Data Processing Agreement (DPA)

Last updated: October 17, 2024

1. Definitions and Interpretation

2. Appointment

3. Processing Time

4. Processing Data

Data We Observe & Collect:

  • Unique User ID: A special identifier for tracking user interactions.
  • Device Information: This includes screen resolution, type of device, operating system, and browser type.
  • Activity Logs: Console logs, errors (the latter is suppressed by default for privacy).
  • Geographic and Language Preferences: Country location and preferred language.
  • User Interaction: Mouse movements, locations, clicks, and pages visited.
  • Access Details: Referring URLs, domains, and timestamps of website visits and specific events.
  • User-Provided Information: Through our Identify API, feedback, surveys, or polls, you might choose to share additional attributes or personal data with us.

Data Shared Through Engagement:

  • Research Responses: Personal data shared in research screeners or tester profiles, including demographics (name, contact details, age, gender, nationality, education, job title, marital status, and voluntarily shared social media profiles).
  • Session Content: Any personal data in audio, video, or text format during sessions.
  • Professional Data: Information related to education and profession.
  • Feedback and Communication: Personal data in file attachments, survey responses, feedback, and messages.

Affected Data Subjects:

  • Observe & Ask: End-users of the Controller’s website utilizing the adam.ai platform.
  • Engage: Testers, affiliates, and other authorized users like employees, freelancers, or contractors who have been given access to the platform, in line with our agreement.

Additional Notes:

  • Prohibition on Sale of Personal Data: adam.ai strictly prohibits the sale of personal data. We ensure that any transfer or disclosure of personal data does not equate to "selling" under any applicable data protection laws, such as the CCPA.
  • Data Subject Categories: The Controller may update or add new categories of data subjects as necessary over time, adhering to the principles of data protection and privacy by design.

5. Organisational and Technical Measures

6. Requests from Data Subjects and adam.ai's Support

7. Commitment to Quality and Compliance

  • a. We've appointed a Compliance Lead to oversee compliance with data protection laws, reachable via compliance@adam.ai.
  • b. Personal Data is kept distinct from data processed for other parties.
  • c. All data processing aligns with our Terms of Service and your specific instructions, including for international data transfers, unless overridden by legal obligations.
  • d. Our team is committed to safeguarding the confidentiality of Personal Data.
  • e. We collaborate with supervisory authorities as needed.
  • f. You'll be informed immediately of any issues impacting data processing or compliance.
  • g. Should you face regulatory inspections or legal challenges, we're here to assist.
  • h. Regular reviews of our processes and security measures ensure alignment with Applicable Data Protection Laws and protection of data subject rights.
  • i. We'll confirm that our technical and organizational safeguards meet your monitoring requirements as outlined in Schedule 2 of this DPA.

8. Controller's Oversight Rights

9. Handling of Security Incidents

  • a. Implementing robust technical and organizational security measures, tailored to the nature of data processing and potential risks, to prevent and swiftly detect security incidents.
  • b. Should a security breach occur, involving unauthorized or accidental disclosure, destruction, loss, alteration, or access to Personal Data, we will inform you immediately. Together, we'll strategize on securing the data and minimizing harm to affected individuals.
  • c. In the event of a Security Breach, adam.ai pledges full cooperation. We'll share all necessary details, conduct thorough investigations, take steps to prevent further issues, and, with your consent, undertake actions to rectify the breach.
  • d. We'll support you in fulfilling your duty to notify affected Data Subjects and relevant authorities about the breach, providing necessary information and assistance.
  • e. adam.ai ensures that you receive all critical information about the breach promptly, aiding in your communication with impacted Data Subjects.

10. Controller's Directive Authority

11. Management of Personal Data Post-Processing

12. Indemnification

  • a. adam.ai will promptly inform the Controller of any legal claims related to data processing.
  • b. adam.ai won't settle any claim without the Controller's agreement, except as required by law.
  • c. The Controller has the right to manage legal defenses or settlements at its expense.
  • d. This agreement does not limit the Controller's right to seek remedies for any negligence on the part of adam.ai or others.
  • a. The Controller must inform adam.ai of any claims related to a security breach in a timely manner.
  • b. adam.ai has the right to defend or settle claims at its own expense.
  • c. adam.ai's financial liability is limited as described above.
  • d. This provision does not affect adam.ai's right to defense against contributory negligence by the Controller or others.

13. Sub-Processing

  • a. Data transfers to sub-processors commence only after meeting all regulatory requirements.
  • b. For services rendered outside the EU/EEA, the Processor ensures the sub-processor complies with Applicable Data Protection Laws.
  • c. Sub-processors are bound by data protection obligations similar to those in this DPA, ensuring adequate technical and organizational measures are in place.

SCHEDULE 1: Description of Processing Activities

The Purpose

  • Meeting Analytics (Observe): This feature allows users to capture and analyze meeting dynamics, attendance, and engagement, providing insights into how meetings are conducted and how they can be optimized for efficiency.
  • Feedback Collection (Ask): Through targeted surveys and feedback requests, this tool gathers input directly from meeting participants, offering a channel to express opinions and suggestions on meeting outcomes and processes.
  • Direct Interviews (Engage): Facilitates the scheduling and conducting of one-on-one or group interviews, making it easier to dive deeper into specific feedback or explore new ideas that can influence future meeting strategies or product developments.

SCHEDULE 2: Technical and Organizational Measures

  • Measures to prevent unauthorized physical access to data processing facilities.
  • Use of authentication systems like passwords to prevent unauthorized virtual access to data.
  • Ensuring that only authorized personnel can access specific data sets.
  • Securing the transfer of data to ensure confidentiality and integrity.
  • Tracking and logging who inputs data into data processing systems, when, and why.
  • Implementing systems to ensure data is always accessible when needed, including backup systems.
  • Keeping data collected for different purposes distinctly separate.