Meet Frank AI – Deterministic AI, across all lines of defense Learn more
LAST UPDATED: February 4, 2026
1. Definitions
2. Duration of Addendum
This Addendum will take effect on the Addendum Effective Date and, notwithstanding the expiration of the Term, will remain in effect until, and automatically expire upon, Supplier’s deletion of all Customer Personal Data as described in this Addendum.
3. Processing of Data
4. Data Deletion on Termination
Upon the expiration or earlier termination of the Services Agreement, Supplier shall securely destroy all Customer Personal Data in Supplier’s possession, custody, or control; provided, however, that Supplier will delete or overwrite information from any back-up media in the ordinary course of business, as technically feasible. In the event applicable law does not permit Supplier to comply with the delivery or destruction of the Customer Personal Data, and with respect to information Supplier maintains on back-up media, Supplier shall maintain the confidentiality of the Customer Personal Data and shall not use or disclose any Customer Personal Data after termination of the Services Agreement, except as required by law.
5. Data Security
When any new Sub-processor is engaged during the Term, Supplier will, at least 30 days before the new Sub-processor processes any Customer Personal Data, notify Customer of the engagement (including a general description of the Sub-processor, the country where the relevant Sub-processor is located and the activities the Sub-processor will perform).Customer may object to any new Sub-processor by providing written notice to Supplier within ten (10) business days of being informed of the engagement of the Sub-processor as described above. In the event Customer objects to a new Sub-processor, Customer and Supplier will work together in good faith to find a mutually acceptable resolution to address such objection. If the parties are unable to reach a mutually acceptable resolution within a reasonable timeframe, Customer may, as its sole and exclusive remedy, terminate the Services Agreement by providing written notice to Supplier.
Customer acknowledges and agrees that Supplier may create and derive from processing related to the Supplier Services anonymized and/or aggregated data that does not identify Customer or any natural person, and use, publicize or share with third parties such data to improve Supplier’s products and services and for its other legitimate business purposes.
Notwithstanding anything to the contrary in the Services Agreement, any notices required or permitted to be given by Supplier to Customer may be given (a) in accordance with the notice clause of the Services Agreement; (b) to Supplier’s primary points of contact with Customer; and/or (c) to any email provided by Customer for the purpose of providing it with Supplier Services-related communications or alerts. Customer is solely responsible for ensuring that such email addresses are valid.
To the extent permitted under law, each party’s and all of its affiliates’ liability, taken together in the aggregate, arising out of or related to this Addendum whether in contract, tort or under any other theory of liability, is subject to the “Limitations on Liability” section of the Services Agreement, and any reference in such section to the liability of a party means the aggregate liability of that party and all of its Affiliates under the Services Agreement and this Addendum.
Notwithstanding anything to the contrary in the Services Agreement, to the extent of any conflict or inconsistency between this Addendum and the remaining terms of the Services Agreement, this Addendum will govern. The parties agree that (1) the governing law of this Addendum, and (2) the forum for all disputes in respect of this Addendum, shall be the same as set out in the Services Agreement, unless otherwise required by Applicable Data Protection Laws.
Schedule 1
CROSS BORDER DATA TRANSFERS
Upon the effective date of adoption for any revised Standard Contractual Clauses by the European Commission, all references in this DPA to the “Standard Contractual Clauses” shall refer to that latest version thereof.“Alternative Transfer Mechanism” means a mechanism, if any, other than the Standard Contractual Clauses, that enables the lawful cross-border transfer of Customer Personal Data to a territory which has not been recognized by the relevant data protection authorities as providing an adequate level of protection for Customer Personal Data in accordance with Data Protection Law, for example, any replacement international instruments for the invalidated EU-U.S. and Switzerland-U.S. Privacy Shield Frameworks or Binding Corporate Rules under Article 47 of EU GDPR.
If Supplier adopts an Alternative Transfer Mechanism for any transfers that are subject to Section 9.2 of the DPA, then Supplier will inform Customer of the relevant Alternative Transfer Mechanism and ensure that such transfers are made in accordance with it; and/or if Supplier has not adopted, or informs Customer that Supplier is no longer adopting, an Alternative Transfer Mechanism for such transfers, then the Standard Contractual Clauses shall apply in accordance with Section 3 below.
3.1. When the Standard Contractual Clauses are the applicable transfer mechanism in accordance with Section 2 above, the parties agree that:3.1.1 Clause 7 will not apply.3.1.2 In Clause 9(a), Option 2 will apply, and the time period for prior notice of Subprocessor changes will be as set forth in Section 4.1 of the DPA.3.1.3 In Clause 11(a), the optional language will not apply.3.1.4 In Clause 17, Option 1 will apply, and the Standard Contractual Clauses will be governed by the law of the Republic of Ireland.3.1.5 In Clause 18(b), disputes will be resolved before the courts of the Republic of Ireland.3.2. For purposes of Annex I, Part A of the Standard Contractual Clauses (List of Parties):3.2.1 Data Exporter: Customer.Contact Details: Customer’s account owner email address, or to the email address(es) for which Customer elects to receive legal communications.Data Exporter Role: Data Exporter’s role is outlined in Section 2 of the DPA.Signature & Date: By entering into the Services Agreement, Data Exporter is deemed to have signed the Standard Contractual Clauses, including their Annexes and configured according to Section 3 of this Schedule I to the DPA, as of the effective date of the Services Agreement.3.2.2 Data Importer: Eventus Systems, Inc., on its own behalf and on behalf of its non-EEA Affiliates.Contact Details: Supplier’s DPO at privacy@eventus.com.Data Importer Role: Data Importer’s role is outlined in Section 3 of the DPA.Signature & Date: By entering into the Services Agreement, Data Importer is deemed to have signed the Standard Contractual Clauses, including their Annexes and configured according to Section 3 of this Schedule 1 to the DPA, as of the effective date of the Services Agreement.3.3. For purposes of Annex I, Part B of the Standard Contractual Clauses (Description of Transfer):3.3.1 The categories of data subjects are described in Section 3.2.5 of the DPA.3.3.2 The forms of Customer Personal Data transferred are described in Section 3.2.4 of the DPA.3.3.3 The frequency of the transfer is on a continuous basis for the duration of the Services Agreement.3.3.4 The nature and purpose of the processing is described in Section 3.2.3 of the DPA.3.3.5 The period of retention of Customer Personal Data in relation to the processing will end upon termination of the Services Agreement.3.3.6 For transfers to Subprocessors, the subject matter and nature of the processing is described on this Schedule 1. The duration of processing by Subprocessors is the same as by Data Importer.3.4. For purposes of Annex I, Part C of the Standard Contractual Clauses (Competent Supervisory Authority), the competent supervisory authority/ies shall be determined in accordance with EU GDPR and Clause 13 of the Standard Contractual Clauses.3.5. Section 5 to the DPA and Schedule 3 to the DPA contain the information required under Annex II of the Standard Contractual Clauses (Technical and Organizational Measures).3.6. In addition to the above stipulations, each of the following forms part of the Standard Contractual Clauses and sets out the parties’ understanding of their respective obligations under the Standard Contractual Clauses:3.6.1 Clause 8.9 of the Standard Contractual Clauses: Audit. Data Exporter acknowledges and agrees that it exercises its audit right(s) under Clause 8.9 by instructing Data Importer to comply with the audit measures described in Section 5.4 (Reviews and Audits of Compliance) of the DPA.3.6.2 Clause 9(c) of the Contractual Clauses: Disclosure of Subprocessor agreements. The parties acknowledge that, pursuant to subprocessor confidentiality restrictions, Data Importer may be restricted from disclosing onward subprocessor agreements to Data Exporter. Even where Data Importer cannot disclose a subprocessor agreement to Data Exporter, the parties agree that, upon the request of Data Exporter, Data Importer shall (on a confidential basis) provide all information it reasonably can in connection with such subprocessing agreement to Data Exporter.3.6.3 Clause 12 of the Standard Contractual Clauses: Liability. To the greatest extent permitted under Data Protection Law, any claims brought under the Standard Contractual Clauses will be subject to any aggregate limitations on liability set out in the Services Agreement.
4.1. With respect to transfers of Customer Personal Data protected by FADP, the Standard Contractual Clauses will apply in accordance with Sections 2 and 3 above, with the following modifications:4.1.1 any references in the Standard Contractual Clauses to “Directive 95/46/EC” or “Regulation (EU) 2016/679” shall be interpreted as references to FADP;4.1.2 references to “EU”, “Union”, “Member State” and “Member State law” shall be interpreted as references to Switzerland and Swiss law, as the case may be; and4.1.3 references to the “competent supervisory authority” and “competent courts” shall be interpreted as references to the Swiss Federal Data Protection and Information Commissioner and competent courts in Switzerland.
5.1. With respect to transfers of Customer Personal Data protected by UK GDPR, the International Data Transfer Addendum to the EU Commission Standard Contractual Clauses issued under S119A(1) Data Protection Act 2018 (“UK Addendum”), shall apply and be incorporated by reference into this DPA, with Part 1: Tables completed in accordance with the applicable stipulations in Section 3 of this Schedule 1. Either data exporter or data importer may terminate the UK Addendum pursuant to Section 19 of the UK Addendum if, after a good faith effort by the parties to amend the DPA to account for the approved changes and any reasonable clarifications to the UK Addendum, the parties are unable to come to agreement. To the extent of any conflict between Section 3 of this Schedule 1 and any mandatory clauses of the UK Addendum, the UK Addendum shall govern to the extent UK GDPR applies to the transfer.
Schedule 2LIST OF SUB-PROCESSORSThe Customer has authorised the use of the following Sub-processors:
| SUB-PROCESSOR | DATA | SERVICE | LOCATION | |||||||||||||||||||
| Zendesk, Inc. | Account Numbers | Customer service ticketing and documentation | USA | |||||||||||||||||||
| Amazon Web Services, Inc. | Account Numbers | Cloud hosting provider | Location based on Customer request and Eventus contracted AWS server locations, including:
| |||||||||||||||||||
| If Customer has also signed Supplier’s Frank AI addendum using the Supplier API Key only (and not Customer’s API Key), then the following Sub-processors are also authorised by Customer: | ||||||||||||||||||||||
| Google LLC (for Gemini) | Account Numbers | A natural language interface that accesses Data from the Supplier Services to provide a passive, assistive tool designed for data visualization and query generation | USA | |||||||||||||||||||
| Anthropic, PBC (for Claude) | Account Numbers | A natural language interface that accesses Data from the Supplier Services to provide a passive, assistive tool designed for data visualization and query generation | USA | |||||||||||||||||||
| OpenAI OpCo, LLC (for ChatGPT) | Account Numbers | A natural language interface that accesses Data from the Supplier Services to provide a passive, assistive tool designed for data visualization and query generation | USA | |||||||||||||||||||
Schedule 3
SECURITY MEASURES
Eventus will take, at a minimum, the security measures described in this Appendix 2 (or, as these measures are updated by Eventus from time to time, measures that are of substantially similar stringency) in order to ensure compliance with such security provisions with regard to the Processing of Personal Data on behalf of Customer. Information SecurityEventus maintains documented information security policies and procedures to help guide personnel in information security activities including information access control, data handling and classification, and information security. The policies are reviewed by executive management on an annual basis and updated as necessary.Employees are required to complete security awareness training annually to re-emphasize existing security policies and review any updates to the security policies. The security awareness training is provided using a third-party platform and includes topics such as handling of data, a review of technology use, email usage, internet usage, and secure networking. Management reviews the training completion report at least annually to help ensure each employee completes security awareness training and acknowledges the aforementioned policies.
Access to system information is protected by authentication and authorization mechanisms. Network and application access requires the use of unique user IDs and passwords. Network account policies are configured to enforce minimum length and complexity requirements, while application account policies are configured to enforce minimum length, complexity, password history, and lockout requirements. A best in class third party application is used as an additional level of security to provide authentication to the AWS environments as well as other applications based on assigned groups and permissions.A VPN service is used to remotely connect to the network and application and inherits its authentication requirements from the third party authentication application. The VPN is configured to enforce multi-factor authentication (MFA) upon login. Once authenticated, authorization to system components and environments are controlled via defined groups within the VPN. Eventus uses the VPN to provide a whitelisted IP address which is used to access hosts within the AWS environments.The IT team is responsible for assigning and maintaining access rights to applications and systems. The IT team requires HR to submit an access request ticket prior to granting or modifying employees’ access to the environment. Logical access requests for new hires are required to be submitted to the IT Team via an access request ticket by HR management. The IT team grants an initial group of access rights for the new hires that contains a standard set of access permissions for applications needed to perform company-wide functions. The initial group of access rights are approved prior to access through the creation of the request ticket. If access outside of the standard permission set is required for new hires, then additional access requests are submitted by management to IT. Modifications to assigned logical access privileges are submitted to the IT team by management. Upon notification of an employee termination, the IT team revokes user accounts assigned to terminated employees as a component of the termination procedures. The ability to add, modify, or revoke access to the production network and systems is restricted to IT operations personnel. Quarterly, the review of user access permissions is conducted by management. The results of these reviews are documented within the HR platform.
Eventus maintains documented incident response and data breach response plans, in efforts to ensure that identified security events or data breach incidents are identified, contained, remediated timely, and to ensure regulatory requirements are met. Notifications regarding confirmed data breaches are provided to affected data subjects, regulators, and other parties (as applicable) within an acceptable timeframe to meet the organization’s confidentiality commitments.Eventus utilizes CrowdStrike’s Falcon protection services for security incident detection and prevention. The Falcon Complete team is responsible for monitoring, and investigating, and the triaging of detections made by the Falcon Agent. If it is determined that further investigation is needed by the Falcon Complete Team, then escalation to the Eventus Infrastructure Team is required. Once escalated to the infrastructure team, Eventus’ incident response procedures are initiated.Personnel that have a job requirement to aid in incident response events are required to participate in a table-top exercise on an annual basis to ensure the accuracy of the plan and account for updates that should be made due to changes in the operating environment.
Management maintains documented change management policies and procedures to guide personnel in performing required activities for standard and emergency changes. Change requests are recorded within Zendesk, the IT helpdesk ticketing system, by the requestor. Zendesk is integrated into Jira, where change requests are ticketed and tracked throughout the lifecycle of the change request. Change request tickets document information about the requested change which includes a unique change request number, description of the change, reason for the change, systems affected, and required approvals.The Product Team and Infrastructure Team meet on a bi-weekly basis to discuss and review scheduled production change requests and patches. Operational issues and scheduled changes are reviewed based on the priority initially set by the Product Team and action plans are recorded.Eventus’ management has documented a roll-back strategy for each change request in the event that changes are required to be rolled back after implementation. Change requests are required to go through peer review Quality Assurance (QA) testing prior to approval, and project supervisors are responsible for approving the change request tickets prior to implementation. Approval is documented within the change request ticket and assigned to the Senior Manager of Infrastructure and Information Systems or the Cloud Engineer. The ability to implement changes into production is restricted to user accounts accessible by authorized personnel. After implementation, appropriate personnel are alerted via Slack, the results of the implementation are recorded, and the change request ticket is closed. Release notes and change information are communicated and made available to external users via the application portal.
Eventus leverages tools that are configured to monitor availability related metrics and report on if thresholds are exceeded. These metrics include individual system capacity (CPU usage, disk space, memory usage, etc.) as well as network performance.
Documented procedures are in place to guide personnel in performing system backups. Eventus utilizes an automated backup system to schedule backups of production systems. The automated backup system is configured to alert key personnel if a backup job were to fail. Incremental system backups are performed daily, and the backups are encrypted and maintained across multiple availability zones for redundancy. Restorations of production backup data are performed at least quarterly as a component of normal business operations. The results of backup restorations are reviewed by IT personnel to verify that data can successfully be recovered from backup media.
Eventus maintains a documented disaster recovery and business continuity plan that defines the roles and responsibilities of personnel. The plans also include the standard processes to follow should there be an event that were to occur that could affect system operations. Using a combination of the availability tools that Eventus utilizes, and the coordination of efforts between personnel allows the organization to recover from an adverse event with minimal downtime and loss of data. Testing of the disaster recovery and business continuity plans are performed on an annual basis and lessons learned applied to the updated plan.
Eventus has a formal data classification policy in place to guide personnel in identifying confidential information and the requirements for handling such information. Management classifies data into the following categories: Public, Sensitive, or Confidential. The classifications are defined to assist personnel in categorizing and handling and security requirements based on the data classification.Data CommunicationsIndustry standard encryption protocols are used and include the following:
Eventus has a data retention and disposal policy in place that defines retention schedules based on the data classification category to ensure data is maintained according to its source and use. Data destruction and disposal procedures are defined within the policy to guide personnel in securely disposing of data once it has exceeded the defined retention period. Customer master service agreements (MSAs) define the data retention and destruction requirements which is required to be signed by both parties prior to execution of services