Last Updated: March 11, 2025
Data Processing Agreement
Effective Date: March 11, 2025
Introduction
This Data Processing Agreement ("DPA") forms part of the Terms of Service between you (the "Controller" or "Client") and Xavarro AI (the "Processor" or "we") and governs the processing of Personal Data in accordance with applicable Data Protection Laws.
This DPA is designed to ensure compliance with the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and other applicable data protection regulations. By engaging our Services, you acknowledge and agree to the terms of this DPA.
In the event of any conflict between this DPA and our Terms of Service, the provisions of this DPA shall prevail with respect to the processing of Personal Data.
Definitions
For the purposes of this DPA, the following terms have the meanings set forth below:
"Data Protection Laws"
All applicable laws and regulations relating to privacy and data protection, including but not limited to the GDPR, CCPA, and any successor legislation.
"Personal Data"
Any information relating to an identified or identifiable natural person that is processed by the Processor on behalf of the Controller in connection with the Services.
"Processing"
Any operation or set of operations performed on Personal Data, including collection, recording, organization, structuring, storage, adaptation, retrieval, consultation, use, disclosure, transmission, erasure, or destruction.
"Controller"
The entity that determines the purposes and means of Processing Personal Data. In the context of this DPA, you (the Client) are the Controller.
"Processor"
The entity that processes Personal Data on behalf of the Controller. In the context of this DPA, Xavarro AI is the Processor.
"Sub-processor"
Any third-party processor engaged by the Processor to process Personal Data on behalf of the Controller.
"Data Subject"
The identified or identifiable natural person to whom Personal Data relates.
"Security Incident"
Any breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Personal Data.
Scope of Processing
Subject Matter and Duration
The Processor will process Personal Data on behalf of the Controller for the duration of the Services agreement, unless terminated earlier in accordance with this DPA or the Terms of Service.
The subject matter of the processing is the provision of AI automation consulting services as described in the Services agreement.
Nature and Purpose of Processing
The Processor will process Personal Data to provide the following Services:
- Business process analysis and workflow automation
- AI solution implementation and system integration
- Data analysis for automation recommendations
- Training and support services
- Project management and communication
Types of Personal Data
The Personal Data processed may include, but is not limited to:
- Identity Data: Names, job titles, employee IDs
- Contact Data: Email addresses, phone numbers, business addresses
- Professional Data: Work history, department, role, responsibilities
- Technical Data: IP addresses, device information, system access logs
- Usage Data: User interactions with systems, workflow patterns
- Communication Data: Messages, feedback, support requests
- Business Data: Transaction records, performance metrics, operational data
Categories of Data Subjects
Personal Data may relate to the following categories of Data Subjects:
- Controller's employees and contractors
- Controller's customers and clients
- Controller's suppliers and business partners
- End users of Controller's systems and services
Processor Obligations
Processing Instructions
The Processor shall process Personal Data only on documented instructions from the Controller, including with respect to transfers of Personal Data to third countries or international organizations, unless required to do so by applicable law.
If the Processor believes that any instruction infringes Data Protection Laws, the Processor will immediately inform the Controller.
Confidentiality
The Processor shall ensure that persons authorized to process Personal Data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.
Assistance to Controller
The Processor shall, taking into account the nature of the processing and information available to the Processor, assist the Controller:
- In ensuring compliance with obligations regarding security, breach notification, and impact assessments
- In responding to requests from Data Subjects exercising their rights
- In meeting the Controller's obligations under Data Protection Laws
Records of Processing
The Processor shall maintain written records of all categories of processing activities carried out on behalf of the Controller, including:
- Name and contact details of the Processor and Controller
- Categories of processing performed on behalf of the Controller
- Transfers of Personal Data to third countries or international organizations
- Description of technical and organizational security measures
Controller Instructions
Documented Instructions
The Controller's initial instructions for processing Personal Data are set out in this DPA and the Services agreement. The Controller may issue additional written instructions as reasonably necessary.
Additional Instructions
The Controller may provide additional processing instructions to the Processor by:
- Email to the designated Processor contact
- Written notice through the Services platform
- Formal amendment to this DPA or the Services agreement
Unlawful Instructions
If the Processor determines that an instruction from the Controller would violate Data Protection Laws, the Processor will inform the Controller immediately and will be entitled to refuse to comply with the instruction until it is confirmed or modified by the Controller.
Security Measures
Technical and Organizational Measures
The Processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including as appropriate:
- Pseudonymization and encryption of Personal Data
- Ongoing confidentiality, integrity, availability, and resilience of processing systems
- Ability to restore availability and access to Personal Data in a timely manner
- Regular testing, assessment, and evaluation of security effectiveness
Specific Security Controls
The Processor maintains the following security controls:
- Access Control: Role-based access controls, multi-factor authentication, principle of least privilege
- Encryption: Data encrypted in transit (TLS 1.3+) and at rest (AES-256)
- Network Security: Firewalls, intrusion detection/prevention systems, network segmentation
- Application Security: Secure coding practices, regular vulnerability scanning, penetration testing
- Backup and Recovery: Regular automated backups, tested disaster recovery procedures
- Logging and Monitoring: Comprehensive audit logs, real-time security monitoring, SIEM integration
- Physical Security: Data centers with 24/7 security, biometric access controls, video surveillance
Security Updates
The Processor will regularly review and update security measures to address evolving threats and maintain compliance with industry best practices and Data Protection Laws.
Security Documentation
Upon reasonable request and subject to confidentiality obligations, the Processor will provide the Controller with information about security measures implemented to protect Personal Data.
Sub-processors
General Authorization
The Controller provides general authorization for the Processor to engage Sub-processors to process Personal Data. The Processor will maintain a current list of Sub-processors available at xavarro.com/legal/subprocessors.
Current Sub-processors
As of the effective date of this DPA, the Processor uses the following Sub-processors:
- Cloud Hosting: Vercel, Hostinger, GitHub – Infrastructure, deployment, and source code management
- AI Services: Anthropic, OpenAI, Google (Gemini) – AI model APIs and processing
- Database: Supabase – Application database and authentication services
- Communication: Resend (email), Twilio (SMS), Daily.co (video) – Client communication channels
- Automation: n8n – Workflow automation and integration
- Payment Processing: Stripe – Payment and billing services
- Analytics: Google Analytics – Website usage analytics
A complete and up-to-date list of all Sub-processors is maintained at xavarro.com/legal/subprocessors.
Sub-processor Requirements
The Processor shall ensure that any Sub-processor:
- Enters into a written agreement imposing data protection obligations substantially similar to those in this DPA
- Complies with all applicable Data Protection Laws
- Implements appropriate technical and organizational security measures
- Provides sufficient guarantees regarding data protection
Changes to Sub-processors
The Processor will notify the Controller at least 30 days in advance of adding or replacing Sub-processors. If the Controller objects to a new Sub-processor on reasonable data protection grounds, the Controller may:
- Request that the Processor not use the Sub-processor
- Terminate the affected Services upon 30 days' written notice
Liability
The Processor remains fully liable to the Controller for the performance of any Sub-processor's obligations under this DPA.
Confidentiality and Data Protection
In addition to the data protection obligations set forth in this DPA, the parties agree to maintain the confidentiality of all information exchanged in connection with the processing of Personal Data and the performance of services under the Agreement.
Definition of Confidential Information
"Confidential Information" means all non-public information disclosed by one party to the other party in connection with this DPA and the Agreement, including:
- Personal Data: All personal data processed under this DPA, including data subject information, processing records, and data flows
- Business Information: Business strategies, financial information, customer lists, supplier information, pricing, and forecasts
- Technical Information: System architectures, security measures, technical specifications, data schemas, APIs, and integration methods
- Security Information: Security controls, vulnerability assessments, incident reports, security audits, and penetration test results
- Proprietary Information: Trade secrets, know-how, inventions, algorithms, and methodologies
Confidentiality Obligations
Each party agrees to:
- Non-Disclosure: Hold all Confidential Information in strict confidence and not disclose it to any third party without prior written consent, except as expressly permitted in this DPA
- Limited Use: Use Confidential Information only for purposes of fulfilling obligations under this DPA and the Agreement
- Protection: Protect Confidential Information using the same degree of care used to protect its own confidential information, but in no event less than reasonable care
- Prompt Notification: Notify the other party promptly of any unauthorized disclosure or use of Confidential Information
Permitted Disclosures
The Receiving Party may disclose Confidential Information only to:
- Authorized Representatives: Its employees, officers, directors, contractors, and advisors who have a legitimate need to know and are bound by confidentiality obligations at least as protective as those herein
- Sub-processors: Approved Sub-processors as set forth in this DPA, provided they are bound by appropriate confidentiality agreements
- Legal Requirements: Government authorities or courts when required by law, provided the Receiving Party gives prior notice to the Disclosing Party (if legally permitted) and limits disclosure to the minimum required
The Receiving Party shall be fully responsible for any breach of confidentiality by its Representatives or Sub-processors.
Exclusions from Confidential Information
Confidential Information does not include information that:
- Is or becomes publicly available through no breach of this DPA by the Receiving Party
- Was rightfully in the Receiving Party's possession prior to disclosure, as evidenced by written records
- Is rightfully received from a third party without breach of confidentiality obligations
- Is independently developed without use of or reference to Confidential Information, as evidenced by written records
- Is approved for disclosure by prior written authorization of the Disclosing Party
Note: Personal Data subject to this DPA does not qualify for these exclusions and remains protected regardless of public availability or other circumstances.
Special Handling of Personal Data
Without limiting the general confidentiality obligations above, the Processor shall implement additional safeguards for Personal Data:
- Access Controls: Restrict access to Personal Data to authorized personnel only, using role-based access controls and the principle of least privilege
- Encryption: Encrypt Personal Data in transit (TLS 1.3+) and at rest (AES-256 or equivalent)
- Segregation: Maintain logical segregation of Personal Data between different Controllers
- Monitoring: Implement logging and monitoring of all access to Personal Data
- Training: Ensure all personnel with access to Personal Data receive data protection and confidentiality training
- Confidentiality Agreements: Bind all personnel with access to Personal Data to written confidentiality obligations
Return or Destruction of Confidential Information
Upon termination or expiration of this DPA, or upon the Disclosing Party's written request, the Receiving Party shall:
- Promptly return to the Disclosing Party, or securely destroy, all tangible materials containing Confidential Information
- Delete or destroy all electronic copies of Confidential Information in its possession or control
- Provide written certification of such return or destruction within thirty (30) days
Exceptions: The Receiving Party may retain:
- One archival copy of Confidential Information in secure storage solely for determining its obligations under this DPA
- Electronic copies automatically retained in backup systems, provided such copies remain subject to confidentiality obligations
- Information required to be retained by applicable law or regulation, provided such information remains confidential
No License or Ownership Transfer
Nothing in this DPA grants the Receiving Party any license, right, title, or interest in or to any Confidential Information, except the limited right to use the Confidential Information as expressly set forth in this DPA. All Confidential Information remains the sole property of the Disclosing Party.
The Receiving Party acknowledges that unauthorized disclosure or use of Confidential Information may cause irreparable harm to the Disclosing Party for which monetary damages may be an inadequate remedy. Accordingly, the Disclosing Party shall be entitled to seek equitable relief, including injunction and specific performance, in addition to all other remedies available at law or in equity.
Duration of Confidentiality Obligations
The confidentiality obligations set forth in this Section shall:
- Personal Data: Continue for as long as the Processor processes Personal Data on behalf of the Controller, and for three (3) years thereafter
- Trade Secrets: Continue for as long as the information remains a trade secret under applicable law
- Other Confidential Information: Continue for a period of three (3) years from the date of disclosure
Note: These obligations survive termination or expiration of this DPA and the Agreement.
Breach Notification
In addition to Security Incident notification requirements elsewhere in this DPA, the Receiving Party shall notify the Disclosing Party immediately (and in any event within 24 hours) upon becoming aware of any breach of confidentiality obligations, including:
- Unauthorized access to or disclosure of Confidential Information
- Loss, theft, or misappropriation of Confidential Information
- Breach of confidentiality by Representatives or Sub-processors
- Any circumstances that may lead to unauthorized disclosure
Such notification shall include all details known at the time, and the Receiving Party shall provide regular updates as additional information becomes available.
Integration with Existing NDAs
If the parties have previously executed a separate Mutual Non-Disclosure Agreement (NDA), such NDA is hereby incorporated by reference and shall continue to govern the treatment of Confidential Information disclosed under this DPA.
In the event of any conflict between this Section and a separate NDA:
- The terms of this DPA shall control with respect to Personal Data and data processing activities
- The terms of the NDA shall control with respect to other Confidential Information
- The more protective provision shall apply in cases of ambiguity
Data Subject Rights
Assistance with Requests
The Processor shall, to the extent legally permitted and taking into account the nature of the processing, assist the Controller in fulfilling its obligation to respond to requests from Data Subjects exercising their rights under Data Protection Laws, including:
- Right of access to Personal Data
- Right to rectification of inaccurate Personal Data
- Right to erasure ("right to be forgotten")
- Right to restriction of processing
- Right to data portability
- Right to object to processing
- Rights related to automated decision-making and profiling
Forwarding Requests
If the Processor receives a request directly from a Data Subject, the Processor will not respond to such request directly without the Controller's prior written authorization, except to acknowledge receipt and inform the Data Subject that the request will be forwarded to the Controller.
Response Timeframes
The Processor will provide assistance to the Controller within the timeframes required by Data Protection Laws to enable the Controller to respond to Data Subject requests within applicable deadlines (typically 30 days under GDPR).
Reasonable Fees
The Processor may charge reasonable fees for assistance with Data Subject requests that require significant technical effort or involve excessive repetitive requests, provided such fees are communicated to the Controller in advance.
Data Breach Notification
Notification Obligation
The Processor shall notify the Controller without undue delay (and in any event within 24 hours) upon becoming aware of a Security Incident affecting Personal Data processed on behalf of the Controller.
Notification Contents
The Security Incident notification shall include, to the extent known:
- Description of the nature of the Security Incident
- Categories and approximate number of Data Subjects affected
- Categories and approximate number of Personal Data records affected
- Likely consequences of the Security Incident
- Measures taken or proposed to address the Security Incident
- Measures to mitigate possible adverse effects
- Contact point for further information
Investigation and Cooperation
The Processor shall:
- Promptly investigate Security Incidents and take appropriate remedial measures
- Provide regular updates to the Controller on investigation progress
- Cooperate with the Controller in fulfilling regulatory reporting obligations
- Assist with notifications to Data Subjects if required by Data Protection Laws
- Preserve evidence and maintain records of Security Incidents
No Acknowledgment of Fault
The Processor's notification of a Security Incident shall not be construed as an acknowledgment of fault or liability.
Audits and Compliance
Audit Rights
The Processor shall make available to the Controller all information necessary to demonstrate compliance with this DPA and allow for and contribute to audits, including inspections, conducted by the Controller or an auditor mandated by the Controller.
Audit Frequency and Scope
The Controller may conduct audits:
- No more than once per year, unless required by Data Protection Laws or following a Security Incident
- Upon reasonable advance notice (at least 30 days)
- During normal business hours
- In a manner that does not unreasonably interfere with Processor's operations
Alternative Compliance Verification
In lieu of an on-site audit, the Controller may accept alternative evidence of compliance, including:
- Third-party security certifications (SOC 2 Type II, ISO 27001, etc.)
- Completed security questionnaires
- Independent audit reports
- Attestations of compliance
Audit Costs
The Controller shall bear the costs of any audits, including reasonable costs incurred by the Processor in facilitating the audit. If an audit reveals material non-compliance, the Processor shall bear its own costs and implement remedial measures at no charge.
Confidentiality
Any information obtained during audits is confidential and shall be used solely to verify compliance with this DPA.
International Data Transfers
Transfer Mechanisms
The Processor may process Personal Data in countries outside the European Economic Area (EEA), United Kingdom, or other jurisdictions with comprehensive data protection laws. When such transfers occur, the Processor shall ensure appropriate safeguards are in place, including:
- European Commission-approved Standard Contractual Clauses (SCCs)
- UK International Data Transfer Agreement (IDTA) or UK Addendum to SCCs
- Adequacy decisions by relevant data protection authorities
- Binding Corporate Rules (where applicable)
- Other legally recognized transfer mechanisms
Standard Contractual Clauses
Where Standard Contractual Clauses are used, they are incorporated into this DPA by reference. The parties agree to execute the applicable SCCs upon request by either party.
Supplementary Measures
In addition to appropriate transfer mechanisms, the Processor implements supplementary technical and organizational measures to ensure adequate protection, including:
- End-to-end encryption of Personal Data
- Contractual restrictions on access by third-country authorities
- Regular assessment of transfer impact
- Data minimization and pseudonymization where possible
Transfer Locations
The Processor currently processes Personal Data in the following locations:
- Canada (primary business location)
- United States (Sub-processor data centres: Vercel, Supabase, Anthropic, OpenAI, AWS Bedrock, Stripe, Resend, GitHub)
- European Union (Sub-processor data centres: n8n, Hostinger)
An updated list of processing locations is available upon request.
Deletion and Return of Data
Deletion or Return
Upon termination or expiration of the Services, the Processor shall, at the Controller's choice and within 30 days of such termination:
- Return all Personal Data to the Controller in a commonly used, machine-readable format
- Securely delete all Personal Data from Processor's systems
Certification of Deletion
Upon completion of deletion, the Processor will provide written certification that all Personal Data has been deleted in accordance with this DPA, unless retention is required by applicable law.
Exceptions
The Processor may retain Personal Data to the extent required by applicable law, provided that:
- The Processor ensures confidentiality of retained Personal Data
- Personal Data is only processed as necessary for legal compliance
- Personal Data is deleted once the legal retention period expires
Backup Data
Personal Data in backup systems will be deleted in accordance with the Processor's regular backup deletion schedule, but in no event later than 90 days after the scheduled deletion date.
Term and Termination
Term
This DPA shall commence on the effective date of the Services agreement and shall remain in effect for as long as the Processor processes Personal Data on behalf of the Controller.
Termination for Breach
Either party may terminate this DPA with immediate effect by written notice if the other party materially breaches this DPA and fails to remedy such breach within 30 days of receiving written notice.
Effect of Termination
Upon termination of this DPA:
- The Processor shall cease all processing of Personal Data
- The Processor shall comply with deletion or return obligations as specified in this DPA
- Provisions relating to confidentiality, liability, and dispute resolution shall survive
Survival
The following provisions shall survive termination of this DPA: Definitions, Security Measures, Confidentiality, Limitation of Liability, Governing Law, and Dispute Resolution.
Questions?
If you have any questions about this document, please contact us:
Email: support@xavarro.com
Address: 2 East John St., Cookstown ON L0L 1L0