www.intercom.com Open in urlscan Pro
18.66.248.79  Public Scan

URL: https://www.intercom.com/legal/data-processing-agreement
Submission: On June 01 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

blankblankblankblankblank
Skip to content

 1. English (United States)
    
    English (United States)GermanSpanishFrenchPortuguese (Brazil)
 2. Contact Sales
 3. Sign in

 * Solutions
   Use Cases
   Support
   Deliver personal customer support at any scale
   Engage
   Onboard, activate, and re-engage customers
   Convert
   Convert more website visitors into customers
   
   Industries
   E-commerce
   Financial Services
   Education
   Healthcare
   
   Company Size
   Enterprise
   Small Business
   Early Stage
   
   Watch a Demo
   Learn how to use Intercom for support, marketing, and customer engagement.
   Watch a demo
 * Platform
   The Intercom Platform
   Get an overview of the Intercom platform—and see why we're known as the
   Engagement OS.
   Learn more
   
   Business Messenger
   Support and engage customers with chat, messages, and more
   Management Tools
   Efficiently manage all your customer interactions in one place
   
   Customer Data Platform
   Leverage your customer data to personalize every interaction
   Apps & Integrations
   Integrate and extend Intercom with 300+ apps
   
   Top Features
   Live Chat
   Support Bots
   Shared Inbox
   Product Tours
   Campaign Builder
   
 * Resources
   Product Help
   Help Center
   Learn how to install, set up, and use Intercom
   Developer Hub
   Learn how to integrate or build on top of Intercom
   Community Forum
   Learn, share, and connect with other Intercom users
   
   Learn & Connect
   Blog & Podcasts
   Stories about support, marketing, product, and more
   Books & Webinars
   Discover books, guides, and webinars full of insights
   Academy
   Master Intercom with deep-dive courses from Intercom experts
   
   Customer Stories
   Discover how businesses like you use Intercom to support and engage
   customers.
   Read stories
 * Pricing


Get started
View demo
Terms & Policies
Data Processing Addendum
Terms of ServicePrivacy PolicyData Processing AddendumSupport PolicyPremier
Services PolicyCookie PolicySecurity PolicySubprocessors ListE.U. - U.S. and
Swiss - U.S. Privacy Shield PolicyIntercom Website Terms of UseAcademy
TermsService Level AgreementAcceptable Use PolicyHow We BillCode of
ConductTrademark UsageIntercom Global Anti-Corruption StatementIntercom Partner
Code of ConductIntercom DMCA PolicyLaw Enforcement GuidelinesIntercom European
Data Hosting AddendumIntercom Australia Data Hosting Addendum
 * Terms of Service
   Definitions
   Intercom Services
   Customer Data and Customer Obligations
   Security
   Third-Party Platforms and Third Party Messaging Apps
   Ownership
   Subscription Term, Fees & Payment
   Term and Termination
   Limited Warranty
   Availability and Service Credits
   Support
   Limitation of Remedies and Damages
   Indemnification
   Confidential Information
   Publicity
   General Terms
 * Privacy Policy
   Purpose and Scope
   Personal Data Collected by Intercom
   How and Why We Use Your Personal Data
   Sharing Your Personal Data
   Retention of Your Personal Data
   Transfers of Your Personal Data
   Privacy Shield
   How We Store and Safeguard Personal Data
   Your Privacy Rights and Choices
   Children’s Privacy
   Changes to this Notice and Questions
   Collection and Use of Personal Data of California Residents
 * Data Processing Addendum
   
 * Support Policy
   
 * Premier Services Policy
   
 * Cookie Policy
   Introduction
   Cookies and similar technologies and the processing of personal data
   What are cookies?
   Why do we use cookies?
   What type of cookies do we use and what are they used for?
 * Security Policy
   Overview
   Security Team
   Best Practices
   Infrastructure
   Data
   Data Transfer
   Authentication
   Permissions and Admin Controls
   Application Monitoring
   Security Audits and Certifications
   Customer Responsibilities
 * Subprocessors List
   
 * E.U. - U.S. and Swiss - U.S. Privacy Shield Policy
   
 * Intercom Website Terms of Use
   Acceptance of Terms
   Permission to Use the Site
   User Content
   Restrictions on User Content and Your Conduct
   Intellectual Property Rights in User Content
   User Content You Post Becomes Public
   We Are Not Responsible for User Content
   Proprietary Rights
   Enforcement of Copyrights
   Notify Us of Infringers
   How to Communicate with Us
   Site Availability
   Links to Other Sites
   Warranty Disclaimer
   Limitation of Liability
   Indemnity
   Termination and Suspension
   Governing Law and Dispute Resolution
   General Terms
 * Academy Terms
   Intercom Academy Terms
   Access
   Participant Responsibilities
   Restrictions on Use
   Badges
   Ownership
   Feedback
   Privacy
   Suspension and Termination
   Disclaimer
   Modifications
   Independent Contractors
 * Service Level Agreement
   
 * Acceptable Use Policy
   
 * How We Bill
   Billing Cycle
   Overages and Credits
   Estimating Your Upcoming Invoice
 * Code of Conduct
   Humanity
   Ethics
   Reporting
 * Trademark Usage
   Intercom Marks and License
   Permissible Use of the Intercom Marks
   Impermissible Use of the Intercom Marks
   Termination
   Ownership
   No Warranties
   Your Liability for Third-Party Claims
   Additional Legal
   Questions
 * Intercom Global Anti-Corruption Statement
   Summary
   Bribery and Kickbacks
   Records and Reporting
   Applicability and Enforcement
 * Intercom Partner Code of Conduct
   Labor and Employment Laws
   Anti Corruption Laws
   Competition
   International Trade and Export Controls
   Recordkeeping, Financial Integrity, and Honest and Accurate Dealings
   Intellectual Property and Confidential Information
   Raising Issues and Concerns
   Certification and Application
 * Intercom DMCA Policy
   
 * Law Enforcement Guidelines
   
 * Intercom European Data Hosting Addendum
   Scope
   EDH Services
   Customer Obligations
   Survival
   Exhibit A
 * Intercom Australia Data Hosting Addendum
   


DATA PROCESSING ADDENDUM

Print page
Effective day 1 November 2021

This Data Processing Addendum, including its annexes and the Standard
Contractual Clauses, ("DPA") is made by and between Intercom, and Customer,
pursuant to the Master SaaS Subscription Agreement, the Subscription Terms of
Service or other written or electronic agreement between the parties (as
applicable) ("Agreement"), and will be effective on the date both parties have
signed the Agreement.

This DPA forms part of the Agreement and sets out the terms that apply when
Personal Data is processed by Intercom under the Agreement. The purpose of the
DPA is to ensure such processing is conducted in accordance with applicable laws
and with due respect for the rights and freedoms of individuals whose Personal
Data is processed.

1. DEFINITIONS. ANY CAPITALIZED TERM USED BUT NOT DEFINED IN THIS DPA HAS THE
MEANING PROVIDED TO IT IN THE AGREEMENT.

i. "Account Data" means Personal Data that relates to Customer's relationship
with Intercom, including to access Customer's account and billing information,
identity verification, maintain or improve performance of the Services, provide
support, investigate and prevent system abuse, or fulfill legal obligations.

ii. "Affiliate" means any entity controlled by, controlling or under common
control by an entity, where "control" means ownership of or the right to control
greater than 50% of the voting securities of such entity.

iii. "Applicable Data Protection Legislation" refers to laws and regulations
applicable to Intercom's processing of personal data under the Agreement,
including but not limited to (a) the GDPR, (b) in respect of the UK, the GDPR as
saved into United Kingdom law by virtue of section 3 of the United Kingdom's
European Union (Withdrawal) Act 2018 ("UK GDPR") and the Data Protection Act
2019 (together, "UK Data Protection Laws"), (c) the Swiss Federal Data
Protection Act and its implementing regulations ("Swiss DPA"), (d) CCPA, and (e)
Australian Privacy Principles and the Australian Privacy Act (1988), in each
case, as may be amended, superseded or replaced.

iv. "CCPA" means the California Consumer Privacy Act of 2018 and any binding
regulations promulgated thereunder, in each case, as may be amended from time to
time.

v. "Controller" or "controller" means the natural or legal person, public
authority, agency, or other body which, alone or jointly with others, determines
the purposes and means of the processing of Personal Data.

vi. "Customer Data" means personal data that relates to Customer's relationship
with Intercom, including Personal Data that Intercom processes as a Processor on
behalf of Customer.

vii. "Europe" means for the purposes of this DPA the European Economic Area
("EEA"), United Kingdom ("UK") and Switzerland.

viii. "GDPR" means Regulation 2016/679 of the European Parliament and of the
Council on the protection of natural persons with regard to the processing of
personal data and on the free movement of such data (General Data Protection
Regulation).

ix. "Personal Data" or "personal data" means any information, including personal
information, relating to an identified or identifiable natural person (“data
subject”) or as defined in and subject to Applicable Data Protection
Legislation.

x. “Privacy Policy” means the then-current privacy policy for the Services
available at https://www.intercom.com/legal/privacy.

xi. "Processor" or "processor" means the entity which processes Personal Data on
behalf of the Controller.

xii. "Processing" or "processing" (and "Process" or "process") means any
operation or set of operations performed upon Personal Data, whether or not by
automated means, means any operation or set of operations that is performed upon
Personal Data, whether or not by automatic means, such as collection, recording,
securing, organization, storage, adaptation or alteration, access to, retrieval,
consultation, use, disclosure by transmission, dissemination or otherwise making
available, alignment or combination, blocking, erasure, or destruction.

xiii. "Restricted Transfer" means: (i) where the GDPR applies, a transfer of
personal data from the EEA to a country outside of the EEA which is not subject
to an adequacy determination by the European Commission; (ii) where the UK GDPR
applies, a transfer of personal data from the UK to any other country which is
not based on adequacy regulations pursuant to Section 17A of the Data Protection
Act 2018; and (iii) where the Swiss DPA applies, a transfer of personal data to
a country outside of Switzerland which is not included on the list of adequate
jurisdictions published by the Swiss Federal Data Protection and Information
Commissioner.

xiv. "Security Breach" means a breach of security leading to any accidental,
unauthorized or unlawful loss, disclosure, destruction, loss, alteration,
unauthorized disclosure of, or access to Customer Data transmitted, stored or
otherwise processed by Intercom. A Security Incident shall not include an
unsuccessful attempt or activity that does not compromise the security of
Customer Data, including (without limitation) pings and other broadcast attacks
of firewalls or edge servers, port scans, unsuccessful log-on attempts, denial
of service attacks, packet sniffing (or other unauthorized access to traffic
data that does not result in access beyond headers) or similar incidents.

xv. "Standard Contractual Clauses" or "SCCs" means (i) where the GDPR applies,
the standard contractual clauses annexed to the European Commission's
Implementing Decision (EU) 2021/914 of 4 June 2021 standard contractual clauses
for the transfer of personal data to third countries pursuant to Regulation (EU)
2016/679 of the European Parliament and of the Council, available at
https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32021D0914&from=EN
("EU SCCs"); (ii) where the UK GDPR applies, the applicable standard data
protection clauses adopted pursuant to Article 46(2)(c), or (d) of the UK GDPR
("UK SCCs") and (iii) where the Swiss DPA applies, the applicable standard data
protection clauses issued, approved or recognized by the Swiss Federal Data
Protection and Information Commissioner (the "Swiss SCCs") (in each case, as
updated, amended or superseded from time to time).

xvi. "Sub-processor" or "sub-processor" means (a) Intercom, when Intercom is
processing Customer Data and where Customer is itself a processor of such
Customer Data, or (b) any third-party Processor engaged by Intercom or its
Affiliates to assist in fulfilling Intercom's obligations under the Agreement
and which processes Customer Data. Sub-processors may include third parties or
Intercom Affiliates but shall exclude Intercom employees, contractors or
consultants.

xvii. "Third Party Request" means any request, correspondence, inquiry, or
complaint from a data subject, regulatory authority, or third party.

2. APPLICABILITY AND SCOPE.

i. Applicability. This DPA will apply only to the extent that Intercom
processes, on behalf of Customer, Personal Data to which Applicable Data
Protection Legislation applies.

ii. Scope. The subject matter of the data processing is the provision of the
Services, and the processing will be carried out for the duration of the
Agreement. Schedule 1 (Details of Processing) sets out the nature and purpose of
the processing, the types of Personal Data Intercom processes and the categories
of data subjects whose Personal Data is processed.

iii. Intercom as a Processor. The parties acknowledge and agree that regarding
the processing of Customer Data, Customer may act either as a controller or
processor and Intercom is a processor. Intercom will process Customer Data in
accordance with Customer's instructions as set forth in Section 5 (Customer
Instructions).

iv. Intercom as a Controller of Account Data. The parties acknowledge that,
regarding the processing of Account Data, Customer is a controller and Intercom
is an independent controller, not a joint controller with Customer. Intercom
will process Account Data as a controller (a) in order to manage the
relationship with Customer; (b) carry out Intercom's core business operations;
(c) in order to detect, prevent, or investigate security incidents, fraud, and
other abuse or misuse of the Services; (d) identity verification; (e) to comply
with Intercom's legal or regulatory obligations; and (f) as otherwise permitted
under Applicable Data Protection Legislation and in accordance with this DPA,
the Agreement, and the Privacy Policy.

3. INTERCOM AS A PROCESSOR – PROCESSING CUSTOMER DATA.

i. Customer Instructions. Customer appoints Intercom as a processor to process
Customer Data on behalf of, and in accordance with, Customer’s instructions (a)
as set forth in the Agreement, this DPA, and as otherwise necessary to provide
the Services to Customer (which may include investigating security incidents,
and detecting and preventing exploits or abuse); (b) as necessary to comply with
applicable law, including Applicable Data Protection Legislation; and (c) as
otherwise agreed in writing between the parties (“Permitted Purposes”).

ii. Lawfulness of Instructions. Customer will ensure that its instructions
comply with Applicable Data Protection Legislation. Customer acknowledges that
Intercom is neither responsible for determining which laws are applicable to
Customer’s business nor whether Intercom’s Services meet or will meet the
requirements of such laws. Customer will ensure that Intercom’s processing of
Customer Data, when done in accordance with Customer’s instructions, will not
cause Intercom to violate any applicable law, including Applicable Data
Protection Legislation. Intercom will inform Customer if it becomes aware, or
reasonably believes, that Customer’s instructions violate applicable law,
including Applicable Data Protection Legislation.

iii. Additional Instructions. Additional instructions outside the scope of the
Agreement or this DPA will be mutually agreed to between the parties in writing.

4. PURPOSE LIMITATION. INTERCOM WILL PROCESS PERSONAL DATA IN ORDER TO PROVIDE
THE SERVICES IN ACCORDANCE WITH THE AGREEMENT. SCHEDULE 1 (DETAILS OF
PROCESSING) OF THIS DPA FURTHER SPECIFIES THE NATURE AND PURPOSE OF THE
PROCESSING, THE PROCESSING ACTIVITIES, THE DURATION OF THE PROCESSING, THE TYPES
OF PERSONAL DATA AND CATEGORIES OF DATA SUBJECTS.

5. COMPLIANCE. CUSTOMER SHALL BE RESPONSIBLE FOR ENSURING THAT: A) ALL SUCH
NOTICES HAVE BEEN GIVEN, AND ALL SUCH AUTHORIZATIONS HAVE BEEN OBTAINED, AS
REQUIRED UNDER APPLICABLE DATA PROTECTION LEGISLATION, FOR INTERCOM (AND ITS
AFFILIATES AND SUB-PROCESSORS) TO PROCESS CUSTOMER DATA AS CONTEMPLATED BY THE
AGREEMENT AND THIS DPA; B) IT HAS COMPLIED, AND WILL CONTINUE TO COMPLY, WITH
ALL APPLICABLE LAWS RELATING TO PRIVACY AND DATA PROTECTION, INCLUDING
APPLICABLE DATA PROTECTION LEGISLATION; AND C) IT HAS, AND WILL CONTINUE TO
HAVE, THE RIGHT TO TRANSFER, OR PROVIDE ACCESS TO, CUSTOMER DATA TO INTERCOM FOR
PROCESSING IN ACCORDANCE WITH THE TERMS OF THE AGREEMENT AND THIS DPA.

6. CONFIDENTIALITY.

i. Confidentiality Obligations of Intercom Personnel.

a. Security Policy and Confidentiality. Intercom requires all employees to
acknowledge in writing, at the time of hire, they will adhere to terms that are
in accordance with Intercom’s security policy and to protect Customer Data at
all times. Intercom requires all employees to sign a confidentiality statement
at the time of hire.

b. Intercom will ensure that any person that it authorizes to process Customer
Data (including its staff, agents, and subcontractors) shall be subject to a
duty of confidentiality (whether in accordance with Intercom's confidentiality
obligations in the Agreement or a statutory duty).

c. Background Checks. Intercom conducts at its expense a criminal background
investigation on all employees who are to perform material aspects of the
Services under this Agreement.

ii. Responding to Third Party Requests. In the event any Third Party Request is
made directly to Intercom in connection with Intercom’s processing of Customer
Data, Intercom will promptly inform Customer and provide details of the same, to
the extent legally permitted. Intercom will not respond to any Third Party
Request, without prior notice to Customer and an opportunity to object, except
as legally required to do so or to confirm that such Third Party Request relates
to Customer.

7. SUB-PROCESSORS.

i. Authorization for Sub-processing. Customer agrees that (a) Intercom may
engage Sub-processors as listed at
https://www.intercom.com/legal/security-third-parties (the "Sub-processor Page")
which may be updated from time to time and Intercom Affiliates; and (b) such
Affiliates and Sub-processors respectively may engage third party processors to
process Customer Data on Intercom's behalf. Customer provides a general
authorization for Intercom to engage onward sub-processors that is conditioned
on the following requirements: (a) Intercom will restrict the onward
sub-processor’s access to Customer Data only to what is strictly necessary to
provide the Services, and Intercom will prohibit the sub-processor from
processing the Personal Data for any other purpose. (b) Intercom agrees to
impose contractual data protection obligations, including appropriate technical
and organizational measures to protect personal data, on any sub-processor it
appoints that require such sub-processor to protect Customer Data to the
standard required by Applicable Data Protection Legislation; and (c) Intercom
will remain liable and accountable for any breach of this DPA that is caused by
an act or omission of its sub-processors.

ii. Current Sub-processors and Notification of Sub-processor Additions.

a. Customer understands that effective operation of the Services may require the
transfer of Customer Data to Intercom Affiliates, such as Intercom, Inc., or to
Intercom's Sub-processors, see Schedule 3. Customer hereby authorizes the
transfer of Customer Data to locations outside Europe (Intercom’s primary
processing facilities are in the United States of America), including to
Intercom Affiliates and Sub-processors, subject to continued compliance with
this DPA throughout the duration of the Agreement. Customer hereby provides
general authorization to Intercom engaging additional third-party Sub-processors
to process Customer Data within the Services for the Permitted Purposes.

b. Intercom may, by giving reasonable notice to the Customer, add to the
Sub-processor Page. Intercom will notify Customer if it intends to add or
replace Sub-processors from the Sub-Processor Page at least 10 days prior to any
such changes. To receive such notification, Customers can follow link
http://privacy.intercom.com/third-party-subscribe to join Intercom’s
distribution list. If Customer objects to the appointment of an additional
Sub-processor within thirty (30) calendar days of such notice on reasonable
grounds relating to the protection of the Personal Data, then Intercom will work
in good faith with Customer to find an alternative solution. In the event that
the parties are unable to find such a solution, Customer may terminate the
Agreement at no additional cost.

8. IMPACT ASSESSMENTS AND CONSULTATIONS. INTERCOM SHALL, TO THE EXTENT REQUIRED
BY APPLICABLE DATA PROTECTION LEGISLATION, PROVIDE CUSTOMER WITH REASONABLE
ASSISTANCE (AT CUSTOMER'S COST AND EXPENSE) WITH DATA PROTECTION IMPACT
ASSESSMENTS OR PRIOR CONSULTATIONS WITH DATA PROTECTION AUTHORITIES THAT
CUSTOMER IS REQUIRED TO CARRY OUT UNDER SUCH LEGISLATION.

9. SECURITY.

i. Intercom has in place and will maintain throughout the term of this Agreement
appropriate technical and organizational measures designed to protect Customer
Data against Security Breaches.

ii. These measures shall at a minimum comply with applicable law and include the
measures identified in Schedule 2 (Technical and Organizational Security
Measures).

iii. Customer acknowledges that the security measures are subject to technical
progress and development and that Intercom may update or modify the security
measures from time to time, provided that such updates and modifications do not
result in the degradation of the overall security of the Services purchased by
the Customer.

iv. Intercom will ensure that any person authorized to process Customer Data
(including its staff, agents, and subcontractors) shall be subject to a duty of
confidentiality.

v. Upon becoming aware of a Security Breach involving Customer Data processed by
Intercom on behalf of Customer under this DPA, Intercom shall notify Customer
without undue delay and shall provide such information as Customer may
reasonably require, including to enable Customer to fulfil its data breach
reporting obligations under Applicable Data Protection Legislation.

vi. Intercom’s notification of or response to a Security Breach shall not be
construed as an acknowledgement by Intercom of any fault or liability with
respect to the Security Breach.

vii. Customer is solely responsible for its use of the Service, including (a)
making appropriate use of the Service to ensure a level of security appropriate
to the risk in respect of Customer Data; (b) securing the account authentication
credentials, systems and devices Customer uses to access the Service; and (c)
backing up Customer Data.

10. RETURN OR DELETION OF CUSTOMER DATA. UPON TERMINATION OR EXPIRY OF THIS
AGREEMENT, INTERCOM WILL (AT CUSTOMER'S ELECTION) DELETE OR RETURN TO CUSTOMER
ALL CUSTOMER DATA (INCLUDING COPIES) IN ITS POSSESSION OR CONTROL AS SOON AS
REASONABLY PRACTICABLE AND WITHIN A MAXIMUM PERIOD OF 30 DAYS OF TERMINATION OR
EXPIRY OF THE AGREEMENT, SAVE THAT THIS REQUIREMENT WILL NOT APPLY TO THE EXTENT
THAT INTERCOM IS REQUIRED BY APPLICABLE LAW TO RETAIN SOME OR ALL OF THE
CUSTOMER DATA, OR TO CUSTOMER DATA IT HAS ARCHIVED ON BACK-UP SYSTEMS, WHICH
CUSTOMER DATA INTERCOM WILL SECURELY ISOLATE AND PROTECT FROM ANY FURTHER
PROCESSING, EXCEPT TO THE EXTENT REQUIRED BY APPLICABLE LAW.

11. AUDITS.

i. The parties acknowledge that when Intercom is acting as a processor on behalf
of Customer, Customer must be able to assess Intercom’s compliance with its
obligations under Applicable Data Protection Legislation and this DPA.

ii. Intercom shall make available to Customer all information reasonably
necessary to demonstrate compliance with this DPA and the obligations under
Article 28 of the GDPR. While it is the parties' intention ordinarily to rely on
the provision of the documentation to demonstrate Intercom's compliance with
this DPA and the provisions of Article 28 of the GDPR, Intercom shall permit
Customer (or its appointed third party auditors) to carry out an audit at
Customer’s cost and expense (including without limitation the costs and expenses
of Intercom) of Intercom’s processing of Customer Data under the Agreement
following a Security Breach suffered by Intercom, or upon the instruction of a
data protection authority acting pursuant to Applicable Data Protection
Legislation. Customer must give Intercom reasonable prior notice of such
intention to audit, conduct its audit during normal business hours, and take all
reasonable measures to prevent unnecessary disruption to Intercom's operations.
Any such audit shall be subject to Intercom's security and confidentiality terms
and guidelines and may only be performed a maximum of once annually. If Intercom
declines to follow any instruction requested by Customer regarding audits,
Customer is entitled to terminate the Agreement.

iii. Intercom uses external auditors to verify the adequacy of its security
measures with respect to its processing of Customer Data. A description of
Intercom’s certifications and standards for audit can be found at
https://www.intercom.com/security.

12. TRANSFER MECHANISMS.

i. Location of Processing. Customer acknowledges that Intercom and its
Sub-processors may transfer and process personal data to and in the United
States of America and other locations in which Intercom, its Affiliates or its
Sub-processors maintain data processing operations, as more particularly
described in the Sub-processor Page. Intercom shall ensure that such transfers
are made in compliance with Applicable Data Protection Legislation and this DPA.

ii. Transfer Mechanism. The parties agree that when the transfer of personal
data from Customer (as "data exporter") to Intercom (as "data importer") is a
Restricted Transfer and Applicable Data Protection Legislation require that
appropriate safeguards are put in place, such transfer shall be subject to the
appropriate Standard Contractual Clauses, which shall be deemed incorporated
into and form part of this DPA, as follows:

a. In relation to transfers of Customer Data that is protected by the GDPR, the
EU SCCs shall apply, completed as follows:

 1. Module Two or Module Three will apply (as applicable);
 2. in Clause 7, the optional docking clause will apply;
 3. in Clause 9, Option 2 will apply, and the time period for prior notice of
    Sub-processor changes shall be as set out in section 7.ii.b of this DPA;
 4. in Clause 11, the optional language will not apply;
 5. in Clause 17, Option 1 will apply, and the EU SCCs will be governed by by
    the law of the EU Member State in which the data exporter is established and
    if no such law by Irish law;
 6. in Clause 18(b), disputes shall be resolved before the courts of the EU
    Member State in which the data exporter is established and otherwise
    Ireland;
 7. Annex I of the EU SCCs shall be deemed completed with the information set
    out in Schedule 1 to this DPA; and
 8. Subject to section 9.iii of this DPA, Annex II of the EU SCCs shall be
    deemed completed with the information set out in Schedule 2 to this DPA;

b. In relation to transfers of Account Data protected by the GDPR and processed
in accordance with Section 2.iv of this DPA, the EU SCCs shall apply, completed
as follows:

 1. Module One will apply;
 2. in Clause 7, the optional docking clause will apply;
 3. in Clause 11, the optional language will not apply;
 4. in Clause 17, Option 1 will apply, and the EU SCCs will be governed by Irish
    law;
 5. in Clause 18(b), disputes shall be resolved before the courts of Ireland;
 6. Annex I of the EU SCCs shall be deemed completed with the information set
    out in Schedule 1 to this DPA; and
 7. Subject to section 9.iii of this DPA, Annex II of the EU SCCs shall be
    deemed completed with the information set out in Schedule 2 to this DPA;

c. In relation to transfers of personal data protected by the UK GDPR or Swiss
DPA, the EU SCCs as implemented under sub-paragraphs (a) and (b) above will
apply with the following modifications:

 1. references to "Regulation (EU) 2016/679" shall be interpreted as references
    to UK Privacy Laws or the Swiss DPA (as applicable);
 2. references to specific Articles of "Regulation (EU) 2016/679" shall be
    replaced with the equivalent article or section of UK Privacy Laws or the
    Swiss DPA (as applicable);
 3. references to "EU", "Union", "Member State" and "Member State law" shall be
    replaced with references to "UK" or "Switzerland", or "UK law" or "Swiss
    law" (as applicable);
 4. the term "member state" shall not be interpreted in such a way as to exclude
    data subjects in the UK or Switzerland from the possibility of suing for
    their rights in their place of habitual residence (i.e., the UK or
    Switzerland);
 5. Clause 13(a) and Part C of Annex I are not used and the "competent
    supervisory authority" is the UK Information Commissioner or Swiss Federal
    Data Protection Information Commissioner (as applicable);
 6. references to the "competent supervisory authority" and "competent courts"
    shall be replaced with references to the "Information Commissioner" and the
    "courts of England and Wales" or the "Swiss Federal Data Protection
    Information Commissioner" and "applicable courts of Switzerland" (as
    applicable);
 7. in Clause 17, the Standard Contractual Clauses shall be governed by the laws
    of England and Wales or Switzerland (as applicable); and
 8. with respect to transfers to which UK Privacy Laws apply, Clause 18 shall be
    amended to state "Any dispute arising from these Clauses shall be resolved
    by the courts of England and Wales. A data subject may bring legal
    proceeding against the data exporter and/or data importer before the courts
    of any country in the UK. The Parties agree to submit themselves to the
    jurisdiction of such courts", and with respect to transfers to which the
    Swiss DPA applies, Clause 18(b) shall state that disputes shall be resolved
    before the applicable courts of Switzerland.

d. To the extent that and for so long as the EU SCCs as implemented in
accordance with sub-paragraph (a)-(c) above cannot be used to lawfully transfer
Customer Data and Account Data in accordance with the UK GDPR to Intercom, the
UK SCCs shall be incorporated into and form an integral part of this DPA and
shall apply to transfers governed by the UK GDPR. For the purposes of the UK
SCCs, the relevant annexes, appendices or tables shall be deemed populated with
the information set out in Schedules 1 and 2 of this DPA.

e. It is not the intention of either party to contradict or restrict any of the
provisions set forth in the Standard Contractual Clauses and, accordingly, if
and to the extent the Standard Contractual Clauses conflict with any provision
of the Agreement (including this DPA) the Standard Contractual Clauses shall
prevail to the extent of such conflict.

iii. Alternative Transfer Mechanism. To the extent that Intercom adopts an
alternative data export mechanism (including any new version of or successor to
the Standard Contractual Clauses adopted pursuant to Applicable Data Protection
Legislation) ("Alternative Transfer Mechanism"), the Alternative Transfer
Mechanism shall upon notice to Customer and an opportunity to object, apply
instead of any applicable transfer mechanism described in this DPA (but only to
the extent such Alternative Transfer Mechanism complies with Applicable Data
Protection Legislation applicable to Europe and extends to territories to which
Customer Data and Account Data is transferred).

13. COOPERATION AND DATA SUBJECT RIGHTS.

i. Data Subject Rights. Intercom shall, taking into account the nature of the
processing, provide reasonable assistance to Customer where possible and at
Customer's cost and expense, to enable Customer to respond to requests from a
data subject seeking to exercise their rights under Applicable Data Protection
Legislation. In the event that such request is made directly to Intercom, if
Intercom can, through reasonable means, identify the Customer as the controller
of the Personal Data of a data subject, Intercom shall promptly inform Customer
of the same

ii. Cooperation. In the event that either party receives (a) any request from a
data subject to exercise any of its rights under Applicable Data Protection
Legislation or (b) any Third Party Request relating to the processing of Account
Data or Customer Data conducted by the other party, such party will promptly
inform the other party in writing. The parties agree to cooperate, in good
faith, as necessary to respond to any Third Party Request and fulfill their
respective obligations under Applicable Data Protection Legislation.

14. MISCELLANEOUS.

i. If there is a conflict between the Agreement and this DPA, the terms of this
DPA will prevail. The order of precedence will be: (a) this DPA; (a) the
Agreement; and (c) the Privacy Policy. To the extent there is any conflict
between the Standard Contractual Clauses, and any other terms in this DPA, the
Agreement, or the Privacy Pol-icy, the provisions of the Standard Contractual
Clauses will prevail.

ii. Any claims brought in connection with this DPA will be subject to the terms
and conditions, including, but not limited to, the exclusions and limitations
set forth in the Agreement.

iii. In no event does this DPA restrict or limit the rights of any data subject
or of any competent supervisory authority.

iv. In the event (and to the extent only) of a conflict (whether actual or
perceived) among Applicable Data Protection Legislation, the parties (or
relevant party as the case may be) shall comply with the more onerous
requirement or standard which shall, in the event of a dispute in that regard,
be solely determined by Intercom.

v. Notwithstanding anything else to the contrary in the Agreement and without
prejudice to Sections 2(iii) and 2 (iv), Intercom reserves the right to make any
modification to this DPA as may be required to comply with Applicable Data
Protection Legislation.

vi. Except as amended by this DPA, the Agreement will remain in full force and
effect.

vii. Notwithstanding anything in the Agreement or any order form entered in
connection therewith, the parties acknowledge and agree that Intercom access to
Customer Data does not constitute part of the consideration exchanged by the
parties in respect of the Agreement.

Schedule 1

DETAILS OF PROCESSING

Annex I

A. LIST OF PARTIES

Data exporter(s): [Identity and contact details of the controller(s) /data
exporter(s) and, where applicable, of its/their data protection officer and/or
representative in the European Union]

Name of Data exporter: The party identified as the "Customer" in the Agreement
and this DPA Address: As set forth in the Agreement Contact person’s name,
position, and contact details: As set forth in the Agreement Activities relevant
to the data transferred under these Clauses: See Annex 1(B) below Signature and
date: This Annex I shall automatically be deemed executed when the Agreement is
executed by Customer Role (controller/processor): Controller or Processor

Data importer(s): [Identity and contact details of the processor(s) /data
importer(s), including any contact person with responsibility for data
protection]

Name: Intercom, Inc. Address: 55 2nd Street, 4th Floor San Francisco, CA 94105
USA Contact person’s name, position, and contact details: Intercom Privacy Team
– [legal@intercom.io](legal@intercom.io) Activities relevant to the data
transferred under these Clauses: See Annex 1(B) below Signature and date: This
Annex I shall automatically be deemed executed when the Agreement is executed by
Intercom. Role (controller/processor): Processor

B. DESCRIPTION OF PROCESSING/ TRANSFER

Categories of Data Subjects whose personal data is transferred Module One
Customer’s employees and individuals authorized by Customer to access Customer’s
Intercom account: Employees or contact persons of Customer's prospects,
customers, business partners and vendors. Modules Two and Three
Customer’s end users: Prospects, customers, business partners and vendors of
Customer (who are natural persons). Categories of Personal Data transferred
Module One
Account Data which constitutes Personal Data, such as name and contact
information as well as Customer billing address. Modules Two and Three
Any Customer Data processed by Intercom in connection with the Services and
which could constitute any type of Personal Data included in chats or messages,
including, without limitation, username, password, email address, IP address as
well as customer attribute data, website page view data, click data and social
media information. Sensitive data transferred (if applicable) and applied
restrictions or safeguards Intercom does not knowingly collect (and Customer
shall not submit) any sensitive data or any special categories of data (as
defined under Applicable Data Protection Legislation). Frequency of the transfer
Continuous. Nature and purpose(s) of the data transfer and Processing Module One
Personal data contained in Account Data will be processed to manage the account,
including to access Customer’s account and billing information, for identity
verification, to maintain or improve the performance of the Services, to provide
support, to investigate and prevent system abuse, or to fulfill legal
obligations. Modules Two and Three
Personal Data contained in Customer Data will be subject to the following basic
processing activities:

Intercom provides a communication platform to facilitate interaction and
engagement between the Customer and end users. This service will consist of
providing a communication platform for the Customer to use in order to on-board
and retain end users as well as analyze their use of the Customer's product
and/or services.

Intercom will process personal data as necessary to provide the Services under
the Agreement. Intercom does not sell Customer’s Personal Data or Customer end
users’ Personal Data and does not share such end users’ Personal Data with third
parties for compensation or for those third parties’ own business interests.

Additional details about Intercom's products and services can be found at
https://www.intercom.com. Retention period (or, if not possible to determine,
the criterial used to determine the period) Module One
Intercom will process Account Data as long as required (a) to provide the
Services to Customer; (b) for Intercom’s lawful and legitimate business needs;
or (c) in accordance with applicable law or regulation. Account Data will be
stored in accordance with the Privacy Policy. Modules Two and Three
Upon termination or expiry of this Agreement, Intercom will (at Customer's
election) delete or return to Customer all Customer Data (including copies) in
its possession or control as soon as reasonably practicable and within a maximum
period of 30 days of termination or expiry of the Agreement, save that this
requirement will not apply to the extent that Intercom is required by applicable
law to retain some or all of the Customer Data, or to Customer Data it has
archived on back-up systems, which Customer Data Intercom will securely isolate
and protect from any further processing, except to the extent required by
applicable law. For transfers to (sub-) processors, also specify subject matter,
nature, and duration of the processing Modules Two and Three only
Intercom will restrict the onward sub-processor’s access to Customer Data only
to what is strictly necessary to provide the Services, and Intercom will
prohibit the sub-processor from processing the Personal Data for any other
purpose.

Intercom imposes contractual data protection obligations, including appropriate
technical and organizational measures to protect personal data, on any
sub-processor it appoints that require such sub-processor to protect Customer
Data to the standard required by Applicable Data Protection Legislation.

Intercom will remain liable and accountable for any breach of this DPA that is
caused by an act or omission of its sub-processors. Identify the competent
supervisory authority/ies in accordance with Clause 13 Where the EU GDPR
applies, the competent supervisory authority shall be (i) the supervisory
authority applicable to the data exporter in its EEA country of establishment
or, (ii) where the data exporter is not established in the EEA, the supervisory
authority applicable in the EEA country where the data exporter's EU
representative has been appointed pursuant to Article 27(1) GDPR, or (iii) where
the data exporter is not obliged to appoint a representative, the supervisory
authority applicable to the EEA country where the data subjects relevant to the
transfer are located.. Where the UK GDPR applies, the UK Information
Commissioner's Office.

Schedule 2

TECHNICAL AND ORGANIZATIONAL SECURITY MEASURES

Annex II

Further details of Intercom’s technical and organizational security measures to
protect Customer Data are available at:

 * https://www.intercom.com/security
 * https://www.intercom.com/legal/security-policy
 * https://intercom.com/help/en/articles/1385437-how-intercom-complies-with-gdpr
 * https://www.intercom.com/legal/privacy

Where applicable, this Schedule 2 will serve as Annex II to the Standard
Contractual Clauses. The following table provides more information regarding the
technical and organizational security measures set forth below.

Technical and Organizational Security Measure Evidence of Technical and
Organizational Security Measure Measures of pseudonymisation and encryption of
personal data
 * All data sent to or from Intercom is encrypted in transit using TLS 1.2.
 * Customer Personal Data is encrypted at rest using 256-bit encryption,
   leveraging AWS' encryption framework’s model C as described in
   https://d0.awsstatic.com/whitepapers/aws-securing-data-at-rest-with-encryption.pdf
 * All Intercom datastores used to process Customer data are configured and
   patched using commercially reasonable methods according to
   industry-recognized system-hardening standards.
 * See “Encryption” at https://www.intercom.com/security.

Measures for ensuring ongoing confidentiality, integrity, availability and
resilience of processing systems and services
 * Intercom has implemented a formal procedure for handling security events.
   When security events are detected, they are escalated to an emergency alias,
   relevant parties are paged, notified, and assembled to rapidly address the
   event. After a security event is contained and mitigated, relevant teams
   write up a post-mortem analysis, which is reviewed in person and distributed
   across the company and includes action items that will make the detection and
   prevention of a similar event easier in the future.
 * All Customer Data is permanently stored in the USA and is backed up for
   disaster recovery.
 * Intercom relies on Amazon Web Services (AWS), a reputable
   Infrastructure-As-A-Service provider. Intercom leverages their portfolio of
   globally redundant services to ensure Services run reliably. Intercom
   benefits from the ability to dynamically scale up, or completely re-provision
   its infrastructure resources on an as-needed basis, across multiple
   geographical areas, using the same vendor, tools, and APIs. Intercom’s
   infrastructure scales up and down on demand as part of day-to-day operations
   and does so in response to any changes in our customers’ needs. This includes
   not just compute resources, but storage and database resources, networking,
   security, and DNS. Every component in Intercom’s infrastructure is designed
   and built for high availability.
 * Intercom’s data security, high availability, and built-in redundancy are
   designed to ensure application availability and protect information from
   accidental loss or destruction. Intercom’s Disaster Recovery plan
   incorporates geographic failover between its 3 U.S. data centers.
   Subscription Service restoration is within commercially reasonable efforts
   and is performed in conjunction with AWS’ ability to provide adequate
   infrastructure at the prevailing failover location. All of Intercom recovery
   and resilience mechanisms are tested regularly and processes are updated as
   required.
 * Intercom operates a dedicated 24x7 on-call incident management function,
   ready to immediately respond to, and mitigate, any Customer impacting issues.
   This is supported by Intercom’s broader internal Availability program which
   is dedicated to ensuring Intercom maintains their system availability.
 * Intercom has no direct reliance on specific office locations to sustain
   operations. All operational access to production resources can be exercised
   at any location on the Internet. Intercom leverages a range of best-of- breed
   technologies and other critical cloud tools to deliver uninterrupted remote
   work for all employees.
 * All Customer Data deleted by Intercom is deleted from AWS datastores in
   accordance with the NIST Special Publication 800-88 Revision 1, Guidelines
   for Media Sanitation December 18, 2014 (available at
   http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf).
   With respect to Customer Data encrypted in compliance with this security
   policy, this deletion may be done by permanently and securely deleting all
   copies of the keys used for encryption.
 * See "Back Ups and Monitoring" at www.intercom.com/security.

Measures for ensuring the ability to restore the availability and access to
personal data in a timely manner in the event of a physical or technical
incident
 * See response for “Measures for ensuring ongoing confidentiality, integrity,
   availability and resilience of processing systems and services” above.

Processes for regularly testing, assessing, and evaluating the effectiveness of
technical and organizational measures in order to ensure the security of the
processing
 * Intercom regularly tests their security systems and processes to ensure they
   meet the requirements of this security policy and ensures that the physical
   and environmental security controls are audited for SOC 2 Type II compliance,
   among other certifications.
 * Application Scans. Intercom performs periodic (but no less than once per
   month) application vulnerability scans. Vulnerabilities shall be remediated
   on a risk basis.
 * Third party penetration tests. Intercom employs an independent third-party
   vendor to conduct periodic (but no less than once per year) penetration tests
   on their web properties.
 * Bug bounty program. Intercom maintains a security bug bounty program, which
   gives independent security researchers a platform for testing and submitting
   vulnerability reports.

Measures for user identification and authorisation
 * Single Sign-On (SSO)
 * Logical Access Controls. Intercom assigns a unique ID to each employee and
   leverages an Identity Provider to manage access to systems processing
   Customer Data.
 * All access to systems processing Customer Data is protected by Multi Factor
   Authentication (MFA).
 * Intercom restricts access to Customer Data to only those people with a
   “need-to-know” for a Permitted Purpose and following least privileges
   principles.
 * Intercom regularly reviews at least every 180 days the list of people and
   systems with access to Customer Data and removes accounts upon termination of
   employment or a change in job status that results in employees no longer
   requiring access to Customer Data.
 * Intercom mandates and ensures the use of system-enforced “strong passwords”
   in accordance with the best practices (described below) on all systems
   hosting, storing, processing, or that have or control access to Customer Data
   and will require that all passwords and access credentials are kept
   confidential and not shared among personnel.
 * Password best practices implemented by Intercom’s Identity Provider.
   Passwords must meet the following criteria: a. contain at least 10
   characters; b. must contain lowercase and uppercase letters, numbers, and a
   special character; c. cannot be part of a vendor provided list of common
   passwords.
 * Intercom maintains and enforces “account lockout” by disabling accounts with
   access to Customer Data when an account exceeds more than ten (10)
   consecutive incorrect password attempts.
 * Intercom does not operate any internal corporate network. All access to
   Intercom resources is protected by strong passwords and MFA.
 * Intercom monitors their production systems and implements and maintains
   security controls and procedures designed to prevent, detect, and respond to
   identified threats and risks.
 * Strict privacy controls exist in the application code that are designed to
   ensure data privacy and to prevent one customer from accessing another
   customer’s data (i.e., logical separation).

Measures for the protection of data during transmission
 * See “Measures of pseudonymisation and encryption of personal data” above.
 * See “Infrastructure” at www.intercom.com/legal/security-policy.

Measures for the protection of data during storage
 * Intrusion Prevention. Intercom implements and maintains a working network
   firewall to protect data accessible via the Internet and will keep all
   Customer Data protected by the firewall at all times.
 * Intercom keeps its systems and software up to date with the latest upgrades,
   updates, bug fixes, new versions, and other modifications necessary to ensure
   security of the Customer Data.
 * Security Awareness Training. Intercom requires annual security and privacy
   training for all employees with access to Customer Data.
 * Intercom uses anti-malware software and keeps the anti-malware software up to
   date. Customer instances are logically separated and attempts to access data
   outside allowed domain boundaries are prevented and logged.
 * Endpoint security software
 * System inputs recorded via log files
 * Access Control Lists (ACL)
 * Multi-factor Authentication (MFA)
 * See “Back Ups and Monitoring” and “Permissions and Authentication” at
   https://www.intercom.com/security.

Measures for ensuring physical security of locations at which personal data are
processed
 * Physical Access Control. Intercom’s services and data are hosted in AWS’
   facilities in the USA and protected by AWS in accordance with their security
   protocols.
 * Access only to approved personnel.
 * All personnel who need data center access must first apply for access and
   provide a valid business justification. These requests are granted based on
   the principle of least privilege and are time-bound. Requests are reviewed
   and approved by authorized personnel, and access is revoked after the
   requested time expires.

Measures for ensuring events logging
 * See “Measures for the protection of data during storage” above.
 * See
   https://www.intercom.com/help/en/articles/4667982-review-actions-taken-in-your-workspace-with-teammate-activity-logs.

Measures for ensuring system configuration, including default configuration
 * Change and Configuration Management. Intercom uses continuous automation for
   application and operating systems deployment for new releases. Integration
   testing and unit testing are done upon every build with safeguards in place
   for availability and reliability. Intercom has a process for critical
   emergency fixes that can be deployed to Customers within minutes. As such
   Intercom can roll out security updates as required based on criticality.
 * Access Control Policy and Procedures
 * Change Management Procedures

Measures for internal IT and IT security governance and management
 * Information security management procedures in accordance with the ISO
   27001:2013 standard.
 * Information-related business operations continue to be carried out in
   accordance with the ISO27001:2013 standard.
 * Information security policy
 * Security Breach Response Plan
 * Other written security policies include: (a) Business Continuity Policy; (b)
   Secure Software Development Policy; (c) Electronic Device Policy; (d) Data
   Classification Policy; (e) Network Security Policy; (f) IT Security Policy;
   (g) Physical Security Policy; (h) Access Control Policy.

Measures for certification/assurance of processes and products
 * See https://www.intercom.com/security..

Measures for ensuring data minimisation
 * Data collection is limited to the purposes of processing (or the data that
   the Customer chooses to provide).
 * Security measures are in place to provide only the minimum amount of access
   (least privilege) necessary to perform required functions.
 * Upon termination or expiry of this Agreement, Intercom will (at Customer's
   election) delete or return to Customer all Customer Data (including copies)
   in its possession or control as soon as reasonably practicable and within a
   maximum period of 30 days of termination or expiry of the Agreement, save
   that this requirement will not apply to the extent that Intercom is required
   by applicable law to retain some or all of the Customer Data, or to Customer
   Data it has archived on back-up systems, which Customer Data Intercom will
   securely isolate and protect from any further processing, except to the
   extent required by applicable law.
 * More information about how Intercom processes personal data is set forth in
   the Privacy Policy available at https://www.intercom.com/legal/privacy.

Measures for ensuring data quality
 * Intercom has a process that allows data subjects to exercise their privacy
   rights (including a right to amend and update their Personal Data), as
   described in Intercom’s Privacy Policy.
 * See “Measures for ensuring ongoing confidentiality, integrity, availability
   and resilience of processing systems and services” above.

Measures for ensuring limited data retention
 * See “Measures for ensuring data minimization” above.

Measures for ensuring accountability
 * Intercom has implemented data protection policies
 * Intercom follows a compliance by design approach
 * Intercom maintains documentation of your processing activities
 * Intercom has appointed a data protection officer
 * Intercom adheres to relevant codes of conduct and signing up to certification
   schemes (see “Measures for certification/assurance of processes and products”
   above).

Measures for allowing data portability and ensuring erasure
 * Secure Disposal. Return or Deletion. Intercom will permanently and securely
   delete all live (online or network accessible) instances of the Customer Data
   within 90 days upon Customer’s in-app deletion request.
 * Archival Copies. When required by law to retain archival copies of Customer
   Data for tax or similar regulatory purposes, this archived Customer Data is
   stored as a “cold” or offline (i.e., not available for immediate or
   interactive use) backup stored in a physically secure facility.
 * Intercom has a process that allows data subjects to exercise their privacy
   rights (including a right to amend and update their Personal Data), as
   described in Intercom’s Privacy Policy.

Technical and organizational measures to be taken by the [sub]-processor to
provide assistance to the controller and, for transfers from a processor to a
[sub]-processor, to the Customer.
 * Vendor & Services Providers. Prior to engaging new third-party service
   providers or vendors who will have access to Intercom Data, Intercom conducts
   a risk assessment of vendors’ data security practices.
 * Intercom will restrict the onward sub-processor’s access to Customer Data
   only to what is strictly necessary to provide the Services, and Intercom will
   prohibit the sub-processor from processing the Personal Data for any other
   purpose.
 * Intercom imposes contractual data protection obligations, including
   appropriate technical and organizational measures to protect personal data,
   on any sub-processor it appoints that require such sub-processor to protect
   Customer Data to the standard required by Applicable Data Protection
   Legislation.
 * Intercom will remain liable and accountable for any breach of this DPA that
   is caused by an act or omission of its sub-processors.

Schedule 3

LIST OF SUB-PROCESSORS

Annex III

In Clause 9 of the 2021 Standard Contractual Clauses, Option 2 will apply and
the time period for prior notice of sub-processor changes will be as set forth
in Section 7.ii (Current Sub-processors and Notification of Sub-processor
Changes) of this DPA.

Customer agrees that (a) Intercom may engage Intercom and Sub-processors as
listed at https://www.intercom.com/legal/security-third-parties - (the
"Sub-processor Page").

Intercom may, by giving reasonable notice to the Customer, add or make changes
to the Sub-processor Page. Intercom will notify Customer if it intends to add or
replace Sub-processors from the Sub-Processor Page at least 10 days prior to any
such changes. In order to receive such notification, Customers can follow link
http://privacy.intercom.com/third-party-subscribe to join Intercom’s
distribution list. If Customer objects to the appointment of an additional
Sub-processor within thirty (30) calendar days of such notice on reasonable
grounds relating to the protection of the Personal Data, then Intercom will work
in good faith with Customer to find an alternative solution. In the event that
the parties are unable to find such a solution, Customer may terminate the
Agreement at no additional cost.

Sitemap

 * Pricing

 * Use Cases
   
   * Support
   * Engage
   * Convert

 * Company Size
   
   * Mid-Market / Enterprise
   * Small Business
   * Early Stage

 * Industries
   
   * Financial Services
   * E-commerce
   * Education
   * Healthcare

 * Features
   
   * Business Messenger
   * Customizable bots
   * Automated answers
   * Product Tours
   * Outbound Messages
   * Inbox
   * Help Center Articles
   * Account Based Marketing
   * Management Tools
   * Apps + Integrations
   * Customer data
   * Live Chat
   * Mobile Apps
   * Mobile Carousels
   * Series
   * Transactional Messaging
   * Surveys
   * Switch

 * Resources
   
   * Blog
   * Watch a Demo
   * Academy
   * Webinars
   * What's New
   * Product Changes
   * App Store
   * Docs
   * Developers
   * Status
   * Security
   * Books and Guides
   * Support ROI Calculator
   * Services

 * Company
   
   * About
   * Customers
   * Community Forum
   * Careers
   * Press Resources
   * App Partner Program
   * Service Partner Program
   * Contact Us
   * Terms
   * Privacy

From the blog

 * How to ask your customers great questions and gather actionable feedback – 3
   key takeaways
 * What is first contact resolution (FCR)?
 * What is customer onboarding?
 * How our infrastructure scales alongside our customers

Read more


🌎 CHOOSE YOUR LANGUAGE

 * English (United States)
 * German
 * Spanish
 * French
 * Portuguese (Brazil)

 * Terms
 * Privacy
 * Status
 * Security




FRESH COOKIE UPDATE



We use cookies to make our site work and also for analytics and advertising
purposes. You can enable or disable optional cookies as desired. See our Cookie
Policy for more details.



Manage your cookiesAccept all cookies