Data Processing Agreement
Effective Date: January 1, 2025
Last Updated: January 6, 2025
Note: This summary explains our DPA in plain language. The full legal text governs.
Our Data Processing Agreement (DPA) defines how Secured AI handles your data when acting as a processor on your behalf:
We process data only as you instruct
We only process personal data according to your documented instructions. We don't use your data for our own purposes.
We protect your data with strong security
We implement technical and organizational measures to protect data, including encryption, access controls, and security certifications.
We carefully vet subprocessors
Any subprocessors we use are bound by data protection obligations equivalent to those in this DPA.
We support your compliance obligations
We help you respond to data subject requests, conduct impact assessments, and meet regulatory requirements.
We delete or return data when you ask
Upon termination, we'll delete or return your data as you instruct.
Overview
This Data Processing Agreement ("DPA") forms part of the Agreement between Secured AI, Inc. ("Secured AI," "Processor") and the entity identified in the Agreement ("Customer," "Controller") for the provision of Services.
This DPA applies when Secured AI processes Personal Data on behalf of Customer in connection with the Services.
Key Definitions
- Personal Data: Information relating to an identified or identifiable natural person
- Processing: Any operation performed on Personal Data
- Data Subject: The individual to whom Personal Data relates
- Subprocessor: A third party engaged by Secured AI to process Personal Data
Table of Contents
1. Scope and Roles
Customer is the Controller (decides why and how data is processed). Secured AI is the Processor (processes data on Customer's behalf).
Key Points:
- Customer acts as Controller with respect to Personal Data
- Secured AI acts as Processor on Customer's behalf
- Processing activities are limited to those necessary to provide the Services
2. Processing of Personal Data
We only process your data to provide the service, according to your instructions.
2.1 Instructions
- Secured AI will process Personal Data only on documented instructions from Customer
- The Agreement and this DPA constitute Customer's complete instructions
- Additional instructions require written agreement
2.2 Purpose
- Processing is limited to providing the Services
- We do not process Personal Data for our own purposes
- We do not sell Personal Data
2.3 Categories of Data
| Category | Examples |
|----------|----------|
| Personal identifiers | Names, email addresses, phone numbers |
| Professional information | Job titles, company names |
| Content data | Text submitted for processing |
| Technical data | IP addresses, device information |
2.4 Data Subjects
- Customer's employees
- Customer's customers
- Other individuals whose data is processed through the Service
3. Security Measures
We use strong security measures to protect your data.
Technical Measures:
- Encryption in transit (TLS 1.3)
- Encryption at rest (AES-256)
- Access controls and authentication
- Network security and firewalls
- Intrusion detection and prevention
- Regular vulnerability scanning
Organizational Measures:
- Security policies and procedures
- Employee training and awareness
- Background checks for personnel
- Incident response procedures
- Business continuity planning
Certifications:
- SOC 2 Type II (alignment in progress)
4. Subprocessors
We use carefully vetted third parties to help provide the service. We maintain a list and notify you of changes.
Authorization:
- Customer authorizes the use of subprocessors listed in Annex B
- Secured AI will notify Customer before adding new subprocessors
Notification Process:
- Advance notice of new subprocessors
- Customer may object to new subprocessors
- If objection cannot be resolved, Customer may terminate
Subprocessor Obligations:
- Subprocessors are bound by data protection obligations equivalent to this DPA
- Secured AI remains liable for subprocessor compliance
5. Data Subject Rights
We help you respond to requests from individuals about their data.
Data Subject Assistance:
- We will notify Customer of data subject requests
- We provide reasonable assistance in responding to requests
- Customer is responsible for responding to data subjects
- Assistance includes: access, rectification, erasure, portability, restriction, objection
6. Personal Data Breach Notification
If there's a security incident affecting your data, we'll notify you promptly.
Incident Process:
- Notification within a reasonable timeframe of becoming aware
- Notification includes: nature of breach, categories affected, likely consequences, measures taken
- Cooperation in investigation and mitigation
- Assistance with regulatory notifications
7. Compliance Assistance
We help you meet your compliance obligations.
Assistance Areas:
- Data protection impact assessments
- Prior consultation with supervisory authorities
- Audit and inspection rights
- Compliance documentation and evidence
8. International Data Transfers
When data crosses borders, we use appropriate safeguards.
Transfer Mechanisms:
- Standard Contractual Clauses (EU Commission approved)
- UK Addendum to Standard Contractual Clauses
- Supplementary measures as needed
- Data residency options (Enterprise)
9. Data Retention and Deletion
We keep your data only as long as needed. When the agreement ends, we delete or return it.
Retention Terms:
- Content data: Not retained by default (processed in real-time)
- Audit logs: Retained per Customer configuration
- Upon termination: Deletion or return within a reasonable period
- Certification of deletion available upon request
10. Audit Rights
You can verify our compliance through audits and certifications.
Audit Options:
- SOC 2 Type II report available upon completion of certification
- Security questionnaire responses
- On-site audits with reasonable notice (Enterprise)
- Third-party audit reports
11. Liability
Liability for data protection is governed by the Agreement.
12. Term and Termination
This DPA lasts as long as the Agreement. When it ends, so does the DPA.
Annexes
Annex A: Details of Processing
| Element | Description |
|---|---|
| Subject matter | Data protection for AI workflows |
| Duration | Term of the Agreement |
| Nature of processing | Detection, masking, reveal of sensitive data |
| Purpose | Providing the Services |
| Data categories | Personal identifiers, content data, technical data |
| Data subjects | Customer's employees and customers |
Annex B: List of Subprocessors
| Element | Description |
|---|---|
| [Cloud Provider] | Infrastructure hosting |
| [CDN Provider] | Content delivery |
| [Monitoring Provider] | System monitoring |
| [Support Provider] | Customer support |
This list is maintained and updated with advance notice.
How to Execute This DPA
To execute this DPA:
Online Acceptance
Enterprise customers can accept the DPA through their account settings
Signed Agreement
Request a signed copy by emailing info@securedai.com
Incorporated by Reference
For many customers, this DPA is automatically incorporated into the Agreement by reference
Questions About This DPA?
Our legal team is here to help with any questions about data processing.
info@securedai.com