purposes of determining Covered Entity’s compliance with HIPAA, the HIPAA Regulations, and the HITECH Act. Except to the extent prohibited by law, Business Associate shall notify Covered Entity of all requests served upon Business Associate for information or documentation by or on behalf of the Secretary. * (II.7) Access to and Amendment of Protected Health Information To the extent that Business Associate maintains a Designated Record Set on behalf of Covered Entity and within fifteen (15) days of a request by Covered Entity, Business Associate shall (a) make the PHI it maintains (or which is maintained by its Subcontractors) in Designated Record Sets available to Covered Entity for inspection and copying, or to an individual to enable Covered Entity to fulfill its obligations under 45 C.F.R. § 164.524, or (b) amend the PHI it maintains (or which is maintained by its Subcontractors) in Designated Record Sets to enable the Covered Entity to fulfill its obligations under 45 C.F.R. § 164.526. Business Associate shall not Disclose PHI to a health plan for payment or Health Care Operations purposes if and to the extent that Covered Entity has informed Business Associate that the patient has requested this special restriction, and has paid out of pocket in full for the health care item or service to which the PHI solely relates, consistent with 42 U.S.C. § 17935(a) and 42 C.F.R. § 164.522(a)(1)(vi). If Business Associate maintains PHI in a Designated Record Set electronically, Business Associate shall provide such information in the electronic form and format requested by the Covered Entity if it is readily reproducible in such form and format, and, if not, in such other form and format agreed to by Covered Entity to enable Covered Entity to fulfill its obligations under 42 U.S.C. § 17935(e) and 45 C.F.R. § 164.524(c)(2). Business Associate shall notify Covered Entity within fifteen (15) days of receipt of a request for access to PHI. * (II.8) Accounting To the extent that Business Associate maintains a Designated Record Set on behalf of Covered Entity, within thirty (30) days of receipt of a request from Covered Entity or an individual for an accounting of disclosures of PHI, Business Associate and its Subcontractors shall make available to Covered Entity the information required to provide an accounting of disclosures to enable Covered Entity to fulfill its obligations under 45 C.F.R. § 164.528 and its obligations under 42 U.S.C. § 17935(c). Business Associate shall notify Covered Entity within fifteen (15) days of receipt of a request by an individual or other requesting party for an accounting of disclosures of PHI. * (II.9) Use of Subcontractors Business Associate shall require each of its Subcontractors that creates, maintains, receives, or transmits PHI on behalf of Business Associate, to execute a Business Associate Agreement that imposes on such Subcontractors the same restrictions, conditions, and requirements that apply to Business Associate under this BAA with respect to PHI. * (II.10) Minimum Necessary Business Associate (and its Subcontractors) shall, to the extent practicable, limits its request, Use, or Disclosure of PHI to the minimum amount of PHI necessary to accomplish the purpose of the request, Use or Disclosure, in accordance with 42 U.S.C. § 17935(b) and 45 C.F.R. § 164.502(b)(1) or any other guidance issued thereunder. -------------------------------------------------------------------------------- ARTICLE III TERM AND TERMINATION * (III.1) Term The term of this Agreement shall be effective as of the Effective Date and shall terminate upon (1) the date that Covered Entity terminated for cause as authorized in Section 3.2, or (2) termination or expiration of the Underlying Agreement, whichever is sooner. * (III.2) Termination for Cause Upon Covered Entity’s knowledge of a material breach or violation of this BAA by Business Associate, Covered Entity shall either: a. Notify Business Associate of the breach in writing, and provide an opportunity for Business Associate to cure the breach or end the violation within ten (10) business days of such notification; provided that if Business Associate fails to cure the breach or end the violation within such time period to the satisfaction of Covered Entity, Covered Entity may immediately terminate this BAA upon written notice to Business Associate; or b. Upon written notice to the Business Associate, immediately terminate this BAA if Covered Entity determines that such breach cannot be cured. * (III.3) Disposition of Protected Health Information Upon Termination or Expiration * (III.3.1) Upon termination or expiration of this BAA, Business Associate shall either return or destroy all PHI received from, or created or received by Business Associate on behalf of Covered Entity, that Business Associate still maintains in any form and retain no copies of such PHI. If Covered Entity requests that Business Associate return PHI, PHI shall be returned in a mutually agreed upon format and timeframe, at no additional charge to Covered Entity * (III.3.2) If return or destruction is not feasible, Business Associate shall (a) retain only that PHI which is necessary for Business Associate to continue its proper management and administration or to carry out its legal responsibilities; (b) return to Covered Entity the remaining PHI that Business Associate still maintains in any form; (c) continue to extend the protections of this BAA to the PHI for as long as Business Associate retains the PHI; (d) limit further Uses and Disclosures of such PHI to those purposes that make the return or destruction of the PHI infeasible and subject to the same conditions set out in Section 2.1 and 2.2 above, which applied prior to termination; and (e) return to Covered Entity the PHI retained by Business Associate when it is no longer needed by Business Associate for its proper management and administration or to carry out its legal responsibilities. -------------------------------------------------------------------------------- ARTICLE IV MISCELLANEOUS * (IV.1) Interpretation The Parties intend that this BAA be interpreted consistently with their intent to comply with HIPAA and other applicable federal and state law. This BAA is issued under, is subject to and incorporates the terms of an applicable Underlying Agreement. Except where this BAA conflicts with an Underlying Agreement, all other terms and conditions of the Underlying Agreement remain unchanged and in effect apply to this BAA. * (IV.2) Amendment to Comply with Law This BAA shall be deemed amended to incorporate any mandatory obligations of Covered Entity or Business Associate under the HITECH Act and its implementing HIPAA Regulations. Additionally, the Parties agree to take such action as is necessary to amend this BAA from time to time as necessary for Covered Entity to implement its obligations pursuant to HIPAA, the HIPAA Regulations, or the HITECH Act. * (IV.3) Notices Any notices required or permitted to be given hereunder by either Party to the other shall be given in writing: (1) by personal delivery; (2) by electronic mail or facsimile with confirmation sent by United States first class registered or certified mail, postage prepaid, return receipt requested; (3) by bonded courier or by a nationally recognized overnight delivery service; or (4) by United States first class registered or certified mail, postage prepaid, return receipt, in each case, addressed to a Party on the signature page(s) to this Agreement or to such other addresses as the Parties may request in writing by notice given pursuant to this Section 4.3. Notices shall be deemed received on the earliest of personal delivery; upon delivery by electronic mail or facsimile with confirmation via electronic mail or from the transmitting machine that the transmission was completed; twenty-four (24) hours following deposit with a bonded courier or overnight delivery service; or seventy-two (72) hours following deposit in the U.S. mail as required herein. * (IV.4) Relationship of Parties Business Associate is an independent contractor and not an agent of Covered Entity under this BAA. Business Associate has the sole right and obligation to supervise, manage, contract, direct, procure, perform or cause to be performed all Business Associate obligations under this BAA. * (IV.5) Survival The respective rights and obligations of the Parties under Sections 3.3 and 4.2 of this BAA shall survive the termination of this BAA. * (IV.6) Applicable Law and Venue This Agreement shall be governed by and construed in accordance with the laws of the State of California (without regards to conflict of laws principles). The Parties agree that all actions or proceedings arising in connection with this BAA shall be tried and litigated exclusively in the state or federal (if permitted by law and if a Party elects to file an action in federal court) courts located in Santa Clara County, California. -------------------------------------------------------------------------------- The Parties hereto have duly executed this as of the Effective Date. FOR BUSINESS ASSOCIATE: SECURITI, INC. By: Print Name: Title: Dated: Notice Address: P.O. Box 13039, Coyote, CA 95013 attn: ___________________________ fax: ____________________________ email: __________________________ FOR COVERED ENTITY: Organization Name: By: Print Name: Title: Dated: Notice Address: ________________________________ ________________________________ ________________________________ attn: ___________________________ fax: ____________________________ email: __________________________ PLATFORM PRODUCTS SPECIFIC TERM PLATFORM PRODUCTS SPECIFIC TERMS "API" is the application-programming interface used by you to access functionality provided by SECURITI "Monthly Active User" or "MAU" is a Platform Application User that uses the Service via an API call (made by or on behalf of the Platform Application User account) at least once in a monthly calendar period. "Monthly Platform API Calls" is any API call made by a Platform Application to the Service within a monthly calendar period on behalf of: (a) a Platform Application User; (b) a User; or (c) a Platform Service Account (connectors), not to exceed your allotted amount. Except as otherwise set forth in an order, excluded from Monthly Platform API Calls are API calls made on behalf of: (i) third party software application integrations that are permitted with your use of the Service; (ii) SECURITI provided application (e.g. PRIVACI virtual appliance); (iii) SECURITI provided services (e.g. consent javascript). "Monthly Platform Bandwidth" is the Platform Bandwidth consumed on a monthly calendar basis by or on behalf of: (a) a Platform Application User; or (b) a Platform Service Account (e.g. Connectors), not to exceed your allotted amount. Unless specified in an order, excluded from Monthly Platform Bandwidth is Platform Bandwidth consumed by: (i) SECURITI provided applications (e.g., the PRIVACI web app) and (ii) SECURITI provided software application (e.g. PRIVACI virtual appliance), if applicable. "PlatformApplication" is an application used by or on behalf of you that uses the API for the purposes of access to the Service. "Platform Application User" is a user with a unique identifier that is created and provisioned by the enterprise administrator and such user’s access to Content in the Service is governed through the Platform Application. "Platform Bandwidth" is the flow of data to or from the Service as a result of the Platform Application, measured in gigabytes (GB), not to exceed your allotted amount. "Platform Service Account" is a securiti.ai API based ‘Connector’ service that is created and provisioned by an application administrator to scan and detect personal data within your data stores and execute data subject rights requests where possible. "Platform Storage" is the total amount of Content, measured in gigabytes (unless otherwise specified), stored by or on behalf of all Platform Application Users, Platform Service Accounts and any other users of Platform Products, not to exceed your allotted amount. "Platform UseLimit(s)" is the amount as specified and allocated to you for: (i) Monthly Platform Bandwidth, Monthly Platform API Calls, Platform Storage and number of Monthly Active Users; and (ii) any other applicable usage limits or restrictions. "System Admin(s)" Users with system admin (also known as ‘admin’) access profile are one or more key stakeholders or IT managers who needs full control over the Securiti account and its administration. This role has special access to all system features, functions, and data because administrators can override access profile rules and pass all access profile checks. The responsibilities for the primary admin include: * Configuring the Privaci account and adjusting account settings as needs change; * Creating other users with system admin access profiles (co-admins); * Creating a DPO user and assigning DPO access profile to that user; * Creating users and assigning access profiles to allow access to various Privaci modules; * Configure, deploy, register, monitor and maintain Privaci virtual appliances; * Configure, deploy, monitor and maintain Privaci connectors to scan and perform data subject rights requests against data stores; * Accessing, configuring and managing the Privaci modules if this is a shared role; * Running Reports as part of regular check-ins; * Monitoring user access and actions for auditing purposes; * Having the time and proper security clearance for managing the general user base. "Data Source Instance" is a unique, data repository that can be scanned to detect personal data and/or automated to execute data rights requests. A single data source instance could be a unique SaaS service instance identified by its instance Id or domain name, a single application database, a unique file share, a unique storage bucket, an LDAP/AD Organizational Unit etc. which can be connected to the PRIVACI environment through a supported PRIVACI Monitored or User Defined Connector. You receive the features and functionality that are provided in the specific Platform Product(s) that you have registered or purchased. You will ensure that your usage of the Platform Products is at all times in conformance with the Platform Use Limits, these Terms and applicable law. If you exceed the Platform Use Limits, additional fees will be due and/or reasonable restrictions may be placed on your account until any such excess usage is adequately eliminated by you. You may not co-brand any Platform Products or use any securiti.ai OR Securiti trademarks, logos, or other SECURITI marks to promote and market the Platform Products without SECURITI’s prior written consent. You will not permit use of the Platform Application: * to violate these Terms; * to perform hidden activities (such as downloading components or other software) * impersonate, or misrepresent an affiliation with, any person or entity; * mine or analyze any Content transmitted to, retrieved from or stored in the Platform Products/the Service (including, but not limited to, through spiders, robots, crawlers, data mining tools, scrapers, or other automated means, or services employing any such means); * circumvent any security measures * use or affect the Platform Products in any manner that could damage, disable, overburden or impair the Platform Products (including, but not limited to, flooding the Platform Products with an excessive amount of data or content); * permit use in connection with any purposes or intended application which involves risks or dangers that could lead to death, serious bodily injury, severe physical or property damage, or use for purposes that otherwise require significant safety precautions. PRIVACY POLICY Updated November 2022 At Securiti, Inc. (“Securiti” or “We”), the protection of your personal data is of particular importance to us. We protect your personal data in accordance with applicable data protection laws as well as this Privacy Policy. We have prepared this Privacy Policy to inform you of the manner in which we collect, use, disclose, and otherwise process the information we may collect about you from (a) your use of our Website, located at https://securiti.ai/ and/or our products and services, (b) your interactions with us online and at in-person events, or (c) any other circumstances in which we provide you with a copy of this Privacy Policy. DEFINITIONS Under this Privacy Policy: * Personal data means any information relating to an identified or identifiable natural person (data subject); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person. * Processing means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction. * Controller means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data. * Processor means a natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller. * Recipient means a natural or legal person, public authority, agency or another body, to which the personal data are disclosed, including both processors and controllers. * Legal basis means a lawful ground for data processing under the GDPR or similar laws. PERSONAL DATA WE COLLECT We may collect your personal data when you: * Contact us; * Visit or register with our Website; * Use our products, including by browsing the product or receiving a product demo; * Apply for employment or other positions * Subscribe or request to attend our webinars, events or workshops * Interact with us on our social media profiles (e.g., Facebook); * Provide your personal data to our third party sources, including our service providers; or * Interact with us or our personnel at in-person events. Personal Data You Provide to Us Directly We may collect information provided by you directly, including from our Website; from your contacts with us, including through our webpage and on social media; by your creation of a user account; and from your use or trial of our products and services. This information may include your first and last name, email address, username, password, job title, phone number, country of residence, company name, payment information, profile picture and any other information provided by you. We may also collect information provided by you in the course of evaluating or engaging you for employment or other positions. This information may include your first and last name, email address, CV, resume, cover letter and any other information provided by you. Personal Data We Collect through Automated Data Collection Technologies We may collect information using Automated Data Collection Technologies from your use of our Website and products. This information may include your IP Address, Log Files, Referrer URL, Browser Information, Device Information, and Data and Time of user request, cookies, information reflecting how you searched, browsed, and were directed to the Website, including mouse movement, click, touch, scroll, and keystroke activity, and any other information provided by your use of our Website and products, as further explained in the “Use of Cookies and Other Web Technologies” section below. Personal Data We Obtain from Third Parties We may collect information from third party sources such as lead generation companies, data sellers, advertising partners, and Service Providers. This information may include your first and last name, email address, phone number, company name, job title, and country, and other information. Personal Data we Process on Behalf of our Customers We may also receive and process personal data on behalf of our customers in connection with their use of our products and services. For example, we may access personal data when we troubleshoot our products and services that are already in use by our customers. When this happens, our customer acts as the controller and their privacy policy applies to the personal data, not ours. As processor, we process this personal data pursuant to our contract with our customer. HOW WE USE YOUR PERSONAL DATA We may use your personal data: * For your creation of a user account or profile to use our products and services; * To provide, maintain, and improve our Website, products and services, including for collaboration within the product, to enhance your user experience, and to understand and save your preferences for future visits; * To monitor our products’ performance and implement security measures; * For the performance or preparation of a contract to which you, our customer or service provider are a party; * To communicate with our customers or clients; * To establish and maintain our business relationship with you; * To plan and host events, workshops, and webinars, including to manage our list of attendees; * To send you marketing and other information about our products, services or offerings, including through our publications and on other websites and/or media channels; * To advertise to you on other sites; * To receive, process, and respond to your feedback, requests or queries through our products, Website, or social media; * For compliance with our legal obligations and other internal legal compliance purposes; * To evaluate your employment application and assess you as a candidate; and, * For other purposes consistent with the context of the collection of your personal data, or as otherwise disclosed to you prior to the use of your personal data. DATA SHARING Personal data may be disclosed to third parties in the following circumstances. Processors, Service Providers and other companies that work with or on behalf of Securiti Personal data may be disclosed to processors or service providers who act on our behalf in order to process personal data in accordance with the purposes outlined above. This includes the following categories of service providers: * IT service providers; * Email marketing providers; * Administrative, billing, operations, and payment operators. * Cloud and other software service providers. Data access by processors or service providers is protected under our contracts with these entities, which limit the processing purposes. The agreement obliges the service providers to process your personal data only on our behalf and upon our instruction. They are prohibited to pass on your personal data to other parties without permission, unless this is required by law. We may also share data with entities that are controllers, such as advertising partners, data sellers, and similar companies, in accordance with the “Use of Cookies and Other Web Technologies” Section below and other sections of this Privacy Policy. Sale of Business If, in the future, we sell or transfer, or we consider selling or transferring, some or all of our business, shares or assets to a third party, we will disclose your personal data to such third party (whether actual or potential) in connection with the foregoing events. In the event that we are acquired by, or merged with, a third party entity, or in the event of bankruptcy or a comparable event, we reserve the right to transfer, disclose or assign your personal data in connection with the foregoing events. Legal Purposes We may share your personal data with regulators, courts or competent authorities, to comply with applicable laws, regulations and rules (including, without limitation, federal, state or local laws), and requests of law enforcement, regulatory and other governmental agencies or if we have a good faith belief that the law requires it, such as in response to a search warrant, subpoena, or other legally valid inquiry, order, or process. We may also disclose information to assist us in collecting a debt, or as necessary to exercise our legal rights or defend claims brought against us. With Your Consent We may share your personal data where you have provided your consent to us sharing or transferring your personal data (e.g., where you provide us with marketing consents or opt-in to optional additional services or functionality). YOUR RIGHTS Depending on the circumstances, you may be entitled to exercise some or all of the following rights: 1. Obtain confirmation as to whether or not your personal data is being processed and access to copy of your personal data undergoing processing. 2. Require (i) access to and/or duplicates of your personal data retained, (ii) receive the personal data concerning you, which you have provided to us, in a structured, commonly used and machine-readable format and (iii) to transmit those personal data to another controller without hindrance from our side; where technically feasible you shall have the right to have the personal data transmitted directly from us to another controller; 3. request rectification, removal or restriction of your personal data; 4. Where the data processing is based on your consent, refuse to provide and – without impact to data processing activities that have taken place before such withdrawal – withdraw your consent to processing of your personal data at any time; 5. take legal actions in relation to any potential breach of your rights regarding the processing of your personal data, as well as to lodge complaints before the competent data protection regulators; 6. not to be subject to any automated decision making, including profiling (automatic decisions based on data processing by automatic means, for the purpose of assessing several personal aspects) which produce legal effects on you or affect you with similar significance. Further, you may be entitled to object, out of grounds relating to your particular situation, at any time to processing of personal data concerning you, including object to direct marketing and automated individual decision-making including profiling. In this case, please provide us with information about your particular situation. After the assessment of the facts presented by you we will either stop processing your personal data or present you our compelling legitimate grounds for an ongoing processing. You can exercise your rights by submitting a request here. Subject to legal and other permissible considerations, we will make every reasonable effort to honor your request promptly in accordance with applicable law or inform you if we require further information in order to fulfill your request. When processing your request, we may ask you for additional information to confirm or verify your identity and for security purposes, before processing and/or honoring your request. We reserve the right to charge a fee where permitted by law, for instance if your request is manifestly unfounded or excessive. In the event that your request would adversely affect the rights and freedoms of others (for example, would impact the duty of confidentiality we owe to others) or if we are legally entitled to deal with your request in a different way than initial requested, we will address your request to the maximum extent possible, all in accordance with applicable law. Please see the “California Residents” Section below for information on rights under California law. LEGAL BASIS Where applicable under the GDPR or similar laws, the legal basis for our collection and use of your personal data may include any of the following: * Performance of a contract. We process your personal data as necessary to perform our obligations under any contract with you, such as to provide our Website or services to you or complete transactions. * Consent. We may ask for your consent to use your personal data, including if we need your consent to engage in certain marketing activities. If we obtain your consent as a legal basis for processing, you may withdraw your consent at any time. * Legitimate interests. We have a legitimate interest in using your personal data for our business purposes, including operating, improving, and marketing our business, Website and services. * Compliance with a legal obligation. We may need to use your personal data to comply with applicable legal requirements. DATA STORAGE AND TRANSFERS Where applicable under the GDPR or similar laws, we have implemented appropriate cross-border transfer mechanisms when transferring your personal data to a country outside of your home jurisdiction, including, where relevant, the EU Standard Contractual Clauses. INTERACTION WITH THIRD PARTIES We may link to or otherwise enable you to interact with a third party Website, mobile software applications and products or services that are not owned or controlled by us (each a “Third Party Service”). We are not responsible for the privacy practices or the content of such Third Party Services. Please be aware that Third Party Services can collect personal data from you. Accordingly, we encourage you to read the terms and conditions and privacy policies of each Third Party Service. DATA RETENTION We retain your personal data as long as reasonably necessary for the respective purpose. In determining the criteria by which to retain or dispose of your personal data, we consider the type, sensitivity, context, and purpose of collecting the information. Securiti may additionally delete your personal data in response to a valid data subject request, as described below. SECURITY OF YOUR INFORMATION We maintain administrative, technical, and physical safeguards designed to protect against unauthorized access, use, modification, and disclosure of your personal data in our custody and control. No data, on the Internet or otherwise, can be guaranteed to be 100% secure. While we strive to protect your information from unauthorized access, use, or disclosure, Securiti cannot and does not ensure or warrant the security of your personal data. CHILDREN’S PRIVACY Securiti does not knowingly collect or process personal data from children under the age of 13. The Website is not directed at children under the age of 13. In the event that we learn that we have collected personal data of a child under the age of 13 without parental consent, we will promptly take steps to delete that information. If you believe that we may have collected personal data from a child under 13, please contact us using the contact details outlined in this policy. NO PROCESSING FOR AUTOMATED INDIVIDUAL DECISION-MAKING INCLUDING PROFILING We do not knowingly collect or process personal data for automated individual decision-making including profiling. COOKIE POLICY USE OF COOKIES AND OTHER WEB TECHNOLOGIES If your browser is configured to accept cookies, we may collect non-personally identifiable information passively using “cookies” and “page tags”. It is Securiti's policy to respect your privacy regarding any information we may collect while operating our Website. Please read this policy carefully to understand how we handle and treat your personal data. COOKIES “Cookies” are small text files that can be placed on your computer or mobile device in order to identify your Web browser and the activities of your computer on the Securiti Service and other Website. We use cookies to personalize your experience on the Securiti Website (such as dynamically generating content on webpages specifically designed for you), to assist you in using the Securiti Service (such as saving time by not having to reenter your name each time you use the Securiti Service), to allow us to statistically monitor how you are using the Securiti Service so that we can improve our offerings, and to target certain advertisements to your browser which may be of interest to you or to determine the popularity of certain content. By using cookies and page tags together, we are able to improve the Securiti Service and measure the effectiveness of our advertising and marketing campaigns. PAGE TAGS “Page tags,” also known as web beacons or gif tags, are a web technology used to help track Website or email usage information, such as how many times a specific page or email has been viewed. Page tags are invisible to you, and any portion of the Securiti Service, including advertisements, or email sent on our behalf, may contain page tags. DO I HAVE TO ACCEPT THEM? You do not have to accept cookies to use the Securiti Website or services. If you reject cookies, certain features or resources of the Securiti Website may not work properly or at all and you may have a degraded experience. Although most browsers are initially set to accept cookies, you can change your browser settings to notify you when you receive a cookie or to reject cookies generally. To learn more about how to control privacy settings and cookie management, click the link for your browser below. * Microsoft Internet Explorer * Mozilla Firefox * Google Chrome * Apple Safari To learn more about cookies; how to control, disable or delete them, please visit http://www.aboutcookies.org. Some third party advertising networks, like Google, allow you to opt out of or customize preferences associated with your internet browsing. For more information on how Google lets you customize these preferences, see their documentation. All cookies, on our Website and everywhere else on the web, fall into one of five categories: * Essential; * Advertising; * Analytics & Customization; * Performance & Functionality; and * Social Networking. You are able to see the specific cookies we use and exercise choices about the types of cookies and other technologies you want to accept by selecting the “Manage Cookie Preferences” section of our website (https://securiti.ai/#). LOG FILES We collect non-personal data through our Internet log files, which record data such as browser types, domain names, and other anonymous statistical data involving the use of the Securiti services. This information may be used to analyze trends, to administer the Securiti services, to monitor the use of the Securiti services, and to gather general demographic information. We may link this information to personal data for these and other purposes such as personalizing your experience on the Securiti services and evaluating the Securiti services in general. DO NOT TRACK (DNT) SETTINGS We do not currently respond or take any action with respect to web browser “do not track” signals or other mechanisms that provide consumers the ability to exercise choice regarding the collection of personally identifiable information about an individual consumer’s online activities over time and across third-party web sites or online services. We may allow third parties, such as companies that provide us with analytics tools, to collect personally identifiable information about an individual consumer’s online activities over time and across different websites when a consumer uses the Services. CALIFORNIA RESIDENTS If you are a California resident, your personal data may be covered by the California Consumer Privacy Act (CCPA). The below disclosures apply to the extent the CCPA applies to your personal data, subject to any applicable exemptions. “PERSONAL INFORMATION” WE COLLECT The categories of “personal information,” as defined in the CCPA, that we collect include: * Identifiers; * Personal information categories listed in the California Customer Records statute (Cal. Civ. Code § 1798.80(e)) * Commercial Information; * Internet or other electronic network activity information; * Audio, electronic, and visual information; * Professional or employment-related information; and * Inferences drawn from other personal information. Securiti may obtain, use, and share these data categories as detailed in the “Personal Data We Collect,” “How We Use Your Personal Data,” and “Data Sharing” sections of this Privacy Policy, above. DATA SUBJECT RIGHTS You may be entitled to exercise some or all of the following rights under the CCPA: (i) Right to Know About Personal Data Collected, Disclosed, or Sold You may have the right to request that we provide certain information to you about our collection and use of your personal data over the past twelve (12) months. Specifically, you may have the right to request disclosure of: * The specific pieces of personal data we collected about you; * The categories of personal data we collected about you; * The categories of sources from which personal data was collected; * Our business or commercial purpose for collecting or disclosing personal data; and * The categories of third parties with whom we shared personal data. (ii) Right to Request Deletion of Personal Data You may also have the right to request that we delete any of your personal Data that we collected or maintain about you, subject to certain exceptions. (iii) Right to Correct Inaccurate Personal Data You may also have the right to request that we correct inaccurate personal data we maintain. (iv) Right to Non-Discrimination for the Exercise of a Consumer’s Privacy Rights We will not unlawfully discriminate against you for exercising any of your applicable privacy rights. (v) Right to Opt Out of the Sale or Sharing of your Personal Data Securiti uses third party cookies and similar technologies to deliver targeted advertisements, also known as data “sharing” and/or “selling” under the CCPA, as further detailed in the “Cookie Policy” section above. You can opt out of these practices by turning off advertising cookies in the “Manage Cookie Preferences” section of our website (https://securiti.ai/#). EXERCISE YOUR RIGHTS You can exercise your rights by submitting a request here or modifying your cookie preferences here. RESPONSE TIMING AND FORMAT We will make our best effort to respond to a verifiable consumer request within 45 days of its receipt. If we require more time (up to 90 days), we will inform you of the reason and extension period in writing. Within ten (10) days of receiving the request, we will confirm receipt and provide information about its verification and processing of the request. Securiti will maintain records of consumer requests made pursuant to the CCPA as well as our response to said requests for a period of at least twenty-four (24) months. YOUR RIGHTS UNDER OTHER CALIFORNIA STATUTES In addition to your rights under the CCPA, California Civil Code Section 1798.83 permits California residents to request information regarding our disclosure, if any, of their personal data to third parties for their direct marketing purposes. If this applies, you may obtain the categories of personal data shared and the names and addresses of all third parties that received personal data for their direct marketing purposes during the immediately prior calendar year. If you are a California resident under the age of 18 and a registered user, California Business and Professions Code Section 22581 permits you to remove content or personal data you have publicly posted. If you wish to remove such content or personal data please submit a request here and if you specify which content or personal data you wish to be removed, we will do so in accordance with applicable law. Please be aware that after removal you may not be able to restore removed content. In addition, such removal does not ensure complete or comprehensive removal of the content or personal data you have posted and that there may be circumstances in which the law does not require us to enable removal of content. You may submit this request using the information in the “Contact Us” section below. UPDATES TO THIS POLICY We may update this Privacy Policy from time to time. If we modify our Privacy Policy, we will post the revised version here, with an updated revision date. You may visit these pages periodically to be aware of and review any such revisions. If we make material changes to our Privacy Policy, we may also notify you by other means prior to the changes taking effect, such as by posting a notice on our Website or sending you a direct notification. CONTACT US Please feel free to contact us at any time if you have any questions or comments about this Privacy Policy. Contact our Data Protection Officer at: dpo@securiti.ai Contact the Controller for the processing of this Website at: Securiti 300 Santana Row Suite 450. San Jose, CA 95128 privacy@securiti.ai AFFILIATE PROGRAM POLICIES All PrivacyCenter.cloud Affiliates are required to remain in compliance with these terms. This list contains everything you need to know to be a PrivacyCenter.cloud affiliate, including resources, recommendations, and legal conditions. Capitalized terms not otherwise defined, shall have the definitions set forth in the PrivacyCenter.cloud Marketing Affiliate Program Agreement If you're not yet part of the PrivacyCenter.cloud Marketing Affiliate Program, you can apply here. If you ever need anything else or have questions, feel free to reach out to the team at affiliate@securiti.ai Last Modified: July 26, 2023 COMMISSION 1. Commission rate: Available commissions are set forth in the Affiliate Tool. Commissions are only based on purchases and not sign-ups. The Commissions may be calculated based on monthly or annual purchases at the rates set forth in the Affiliate Tool. 2. Minimum Threshold: All Commissions are subject to the minimum threshold amount set forth in the Affiliate Tool. Commissions will be disbursed to affiliates once the minimum threshold has been achieved. 3. Limitations: 1. For Commissions, you will receive a commission for the first purchase made by a new Customer who is not in an active sales process with us at the time of the Affiliate Link click. 2. The Customer needs to be an active Customer for the locking period in the Affiliate Tool. 3. Affiliate links may rely on cookies to track referrals. Therefore, if cookies get cleared, we may not be able to track these events. 4. Cookie windows are stated in the Affiliate Tool. 5. Only Affiliate Links can be used to track referrals. Incorrect use of Affiliate Links will cause inability to track referrals. 6. You cannot use Affiliate Links to refer customers you are servicing. You'll need to join the Securiti Partner Program and register them as a lead. You also can't be a billing contact or user of the account referred. 7. Fraudulent or stolen attribution is a non-payable event. If we suspect fraud (for example, if we see that signups are all from the same city or IP address) we may require you to prove that the referrals are valid. There are a number of other limitations that may result in a Commission not being paid - we encourage you to read the Marketing Affiliate Program Agreement for more information on this. 4. Upgrades/downgrades: You will receive a Commission only if a Customer upgrades to a higher tiered product from our ‘free forever’ plan in the future. If a Customer downgrades any paid plan, you will receive any Commission associated with that downgrade. 5. Attribution: In the event a single Customer clicks two different Affiliate Links, the last affiliate gets the credit. We do, however, reserve the right to modify this in certain circumstances. PROMOTING PRIVACYCENTER.CLOUD 1. PrivacyCenter.cloud branding Do: Capitalize the “P” in “Privacy”. Capitalize the “C” in “Center”. No Space between the words “PrivacyCenter”. Must add “.” before the word “cloud”. Lowercase the letter “C” in “cloud”. This is important to maintaining consistent branding. You must follow our Trademark Usage Guidelines and our Content Usage Guidelines here. Do Not: Use false or misleading statements on the benefits of using PrivacyCenter.cloud (e.g. “Get super rich quickly with PrivacyCenter.cloud”). Do not modify or adjust the PrivacyCenter.cloud logo in any sort of marketing material you might create, including the creation of any visual badges or dual-logo lockups. Do Not: Use ‘PrivacyCenter.cloud’ and ‘Securiti’ interchangeably. Both are two distinct brands in terms of promotion. However, you can mention ‘PrivacyCenter.cloud by Securiti’ in your written text of the body paragraph. 2. What to call yourself As we have multiple ways to partner with Securiti and several ways to reference those relationships, here are some guidelines around what you can and cannot call yourself within the PrivacyCenter.cloud Marketing Affiliate Program. Do: Say you’re a “PrivacyCenter.cloud Marketing Affiliate” or “Marketing Affiliate”. Do Not: Refer to yourself as a Partner or that you’ve “partnered with Securiti” or “partnered with PrivacyCenter.cloud.” This includes press releases, references in videos, listings on your website, or in any other marketing material you may be using. 3. Buying ads You will not purchase ads that direct to your site(s) or through an Affiliate Link that could be considered as competing with Securiti’s and its intellectual properties own advertising, including, but not limited to, our branded keywords. If running ads, you need to direct the ad to your own website (and not to securiti.ai or any standalone landing page). Other Related Policies 1. Survey participation: We would encourage you to participate in any affiliate-specific surveys, industry surveys, marketing surveys, etc. as we request. 2. Sharing placements: When requested, you’ll share the places you’ve used your Affiliate Link. This includes, but is not limited to, links, screenshots, and email sends. 3. Purchasing PrivacyCenter.cloud yourself: One of the benefits of the Marketing Affiliate Program is we don’t require you to purchase PrivacyCenter.cloud Products. Though if you decide to purchase, we require that you do not use your own Affiliate Link. 4. Securiti’s Partner Program: If you’re also part of one of Securiti’s other commission programs, you will only receive commission for either that program or the affiliate program depending on whether you registered the lead or the customer went through your Affiliate Link. When working with customers, you are not allowed to use your Affiliate Link. You must join the Securiti Partner Program to refer customers. 5. FTC disclosure: You must be FTC compliant and disclose in a clear way before the Affiliate Link that you will receive a Commission if someone clicks through and purchases. AFFILIATE PROGRAM AGREEMENT Last Modified: July 26, 2023 PLEASE READ THIS MARKETING AFFILIATE PROGRAM AGREEMENT CAREFULLY. This is a contract between you (the “Affiliate”) and Securiti, Inc. (“Securiti”). It describes how we will work together and other aspects of our business relationship. It is a legal document so some of the language is necessarily “legalese” but we have tried to make it as readable as possible. The Marketing Affiliate Program Agreement applies to your participation in our PrivacyCenter.cloud Marketing Affiliate Program. These terms are so important that we cannot have you participate in our Marketing Affiliate Program unless you agree to them. We periodically update these terms. We might also choose to replace these terms in their entirety if, for example, the Marketing Affiliate Program changes, ends, or becomes part of an existing program, including our partner programs. If we update or replace the terms we or the Affiliate Tool will let you know via electronic means, which may include an in-app notification or by email. If you don’t agree to the update or replacement, you can choose to terminate as we describe below. Definitions “Marketing Affiliate Program” means our marketing affiliate program as described in this Agreement. “Affiliate Lead” means a customer prospect who clicks on the Affiliate Link that we have made available to you via the Affiliate Tool. “Affiliate Link” means the unique tracking link you place on your site or promote through other channels. “Affiliate Policies” means the policies applicable to affiliates which we may make available to you from time to time. “Affiliate Tool” means the tool that we make available to you upon your acceptance into the Marketing Affiliate Program and for you to use in order to participate in the Marketing Affiliate Program. "Agreement" means this Marketing Affiliate Program Agreement and all materials referred or linked to in here. “Commission” means an amount described in the Affiliate Tool (or if applicable, in the Program Policies) for each Customer Transaction. “Customer” means the authorized actual user of the PrivacyCenter.cloud Product who has purchased or signed up for the PrivacyCenter.cloud Product after being an Affiliate Lead. "Customer Data" means all information that Customer submits or collects via the PrivacyCenter.cloud Products and all materials that Customer provides or posts, uploads, inputs or submits for public display through the PrivacyCenter.cloud Products. “Customer Transactions” means those transactions by Affiliate Leads that are eligible for a Commission pursuant to the ‘Customer Transactions’ section of this Agreement. Customer Transactions may include customer purchases or customer signups, as further described in the Affiliate Tool. "PrivacyCenter.cloud Content" means all information, data, text, messages, software, sound, music, video, photographs, graphics, images, and tags that we incorporate into our services. “PrivacyCenter.cloud Products” means both the Subscription Service and Other Products. “Program Policies Page” means the landing page: https://securiti.ai/terms#affiliate-program-policy where we will provide all the up to date guidelines and policies for the Marketing Affiliate Program. “Other Products” means those products and services that we offer, which are not included in the PrivacyCenter.cloud Subscription Service (as detailed below). “Subscription Service” means our web-based data security, compliance and privacy software that is subscribed to, and developed, operated, and maintained by us, accessible via https://securiti.ai/privacy-center or another designated URL. For the purposes of this Agreement, the Subscription Service does not include our legacy products, any implementation, customization, training, consulting, additional support or other professional services, or fees for third-party products or services. "We", "us", “our”, and “PrivacyCenter.cloud” means Securiti. “You” and “Affiliate” means the party, other than Securiti, entering into this Agreement and participating in the PrivacyCenter.cloud Marketing Affiliate Program. Non-Exclusivity This Agreement does not create an exclusive agreement between you and us. You have the right to recommend similar products of third parties and to work with other parties. However, you must not disclose any confidential information to the third-party, its representatives, and partners. Affiliate Acceptance Once you complete an application to become an Affiliate, we will review your application and notify you whether you have been accepted to participate in the Marketing Affiliate Program, or not. Before we accept an application, we may want to review your application with you, so we may reach out to you for more information. We may require that you complete certain requirements or certification(s) before we accept your application. If we do not notify you that you are accepted to participate in the Marketing Affiliate Program within thirty (30) days from your application, your application is considered to be rejected. If you are accepted to participate in the Marketing Affiliate Program, then upon notification of acceptance, the terms and conditions of this Agreement shall apply in full force and effect, until terminated, pursuant to the terms set forth below. Further, you will need to complete any enrollment criteria set out in the Program Policies Page, if applicable. Failure to complete any enrollment criteria within thirty (30) days of your acceptance will result in the immediate termination of this Agreement and you will no longer be able to participate in the Marketing Affiliate Program. Your acceptance and participation in the Marketing Affiliate Program does not mean that you will be accepted into any of our Securiti Partner Programs. In order to participate in these programs, you will need to apply in accordance with the relevant application procedure. You will comply with the terms and conditions of this Agreement at all times, including any applicable Program Policies. Customer Transactions 1. Marketing Affiliate Program Limits. Each accepted Affiliate Lead will expire according to the information provided in the Affiliate Tool (or if applicable, in the Program Policies) from the date the Affiliate Lead clicked on the Affiliate Link that was made available by you. We will pay you a Commission as described in the Affiliate Tool (or if applicable, in the Program Policies) for each new Customer who completes an applicable Customer Transaction after clicking on an Affiliate Lead made available by you, provided that you remain eligible to receive Commission pursuant to the terms of this Agreement. The start of the Customer’s subscription is determined by the date of the first purchase or sign up (as applicable) of the Subscription Service by the Customer and you will receive a Commission payment for that Customer Transaction only, regardless of any additional purchases made by that customer during their Subscription Service. For example, if the initial Customer Transaction is for “one” user of PrivacyCenter.cloud Products, and there is a subsequent purchase by that same customer for an “additional” users of PrivacyCenter.cloud Products for the same subscription, Affiliate will receive Commission for the initial user purchase only. The Affiliate will not be entitled to receive a Commission on any additional purchases of PrivacyCenter.cloud Products by that same Customer. 2. Eligibility. To be eligible for a Commission (i) an Affiliate Lead must be accepted and valid in accordance with the ‘Acceptance and Validity’ section, (ii) a Customer Transaction must have occurred, and (iii) a Customer must remain a customer during the locking period in the Affiliate Tool (or if applicable, in the Program Policies). You are not eligible to receive a Commission or any other compensation from us based on transactions for Other Products or if: (i) such compensation is disallowed or limited by federal, state or local law or regulation in the United States or the laws or regulations of your jurisdiction; (ii) the applicable Customer objects to or prohibits such compensation or excludes such compensation from its payments to us; (iii) the Customer has paid or will pay such commissions, referral fees, or other compensation directly to you, (iv) the Commission payment has been obtained by fraudulent means, misuse of the Affiliate Link, in violation of any Affiliate Program Policies that we make available to you, misuse of the Affiliate Tool or by any other means that we deem to breach the spirit of the Marketing Affiliate Program, or (v) you participate in our Securiti Partner Program and are eligible to receive commission in relation to the Customer Transaction under that program. If at any point you are eligible to receive a revenue share payment or commission under our Securiti Partner Program, that payment amount will not change based on your participation in the Marketing Affiliate Program. For example, you will not be able to receive the Commission set out in this Agreement on any Partner Transaction that was completed while participating as a partner in the Securiti Partner Program (as defined in the Securiti Partner Program Agreement). In competitive situations with other affiliates, we may elect to provide the Commission to the affiliate that we deem to be the most eligible for Commission, at our discretion. We may discontinue Commission payments should any of the eligibility criteria set forth in this subsection fail to be met at any time. 3. Acceptance and Validity. You will only be eligible for a Commission payment for any Customer Transactions that derived from Affiliate Leads generated by the Affiliate Link that we make available to you and are accepted by Securiti. An Affiliate Lead will be considered valid and accepted if, in our reasonable determination: (i) it is a new potential customer of ours, and (ii) is not, at the time of submission or sixty (60) days prior, one of our pre-existing customers, or involved in our active sales process. Notwithstanding the foregoing, we may choose not to accept an Affiliate Lead in our reasonable discretion. If an Affiliate Lead does not purchase the Subscription Service within the time period described on the Affiliate Tool (or if applicable, in the Program Policies) of their first click on the Affiliate Link, you will not be eligible for a Commission payment, even if the Affiliate Lead decides to purchase after the time period has expired. An Affiliate Lead is not considered valid if its first click on the Affiliate Link is after this Agreement has expired or terminated. 4. Engagement with Prospects. Once we have received the Affiliate Lead information, we may elect to engage with the prospect directly, regardless of whether or not the Affiliate Lead is valid. If an Affiliate Lead is not valid then we may choose to maintain it in our database and we may choose to engage with such Affiliate Lead. Any engagement between Securiti and an Affiliate Lead will be at Securiti’s discretion. 5. Commission and Payment. In order to receive payment under this Agreement, you must have: (i) agreed to the terms of this Agreement (generally completed through the Affiliate Tool); (ii) completed all steps necessary to create your account in the Affiliate Tool in accordance with our directions, (iii) have a valid and up-to-date payment method in the Affiliate Tool with such account (iv) completed any and all required tax documentation in order for the Affiliate Tool to process any payments that may be owed to you. 6. Requirements for Payment; Forfeiture. Notwithstanding the foregoing or anything to the contrary in this Agreement, if any of the requirements set forth in section 5(i-iv) remain outstanding for six (6) months immediately following the close of a Customer Transaction, then your right to receive Commission arising from any and all Customer Transactions with the associated Customer will be forever forfeited (each, a “Forfeited Transaction”). We will have no obligation to pay you the Commission associated with a Forfeited Transaction. Once you comply with all of the requirements in section 5(i-iv), then you will be eligible to receive Commission on Customer Transactions, as long as these Customer Transactions do not involve the same Customer associated with a Forfeited Transaction. 7. Commission Payment. We or the Affiliate Tool will determine the currency in which we pay the Commission, as well as the applicable conversion rate. We will not pay more than one Commission payment or other similar referral fee on any given Customer Transaction (unless we choose to in our discretion). 8. Taxes. You are responsible for payment of all taxes and fees (including bank fees) applicable to the Commission. All amounts payable by us to you are subject to offset by us against any amounts owed by you to us. Commission Amounts. We reserve the right to alter or change the Commission amount as per the Affiliate Tool. Training and Support We may make available to you, without charge, various webinars and other resources made available as part of our Marketing Affiliate Program. If we make such resources available to you, you will encourage your sales representatives and/or other relevant personnel to participate in training and/or other certifications as we recommend and may make available to you from time-to-time. We may change or discontinue any or all parts of the Marketing Affiliate Program benefits or offerings at any time without notice. Trademarks You grant to us a non-exclusive, non-transferable, royalty-free right to use and display your trademarks, service marks and logos (“Affiliate Marks”) in connection with the Marketing Affiliate Program and this Agreement. During the term of this Agreement, in the event that we make our trademark available to you within the Affiliate Tool, you may use our trademark as long as you follow the usage requirements in this section. You must: (i) only use the images of our trademark that we make available to you, without altering them in any way; (ii) only use our trademarks in connection with the Marketing Affiliate Program and this Agreement; (iii) comply with our Trademark Usage Guidelines; and (iv) immediately comply if we request that you discontinue use. You must not: (i) use our trademark in a misleading or disparaging way; (ii) use our trademark in a way that implies we endorse, sponsor or approve of your services or products; or (iii) use our trademark in violation of applicable law or in connection with an obscene, indecent, or unlawful topic or material. Proprietary Rights 1. Securiti’s Proprietary Rights. No license to any software is granted by this Agreement. The PrivacyCenter.cloud Products are protected by intellectual property laws. The PrivacyCenter.cloud Products belong to and are the property of us or our licensors (if any). We retain all ownership rights in the PrivacyCenter.cloud Products. You agree not to copy, rent, lease, sell, distribute, or create derivative works based on the PrivacyCenter.cloud Content, or the PrivacyCenter.cloud Products in whole or in part, by any means, except as expressly authorized in writing by us. If you wish to use PrivacyCenter.cloud Content, you must comply with our Content Usage Guidelines here. Securiti, the Securiti logos, and other marks that we use from time to time are our trademarks and you may not use them without our prior written permission, except as otherwise set forth in this Agreement.We encourage all customers, affiliates and partners to comment on the PrivacyCenter.cloud Products, provide suggestions for improving them, and vote on suggestions they like. You agree that all such comments and suggestions will be non-confidential and that we own all rights to use and incorporate them into the PrivacyCenter.cloud Products, without payment to you. 2. Customer’s Proprietary Rights. As between you and Customer, Customer retains the right to access and use the Customer portal associated with the PrivacyCenter.cloud Products. For the avoidance of doubt, Customer will own and retain all rights to the Customer Data. Confidentiality As used herein, “Confidential Information” means all confidential information disclosed by a party ("Disclosing Party") to the other party (“Receiving Party”), (i) whether orally or in writing, that is designated as confidential, and (ii) Securiti customer and prospect information, whether or not otherwise designated as confidential. Confidential Information does not include any information that (i) is or becomes generally known to the public without breach of any obligation owed to the Disclosing Party or (ii) was known to the Receiving Party prior to its disclosure by the Disclosing Party without breach of any obligation owed to the Disclosing Party. The Receiving Party shall: (i) protect the confidentiality of the Confidential Information of the Disclosing Party using the same degree of care that it uses with its own confidential information, but in no event less than reasonable care, (ii) not use any Confidential Information of the Disclosing Party for any purpose outside the scope of this Agreement, (iii) not disclose Confidential Information of the Disclosing Party to any third party, and (iv) limit access to Confidential Information of the Disclosing Party to its employees, contractors and agents. The Receiving Party may disclose Confidential Information of the Disclosing Party if required to do so under any federal, state, or local law, statute, rule or regulation, subpoena or legal process. Opt Out and Unsubscribing You will comply promptly with all opt out, unsubscribe, "do not call" and "do not send" requests. For the duration of this Agreement, you will establish and maintain systems and procedures appropriate to effectuate all opt out, unsubscribe, "do not call" and "do not send" requests. Term and Termination 1. Term. This Agreement will apply for as long as you participate in the Marketing Affiliate Program, until terminated. 2. Termination Without Cause. Both you and we may terminate this Agreement on fifteen (15) days written notice to the other party. 3. Termination for Agreement Changes. If we update or replace the terms of this Agreement, you may terminate this Agreement on five (5) days written notice to us, provided that you send us written notice within ten (10) days after we send you notice of the change. 4. Termination for Cause. We may terminate this Agreement: (i) upon five (5) days notice to you of a material breach if such breach remains uncured at the expiration of such period, (ii) upon fifteen (15) days notice to you of non-payment of any amount due to us if such amount remains unpaid at the expiration of such period, (iii) immediately, if you become the subject of a petition in bankruptcy or any other proceeding relating to insolvency, receivership, liquidation or assignment for the benefit of creditors, (iv) immediately, if you breach the terms applicable to your subscription with us (if you have one), including if you default on your payment obligations to us or our affiliate, or (v) immediately, if we determine that you are acting, or have acted, in a way that has or may negatively reflect on or affect us, our prospects, or our customers. 5. Effects of Expiration/Termination. Expiration of this Agreement, and termination of this Agreement: (i) without cause by us, (ii) by you with cause, (iii) by you according to the ‘Termination for Agreement Changes’ section, shall not affect our obligation to pay you a Commission, so long as the related payment by the Customer Transaction is recognized by us within thirty (30) days after the date of such termination or expiration and provided that in no event shall you be entitled to payment of Commission under this Agreement if you are eligible to receive a revenue share payment under the Solutions Partner Program Agreement. We will not pay you fees on Customer Transactions recognized by us after thirty (30) days after the date of such termination or expiration set out above. Provided however, in the event of termination without cause by you, or for cause by us, our obligation to pay and your right to receive any Commission will terminate upon the date of such termination, regardless of whether you would have otherwise been eligible to receive Commission prior to the date of termination. Except as expressly set forth in this section, you are not eligible to receive a Commission payment after expiration or termination of this Agreement. Upon termination or expiration, you will discontinue all use of and delete the Affiliate Tool that we make available to you for your participation in the Marketing Affiliate Program. Upon termination or expiration, an Affiliate Lead is not considered valid, and we may choose to maintain it in our database and engage with such a prospect.Upon termination or expiration, you will immediately discontinue all use of our trademark and references to this Marketing Affiliate Program from your website(s) and other collateral. For the avoidance of doubt, termination or expiration of this Agreement shall not cause a Customer’s subscription agreement to be terminated. Affiliate Representations and Warranties You represent and warrant that: (i) you have all sufficient rights and permissions to participate in the Marketing Affiliate Program and to provision Securiti with Affiliate Leads for our use in sales and marketing efforts or as otherwise set forth in this Agreement, (ii) your participation in this Marketing Affiliate Program will not conflict with any of your existing agreements or arrangements; and (iii) you own or have sufficient rights to use and to grant to us our right to use the Affiliate Marks. You further represent and warrant that: (i) you will ensure that you are compliant with any trade or regulatory requirements that may apply to your participation in the Marketing Affiliate Program (for example, by clearly stating you are a PrivacyCenter.cloud Affiliate on any website(s) you own where you make an Affiliate Link available); (ii) you will accurately provide in the Affiliate Tool all websites and domains you own where you intend to use Affiliate Links to generate Affiliate Leads; (iii) you will not purchase ads that direct to your site(s) or through an Affiliate Link that could be considered as competing with Securiti’s own advertising, including, but not limited to, our branded keywords; (iv) you will not participate in cookie stuffing or pop-ups, false or misleading links are strictly prohibited; (v) you will not attempt to mask the referring URL information; (vi) you will not use your own Affiliate Link to purchase PrivacyCenter.cloud Products for yourself; and (vii) you will not use any mechanisms to deliver leads other than through an intended consumer. This includes sourcing leads through compilations of personal data such as phonebooks, using fake redirects or other tools or automation devices to generate leads (including but not limited to robots, iframes, or hidden frames), or offering incentives to encourage purchases or signups. Indemnification You will indemnify, defend and hold us harmless, at your expense, against any third-party claim, suit, action, or proceeding (each, an "Action") brought against us (and our officers, directors, employees, agents, service providers, licensors, and affiliates) by a third party not affiliated with us to the extent that such Action is based upon or arises out of (a) your participation in the Marketing Affiliate Program, (b) our use of the prospect data you provided us, (c) your noncompliance with or breach of this Agreement, (d) your use of the Affiliate Tool, or (e) our use of the Affiliate Marks. We will: notify you in writing within thirty (30) days of our becoming aware of any such claim; give you sole control of the defense or settlement of such a claim; and provide you (at your expense) with any and all information and assistance reasonably requested by you to handle the defense or settlement of the claim. You shall not accept any settlement that (i) imposes an obligation on us; (ii) requires us to make an admission; or (iii) imposes liability not covered by these indemnifications or places restrictions on us without our prior written consent. Disclaimers; Limitations of Liability 1. Disclaimer of Warranties. WE AND OUR AFFILIATED COMPANIES AND AGENTS MAKE NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY, RELIABILITY, AVAILABILITY, TIMELINESS, SECURITY OR ACCURACY OF THE PRIVACYCENTER.CLOUD PRODUCTS, PRIVACYCENTER.CLOUD CONTENT, THE MARKETING AFFILIATE PROGRAM OR THE AFFILIATE TOOL FOR ANY PURPOSE. APPLICATION PROGRAMMING INTERFACES (APIs) AND THE AFFILIATE TOOL MAY NOT BE AVAILABLE AT ALL TIMES. TO THE EXTENT PERMITTED BY LAW, THE PRIVACYCENTER.CLOUD PRODUCTS AND AFFILIATE TOOL ARE PROVIDED "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND. WE DISCLAIM ALL WARRANTIES AND CONDITIONS OF ANY KIND WITH REGARD TO THE PRIVACYCENTER.CLOUD PRODUCTS AND THE AFFILIATE TOOL INCLUDING ALL IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. 2. No Indirect Damages. TO THE EXTENT PERMITTED BY LAW, IN NO EVENT SHALL WE BE LIABLE FOR ANY INDIRECT, PUNITIVE, OR CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS OR BUSINESS OPPORTUNITIES. 3. Limitation of Liability. IF, NOTWITHSTANDING THE OTHER TERMS OF THIS AGREEMENT, WE ARE DETERMINED TO HAVE ANY LIABILITY TO YOU OR ANY THIRD PARTY, THE PARTIES AGREE THAT OUR AGGREGATE LIABILITY WILL BE LIMITED TO THE TOTAL COMMISSION AMOUNTS YOU HAVE ACTUALLY EARNED FOR THE RELATED CUSTOMER TRANSACTIONS IN THE SIX MONTH PERIOD PRECEDING THE EVENT GIVING RISE TO A CLAIM. 4. Affiliate Tool. WE DISCLAIM ALL LIABILITY WITH RESPECT TO THE AFFILIATE TOOL THAT YOU USE. WE DO NOT PROMISE TO MAKE THE AFFILIATE TOOL AVAILABLE TO YOU, AND WE MAY CHOOSE TO DO SO, OR NOT TO DO SO, IN OUR DISCRETION. 5. Cookie Duration. COOKIES USED AS PART OF THE AFFILIATE TOOL HAVE A SET DURATION. IF A POTENTIAL CUSTOMER CLEARS THEIR COOKIES DURING THIS PERIOD, SECURITI SHALL NOT BE LIABLE FOR ANY COMMISSIONS THAT MAY HAVE BEEN OWED TO YOU. General 1. Amendment; No Waiver. We may update and change any part or all of this Agreement, including by replacing it in its entirety. If we update or change this Agreement, the updated Agreement will be made available to you via the Affiliate Tool and/or by email. The updated Agreement will become effective and binding on the next business day after we or the Affiliate Tool have notified you. When we change this Agreement, the "Last Modified" date above will be updated to reflect the date of the most recent version at our Terms page. We encourage you to review this Agreement periodically. If you don’t agree to the update, change or replacement, you can choose to terminate as we describe above. No delay in exercising any right or remedy or failure to object will be a waiver of such right or remedy or any other right or remedy. A waiver on one occasion will not be a waiver of any right or remedy on any future occasion. 2. Applicable Law. This Agreement shall be governed by the laws of the state of California, without regard to the conflict of laws provisions thereof. In the event either of us initiates an action in connection with this Agreement or any other dispute between the parties, the exclusive venue and jurisdiction of such action shall be in the state and federal courts in Santa Clara County, California. 3. Force Majeure. Neither party will be responsible for failure or delay of performance if caused by: an act of war, hostility, or sabotage; act of god; electrical, internet, or telecommunication outage that is not caused by the obligated party; government restrictions; or other event outside the reasonable control of the obligated party. Each party will use reasonable efforts to mitigate the effect of a force majeure event. 4. Actions Permitted. Except for actions for nonpayment or breach of a party’s proprietary rights, no action, regardless of form, arising out of or relating to this Agreement may be brought by either party more than two (2) years after the cause of action has accrued. 5. Relationship of the Parties. Both you and we agree that no joint venture, partnership, employment, or agency relationship exists between you and us as a result of this Agreement. 6. Compliance with Applicable Laws. You shall comply, and shall ensure that any third parties performing sales or referral activities on your behalf comply with all applicable foreign and domestic laws (including without limitation export laws and laws applicable to sending of unsolicited email), governmental regulations, ordinances, and judicial administrative orders. You shall not engage in any deceptive, misleading, illegal or unethical marketing activities, or activities that otherwise may be detrimental to us, our customers, or to the public. Export laws and regulations of the United States and any other relevant local export laws and regulations may apply to the PrivacyCenter.cloud Products. You will comply with the sanctions programs administered by the Office of Foreign Assets Control (OFAC) of the US Department of the Treasury. You will not directly or indirectly export, re-export, or transfer the PrivacyCenter.cloud Products to prohibited countries or individuals or permit use of the PrivacyCenter.cloud Products by prohibited countries or individuals. 7. Severability. If any part of this Agreement is determined to be invalid or unenforceable by applicable law, then the invalid or unenforceable provision will be deemed superseded by a valid, enforceable provision that most closely matches the intent of the original provision and the remainder of this Agreement will continue in effect. 8. Notices. Notice will be sent to the contact address set forth herein (as such may be changed by notice given to the other party), and will be deemed delivered as of the date of actual receipt.To Securiti, 300 Santana Row, Suite 450, San Jose, CA 95128, U.S.A. Attention: VP Finance To you: your address as provided in our affiliate account information for you. We may give electronic notices specific to you by email to your e-mail address(es) on record in our account information for you. We may give notice to you by telephone calls to the telephone numbers on record in our account information for you. 9. Entire Agreement. This Agreement is the entire agreement between us for the Marketing Affiliate Program and supersedes all other proposals and agreements, whether electronic, oral or written, between us. We object to and reject any additional or different terms proposed by you, including those contained in your purchase order, acceptance or website. Our obligations are not contingent on the delivery of any future functionality or features of the PrivacyCenter.cloud Products or dependent on any oral or written public comments made by us regarding future functionality or features of the PrivacyCenter.cloud Products. It is the express wish of both you and us that this Agreement and all related documents be drawn up in English. We might make versions of this Agreement available in languages other than English. If we do, the English version of this Agreement will govern our relationship and the translated version is provided for convenience only and will not be interpreted to modify the English version of this Agreement. 10. Assignment. You will not assign or transfer this Agreement, including any assignment or transfer by reason of merger, reorganization, sale of all or substantially all of its assets, change of control or operation of law, without our prior written consent. We may assign this Agreement to any affiliate or in the event of merger, reorganization, sale of all or substantially all of our assets, change of control or operation of law. 11. No Third Party Beneficiaries. Nothing in this Agreement, express or implied, is intended to or shall confer upon any person or entity (other than the parties hereto) any right, benefit or remedy of any nature whatsoever under or by reason of this Agreement. 12. Program Policies Page. We may change the Program Policies from time to time. Your participation in the Marketing Affiliate Program is subject to the Program Policies, which are incorporated herein by reference. 13. No Licenses. We grant to you only the rights and licenses expressly stated in this Agreement, and you receive no other rights or licenses with respect to us, the PrivacyCenter.cloud Products, our trademarks, or any other property or right of ours. 14. Sales by Securiti. This Agreement shall in no way limit our right to sell the PrivacyCenter.cloud Products, directly or indirectly, to any current or prospective customers. 15. Authority. Each party represents and warrants to the other that it has full power and authority to enter into this Agreement and that it is binding upon such party and enforceable in accordance with its terms. 16. Survival. The following sections shall survive the expiration or termination of this Agreement: ‘Commission and Payment’, ‘Proprietary Rights’, ‘Confidentiality’, ‘Effects of Termination/Expiration’, “Affiliate Representations and Warranties’, ‘Indemnification’, ‘Disclaimers; Limitation of Liability’, and ‘General’. 17. Data Processing and Protection. The parties acknowledge that in connection with the PrivacyCenter.cloud Marketing Affiliate Program, each party may provide or make available to the other party Personal Data. To the extent that any Personal Data is processed in connection with the Project the terms set forth in the Securiti Data Processing Agreement (posted at: https://securiti.ai/terms/), which are hereby incorporated by reference, shall apply. Each party shall process the copy of the Personal Data in its possession or control: (i) in accordance with the Securiti Data Processing Agreement (ii) as an independent controller (not as a joint controller with the other party) (iii) for the purposes described in this Agreement; and/or (iv) as may otherwise be permitted under Applicable Data Protection Law. For the avoidance of doubt and without prejudice to the foregoing, Securiti shall be an independent controller of any Personal Data that it receives or shares with Affiliate. CONTENT USAGE GUIDELINES Last Modified: July 26, 2023 What Securiti Content You Can Use and How * Feel free to share any of our content through email or social media. Your support means the world to us! * Securiti’s original images including charts, graphs, cartoons, and infographics, videos, or SlideShares can be republished in full by copying or embedding them in your content. Please make sure to comply with the Content Attribution Policy outlined below. Please note that this permission does not extend to any stock images that we have acquired for use in our content. * You're welcome to use up to 75 words of our text content, such as facts, figures, and quotes, as references or quotes in your blog articles, presentations, or documents, provided that you comply with the Content Attribution Policy stated below. * Regrettably, we are unable to permit you to republish any of our text-based content (such as blog articles, PDFs, PPTs, DOCs) in its entirety on the internet. The reason being that duplicate content can harm SEO, and it may displease Google. * We're sorry to say that we're unable to comply with requests for original files, such as PDFs, PPTs, DOCs, or original video files. * You cannot monetize our content. * Claiming our content as your own original work (by using it and publishing it on a channel) is not allowed. However, we appreciate your willingness to share our content and kindly request that you share the original link instead. Content Attribution Policy * Attribute Securiti as the source. * Link to the original Securiti source you're referencing: * For references to a Securiti blog article, link to the URL of the specific blog article you're referencing. * For references to Securiti's downloadable content offers behind a form, please link to the landing page URL with the form for that individual offer. Thanks for sharing the content. We appreciate it! At Securiti, our mission is to enable enterprises to safely harness the incredible power of data and the cloud by controlling the complex security, privacy and compliance risks. Copyright © 2023 Securiti · Sitemap · XML Sitemap NEWSLETTER * Work Email: * I consent to receive marketing emails. I understand I can unsubscribe at any time and agree to terms outlined in Securiti’s privacy policy. Subscribe -------------------------------------------------------------------------------- COMPANY * About Us * Careers * Contact Us * Partner Program * News Coverage * Press Releases RESOURCES * Blog * Collateral * Knowledge Center * Securiti Education * Privacy Center * Free Do Not Sell Tool * What is DSPM TERMS * Terms & Policies * Security & Compliance * Manage cookie preferences * My Privacy Center GET IN TOUCH info@securiti.ai 300 Santana Row Suite 450. San Jose, CA 95128 * * * -------------------------------------------------------------------------------- Contact Us Schedule a Demo * Products * By Role * Data Command Center * Sensitive Data Intelligence * Privacy * Security * Governance * Data Controls Orchestrator * By Use Cases Back * Asset Discovery Asset Discovery * Data Discovery & Classification Data Discovery & Classification * Sensitive Data Catalog Sensitive Data Catalog * People Data Graph People Data Graph * Data Mapping Automation View * Data Subject Request Automation View * People Data Graph View * Assessment Automation View * Cookie Consent View * Universal Consent View * Vendor Risk Assessment View * Breach Management View * Privacy Policy Management View * Privacy Center View * Data Security Posture Management View * Data Access Intelligence & Governance View * Data Risk Management View * Data Breach Analysis View * Data Catalog View * Data Lineage View * Data Quality View * Asset and Data Discovery View * Data Access Intelligence & Governance View * Data Privacy Automation View * Sensitive Data Intelligence View * Data Flow Intelligence & Governance View * Data Consent Automation View * Data Security Posture Management View * Data Breach Impact Analysis & Response View * Data Catalog View * Data Lineage View * Solutions * Technologies * Regulations * Roles Back * Snowflake View * AWS View * Microsoft 365 View * Salesforce View * Workday View * GCP View * Azure View * Oracle View * US California CCPA View * US California CPRA View * European Union GDPR View * Thailand’s PDPA View * China PIPL View * Canada PIPEDA View * Brazil's LGPD View * + More View * Privacy View * Security View * Governance View * Marketing View * Resources * Blog View * Collateral View * Knowledge Center View * Securiti Education View * Company * About Us View * Partner Program View * Contact Us View * News Coverage View * Press Releases View * Careers View * Events * Spotlight Talks