ZeroEntropy's Data Processing Addendum (DPA)

Nov 4, 2025

SHARE

ZeroEntropy is compliant under SOC 2 Type II, HIPAA, GDPR. You can find most resources in our trust report.

Below is our current Data Processing Addendum as of November 4th, 2025.

DATA PROTECTION AGREEMENT

ZeroEntropy, Inc. a company incorporated under the laws of Delaware, having its

registered office and principal place of business in San Francisco at 156 2nd St San

Francisco 94110 California USA (hereinafter to be referred to as: the “Data

Processor”),

AND

________________, a company incorporated under the laws of ______________,

having its registered office in ________________ at ________________ and principal

place of business in _____________ at __________________ (hereinafter to be

referred to as: the “Data Controller”).

HEREBY AGREE AS FOLLOWS:

1. Subject matter of this Data Processing Agreement

1.1. This Data Processing Agreement applies to the processing of Personal Data

subject to EU Data Protection Law in connection with the Data Controller’s use of the

Data Processor’s services (the “Services”) under the Data Processor’s Terms of Service

or any other applicable online agreement governing such use.

1.2. The term EU Data Protection Law shall mean Regulation (EU) 2016/679 of

the European Parliament and of the Council of 27 April 2016 on the protection of

natural persons with regard to the processing of personal data and on the free

movement of such data, and repealing Directive 95/46/EC (General Data Protection

Regulation).

1.2A. “Data Protection Laws” means GDPR, UK GDPR, and applicable

US state privacy laws including CCPA CPRA, Colorado CPA, Connecticut CTDPA,

Utah UCPA, and Virginia VCDPA.

1.2B. This DPA also applies to Customer Affiliates that enter an order

under the Agreement. Processor acts as processor for such Affiliates to the extent they

use the Services.

1.3. Except as modified below, the Terms of Service shall remain in full force

and effect. Other terms used in this Data Processing Agreement that have meanings

ascribed to them in the EU Data Protection law, including but not limited to

“Processing”, “Personal Data”, “Data Controller” and “Processor,” shall carry the

meanings set forth under EU Data Protection Law.1.4. Insofar as the Data Processor processes Personal Data subject to EU Data

Protection Law on behalf of the Data Controller in connection with the Data

Controller’s use of the Services, the terms of this Data Processing Agreement shall

apply. In the event of any conflict between the Terms of Service (or other applicable

online agreement) and this Data Processing Agreement, the provisions of this Data

Processing Agreement shall prevail. An overview of the categories of Personal Data,

the categories of Data Subjects, and the nature and purposes of processing is provided

in Annex 2.

2. The Data Controller and the Data Processor

2.1. Subject to the provisions of the Terms of Service, to the extent that the Data

Processor’s data processing activities are not adequately described in the Terms of

Service, the Data Controller will determine the scope, purposes, and manner by which

the Personal Data may be accessed or processed by the Data Processor. The Data

Processor will process the Personal Data only as set forth in Data Controller’s written

instructions and no Personal Data will be processed unless explicitly instructed by the

Controller. Documented instructions include those provided via the Services, the

Dashboard, APIs, or the Terms of Service. Documented instructions include those

provided via the Services, dashboard, APIs, Agreement, or other written

communications.

2.2. The Data Processor will only process the Personal Data on documented

instructions of the Data Controller to the extent that this is required for the provision of

the Services. Should the Data Processor reasonably believe that a specific processing

activity beyond the scope of the Data Controller’s instructions is required to comply

with a legal obligation to which the Data Processor is subject, the Data Processor shall

inform the Data Controller of that legal obligation and seek explicit authorization from

the Data Controller before undertaking such processing. The Data Processor shall never

process the Personal Data in a manner inconsistent with the Data Controller’s

documented instructions. The Data Processor shall immediately notify the Data

Controller if, in its opinion, any instruction infringes this Regulation or other Union or

Member State data protection provisions. Such notification will not constitute a general

obligation on the part of the Data Processor to monitor or interpret the laws applicable

to the Data Controller, and such notification will not constitute legal advice to the Data

Controller.

2.3. The Parties have entered into this Data Processing Agreement in connection

with the Data Controller’s use of the Data Processor’s Services, in order to benefit from

the capabilities of the Data Processor in securely processing Personal Data for the

purposes set out in Annex 2. The Data Processor may determine the technical andorganizational means it considers necessary to achieve those purposes, provided that

such means comply with this Data Processing Agreement and the Data Controller’s

documented instructions.

2.4. The Data Controller warrants that it has all necessary rights to provide the

Personal Data to the Data Processor for the Processing to be performed in relation to

the Services, and that one or more lawful bases set forth in EU Data Protection Law

support the lawfulness of the Processing. To the extent required by EU Data Protection

Law, the Data Controller is responsible for ensuring that all necessary privacy notices

are provided to data subjects, and unless another legal basis set forth in EU Data

Protection Law supports the lawfulness of the processing, that any necessary data

subject consents to the Processing are obtained, and for ensuring that a record of such

consents is maintained. Should such a consent be revoked by a data subject, the Data

Controller is responsible for communicating the fact of such revocation to the Data

Processor, and the Data Processor remains responsible for implementing Data

Controller’s instruction with respect to the processing of that Personal Data.

2.5. Data Use and Storage Location

(a) No Training or Fine-Tuning. The Data Processor does not use any Personal

Data or Customer Content processed through the Services to train, or fine-tune its

machine learning models or those of any third party. Processing of Personal Data is

strictly limited to operating, maintaining, and securing the Services in accordance with

the Data Controller’s documented instructions.

(b) Encryption. The Data Processor protects Personal Data in transit and at rest

using industry-standard encryption technologies (such as TLS 1.2+ for data in transit

and AES-256 or equivalent for data at rest).

(c) Data Residency. The Data Processor offers regional hosting options,

including EU-based data centers. When the Data Controller selects an EU region, all

Personal Data submitted to and processed by the Services remains within the European

Economic Area, subject only to the Data Controller’s configuration and any explicitly

authorized subprocessors listed in Annex 4.

2.6. For California personal information, Processor acts as a service provider or

processor and will not sell or share personal information, will not retain, use, or

disclose it for any purpose other than the Services, will not combine it with personal

information from other customers except as permitted by law for security and

debugging, and certifies compliance with these restrictions.2.7. De-identified Data. If Customer instructs Processor to generate or handle

de-identified or aggregated data, Processor will take reasonable measures to prevent re-

identification, will not attempt to re-identify except to test its de-identification process,

and will bind any recipients to the same restrictions.

3. Confidentiality

3.1. Without prejudice to any existing contractual arrangements between the

Parties, the Data Processor shall treat all Personal Data as confidential and it shall

inform all its employees, agents and/ or approved sub-processors engaged in

processing the Personal Data of the confidential nature of the Personal Data. The Data

Processor shall ensure that all such persons or parties have signed an appropriate

confidentiality agreement, are otherwise bound to a duty of confidentiality, or are under

an appropriate statutory obligation of confidentiality.

4. Security

4.1. Taking into account the state of the art, the costs of implementation and the

nature, scope, context and purposes of processing as well as the risk of varying

likelihood and severity for the rights and freedoms of natural persons, the Data

Controller and Data Processor shall implement appropriate technical and organizational

measures to ensure a level of security of the processing of Personal Data appropriate to

the risk. These measures shall include, at a minimum, the security measures agreed

upon by the Parties in Annex 3.

4.2. Both the Data Controller and the Data Processor shall maintain written

security policies that are fully implemented and applicable to the processing of

Personal Data. At a minimum, such policies should include assignment of internal

responsibility for information security management, devoting adequate personnel

resources to information security, carrying out verification checks on permanent staff

who will have access to the Personal Data, conducting appropriate background checks,

requiring employees, vendors and others with access to Personal Data to enter into

written confidentiality agreements, and conducting training to make employees and

others with access to the Personal Data aware of information security risks presented

by the Processing.

4.3. Upon reasonable written notice, Processor shall make available information

necessary to demonstrate compliance with this DPA, including current third-party

certifications or audit reports such as SOC 2 Type II. Where such documentation does

not reasonably address the Controller’s concerns, Controller (or an independent auditorit designates) may conduct audits, including remote document review and on-site

inspections, no more than once in any 12-month period, or following (i) a confirmed

Security Incident, (ii) material change to Processing, or (iii) a Supervisory Authority

request, during normal business hours and without unreasonably disrupting Processor’s

operations. All audit information is Confidential Information. Processor maintains the

records required by Article 30 GDPR and may satisfy audit requests by providing

current third party reports such as SOC 2 Type II, where they address the scope of

Processing.

4.4. The Data Processor’s adherence to either an approved code of conduct or to

an approved certification mechanism recognized under EU

Data Protection Law may be used as an element by which the Data Processor may

demonstrate compliance with the requirements set out in Article 4.1, provided that the

requirements contained in Annex 3 are also addressed by such code of conduct or

certification mechanism.

5. Improvements to Security

5.1. The Parties acknowledge that security requirements are constantly changing

and that effective security requires frequent evaluation and regular improvements of

outdated security measures. The Data Processor will therefore evaluate the measures as

implemented in accordance with Article 4 on an on-going basis in order to maintain

compliance with the requirements set out in Article 4.

6. Data Transfers

6.1. The Data Processor shall promptly notify the Data Controller of any

planned permanent or temporary transfers of Personal Data to a third country, including

a country outside of the European Economic Area without an adequate level of

protection, and shall only perform such a transfer after obtaining authorization from the

Data Controller, which may be refused at its own discretion. Annex 4 provides a list of

transfers for which the Data Controller grants its authorization upon the conclusion of

this Data Processing Agreement.

6.2. To the extent that the Data Controller or the Data Processor are relying on a

specific statutory mechanism to normalize international data transfers and that

mechanism is subsequently modified, revoked, or held in a court of competent

jurisdiction to be invalid, the Data Controller and the Data Processor agree to cooperate

in good faith to promptly suspend the transfer or to pursue a suitable alternate

mechanism that can lawfully support the transfer.6.3. Standard Contractual Clauses and UK Addendum. To the extent any transfer

constitutes a Restricted Transfer, the parties incorporate the EU Commission SCCs

2021/914:

(a) Module Two (controller to processor) and Module Three (processor to

subprocessor) as applicable;

(b) Clause 9 Option 2 (general authorization) with the notice period in

Section 8.2 of this DPA;

(c) Clause 17 governing law: Ireland; Clause 18 courts: Ireland;

(d) Annex I and Annex III are completed by Annex 2 and Annex 4; Annex

II is completed by Annex 3.

For UK transfers, the UK Addendum to the EU SCCs is incorporated with Part 1

completed by Annexes 2, 3, and 4 and Table 4 selecting neither party. For Swiss

transfers, the SCCs apply with references adjusted to the Swiss FADP, Swiss law, and

Swiss courts.

6.4. Transfer Impact Assessments. Processor shall conduct and document

transfer-impact assessments for Restricted Transfers as required by the SCCs and make

a summary available to Controller upon request. If a transfer mechanism is invalidated

or superseded, the parties shall promptly cooperate to implement an alternative lawful

mechanism.

7. Information Obligations and Incident Management

7.1. Processor will notify Controller without undue delay and where feasible

within 72 hours after becoming aware of an incident that has a material impact on

Processing.

7.2. The term “incident” used in Article 7.1 shall be understood to mean in any

case:

(a) a complaint or a request with respect to the exercise of a data

subject’s rights under EU Data Protection Law;

(b) an investigation into or seizure of the Personal Data by government

officials, or a specific indication that such an investigation or seizure is

imminent;(c) any unauthorized or accidental access, processing, deletion, loss or

any form of unlawful processing of the Personal Data;

(d) any breach of the security and/or confidentiality as set out

in Articles 3 and 4 of this Data Processing Agreement leading

to the accidental or unlawful destruction, loss, alteration, unauthorized

disclosure of, or access to, the Personal Data, or any indication of such breach

having taken place or being about to take place;

(e) where, in the opinion of the Data Processor, implementing an

instruction received from the Data Controller would violate applicable laws to

which the Data Controller or the Data Processor are subject.

7.3. The Data Processor shall at all times have in place written procedures

which enable it to promptly respond to the Data Controller about an incident. Where

the incident is reasonably likely to require a data breach notification by the Data

Controller under EU Data Protection Law, the Data Processor shall implement its

written procedures in such a way that it is in a position to notify the Data Controller

without undue delay after the Data Processor becomes aware of such an incident.

7.4. Any notifications made to the Data Controller pursuant to this Article 7 shall

be addressed to the employee of the Data Controller whose contact details are provided

in Annex 1 of this Data Processing Agreement and, in order to assist the Data

Controller in fulfilling its obligations under EU Data Protection Law, should contain:

(a) a description of the nature of the incident, including where possible the

categories and approximate number of data subjects concerned and the categories and

approximate number of Personal Data records concerned;

(b) the name and contact details of the Data Processor’s data protection officer

or another contact point where more information can be obtained;

(c) a description of the likely consequences of the incident; and

(d) a description of the measures taken or proposed to be taken by the Data

Processor to address the incident including, where appropriate, measures to mitigate its

possible adverse effects.

7.5. If Processor receives a legally binding request from a public authority for

access to Controller Personal Data, Processor will (i) notify Controller prior to

disclosure unless legally prohibited, (ii) challenge unlawful or overbroad requests, and

(iii) disclose only the minimum data required.8. Contracting with Sub-Processors

8.1. The Data Processor shall not subcontract any of its Service-related

activities consisting (partly) of the processing of the Personal Data or requiring

Personal Data to be processed by any third party without the prior written authorization

of the Data Controller.

8.2. The Data Controller authorizes the Data Processor to engage the

subprocessors listed in Annex 4 for the service-related Data Processing activities

described in Annex 2. The Data Processor shall inform the Data Controller of any

addition or replacement of such subprocessors, giving the Data Controller an

opportunity to object to such changes. If the Data Controller timely submits a written

objection setting forth a reasonable basis, the Parties will make a good-faith effort to

resolve the objection. If no resolution is reached, the Data Processor will use

commercially reasonable efforts to provide the Data Controller with the same level of

service without using the relevant subprocessor. If this is not feasible, the Data

Controller may terminate the affected portion of the Services and receive a pro-rated

refund of any prepaid fees for that portion.

8.3. Notwithstanding any authorization by the Data Controller within the

meaning of the preceding paragraph, the Data Processor shall remain fully liable vis-à-

vis the Data Controller for the performance of any such sub-processor that fails to

fulfill its data protection obligations.

8.4. The Data Processor shall ensure that the sub-processor is bound by data

protection obligations compatible with those of the Data Processor under this Data

Processing Agreement, shall supervise compliance thereof, and must in particular

impose on its sub- processors the obligation to implement appropriate technical and

organizational measures in such a manner that the processing will meet the

requirements of EU Data Protection Law.

8.5. The Data Controller may request confirmation that an audit of a Third Party

Sub-processor has occurred and a summary of the results, or where available a current

third-party assurance report.

9. Returning or Destruction of Personal Data

9.1. Upon termination or on written request, Processor will delete or return all

Personal Data within 30 days, and delete remaining backups within 60 days, unless law

requires retention. Where retention is required, Processor will minimize the retained

data, protect it, and delete it once the basis ends.9.2. The Data Processor shall notify all authorized subprocessors supporting its

processing of the Personal Data of the termination of the Data Processing Agreement

and shall ensure that all such authorized sub processors shall either destroy the

Personal Data or return the Personal Data to the Data Controller, at the discretion of the

Data Controller.

9.3. Operational Retention. Processor may retain transient API request metadata

and security logs for up to 30 days for reliability, security, and abuse detection, after

which such data is deleted unless a different retention is agreed in writing or required

by law.

10. Assistance to Data Controller

10.1. The Data Processor shall assist the Data Controller by appropriate

technical and organizational measures, insofar as this is possible, for the fulfillment of

the Data Controller’s obligation to respond to requests for exercising the data subject’s

rights under the EU Data Protection Law.

10.2. Taking into account the nature of processing and the information available

to the Data Processor, the Data Processor shall assist the Data Controller in ensuring

compliance with obligations pursuant to Section 4 (Security), as well as other Data

Controller obligations under EU Data Protection Law that are relevant to the Data

Processing described in Annex 2, including notifications to a supervisory authority or

to Data Subjects, the process of undertaking a Data Protection Impact Assessment, and

with prior consultations with supervisory authorities.

10.3. The Data Processor shall make available to the Data Controller all

information necessary to demonstrate compliance with the Data Processor’s obligations

and allow for and contribute to audits, including inspections, conducted by the Data

Controller or another auditor mandated by the Data Controller.

11. Duration and Termination

11.1. This Data Processing Agreement shall come into effect as of the date the

Customer accepts this DPA (the Effective Date) whether electronically or by continued

use of the Services.

11.2. Termination or expiration of this Data Processing Agreement shall not

discharge the Data Processor from its confidentiality obligations pursuant to Article 3.

11.3. The Data Processor shall process Personal Data until the earlier of (i)

termination of the Customer’s account or (ii) termination of this DPA by either partywith written notice, unless instructed otherwise by the Data Controller, or until such

data is returned or destroyed on instruction of the Data Controller.

12. Miscellaneous

12.1. Governing Law and Jurisdiction. To the extent the Processing of Personal

Data is subject to EU, UK, or Swiss Data Protection Law or the EU Standard

Contractual Clauses, this DPA and any dispute arising from it shall be governed by and

construed in accordance with the laws of Ireland, and the courts of Ireland shall have

exclusive jurisdiction. For all other Processing not subject to those laws, this DPA shall

be governed by the laws of the State of California, USA, and the courts located in San

Francisco County, California shall have exclusive jurisdiction.

________________________________

Signed

for and on behalf of the Data Processor

Name:

Title:

Date:

________________________________

Signed

for and on behalf of the Data Controller

Name:

Title:

Date:Annex 1:

Contact information of the data protection officer of the Data Controller.

Name:

Title:

Email:

Contact information of the data protection officer of the Data Processor.

Email: security@zeroentropy.dev

Annex 2:

Types of Personal Data that will be processed in the scope of the Service Agreement:

Unstructured text data supplied through API requests or uploads. This may incidentally include

personal data if contained in the Customer’s own documents, such as names, email addresses, or

other identifiers embedded in text.

Categories of Data Subjects:

Individuals whose personal data may appear in the Customer’s submitted content (for example,

employees, clients, contractors, or other data subjects referenced in uploaded materials).

Nature and purpose of the Data Processing:

Operation of the Services, including retrieval, reranking, semantic similarity computation, and

other automated text-processing functions performed to deliver relevant search and retrieval

results as requested by the Customer. Processing is limited to executing API calls, improving

retrieval quality, and maintaining service reliability and security.

Annex 3: Security Measures

Data Processor shall:

1. ensure that the Personal Data can be accessed only by authorized personnel for

the purposes set forth in Annex 2 of this Data Processing Agreement;

2. take all reasonable measures to prevent unauthorized access to the Personal Data

through the use of appropriate physical and logical (passwords) entry controls,securing areas for data processing, and implementing procedures for monitoring

the use of data processing facilities;

3. build in system and audit trails;

4. use secure passwords, network intrusion detection technology, encryption and

authentication technology, secure logon procedures and virus protection;

5. account for all the risks that are presented by processing, for example from

accidental or unlawful destruction, loss, or alteration, unauthorized or unlawful

storage, processing, access or disclosure of Personal Data;

6. ensure pseudonymisation and/or encryption of Personal Data, where

appropriate;

7. maintain the ability to ensure the ongoing confidentiality, integrity, availability

and resilience of processing systems and services;

8. maintain the ability to restore the availability and access to Personal Data in a

timely manner in the event of a physical or technical incident;

9. implement a process for regularly testing, assessing, and evaluating the

effectiveness of technical and organizational measures for ensuring the security

of the processing of Personal Data;

10. monitor compliance on an ongoing basis;

11. implement measures to identify vulnerabilities with regard to the processing of

Personal Data in systems used to provide services to the Data Controller;

12. provide employee and contractor training to ensure ongoing capabilities to carry

out the security measures established in policy.

Annex 4:

he Data Controller authorizes the subprocessors engaged by Data Processor to support

the provision of the Services.

A current list of subprocessors, including their locations and purposes of processing, is

maintained on our Trust Report.Data Processor will notify the Data Controller in advance of any intended changes to

this list in accordance with Article 8.2.

Get started with

ZeroEntropy Animation Gif
ZeroEntropy Animation Gif

Our retrieval engine runs autonomously with the 

accuracy of a human-curated system.

Our retrieval engine runs autonomously with the 

accuracy of a human-curated system.

Our retrieval engine runs autonomously with the 

accuracy of a human-curated system.

Contact us for a custom enterprise solution with custom pricing

Contact us for a custom enterprise solution with custom pricing

Contact us for a custom enterprise solution with custom pricing

RELATED ARTICLES
Abstract image of a dark background with blurry teal, blue, and pink gradients.