Data Processing Addendum
This Data Processing Addendum (including all Schedules attached hereto, the “DPA”) is incorporated into, and is subject to the terms and conditions of, the Master Services Agreement or other written or electronic agreement (“Agreement”) between the 5X entity identified as the contracting entity in the Agreement (“5X”) and the entity identified as “Customer” in the Agreement (“Customer”). This DPA applies to the extent 5X’s Processing of Customer Personal Data is subject to the Data Protection Laws. This DPA shall be effective for the term of the Agreement.
For this DPA:
- “CCPA” means the California Consumer Privacy Act, including as modified by the California Privacy Rights Act (“CPRA”) once the CPRA takes effect, together with any implementing regulations;
- “Controller” means the entity which determines the purposes and means of the Processing of Personal Data;
- “Customer Personal Data” means the Personal Data described under Schedule 1 to this DPA;
- “Data Protection Laws” means all laws relating to data protection and privacy applicable to 5X’s Processing of Customer Personal Data, including without limitation, the CCPA, the GDPR and member state laws implementing the GDPR, the United Kingdom’s Data Protection Act 2018, and applicable privacy and data protection laws of any other jurisdiction, each as amended, repealed, consolidated or replaced from time to time;
- “Data Subjects” means the individuals identified in Schedule 1;
- “EU SCCs” means the Standard Contractual Clauses approved with Commission Implementing Decision (EU) 2021/914 of June 4, 2021 on standard contractual clauses for the transfer of personal data to third countries pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council, as amended, supplemented, updated or replaced from time to time;
- “GDPR” means the General Data Protection Regulation (EU) 2016/679 together with any national implementing laws in any member state of the EEA (“EU GDPR”) and the EU GDPR as incorporated into the laws of the United Kingdom (“UK GDPR”);
- “Personal Data”, “Personal Data Breach” and “Processing” will each have the meaning given to them in the Data Protection Laws. The term “Personal Data” includes “personal information,” “personally identifiable information,” and equivalent terms as such terms may be defined by the Data Protection Laws. The term “Personal Data Breach” includes equivalent terms as defined by the Data Protection Laws;
- “Processor” means the entity which Processes Personal Data on behalf of the Controller;
- “Sell” has the meaning given in the Data Protection Laws; and
- “UK SCCs” means the Standard Contractual Clauses for controller to processor transfers set forth in the European Commission’s decision (C(2010)593) of 5 February 2010.
Capitalized terms not otherwise defined herein shall have the meaning given to them in the Agreement.
2. Processing of Customer Personal Data
- The parties acknowledge and agree that Customer is the Controller of Customer Personal Data and 5x is a Processor of Customer Personal Data. 5x will only Process Customer Personal Data as a Processor on behalf of and in accordance with Customer’s prior written instructions, including any instructions provided through Customer’s use of the Service. 5x is hereby instructed to Process Customer Personal Data to the extent necessary to provide the Service as set forth in the Agreement and this DPA. 5x shall not (1) retain, use, or disclose Customer Personal Data other than as provided for in the Agreement, as needed to provide the Service, or as otherwise permitted by Data Protection Laws; (2) combine Customer Personal Data with Personal Data 5x receives from other customers or individuals (except as permitted by the CCPA); or (3) Sell Customer Personal Data. 5x shall notify Customer if it determines that it cannot meet its obligations under the CPRA. Upon receiving written notice from Customer that 5x has Processed Customer Personal Data without authorization, 5x will stop and remediate such Processing.
- 5x will immediately inform Customer if, in its opinion, an instruction from Customer infringes the Data Protection Laws.
- The details of 5x’s Processing of Customer Personal Data are described in Schedule 1.
- If applicable laws preclude 5x from complying with Customer’s instructions, 5x will inform Customer of its inability to comply with the instructions, to the extent permitted by law.
- Each of Customer and 5x will comply with their respective obligations under the Data Protection Laws.
3. Cross-Border Transfers of Personal Data
With respect to Customer Personal Data originating from the European Economic Area (“EEA”) or Switzerland that is transferred from Customer to 5x, the parties agree to comply with the general clauses and with “Module Two” (Controller to Processor) of the EU SCCs, which are incorporated herein by reference, with Customer as the “data exporter” and 5x as the “data importer.”
For purposes of the EU SCCs the parties agree that:
- In Clause 7, the optional docking clause will not apply;
- In Clause 9, Option 2 will apply and the time period for prior notice of Sub-Processor changes will be as set forth in Section 5.1 of this DPA;
- In Clause 11, the optional language will not apply;
- For the purposes of Clause 15(1)(a), 5x shall notify Customer (only) and not the Data Subject(s) in case of government access requests and Customer shall be solely responsible for promptly notifying the affected Data Subjects as necessary;
- In Clause 17, the EU SCCs shall be governed by the laws of Ireland;
- In Clause 18(b), the parties agree to submit to the jurisdiction of the courts of Ireland;
- In Annex I, Section A (List of Parties), (i) the data exporter’s and the data importer’s identity and contact details and, where applicable, information about their respective data protection officer and/or representative in the EEA are those set forth in the Agreement or as otherwise communicated by each party to the other party; (ii) Customer is a Controller or Processor, and 5x is a Processor; (iii) the activities relevant to the data transferred under the EU SCCs relate to the provision of the Services pursuant to the Agreement; and (iv) entering into this DPA shall be treated as each party’s signature of Annex I, Section A, as of the effective date of this DPA;
- In Annex I, Section B (Description of Transfer): (i) Schedule 1 to this DPA describes 5x’s Processing of Customer Personal Data; (ii) the frequency of the transfer is continuous (for as long as Customer uses the Services); (iii) Customer Personal Data will be retained in accordance with Clause 8.5 of the EU SCCs and this DPA; (iv) 5x uses sub-Processors to support the provision of the Services.
- In Annex I, Section C (Competent Supervisory Authority), the competent supervisory authority identified in accordance with Clause 13 of the EU SCCs is the competent supervisory authority communicated by Customer to 5x. Unless and until Customer communicates a competent supervisory authority to 5x, the competent supervisory authority shall be the Irish Data Protection Commission.
- In Annex II, data importer has implemented and will maintain appropriate technical and organizational measures to protect the security, confidentiality and integrity of Customer Personal Data as described in Schedule 2.
If the transfer of Customer Personal Data is subject to the Swiss Federal Act on Data Protection, the parties agree to rely on the EU SCCs with the following modifications: (i) the Federal Data Protection and Information Commissioner (FDPIC) will be the competent supervisory authority under Clause 13 of the EU SCCs; (ii) the parties agree to abide by the GDPR standard in relation to all Processing of Customer Personal Data that is governed by the Swiss Federal Act on Data Protection; (iii) the term ‘Member State’ in the EU SCCs will not be interpreted in such a way as to exclude Data Subjects who habitually reside in Switzerland from initiating legal proceedings in Switzerland in accordance with Clause 18(c) of the EU SCCs; and (iv) references to the ‘GDPR’ in the EU SCCs will be understood as references to the Swiss Federal Act on Data Protection insofar as the transfer of Customer Personal Data is subject to the Swiss Federal Act on Data Protection.
With respect to transfers from Customer to 5x of Customer Personal Data originating from the United Kingdom, the parties agree to comply with the UK SCCs, which are incorporated herein by reference. The parties agree that, for the UK SCCs: (i) Customer is the “data exporter”, and 5x is the “data importer”; (ii) all references to the “Directive 95/46/EC” and its provisions shall be deemed to refer to the relevant provisions of the UK GDPR and the Data Protection Act 2018 of the United Kingdom; (iii) all references to the “Commission” shall be deemed to refer to the Information Commissioner; (iv) all references to the “European Economic Area” or the “European Union” shall be deemed to refer to the United Kingdom; (v) for Appendix 1 to the UK SCCs, information about the exporter and importer, the categories of Data Subjects, types of Personal Data and type of Processing operations are as set out in Schedule 1 to this DPA; and (vi) for Appendix 2 to the UK SCCs, the security measures are as described in Schedule 2. The parties acknowledge that the Information Commissioner’s Office has not yet approved new standard contractual clauses under the UK GDPR. The UK SCCs will apply only until such time as the Information Commissioner’s Office issues new standard contractual clauses under the UK GDPR. If the Information Commissioner’s Office approves the EU SCCs for transfers from the UK, the parties agree to adopt the EU SCCS as the mechanism to legitimize such transfers. Where necessary, the parties shall work together, in good faith, to enter into an updated version of the UK SCCs or negotiate an alternative solution to enable transfers of Customer Personal Data in compliance with Data Protection Laws.
4. Confidentiality and Security
- 5x will require 5x’s personnel who access Customer Personal Data to commit to protect the confidentiality of Customer Personal Data.
- 5x will implement commercially reasonable technical and organisational measures, as further described in Schedule 2, that are designed to protect against accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Personal Data.
- To the extent required by Data Protection Laws, 5x will provide Customer with reasonable assistance as necessary for the fulfilment of Customer’s obligations under Data Protection Laws to maintain the security of Customer Personal Data.
- Customer agrees that 5x may engage the Sub-Processors identified at in Schedule 3 to Process Customer Personal Data on Customer’s behalf. 5x will inform Customer of any intended changes concerning the addition or replacement of Sub-Processors at least fifteen days prior to the change taking effect and Customer will have an opportunity to object to such changes on reasonable grounds within seven days after being notified. If the parties are unable to resolve such objection, either party may terminate the Agreement by providing written notice to the other party.
- 5x will impose on its Sub-Processors substantially the same obligations that apply to 5x under this DPA. 5x will be liable to Customer for breaches of its Sub-Processors’ obligations as it would be for its own.
- The parties agree that the copies of the Authorized Sub-Processor agreements that must be provided by 5x to Customer pursuant to Clause 9(c) of the EU SCCs and Clause 5 of the UK SCCs, if applicable, may have commercial information or clauses unrelated to the EU or UK SCCs removed by 5x beforehand; and, that such copies will be provided by 5x, in a manner to be determined in its discretion, only upon Customer’s written request.
6. Data Subject Rights
Customer is responsible for responding to any Data Subject requests relating to Customer Personal Data (“Requests”). If 5x receives any Requests during the term, 5x will advise the Data Subject to submit the request directly to Customer. 5x will provide Customer with self-service functionality or other reasonable assistance to permit Customer to respond to Requests.
7. Personal Data Breaches
Upon becoming aware of a Personal Data Breach affecting Customer Personal Data, 5x will (i) promptly take measures designed to remediate the Personal Data Breach and (ii) notify Customer without undue delay. Customer is solely responsible for complying with Personal Data Breach notification requirements applicable to Customer. At Customer’s request, 5x will reasonably assist Customer’s efforts to notify Personal Data Breaches to the competent data protection authorities and/or affected Data Subjects, if Customer is required to do so under the Data Protection Laws. 5x’s notice of or response to a Personal Data Breach under this Section 7 will not be an acknowledgement or admission by 5x of any fault or liability with respect to the Personal Data Breach.
8. Data Protection Impact Assessment; Prior Consultation
Taking into account the nature of the Processing and the information available to 5x, 5x will reasonably assist Customer in conducting data protection impact assessments and consultation with data protection authorities if Customer is required to engage in such activities under applicable Data Protection Laws and such assistance is necessary and relates to the Processing by 5x of Customer Personal Data.
9. Deletion of Customer Personal Data
Customer instructs 5x to delete Customer Personal Data within 90 days of the termination of the Agreement and delete existing copies unless applicable law requires otherwise. The parties agree that the certification of deletion described in Clause 8.5 of the EU SCCs and Clause 12 of the UK SCCs, if applicable, shall be provided only upon Customer’s written request. Notwithstanding the foregoing, 5x may retain Customer Personal Data to the extent and for the period required by applicable laws provided that 5x maintains the confidentiality of all such Customer Personal Data and Processes such Customer Personal Data only as necessary for the purpose(s) specified in the applicable laws requiring its storage.
- Customer may audit 5x’s compliance with its obligations under this DPA up to once per year. In addition, Customer may perform more frequent audits (including inspections) in the event: (1) 5x suffers a Personal Data Breach affecting Customer Personal Data; (2) Customer has genuine, documented concerns regarding 5x’s compliance with this DPA or the Data Protection Laws; or (3) where required by the Data Protection Laws, including where mandated by regulatory or governmental authorities with jurisdiction over Customer Personal Data. 5x will contribute to such audits by providing Customer or Customer’s regulatory or governmental authority with the information and assistance reasonably necessary to conduct the audit, including any relevant records of Processing activities applicable to the Service, as described below.
- To request an audit, Customer must submit a detailed proposed audit plan to at least one month in advance of the proposed audit start date. The proposed audit plan must describe the proposed scope, duration, start date of the audit, and the identity of any third party Customer intends to appoint to perform the audit. 5x will review the proposed audit plan and provide Customer with any concerns or questions (for example, 5x may object to the third party auditor as described in Section 10.3, provide an Audit Report as described in Section 10.4, or identify any requests for information that could compromise 5x confidentiality obligations or security, privacy, employment or other relevant policies). The parties will negotiate in good faith to agree on a final audit plan at least two weeks in advance of the proposed audit start date. Nothing in this Section 10 shall require 5x to breach any duties of confidentiality.
- 5x may object to third party auditors that are, in 5x’s reasonable opinion, not suitably qualified or independent, a competitor of 5x, or otherwise manifestly unsuitable. Customer will appoint another auditor or conduct the audit itself if the parties cannot resolve the objection after negotiating in good faith.
- If the requested audit scope is addressed in an SSAE 16/ISAE 3402 Type 2, ISO, NIST or similar audit report performed by a qualified third party auditor on 5x’s systems that Process Customer Personal Data (“Audit Reports”) within twelve (12) months of Customer’s audit request and 5x confirms there are no known material changes in the controls audited, Customer agrees to accept the Audit Report in lieu of requesting an audit of the controls covered by the Audit Report.
- The audit must be conducted at a mutually agreeable time during regular business hours at the applicable facility, subject to the agreed final audit plan and 5x’s health and safety or other relevant policies and may not unreasonably interfere with 5x business activities.
- Any audits are at Customer’s expense and Customer will promptly disclose to 5x any perceived non-compliance or security concerns discovered during the audit, together with all relevant details.
- The parties agree that the audits described in Clause 8.9 of the EU SCCs and Clause 5(f) of the UK SCCs, if applicable, shall be performed in accordance with this Section 10.
11. Analytics Data
Customer acknowledges and agrees that 5x may create and derive from Processing related to the Service anonymized and/or aggregated data that does not identify or relate to Customer or any Data Subject (“Analytics Data”), and use, publicize or share with third parties such Analytics Data to improve the Service and for 5x’s other legitimate business purposes.
- Each party’s liability towards the other party under or in connection with this DPA will be limited in accordance with the provisions of the Agreement.
- Customer acknowledges that 5x is reliant on Customer for direction as to the extent to which 5x is entitled to Process Customer Personal Data on behalf of Customer in performance of the Service. Consequently, 5x will not be liable under the Agreement for any claim brought by a Data Subject arising from (a) any action or omission by 5x in compliance with Customer’s instructions or (b) from Customer’s failure to comply with its obligations under the Data Protection Laws.
13. General Provisions
With regard to the subject matter of this DPA, in the event of inconsistencies between the provisions of this DPA and the Agreement, the provisions of this DPA shall prevail. In the event of inconsistencies between the DPA and the EU or UK SCCs, the EU OR UK SCCs will prevail.
Details of Processing
- Categories of Data Subjects. As a data-as-a-service company, 5x may Process Customer Personal Data relating to broad categories of individuals. Depending on the data Customer instructs 5x to process, those individuals may include Customer’s employees, contractors, and other authorized users of the Service as well as any individuals to whom the Customer Personal Data relates (“Data Subjects”).
- Types of Personal Data. As a data-as-a-service company, the types of Customer Personal Data Processed by 5x are determined and controlled by Customer in its sole discretion. Customer Personal Data could include names, email addresses, and any other Personal Data that Customer may instruct 5x to Process.
- Subject-Matter and Nature of the Processing. Customer Personal Data will be subject to the Processing activities that 5x needs to perform in order to provide the Service pursuant to the Agreement.
- Purpose of the Processing. 5x will Process Customer Personal Data for purposes of providing the Service as set out in the Agreement.
- Duration of the Processing. Customer Personal Data will be Processed for the duration of the Agreement, subject to Section 9 of the DPA.
- Purpose. 5x is committed to maintaining customer trust. The purpose of this Security Overview is to describe the security program for the 5x Services. This Security Overview describes the minimum security standards that 5x maintains in order to protect Customer Personal Data from unauthorized use, access, disclosure, theft, or manipulation. As security threats shift and evolve, 5x continues to update its security program and strategy to help protect Customer Personal Data. 5x reserves the right to update this Security Overview from time to time; provided, however, any update will not materially reduce the overall protections set forth in this Security Overview. Any capitalized term not defined in this Security Overview will have the meaning given in the Agreement or the DPA.
- Services Covered. This Security Overview describes the architecture, administrative, technical and physical controls as well as third party security audit certifications that are applicable to the Services.
- Security Organization & Program. 5x maintains a risk-based assessment security program. The framework for 5x’s security program includes administrative, technical, and physical safeguards reasonably designed to protect the confidentiality, integrity, and availability of Customer Personal Data. 5x’s security program is intended to be appropriate to the nature of 5x Services and the size and complexity of 5x’s business operations. 5x’s security framework includes programs covering: Policies and Procedures, Asset Management, Access Management, Cryptography, Physical Security, Operations Security, Communications Security, Business Continuity Security, People Security, Product Security, Cloud and Network Infrastructure Security, Security Compliance, Third-Party Security, Vulnerability Management, as well as Security Monitoring and Incident Response. Information security policies and standards are reviewed and approved by management at least annually and are made available to all 5X employees for their reference.
- Confidentiality. 5X has controls in place to maintain the confidentiality of Customer Personal Data that Customer makes available to the Services, in accordance with the Agreement. All 5X employees and contract personnel are bound by 5X’s internal policies regarding maintaining confidentiality of Customer Personal Data and contractually commit to these obligations.
- Employee Training. At least once a year, all 5X employees must complete the 5X security and privacy training which covers 5X’s security policies, security best practices, and privacy principles. Employees on a leave of absence may have additional time to complete this annual training. 5X has established an anonymous hotline for employees to report any unethical behavior where anonymous reporting is legally permitted.
Third Party Vendor Management.
- Vendor Assessment. 5X may use third party vendors to provide Services. 5X carries out a security risk-based assessment of prospective vendors before working with those vendors to validate that prospective vendors meet 5X’s security requirements. 5X periodically reviews each vendor in light of 5X’s security and business continuity standards, including the type of access and classification of data being accessed (if any), controls necessary to protect data, and legal/regulatory requirements. 5X ensures that Customer Personal Data is returned and/or deleted at the end of a vendor relationship. For the avoidance of doubt, third-party services that Customer chooses to integrate via 5X Services are not considered subcontractors of 5X.
- Vendor Agreements. 5X enters into written agreements with all of its Vendors which include confidentiality, privacy and security obligations that provide an appropriate level of protection for the personal data contained within the Customer Personal Data that these Vendors may process.
- 5X Certificates. 5X has obtained the following security-related certifications for the 5X Services:System and Organization Control (“SOC”) 2 – Type I. 5X maintains SOC 2 – Type I certification for 5X Services. SOC 2 audits for the 5X Services are conducted once a year by an independent third-party auditor. The SOC 2 audits validate 5X’s physical and environmental safeguards for production data centers, backup and recovery procedures, software development processes, and logical security controls.
- AWS Certifications. In addition, the Services use and leverage AWS data centers. 5X uses and leverages AWS data centers, with a reputation of being highly scalable, secure, and reliable. Information about AWS audit certifications are available at AWS Security website https://aws.amazon.com/security and AWS Compliance website https://aws.amazon.com/compliance.
- Architecture and Data Segregation. The cloud communication platform for the 5X Services is hosted by Amazon Web Services (“AWS”). The current location of the AWS data center infrastructure used in providing 5X Services is located in the United States. Further information about security provided by AWS is available from the AWS security webpage available at https://aws.amazon.com/security/. In addition, the overview of AWS’s security process is available at https://aws.amazon.com/whiteapers/overview-of-security-processes/. 5X separates Customer Personal Data using logical identifiers tagging all communications data with the associated Customer ID to clearly identify ownership. 5X’s APIs are designed and built to designed and built to identify and allow access only to and from these tags and enforce access controls to ensure the confidentiality and integrity requirements for each Customer are appropriately addressed. These controls are in place so one customer’s communications cannot be accessed by another customer.
- Physical Security. AWS data centers that host 5X Services are strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions. Each data center has redundant electrical power systems that are available twenty-four (24) hours a day, seven (7) days a week. Uninterruptible power supplies and on-site generators are available to provide back-up power in the event of an electrical failure. More details about the physical security of AWS data centers used by5x for the 5x Services, are available at https://aws.amazon.com/whitepapers/overview-of-security-processes/. In addition, 5X headquarters and office spaces have a physical security program that manages visitors, building entrances, CCTVs (closed circuit television), and overall office security. All contractors and visitors are required to wear identification badges.
- Security by Design. The 5X’s Software Development Lifecycle (SDLC) standard defines the process by which 5X creates secure products and the activities that the product teams must perform at different stages of development (requirements, design, implementation, and deployment). 5X engineers perform numerous security activities for the Services including internal security reviews before products are launched.
- Provisioning Access. To minimize the risk of data exposure, 5X follows the principles of least privilege when provisioning system access. 5X personnel are authorized to access Customer Personal Data based on their job function, role and responsibilities, and such access requires approval of the employee’s manager. Access rights to production environments are reviewed at least semi-annually. An employee’s access to Customer Personal Data is promptly removed upon termination of their employment. Before an engineer is granted access to the production environment, access must be approved by management and the engineer is required to complete internal trainings for such access including trainings on the relevant team’s systems. 5X logs high risk actions and changes in the production environment. 5X leverages automation to identify any deviation from internal technical standards that could indicate anomalous/unauthorized activity to raise an alert within minutes of a configuration change.
- Password Controls. 5X’s current policy for employee password management follows the NIST 800-63B guidance, and as such, our policy is to use longer passwords, with multi-factor authentication but not require special characters or frequent changes. 5X does not store Customer passwords in any form.
- Change Management. 5X has a formal change management process to manage changes to software, applications and system software that will be deployed within the production environment. Change requests are documented using a formal, auditable, system of record. Prior to a high-risk change being made, an assessment is carried out to consider the impact and risk of a requested change, evidence acknowledging applicable testing for the change, approval of deployment into production by appropriate approvers(s) and roll back procedures. A change is reviewed and tested before being deployed to production.
- Encryption. For the 5X Services, 5X’s cloud platform supports TLS 1.2 to encrypt network traffic transmitted between a Customer application and 5X’s cloud infrastructure. When supported by integrations selected by Customer, 5X’s cloud platform will also encrypt network traffic between 5X’s cloud infrastructure and the integration provider. All Customer Personal Data is stored encrypted using 256-bit Advanced Encryption Standard (AES-256).
- Security Incident Management. 5X maintains security incident management policies and procedures in accordance with NIST SP 800-61. 5X assesses the threat of all relevant vulnerabilities or security incidents and establishes remediation and mitigation actions for all events. 5X utilizes AWS platforms and third-party tools to detect, mitigate, and to help prevent Distributed Denial of Service attacks (DDoS) attacks.
Discovery, Investigation and Notification of a Security Incident. Upon discovery or notification of any Security Incident, 5X will:
- promptly investigate such Security Incident;
- to the extent that is permitted by applicable law, promptly notify Customer.
- Resilience and Service Continuity. 5X infrastructure for the 5X Services uses a variety of tools and mechanisms to achieve high availability and resiliency. For the 5X Services, 5X’s infrastructure spans multiple fault-independent AWS availability zones. For the 5X Services, there are manual or automatic capabilities to re-route and regenerate hosts within 5X’s infrastructure. 5X leverages specialized tools that monitor server performance, data, and traffic load capacity within each availability zone. If suboptimal server performance or overloaded capacity is detected on a server within an availability zone, then these specialized tools will increase the capacity or shift traffic to relieve any suboptimal server performance or capacity overload. 5X will also be notified immediately and have the ability to take prompt action to correct the cause(s) behind these issues if the specialized tools are unable to do so.
- Backups and Recovery. 5X performs regular backups of 5X Services account information, message templates, message logs and other critical data using Amazon cloud storage. Backup data are retained redundantly across availability zones and are encrypted in transit and at rest using 256-bit Advanced Encryption Standard (AES-256) server-side encryption.
|Looker||Data exploration and discovery|
|Sigma Computing||Data analytics|
|Gravity AI||AI Models|
The locations in which these SubProcessors will Process Customer Personal Data varies based on the Customers’ location and other factors but may include the United States and other regions that have not been deemed adequate by supervisory authorities in the EU.