Provider: Kacper Kolasa trading as Kasper Automation
Client: CLIENT LEGAL NAME
Contact: hello@kasperautomation.com
Security contact: security@kasperautomation.com
This Data Processing Addendum ("DPA") forms part of the agreement between the Controller and the Processor for the Services. It applies where the Processor processes Personal Data on behalf of the Controller.
If you need this DPA countersigned, email hello@kasperautomation.com with subject line "DPA Signature Request".
Download: Available upon request
Subprocessors list: /subprocessors.html
For the purposes of this DPA:
2.1 The Controller is the Controller of Personal Data Processed under this DPA.
2.2 The Processor Processes Personal Data only on behalf of and in accordance with the Controller's documented instructions, as described in this DPA and the agreement between the parties.
3.1 The subject matter, duration, nature, and purpose of Processing, and the types of Personal Data and categories of Data Subjects are described in Annex 1 (Processing Details).
3.2 The Controller may update Annex 1 in writing where reasonably necessary to reflect changes to the Services.
4.1 The Controller warrants that it has complied and will comply with Applicable Data Protection Law in relation to Personal Data provided to the Processor and instructions given to the Processor.
4.2 The Controller is responsible for:
5.1 Instructions. The Processor shall Process Personal Data only on documented instructions from the Controller, including with regard to transfers of Personal Data to a third country, unless required to do so by applicable law. Where the Processor is required by law to Process Personal Data other than on the Controller's instructions, the Processor shall (to the extent permitted by law) inform the Controller of that legal requirement.
5.2 Confidentiality. The Processor shall ensure that persons authorised to Process Personal Data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.
5.3 Security. The Processor shall implement appropriate technical and organisational measures designed to protect Personal Data against accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data. The measures are described in Annex 2 (Security Measures).
5.4 Subprocessors.
5.5 Assistance with Data Subject requests. Taking into account the nature of the Processing, the Processor shall provide reasonable assistance to the Controller to fulfil the Controller's obligation to respond to requests from Data Subjects to exercise their rights under Applicable Data Protection Law, to the extent the Controller cannot fulfil the request through its own access to the relevant systems.
5.6 Assistance with compliance. The Processor shall provide reasonable assistance to the Controller with respect to:
5.7 Personal Data Breach notification. The Processor shall notify the Controller without undue delay after becoming aware of a Personal Data Breach involving Personal Data Processed under this DPA. The notification will include information reasonably necessary for the Controller to meet its obligations under Applicable Data Protection Law, to the extent such information is available to the Processor.
5.8 Deletion or return. At the Controller's choice, upon termination of the Services, the Processor shall delete or return Personal Data to the Controller, and delete existing copies, unless retention is required by applicable law. The Processor may retain limited information where necessary for legal compliance, billing, or dispute resolution, in accordance with Applicable Data Protection Law.
5.9 Audits and information. The Processor shall make available to the Controller information reasonably necessary to demonstrate compliance with this DPA. Audits and inspections, if requested, shall:
The Controller shall bear its own costs and reimburse the Processor for reasonable time and expenses incurred in supporting the audit.
6.1 Where Applicable Data Protection Law restricts transfers of Personal Data outside the UK or EEA, the parties shall ensure appropriate safeguards are in place.
6.2 Depending on the circumstances, safeguards may include:
6.3 The Processor shall, on request, provide the Controller with information about the transfer mechanism used for relevant Subprocessors where applicable.
7.1 Each party's liability under this DPA is subject to the limitations and exclusions of liability set out in the main agreement between the parties, unless Applicable Data Protection Law requires otherwise.
7.2 Nothing in this DPA limits liability that cannot be limited under Applicable Data Protection Law.
If there is a conflict between this DPA and the main agreement, this DPA shall prevail in relation to the Processing of Personal Data, except where the main agreement provides greater protection for Personal Data, in which case the main agreement shall prevail to that extent.
9.1 This DPA remains in effect for as long as the Processor Processes Personal Data on behalf of the Controller under the Services.
9.2 Sections that by their nature should survive termination shall survive, including Sections 5.8, 7, and 8.
For data protection and security requests: security@kasperautomation.com
General contact: hello@kasperautomation.com
Provision of automation consulting, implementation, and maintenance services, including building and supporting workflows and integrations.
For the term of the Services and any agreed support period, subject to deletion/return provisions in this DPA.
Processing activities may include: receiving, transmitting, transforming, updating, and routing data between systems, and performing workflow logging and diagnostics necessary for reliability and support.
May include (depending on the Controller's business): prospects, leads, customers, employees, contractors, and other individuals whose data is stored in the Controller's systems.
May include (depending on workflows): names, email addresses, phone numbers, account identifiers, CRM fields, message content, files intentionally routed through workflows, and workflow metadata (timestamps, record IDs).
Not processed.
Continuous.
The Processor maintains measures designed to protect Personal Data, which may include:
The specific measures implemented depend on whether delivery is Client-hosted or Managed by us, and will be documented per project where required.
Current Subprocessors list: /subprocessors.html
Name:
Title:
Company:
Date:
Name: Kacper Kolasa
Title: CEO
Company: Kacper Kolasa trading as Kasper Automation
Date: