DATA PROCESSING ADDENDUM
This Data Processing Addendum ("DPA") forms part of the Terms of Use, Master Subscription Agreement, Order Form, or other written or electronic agreement addressing the same subject matter (the "Agreement") between Customer and Akto Io, Inc. ("Processor"), pursuant to which Processor provides software and related services (the "Services") to Customer.
This DPA governs the Processing of Personal Data by Processor on behalf of Customer in connection with the Services.
For purposes of this DPA, Customer shall act as Controller (or Processor, where applicable), and Akto Io, Inc. shall act as Processor (or Sub-processor, where applicable), solely to the extent Personal Data is Processed in connection with the Services.
Customer and Processor are each referred to herein as a "Party" and collectively as the "Parties".
For purposes of this DPA:
Processor shall Process Personal Data solely:
Processor shall not:
Processor may generate aggregated and de-identified information that does not identify Customer or any natural person and may use such information for benchmarking, analytics, security enhancement, and service improvement.
Processor acknowledges that it processes Personal Data as a "service provider" as defined under the California Consumer Privacy Act, as amended by the California Privacy Rights Act (CPRA), and shall not process Personal Data in a manner inconsistent with that designation.
Customer represents and warrants that:
Customer shall promptly notify Processor of:
Processor shall:
Where Customer’s requests for assistance are manifestly unfounded or excessive (in particular because of their repetitive character), Processor may charge a reasonable fee based on documented administrative costs, or may decline to act on such requests. Processor shall notify Customer in writing before imposing any such fee. This clause does not limit Processor’s obligation to assist with requests that are required as a result of Processor’s own breach of this DPA.
Where Customer determines that a Data Protection Impact Assessment (DPIA) is required under applicable Data Protection Laws in connection with the Services, Processor shall, upon Customer's reasonable written request:
DPIA assistance requests shall be limited to one (1) per calendar year, except where legally required. Customer shall bear the costs of DPIA assistance, except where the DPIA is required primarily as a result of Processor's breach of this DPA, in which case Processor shall bear its own costs. All DPIA assistance is subject to the confidentiality obligations in Section 5.
Processor shall ensure that personnel authorized to Process Personal Data:
Confidentiality obligations survive termination of this DPA for as long as Personal Data is retained.
Processor shall maintain appropriate administrative, technical, physical, and organizational safeguards designed to protect Personal Data against unauthorized access, disclosure, alteration, loss, or destruction.
Security measures include, where applicable:
Processor may update security measures from time to time, provided such updates do not materially diminish the overall security posture of the Services. Where Processor makes a material adverse change that materially diminishes such security posture, Processor shall provide commercially reasonable notice to Customer.
Processor shall provide its most recent SOC 2 Type II report (or ISO 27001 certification or equivalent third-party audit report) to Customer upon written request, subject to a mutual non-disclosure agreement. Provision of such report shall constitute primary satisfaction of Customer’s audit rights under this DPA absent a specific documented concern that such report does not address.
Upon reasonable written request not more than once annually (except where legally required following a verified security incident), Processor shall make available information reasonably necessary to demonstrate compliance with this DPA, including:
Processor shall provide documentary compliance information (including SOC 2 reports and security summaries) at no charge to Customer. Customer shall only be responsible for reimbursing Processor's reasonable internal costs for extraordinary onsite audit assistance as set out below.
Onsite audits shall only be permitted where legally required or where documentary information is reasonably insufficient. Any onsite audit shall:
Where Processing involves transfer of Personal Data outside a jurisdiction that restricts such transfer, the Parties shall rely on lawful transfer mechanisms, including where applicable:
Where the EU Standard Contractual Clauses (Commission Decision 2021/914), the UK International Data Transfer Addendum, or any equivalent lawful transfer mechanism applies to a transfer of Personal Data under this DPA, such clauses are hereby incorporated by reference into this DPA and deemed executed by the Parties as of the effective date of the Agreement. Annex I, Annex II, and Annex III of this DPA shall serve as the corresponding Annex I, Annex II, and Annex III to such clauses, as applicable. In the event of any conflict between this DPA and the incorporated transfer clauses, the transfer clauses shall prevail with respect to the transfer to which they apply.
Processor shall maintain supplementary safeguards reasonably designed to support lawful transfers, including encryption, access controls, onward transfer restrictions, and risk review of governmental access obligations.
Processor shall promptly notify Customer if Processor determines it can no longer meet applicable transfer obligations.
Customer grants Processor general authorization to engage Sub-processors.
Processor shall:
If Customer reasonably objects to a proposed Sub-processor on documented privacy or security grounds, the Parties shall work in good faith to resolve such objection. Processor may:
If Processor receives a subpoena, regulatory request, or lawful governmental request for Customer Personal Data, Processor shall, unless legally prohibited:
Processor shall maintain documented incident response procedures designed to identify, investigate, contain, mitigate, and remediate Security Incidents.
Processor shall notify Customer without undue delay and, where feasible, no later than seventy-two (72) hours after becoming aware of a confirmed Security Incident, or reasonably suspecting that a Security Incident has occurred, affecting Customer Personal Data.
Where initial notification is made based on reasonable suspicion prior to full confirmation, Processor shall provide follow-up updates promptly as additional material information becomes reasonably available, including prompt confirmation where a Security Incident is confirmed.
Notice shall include reasonably available information regarding:
Processor’s notification shall not be construed as admission of fault or liability. Processor shall provide commercially reasonable cooperation and information necessary for Customer to investigate, mitigate, and comply with legally required notification obligations arising from a confirmed Security Incident.
Upon termination or expiration of Services, Processor shall make Customer Personal Data available for export / retrieval for up to thirty (30) days following the effective date of termination or expiration, unless the Parties otherwise agree in writing or unless Processor is prevented from doing so by circumstances beyond its reasonable control (in which case Processor shall notify Customer promptly and use commercially reasonable efforts to make Personal Data available as soon as practicable).
Following such period, Processor shall delete or render inaccessible Customer Personal Data as soon as reasonably practicable, and in any event within ninety (90) days, except where retention is required for:
Any retained Personal Data remains subject to confidentiality and security obligations until securely deleted.
All liability arising under this DPA shall be subject to the exclusions, disclaimers, and limitations of liability contained in the Agreement, which are incorporated herein by reference.
Claims under this DPA, including privacy claims, security claims, Sub-processor claims, and transfer claims, shall count toward the aggregate liability cap under the Agreement unless expressly stated otherwise therein.
In the event of conflict:
In the event of an investigation by any data protection authority, regulator, or supervisory authority that relates to the Processing of Customer Personal Data under this DPA, Processor shall:
The costs of such cooperation shall be borne by Customer, except where the investigation was initiated primarily as a result of Processor’s breach of this DPA, negligence, or willful misconduct, in which case such costs shall be borne by Processor. All liability arising from this Section remains subject to the limitations of liability in the Agreement.
If any provision of this DPA is invalid or unenforceable, remaining provisions remain in effect.
Except where mandatory law provides otherwise, governing law and dispute resolution provisions in the Agreement apply to this DPA.
No third-party beneficiaries are created under this DPA except rights mandatorily granted to Data Subjects by law.
Clauses relating to confidentiality, retained data, security, liability, and dispute resolution survive termination.
Execution. This DPA is deemed executed by the Parties and becomes effective upon execution of the Agreement (including by written agreement, Order Form, click-through acceptance, or other legally binding acceptance referencing the Agreement), without requiring separate signature of this DPA unless expressly agreed otherwise in writing.
Amendments: This DPA may only be amended by a written instrument signed by authorised representatives of both Parties. No amendment shall be effective unless it expressly states that it amends this DPA.
Data Exporter: Customer, as identified in the Agreement.
Activities relevant to transfer: Receipt and use of Services; disclosure of Customer Personal Data to Processor in connection with Services
Role: Controller (or Processor where applicable)
Data Importer: Akto Io, Inc.,
Address: 95 Third Street, 2nd Floor, San Francisco, California 94103.
Contact: Ankush Jain — ankush@akto.io.
Activities relevant to transfer: Processing Customer Personal Data solely to provide Services under Agreement
Role: Processor (or Sub-processor where applicable)
These may include:
These may include:
Processor does not intentionally require Special Category / Sensitive Personal Data for normal operation of Services. Customer shall avoid submitting such data unless expressly agreed in writing.
Collection, storage, organization, retrieval, analysis, transmission, support access, security monitoring, and deletion as necessary to provide Services.
Provision, maintenance, support, security, and improvement of Services as described in the Agreement.
For the duration of the Agreement plus applicable deletion / backup retention cycles as set out in Section 12 of this DPA.
Frequency of Transfer
Continuous, for the duration of the Agreement, as triggered by Customer’s access to and use of the Services. Transfers occur on an ongoing basis each time the Services are accessed or Personal Data is submitted, processed, or retrieved by or on behalf of Customer.
Nature of Transfer
Transmission of Personal Data from Customer (Data Exporter) to Akto Io, Inc. (Data Importer) via encrypted network connection (TLS/HTTPS) for the purpose of providing the Services. Personal Data may be accessed remotely by Data Importer’s personnel for support, maintenance, and security purposes.
Purpose of Transfer
The transfer of Personal Data is necessary to enable Processor to provide the Services under the Agreement, including: API security testing and monitoring; application telemetry analysis; authentication and access management; customer support; security incident response; and service maintenance and improvement.
Retention Period
Personal Data is retained for the duration of the Agreement and deleted within ninety (90) days following expiration or termination, subject to the exceptions set out in Section 12 of this DPA (legal obligations, tax retention, dispute preservation, fraud prevention, and backup / archival cycles). Backup copies are deleted within twelve (12) months in the ordinary course.
Transfers to Sub-processors
Where Personal Data is transferred onward to Sub-processors listed in Annex III, such transfers are made solely for the purposes described in Annex III (hosting, authentication, analytics, support, and communications). All Sub-processors are contractually bound by data protection obligations no less protective than those in this DPA. Sub-processor transfers are made under lawful transfer mechanisms as required by applicable Data Protection Laws.
Competent Supervisory Authority
The competent supervisory authority shall be determined in accordance with applicable Data Protection Laws and, where applicable, Clause 13 of the EU Standard Contractual Clauses, based on the Data Exporter’s place of establishment. For UK transfers, the competent authority is the UK Information Commissioner’s Office (ICO).
Processor maintains an information security program aligned to commercially reasonable industry practices, including:
Security controls may evolve over time, provided overall security posture is not materially diminished.
Sub-processor | Purpose | Region |
Google Cloud Platform | Hosting / compute / storage | US / global |
Google Workspace | Email / business communications | US |
MongoDB, Inc. | Database Hosting | US |
Mixpanel | Usage analytics | US |
Intercom, Inc. | Customer support communications | US |
Auth0, Inc. / Okta, Inc. | Authentication / SSO services | US |
GitHub | Code Repository / CI Workflows | US |