DATA PROCESSING ADDENDUM (COMPREHENSIVE) - TEXAS
TABLE OF CONTENTS
- Roles and Scope
- Duration and Instructions
- Nature, Purpose, Types of Data, and Categories of Data Subjects
- Provider Obligations (Processor)
- Anonymization and Aggregation (if applicable)
- Subprocessing
- Security Measures
- Data Residency and Localization
- Personal Data Breach
- Data Subject Requests
- Return and Deletion
- Audits and Certifications
- Cross-Border Transfers
- US State Privacy (Texas and others)
- Liability and Indemnities
- Conflict; Order of Precedence
- Annexes (Security Controls; SCC/UK Addendum; Completion Guidance)
- Signatures
1. ROLES AND SCOPE
- Parties: [CONTROLLER/PROCESSOR] roles for each party.
- Default: Provider acts as Processor (or Subprocessor) on behalf of Customer for Personal Data described herein.
- Optional: For Controller-to-Controller or joint-controller arrangements, select SCC Module 1 or Module 4 and document responsibilities in Annex I.
- Subject matter and purpose: provision of [SERVICES] under the [MASTER AGREEMENT NAME/DATE].
- DPO or Privacy Contact (if applicable): [NAME/EMAIL] for each party.
2. DURATION AND INSTRUCTIONS
- Processing duration: through the term of the underlying agreement plus wind-down.
- Provider will process Personal Data only on documented instructions from Customer, including regarding transfers; Provider will notify Customer if instructions conflict with Applicable Law.
3. NATURE, PURPOSE, TYPES OF DATA, AND CATEGORIES OF DATA SUBJECTS
- Nature and purpose: [e.g., hosting, support, analytics].
- Types of Personal Data: [contact info, device IDs, usage data, HR data, etc.].
- Data Subjects: [customers, employees, contractors, end users].
- Sensitive or Special Categories (if any): [health, biometric, racial/ethnic, political, etc.] require prior written approval and enhanced safeguards (encryption in transit/at rest, access restriction, need-to-know, DPIA/TIA if applicable). If none, state "Not processed."
4. PROVIDER OBLIGATIONS (PROCESSOR)
- Maintain confidentiality for personnel; background checks where appropriate.
- Process only per instructions; assist with impact assessments and consultations with authorities when required.
- Maintain records of processing as required by law.
5. ANONYMIZATION AND AGGREGATION (IF APPLICABLE)
- Provider may [choose: (a) not use / (b) use] Customer Personal Data to create de-identified or aggregated data for [benchmarking/product improvement/security analytics] provided it: (i) is irreversibly de-identified, (ii) contains no Personal Data, (iii) is not used to re-identify any individual or Customer, and (iv) complies with Applicable Law. If prohibited, state "No de-identified/aggregated use permitted."
6. SUBPROCESSING
- Authorized subprocessors listed in Annex; advance notice of new subprocessors; Customer objection rights within [X] days for reasonable, documented grounds.
- Provider remains liable for subprocessors; flow-down of equivalent obligations.
7. SECURITY MEASURES
- Implement technical and organizational measures appropriate to risk (see Annex 1).
- Access controls, encryption, logging and monitoring, vulnerability management, backup and disaster recovery, secure development, segregation of environments, personnel training.
8. DATA RESIDENCY AND LOCALIZATION
- Primary storage or processing locations: [LIST REGIONS/COUNTRIES].
- Customer options (if offered): [EEA-only/US-only/regional ringfencing]; any change requires prior written notice and, if applicable, updated transfer mechanism and TIA.
9. PERSONAL DATA BREACH
- Notify Customer without undue delay and within [X] hours of confirmation.
- Include details: nature of breach, data types, data subjects affected, measures taken or proposed.
- Cooperate on notifications and remediation.
10. DATA SUBJECT REQUESTS
- Assist Customer in responding to DSRs (access, deletion, correction, portability, restriction) within applicable timelines.
- No responses directly to Data Subjects unless authorized or required by law (with notice to Customer).
11. RETURN AND DELETION
- Upon termination or expiration, delete or return Personal Data per Customer's choice, subject to legal retention obligations; certify completion on request.
12. AUDITS AND CERTIFICATIONS
- Provide SOC/ISO or equivalent reports where available; otherwise allow audits once annually with reasonable notice, subject to confidentiality and time/materials fees if on-site.
- Promptly address material findings.
13. CROSS-BORDER TRANSFERS
- If transferring from EEA/UK/Switzerland, incorporate SCCs: [Select Module 2 (Controller-Processor) or 3 (Processor-Processor)], with Annexes completed.
- UK transfers: attach UK Addendum or IDTA with selected options.
- Conduct Transfer Impact Assessments (TIAs) as required; implement additional measures (encryption, pseudonymization, access controls) if indicated by TIA outcomes.
14. US STATE PRIVACY (TEXAS AND OTHERS)
- Provider acts as a "Processor" and shall not sell Personal Data, retain, use, or disclose Personal Data outside the scope of the Services, or combine Personal Data except as permitted by Applicable Law.
- Comply with the Texas Data Privacy and Security Act (TDPSA), as applicable, including processor obligations and assistance with consumer rights requests.
- For other applicable US state privacy laws, Provider will act as a processor or service provider and provide reasonable assistance with consumer rights requests.
15. LIABILITY AND INDEMNITIES
- Liability and caps align with the master agreement; no cap circumvention unless specifically carved out.
- Breach of DPA confidentiality or security obligations may be a carve-out where negotiated.
16. CONFLICT; ORDER OF PRECEDENCE
- This DPA prevails over conflicting terms in the master agreement regarding data protection and security; otherwise, the master agreement controls.
17. ANNEXES
- Annex 1: Technical and Organizational Measures (TOMs). [Guidance: list access controls, encryption standards, network security, logging/monitoring, vulnerability management, backup/DR, secure SDLC, HR security, physical security.]
- Annex 2: Subprocessor list. [Guidance: name, service, location, data types, role.]
- Annex 3: SCCs details (Modules, Clauses, Annex I/II/III) and UK Addendum selections. [Guidance: complete data exporter/importer details, description of transfers, TOMs, and jurisdiction-specific options.]
18. SIGNATURES
Customer:
By: _________________________
Name: _______________________
Title: ________________________
Date: ________________________
Provider:
By: _________________________
Name: _______________________
Title: ________________________
Date: ________________________