Data Processing Agreement

Your one-stop solution for efficient and secure data processing.

Signup & Get 100 Free credits

This Data Processing Addendum (DPA) forms part of the Master Terms of Service Agreement available at the Terms of Service (Agreement), entered into by and between Glitz Blitz Promotions Pvt. Ltd. (Clearout.io) (Data Processor or Company or Clearout) and Data Controller (Customer or Controller), in accordance with the personal data processed using Clearouts Services as outlined in the applicable Agreement. The main goal of this DPA is to demonstrate agreement between the two parties in terms of the processing of Personal Data in compliance with the requirements of Data Protection Legislation as provided below.

If the Data Controller signing this DPA is a party to the Agreement, this DPA forms part of the Agreement.

In such a case, Clearout that is a party to the Agreement becomes a party to this DPA.

In the course of providing the Services to Data Controller pursuant to the Agreement, Data Processor may Process Personal Data on behalf of Data Controller and the Parties agree to comply with the following provisions with respect to any Personal Data, each acting reasonably and in good faith.

1. Definitions

Data Processor: A person or company that controls the personal data processed using Clearouts Service

Service or Services: All content, services and products available at or through the Website, including, but not limited to verifying email addresses using Clearouts App or API

API: Automated application programming interface to connect Clearouts Services with other websites, servers or applications.

Data Processing: Processing of data on behalf of the Data Controller.

Data Protection Law: EU Directive 95/46/EC, as transposed into domestic legislation of each Member State and as amended, replaced or superseded from time to time, including (with effect from May 25, 2018) by the GDPR and laws implementing, replacing or supplementing the GDPR, the California Consumer Privacy Act (CCPA, Cal. Civ. Code §1798.100 et seq and 11 CCR §999.300) (CCPA) (as applicable) and the EU law (as defined in the European Union (Withdrawal) Act 2018), the Data Protection, Privacy and Electronic Communications (Amendments etc.) (EU Exit) Regulations 2019 and any further UK laws addressing data transfers from the UK (collectively, UK GDPR).

GDPR: The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA).

Data Subject: Means the identified or identifiable natural person to whom the Personal Data relates.

Personal Data: Means any data which relates to an identified or identifiable natural person (Data Subject)

Personal Data Breach: Means a security breach leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Personal Data transmitted, stored or otherwise processed.

Standard Contractual Clauses: Means (a) in respect of transfers subject to the GDPR, the Standard Contractual Clauses, specifically between controllers and processors, and between processors and processors as approved by the European Commission Implementing Decision (EU) 2021/914 of 4 June 2021, including all Annexes I and II thereto (EU SCCs); (b) in respect of transfers subject to the UK GDPR, the International Data Transfer Addendum to the EU Commission Standard Contractual Clauses of 21 March 2022, as set forth in Annex III of the Standard Contractual Clauses (UK Cross Border Transfers) (UK Addendum) or (c) in respect of transfers subject to the Federal Act on Data Protection (FADP - as revised as of 25 September 2020), the terms set forth in Annex IV of the Standard Contractual Clauses (Switzerland Cross Border Transfers) (Switzerland Addendum) all (a)-(c) are located at: Standard Contractual Clauses (Controller to Processor) and Standard Contractual Clauses (Processor to Processor), respectively.

Sub-processor: Means any person (including any third party, but excluding Clearout employees) appointed by or on behalf of Clearout to process data in connection with the Agreement.

2. Data Processing

2.1. Data Subjects

Data Subjects include the information of the Data controller who signed up for the email verification plan of Data Processor.

2.2. Types of Information

In the course of using the Services, Data Processor asks Data Controller to provide certain personally identifiable information of Data Controller that can be used to contact or identify the Data Controller and to administer the Data Controllers account (Personally Identifiable Information). Personal Information such as the Data Controllers name and email address are used to create the account for the Site and Services, as well as for email newsletters and invoicing.

Data Controllers credit card information is used by third parties such as PayPal or Stripe to process the payment(s) of Data Controller for the Services. Data Controllers consent will be required if the Personal Information of the Data Controller is being collected, used and stored by Data Processor in accordance with the Terms and Conditions of Use and the Privacy Policy of the Data Processor.

2.3. Purpose of the Processing

The purpose of processing is to identify whether an email address exists and whether it is possible to deliver an email to this address. This verification happens in an online, fully automated system. The subject matter of the contract is email verification. In no event will Data Processor process any Personal or Navigational Data for its own purpose or those of any third party.

2.4. Duration of the Processing

Personal Data will be processed for the duration of the Agreement, subject to Section 4 of this DPA. Information uploaded to the Site or otherwise submitted to Data Processor in conjunction with the Services, including but not limited to CSV or XLSX files, may be stored for a period of thirty (30) days. If the Data Controller initiates payment for the Services, Data Processor may collect and store Personal Information, as well as any other information provided to us. This Personal Information may be shared with third parties in order to process the payment of the Data Controller. Data Processor encrypts credit card numbers using industry standard technology.

3. Obligations of Processor

3.1. Security

Data Processor shall take the appropriate technical and organizational measures to adequately protect Personal Data against accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Personal Data.

3.2. Confidentiality

Data Processor shall ensure that any personnel whom the Data Processor authorizes to process Personal Data on Data Processors behalf is subject to confidentiality obligations with respect to that Personal Data. The undertaking of confidentiality shall continue after the termination of the above-entitled activities. Data Processor ensures that its personnel who access Personal Data are subject to confidentiality obligations that restrict their ability to disclose Data Controller Personal Data.

3.3. Personal Data Breaches

Data Processor is obliged to promptly notify the Data Controller about a Personal Data Breach without undue delay and in any event within 36 hours after becoming aware of a data breach.

3.4. Data Subject Requests

Data Processor shall respond to any request from Data Subjects seeking to exercise their rights under the Data Protection Law with respect to Personal Data (including access, rectification, restriction, deletion or portability of Personal Data), to the extent permitted by the law.

3.5. Sub-processors

Data Processor may hire other companies to provide limited services on its behalf (Annexure 1). Any such sub-processors will be permitted to process Personal Data only to deliver the services Data Processor has retained them to provide, and they shall be prohibited from using Personal Data for any other purpose. Data Processor remains responsible for its sub-processors compliance with the obligations of this DPA. Any subcontractors to whom Data Processor transfers Personal Data will have entered into written agreements with Data Processor requiring that they abide by terms substantially similar to this DPA. If Data Controller requires prior notification of any updates to the list of sub-processors, Data Controller may request such notification in writing by emailing at [email protected]. Data Processor will update the list within seventy-two (72) hours of any such notification if Data Controller does not legitimately object within that time frame. Legitimate objections must contain reasonable and documented grounds relating to a subcontractors non-compliance with applicable Data Protection Legislation. If in Data Processors reasonable opinion, such objections are not legitimate, the Data Controller may, by providing written notice to Data Processor, terminate the Agreement.

3.6. Data Transfers

Data Controller acknowledges and agrees that, in connection with the performance of the services under the Agreement, Personal Data may be transferred outside of the European Union (EU) and the European Economic Area (EEA). While transferring the data, the Data Processor takes the necessary measures to safeguard the activity in general, and the data subjects in particular to ensure an appropriate level of protection for their fundamental rights. This Privacy Policy shall apply even if Personal Information is transferred or accessed from other countries.

3.6.1. Transfers from the EEA, Switzerland and the United Kingdom to countries that offer adequate level or data protection. Personal Data may be transferred from EU Member States, the three EEA member countries (Norway, Liechtenstein and Iceland) (collectively, EEA), Switzerland and the United Kingdom (UK) to countries that offer an adequate level of data protection under or pursuant to the adequacy decisions published by the relevant data protection authorities of the EEA, the European Union, the Member States or the European Commission, or Switzerland or the UK as relevant (Adequacy Decisions), as applicable, without any further safeguard being necessary.

3.6.2. Transfers from the EEA, Switzerland and the United Kingdom to other countries. If the Processing of Personal Data by Processor includes a transfer (either directly or via onward transfer):

a)

From the EEA to other countries which have not been subject to a relevant Adequacy Decision, and such transfers are not performed through an alternative recognized compliance mechanism as may be adopted by Processor for the lawful transfer of personal data (as defined in the GDPR) outside the EEA, the terms set forth in the EU SCCs shall apply

b)

From the UK to other countries which have not been subject to a relevant Adequacy Decision, and such transfers are not performed through an alternative recognized compliance mechanism as may be adopted by Processor for the lawful transfer of personal data (as defined in the UK GDPR) outside UK, the terms set forth in the UK Addendum shall apply

c)

From Switzerland to other countries which have not been subject to a relevant Adequacy Decision, and such transfers are not performed through an alternative recognized compliance mechanism for the lawful transfer of personal data (as defined under the GDPR) outside Switzerland, the terms set forth in the Switzerland Addendum shall apply

The terms set forth in Annex V of the Standard Contractual Clauses (Additional Safeguards) shall apply to any transfer where the Standard Contractual Clauses apply.

3.7. Deletion or Retrieval of Personal Data

Upon termination or expiration of the Agreement or upon the request, the Data Processor will delete or return to Data Controller all individual- and account-related Personal Data that is in its possession or control (including any Data subcontracted to a third party for processing). This requirement will not apply to the extent that Data Processor is required by any EU (or any EU Member State) law to retain some or all of the Data, in which event Data Processor will isolate and protect the Data from any further processing except to the extent required by such law.

3.8. CCPA

Clearout is prohibited from retaining, using or disclosing Customers Personal Information: (a) For any purpose other than those as set out in the Agreement, or as otherwise permitted under 11 CCR §999.314(c) (b) by way of Selling the Customers Personal Information and (c) by way of retaining, using or disclosing the Customers Personal Information outside of the direct business relationship between the Parties, except as permitted under 11 CCR §999.314(c). Clearout certifies that it understands the restriction specified in the preceding subsection and will comply with it.

3.9. For the avoidance of doubt, Clearout will not share and/or sell any information disclosed by the Customer or gathered on the Customer, unless expressly stated under this DPA.

4. Assistance to Data Controller

4.1 The Data Processor shall assist the Data Controller by appropriate technical and organizational measures (Annexure 2), in so far as this is possible, for the fulfillment of the Data Controllers obligation to respond to a request for exercising the data subjects rights under the GDPR.

4.2 The Data Processor shall assist the Data Controller in ensuring compliance with the obligations pursuant to security and prior consultations with supervisory authorities required under Article 36 of the GDPR taking into account the nature of processing and the information available to the Data Processor.

4.3 The Data Processor shall make available all necessary information to Data Controller to demonstrate compliance with the Data Processors obligations and to allow for and contribute to audits, including inspections conducted by the Data Controller or another auditor mandated by the Data Controller.

5. Liability and Indemnity

The Data Processor indemnifies the Data Controller and holds the Data Controller harmless against all claims, actions, third party claims, losses, damages and expenses incurred by the Data Controller and arising directly or indirectly out of or in connection with a breach of this Data Processing Agreement and/or the Applicable Data Protection Law by the Data Processor. The Data Controller indemnifies the Data Processor and holds the Data Processor harmless against all claims, actions, third party claims, losses, damages and expenses incurred by the Data Processor and arising directly or indirectly out of or in connection with a breach of this Data Processing Agreement and/or the Applicable Data Law by the Data Controller.

6. Duration and Termination

6.1 This Data Processing Agreement shall come into effect on the date the Data Controller electronically signs this Data Processing Agreement.

6.2 Termination or expiration of this Data Processing Agreement shall not discharge the Data Processor from its confidentiality obligations pursuant to Article 3.

6.3 The Data Processor shall process Personal Data until the date of termination of the Service Agreement, unless instructed otherwise by the Data Controller, or until such data is returned or destroyed on the instruction of the Data Controller.

7. Data Center and Location

Clearout Service is available in the European region for European users to comply with GDPR so that no data processed outside of the European region.

8. Miscellaneous

For the avoidance of doubt and to the extent allowed by applicable law, any and all liability, including limitations thereof, will be governed by the relevant provisions of the Agreement.

If Data Controller does not agree to any changes to the Agreement, do not continue to use the Clearout application.

Annexure 1:

List of GDPR compliant Sub-Processors:

As a data processor under the GDPR, Clearout makes use of the sub-processors listed below. In order to meet its obligations under Art. 28 of the GDPR, the following disclosure relates to the name and processing actions of these sub-processors.

Sub-processor NameSub-processing Actions
StripeSub-processor for online payment
PayPalSub-processor for online payment
MailgunSub-processor for email notifications
FreshchatSub-processor for live chat
AWSSub-processor for Server Hosting

Annexure 2:

Technical and Organizational Measures (TOMs) : Security Services

This document describes technical and organizational security measures and controls implemented by Clearout, or Clearout affiliates (hereafter Clearout), to protect personal data and ensure the ongoing confidentiality, integrity and availability of Clearouts products and services.

This document is a high-level overview of Clearouts technical and organizational security measures. More details on the measures we implement are available upon request. Clearout reserves the right to revise these technical and organizational measures at any time, without notice, so long as any such revisions will not materially reduce or weaken the protection provided for personal data that Clearout processes in providing its various services. In the unlikely event that Clearout does materially reduce its security, Clearout shall notify its customers.

Clearout shall take the following technical and organizational security measures to protect personal data:

1.

Organizational management and dedicated staff responsible for the development, implementation, and maintenance of Clearouts information security program.

2.

Audit and risk assessment procedures for the purposes of periodic review and assessment of risks to the Clearout organization, monitoring and maintaining compliance with Clearout policies and procedures, and reporting the condition of its information security and compliance to senior internal management.

3.

Maintain Information security policies and make sure that policies and measures are regularly reviewed and where necessary, improve them.

4.

Communication with Clearout applications utilizes cryptographic protocols such as TLS to protect information in transit over public networks. At the network edge, stateful firewalls, web application firewalls, and DDoS protection are used to filter attacks. Within the internal network, applications follow a multi-tiered model which provides the ability to apply security controls between each layer.

5.

Data security controls which include logical segregation of data, restricted (e.g. role-based) access and monitoring, and where applicable, utilization of commercially available and industry-standard encryption technologies.

6.

Logical access controls designed to manage electronic access to data and system functionality based on authority levels and job functions, (e.g. granting access on a need-to-know and least privilege basis, use of unique IDs and passwords for all users, periodic review and revoking/changing access promptly when employment terminates or changes in job functions occur).

7.

Password controls designed to manage and control password strength, and usage including prohibiting users from sharing passwords.

8.

System audit or event logging and related monitoring procedures to proactively record user access and system activity for routine review.

9.

Physical and environmental security of data centre, server room facilities and other areas containing client confidential information designed to: (i) protect information assets from unauthorized physical access, (ii) manage, monitor and log movement of persons into and out of Clearout facilities, and (iii) guard against environmental hazards such as heat, fire and water damage.

10.

Operational procedures and controls to provide for configuration, monitoring, and maintenance of technology and information systems according to prescribed internal and adopted industry standards, including secure disposal of systems and media to render all information or data contained therein as undecipherable or unrecoverable prior to final disposal or release from Clearout possession.

11.

Change management procedures and tracking mechanisms designed to test, approve and monitor all changes to Clearout technology and information assets.

12.

Incident / problem management procedures designed to allow Clearout investigate, respond to, mitigate and notify of events related to Clearout technology and information assets.

13.

Network security controls that provide for the use of enterprise firewalls and layered DMZ architectures, and intrusion detection systems and other traffic and event correlation procedures designed to protect systems from intrusion and limit the scope of any successful attack.

14.

Vulnerability assessment, patch management, and threat protection technologies and scheduled monitoring procedures designed to identify, assess, mitigate and protect against identified security threats, viruses and other malicious code.

15.

Business resiliency/continuity and disaster recovery procedures, as appropriate, designed to maintain service and/or recovery from foreseeable emergency situations or disasters.

16.

Formal Vendor Management program, including vendor security reviews for critical vendors to ensure compliance with Clearout Information Security Policies.

17.

A Data Protection Officer (DPO) who is independent, regularly reviews data protection risks and controls.

For a signed copy, please write to us at [email protected]

Let's Get Started

Save Time. Work Smarter.
Try With 100 Free Credits
Have An Enquiry?
Talk To An Expert.
Book A Demo