Data Processing Addendum (Service Provider Addendum)

Last updated: February 04, 2026

View previous version (Jan 01, 2026)

Applicability: This DPA applies automatically to business customers that accept our Terms.

Signed copy: Need a countersigned copy for your records? Email[email protected]and we’ll send one. The countersigned version is identical to this page.

Custom terms (limited): We generally don’t modify the DPA. For larger purchases (≥ 50,000 credits), contact us to discuss limited commercial edits.

This Data Processing Addendum (“DPA”) is between DEH Technologies LLC, a Wyoming limited liability company, doing business as Invoice Data Extraction (“Provider”), and the “Customer,” meaning (i) the entity named in the signature block below; (ii) if no signature block is used, the business entity identified in the applicable order, quote, or online checkout/receipt for the Services (including a Paddle checkout/receipt); or (iii) if no order, quote, or checkout is used, the business entity identified in the account registration/profile for the Services, in each case as the purchaser or account holder. This DPA forms part of the agreement governing Customer’s use of the Services (the “Agreement”), which for online purchases or click-through use means Provider’s Terms of Service (as updated from time to time) together with any applicable order, quote, or checkout/receipt, and, where the Terms so state, is incorporated by reference. Capitalized terms not defined here have the meanings in the Agreement.

1. Definitions; Scope; Instructions

1.1 Applicable Data Protection Laws.

'Applicable Laws' means, to the extent they apply to Provider's processing of Personal Information: (a) US state privacy laws, including the California Consumer Privacy Act (as amended by the CPRA) and its regulations (collectively, 'CCPA'), the Colorado Privacy Act ('CPA'), the Connecticut Data Privacy Act ('CTDPA'), the Virginia Consumer Data Protection Act ('VCDPA'), the Utah Consumer Privacy Act ('UCPA'), the Texas Data Privacy and Security Act (TDPSA), the Oregon Consumer Privacy Act (OCPA), and materially similar US state privacy laws as enacted or amended; and (b) the General Data Protection Regulation (Regulation (EU) 2016/679) ('GDPR') and, where applicable, the UK General Data Protection Regulation as incorporated into UK law by the Data Protection Act 2018 ('UK GDPR'), together with their implementing legislation, in each case to the extent applicable to Provider's processing of Personal Information as a processor.

1.2 Personal Information.

"Personal Information" (or "Personal Data") has the meaning given in Applicable Laws and includes personal information contained within Customer Data. Where GDPR or UK GDPR applies, "Personal Information" includes "personal data" as defined under those laws.

1.3 Roles.

For Customer Data that Provider processes to deliver the Services, Customer is a business/controller and Provider is a service provider/processor under Applicable Laws. Where GDPR or UK GDPR applies, Customer is either (a) the "controller" or (b) a "processor" acting on behalf of its controller customer, and Provider is the "processor" or "subprocessor" (respectively), as those terms are defined under GDPR/UK GDPR. This DPA (including its Annexes and Security Schedule) is intended to satisfy the parties' obligations under Article 28(3) GDPR (and equivalent UK GDPR provisions), to the extent applicable. For Provider's own operations (e.g., billing via Paddle, Provider business communications, internal finance and compliance records), Provider acts as an independent business/controller. For clarity, Paddle acts as Merchant of Record and reseller for billing and buyer/payment data; it is not a party to this DPA and does not process Customer Data as defined here.

1.4 Customer Data.

“Customer Data” means data submitted to or generated in the Services by or on behalf of Customer, including (a) Customer Content (e.g., invoice files, prompts, extracted fields and associated task metadata) and (b) Customer Account Data (e.g., users’ names, emails, authentication identifiers, organization membership and role assignments) processed to create and administer Customer’s access to the Services. Customer Data excludes Provider’s own business records (e.g., buyer/billing data handled by Paddle and Provider’s business communications).

1.5 Instructions.

Provider will process Customer Data only (a) to provide and support the Services as described in the Agreement and Provider documentation (including theSecurityandAI Data Usepages, as updated from time to time), (b) per Customer's documented instructions, and (c) as required by law. Provider may update such documentation from time to time. If an update materially reduces protections for Customer Data, Provider will post the updated documentation on the website (or in-product) prior to the change taking effect. "Documented instructions" include configurations and actions Customer makes in the Services (e.g., dashboard settings, task submissions) and any written instructions Customer provides to Provider's support team. If, in Provider's opinion, a processing instruction from Customer infringes Applicable Laws (including GDPR or UK GDPR), Provider will inform Customer without undue delay. Customer is responsible for its users' instructions and any necessary notices/consents, and will not instruct Provider to process PHI or other sector-regulated data except as expressly agreed in Section 12.

2. Service-Provider/Processor Restrictions & Certification

2.1 Purpose limitation; no sale/share/targeted advertising.

Provider will not sell Customer Data or share it for cross-context behavioral advertising, or use Customer Data for targeted advertising (as defined under Applicable Laws). Provider will not retain, use, or disclose Customer Data for any purpose other than the business purpose of performing the Services or as otherwise permitted by Applicable Laws.

2.2 Combining data.

Provider will not combine Customer Data with personal information from other customers or sources, except as permitted by Applicable Laws for limited purposes such as detecting security incidents, protecting against malicious or illegal activity, and debugging.

2.3 Monitoring; notice of inability to comply.

Customer may take reasonable and appropriate steps to help ensure Provider uses Customer Data consistent with this DPA (e.g., review Provider’s written security documentation and a completed security questionnaire). Customer may direct Provider to stop and remediate per Section 9.3. Provider will promptly notify Customer if it determines it can no longer meet its obligations under Applicable Laws.

2.4 Certification.

Provider certifies it understands and will comply with the restrictions in this Section 2 and Applicable Laws, including where applicable its obligations as a processor under Article 28 of the GDPR and the equivalent provisions of UK GDPR.

3. Subprocessors

3.1 Authorization.

Customer grants a general authorization for Provider to engage subprocessors to support the Services (e.g., hosting, storage, database, AI model providers, and business communications platforms (e.g., Google Workspace) which may incidentally process Customer Data if Customer emails such content or files).

3.2 Flow-down.

Provider will maintain written contracts with subprocessors that contain obligations materially equivalent to those imposed on Provider under this DPA to the extent applicable to the subprocessor’s services (including, where applicable, no sale/share, purpose limitation, confidentiality, security, deletion/return, and reasonable assistance with consumer/privacy requests). Where a subprocessor offers non-negotiable standard terms (e.g., major cloud or AI providers), Provider may satisfy this requirement by entering into that subprocessor's standard data-processing terms (including any applicable DPA) and relying on relevant product documentation and configuration controls, which taken together provide protections materially equivalent to the relevant obligations in this DPA. If Provider cannot reasonably obtain such protections, Provider will not use that subprocessor for Customer Data or will notify Customer and allow termination of the affected Service(s) under Section 3.4.

3.3 Responsibility.

Provider remains responsible for its subprocessors’ performance of obligations under this DPA.

3.4 Notice & Objection.

Provider maintains a current list of subprocessors and will give 15 days’ prior notice of material changes (e.g., adding or replacing a subprocessor) by posting on its Subprocessors page. Customer may object in writing on reasonable data-protection grounds; the parties will discuss in good faith. If unresolved, Customer may terminate the affected Service(s) only and receive a refund of pre-paid, unused fees for those Service(s).

(a) Deemed approval. If Customer does not object with reasonable, written data-protection grounds within 15 days after Provider's notice, the change is deemed approved.

(b) Emergency changes. Provider may add or replace a subprocessor immediately where reasonably necessary to address security, availability, or legal requirements, and will notify Customer promptly thereafter. Customer may object under this Section 3.4.

(c) Reasonable grounds. “Reasonable data-protection grounds” means documented concerns that the change would materially reduce protections for Customer Data or cause non-compliance with Applicable Laws.

3.5 Record-keeping.

Provider will maintain an internal record identifying each Subprocessor that processes Customer Data and, for AI model providers, the current high-level configuration relevant to Section 6 (e.g., training disabled; retention disabled/minimized where available). Upon Customer’s written request no more than once per 12 months (and otherwise as permitted under Section 9.1), or (i) following a confirmed Security Incident primarily attributable to Provider’s controls, (ii) in response to a verifiable regulatory inquiry that compels Customer to validate Provider’s controls, or (iii) after a material Subprocessor change that Customer has objected to under Section 3.4, Provider will provide a high-level summary of such record, subject to confidentiality. Nothing in this Section requires Provider to disclose full Subprocessor contracts or security-sensitive details; Provider may provide summaries or redacted excerpts sufficient to demonstrate compliance.

4. Security; Location; Retention & Deletion

4.1 Security Measures.

Provider will implement and maintain appropriate technical and organizational measures designed to protect Customer Data, including encryption in transit and at rest, least‑privilege access, multi‑factor authentication for administrative access, database Row‑Level Security (RLS), logging/monitoring, environment separation, secrets management, vulnerability remediation on a risk basis, and incident response, as summarized in the Security Schedule.

4.2 Hosting & Location.

Provider’s primary application hosting, database, and object storage are located in the United States. Certain AI model providers used to process invoice content may operate global infrastructure. Provider configures such providers per Section 6 (no training; retention disabled or minimized).

4.3 Default retention during term.

• Source uploads and pipeline/debug logs: deleted within 24 hours after processing completes.

• Generated outputs (e.g., spreadsheets): retained 90 days to support redownload/continuity, then deleted.

• Manual task deletion: Customer may delete a task at any time in the dashboard. This immediately deletes uploaded invoice files, generated spreadsheet outputs, and task metadata. Processing logs are retained for up to 24 hours for security and abuse prevention, then automatically deleted.

• Account deletion: Customer may delete their account at any time. This immediately deletes all uploaded files, generated outputs, saved prompts, and account data. Processing logs are retained for up to 24 hours for security, then automatically deleted. Purchase records are retained for financial audit and legal compliance.

4.4 Return/Deletion upon instruction or termination.

During the Term, upon Customer's written instruction, Provider will export available Customer Data in a commercially reasonable, machine-readable format and delete such data from active systems, subject to (i)–(ii) below. Following termination/expiration, Customer may request export of available Customer Data within 30 days; Provider will make such data available for download in a commercially reasonable format. After the 30-day export window, Provider will continue to apply the retention and deletion schedule in Section 4.3 unless Customer requests earlier deletion. If Customer requests earlier deletion, Provider will delete Customer Data from active systems within a commercially reasonable time, subject to backups and legal retention. On request, Provider will confirm deletion in writing. Provider will instruct relevant Subprocessors that process Customer Data to delete such data from their active systems within their standard deletion windows consistent with this Section, with deletion from backups occurring per each Subprocessor's standard rotation cycles, currently ~7 days for the managed database snapshots.

4.5 International Data Transfers.

Customer Data originating in the EEA or United Kingdom may be transferred to the United States (and other jurisdictions where Provider or its Subprocessors operate) in connection with the Services. Where Applicable Laws require a lawful transfer mechanism for such transfers, the parties will rely on a lawful transfer mechanism, as applicable, including one of the following: (a) an applicable adequacy decision (including, if and when Provider is self-certified and the transfer is within scope, the EU-US Data Privacy Framework and/or the UK Extension); or (b) the European Commission's Standard Contractual Clauses adopted under Implementing Decision (EU) 2021/914 (using the appropriate module(s) for the parties' roles) and, where applicable, the UK Addendum to the EU SCCs or the UK International Data Transfer Agreement (IDTA). If a transfer is not covered by an adequacy decision, Customer may request execution of the applicable SCCs/UK transfer addendum. Provider will provide the relevant form within a reasonable time. Customer is responsible for completing any customer-specific details required in the SCCs/addendum (e.g., exporter details and any optional selections); Provider will countersign once the required details are provided.

5. Security Incidents

5.1 Definition.

A “Security Incident” means a confirmed breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Data transmitted, stored, or otherwise processed by Provider. Unsuccessful attempts or activities that do not compromise security (e.g., pings, port scans, blocked malware, failed logins) are not Security Incidents.

5.2 Notice.

Provider will notify Customer without undue delay and no later than 48 hours after becoming aware of a confirmed Security Incident affecting Customer Data in Provider-controlled systems, and will provide updates reasonably available, including: (a) a summary of the event and timeline; (b) the types of Customer Data reasonably believed affected; (c) steps taken or planned for containment and remediation; and (d) a contact point.

5.3 Subprocessor incidents.

Where a subprocessor experiences a Security Incident affecting Customer Data, Provider will promptly request and relay available information and subsequent updates from the subprocessor to Customer as they are made available.

5.4 Cooperation; scope & costs.

Provider will provide reasonable cooperation to support Customer’s investigation and required notifications to the extent related to Provider’s processing, taking into account Provider’s organization size; out-of-scope work (e.g., bespoke forensics, regulator responses unrelated to Provider’s systems) may be at Customer’s expense. The parties will use commercially reasonable efforts to preserve privilege and protect sensitive security information (e.g., detailed forensics) under confidentiality.

5.5 No admission; notification responsibility.

Notices are not an admission of fault or liability. Unless law requires Provider to notify individuals or authorities directly, Customer is responsible for regulatory and individual notifications.

6. AI Model Providers (Inference Only; No Training; Limited Retention)

6.1 Purpose-limited use.

Provider may transmit invoice content, prompts, and extraction context to vetted AI model providers solely to perform extraction as instructed by Customer. For clarity, model outputs and derived fields are Customer Data under Section 1.4.

6.2 No training or secondary use.

Provider will not permit AI model providers to (a) train or fine-tune models on Customer Data, or (b) use Customer Data for advertising, profiling, or any purpose other than providing the requested inference.

6.3 Retention controls.

Provider will configure provider settings to disable data retention where available, or otherwise rely on short, provider-imposed retention windows required for abuse prevention/debugging. Upon written request, Provider will summarize current configurations for active providers within a reasonable time.

6.4 Contractual & technical controls.

Provider will maintain contractual terms with AI model providers and, where available, documented configuration controls that, taken together, are consistent with Section 3 (including purpose limitation, no sale/share, confidentiality, and security), and will use encrypted channels for such transmissions.

6.5 Provider selection & notice.

Provider may select among AI model providers to deliver the Services; changes are subject to Section 3.4 (Notice & Objection).

7. Data Subject & Consumer Requests; Assistance

7.1 Routing.

If Provider receives a data subject request, consumer request, or similar privacy rights request under Applicable Laws relating to Customer Data, Provider will promptly notify Customer and will not respond except per Customer's instructions, unless legally required. Where legally permitted, Provider will forward the request to Customer and include any information reasonably available; if legally prohibited from notifying, Provider will notify Customer promptly after the prohibition lifts.

7.2 Assistance.

Taking into account the nature of processing and Provider's organizational size and resources, Provider will provide commercially reasonable assistance for Customer to respond to verifiable data subject requests and consumer requests (e.g., access, deletion, portability) and to meet applicable security and privacy obligations that relate to Provider's processing of Customer Data, including, where required by Applicable Laws, providing information and documentation reasonably available to assist Customer with DPIAs and prior consultation obligations, limited to Provider's processing of Customer Data. Such assistance is limited to Customer Data in Provider's systems and is provided at Customer's expense where requests are excessive, repetitive, unfounded, or require measures beyond Provider's standard tooling and records.

8. Confidentiality; Personnel

8.1 Confidentiality.

Provider will ensure that persons authorized to process Customer Data are bound by confidentiality obligations, on a need-to-know basis, and receive appropriate security awareness.

8.2 Personnel.

“Personnel” means Provider’s employees (including the founder) and vetted contractors engaged by Provider. Provider will ensure such Personnel are subject to written confidentiality and data-protection obligations (e.g., employment agreements or policy acknowledgments for employees, services agreements for contractors) no less protective than those in this DPA, and that access to Customer Data is promptly removed upon role change or termination.

9. Audits; Information Rights

9.1 Documentation & questionnaire.

No more than once per 12 months and with reasonable prior notice, Customer may (a) review Provider’s then‑current written security documentation (e.g., Security page, retention settings summary, subprocessor list), and (b) submit a reasonable security questionnaire (e.g., SIG Lite/CAIQ‑Lite) which Provider will complete in good faith within a commercially reasonable timeframe.

9.2 On-site audits.

Provider will make available to Customer information reasonably necessary to demonstrate compliance with this DPA and, where required by Applicable Laws (including GDPR/UK GDPR where applicable), allow for and contribute to audits subject to the safeguards below. As a default, Provider will satisfy audit requests by making available its written security documentation, responses to reasonable security questionnaires, and (where available) relevant third-party reports or summaries. On-site inspections or intrusive technical audits (including remote vulnerability scanning or penetration testing) are not permitted unless (i) required by Applicable Laws in a manner that cannot be satisfied through the foregoing documentation-based approach, or (ii) following a confirmed Security Incident primarily attributable to Provider's controls. Any permitted audit must: (a) be preceded by reasonable prior written notice; (b) be limited to records and systems within Provider's control that process Customer Data; (c) exclude access to Provider's subprocessors' premises, systems, or data; (d) avoid disruption and occur during normal business hours; (e) not require disclosure of other customers' data, trade secrets, or security-sensitive information; (f) be conducted by Customer or an independent, non-competitor auditor bound by confidentiality; and (g) be at Customer's expense.

9.3 Remedial steps.

If Customer reasonably determines Provider has violated this DPA, Customer may direct Provider to take reasonable and appropriate steps to stop and remediate unauthorized use of Customer Data.

10. Government & Law-Enforcement Requests

Provider will promptly notify Customer of any legally binding request by a court, law-enforcement, or other public authority for disclosure of Customer Data and, where legally permissible and feasible, prior to disclosure, unless legally prohibited. Provider will (a) request that the authority seek the data directly from Customer where appropriate; (b) if the request appears facially overbroad, unlawful, or lacking proper legal process, ask the authority in writing to narrow or withdraw it; and (c) disclose only the minimum Customer Data necessary to comply. Provider is not required to take further steps to challenge a request (e.g., litigation, administrative appeals, or retaining outside counsel).

11. Deidentified/Aggregated Data (internal-use only)

Provider may process aggregated service metrics (e.g., usage volumes, performance, error rates) that do not include Customer Data and cannot reasonably be used to identify any individual or Customer, solely for internal analytics and service improvement.

12. No PHI / Not a Business Associate

The Services are not designed for PHI. Provider does not act as a HIPAA Business Associate and will not sign a BAA. Customer agrees not to submit PHI or other sector-regulated data that would require Provider to act as a specially regulated entity under those regimes (for example, PCI DSS cardholder data or student education records regulated under FERPA), unless separately agreed in writing.

12A. No Consumer Health Data.

The Services are not designed to process “consumer health data” as defined by Washington’s My Health My Data Act, RCW 19.373, and materially similar U.S. state laws (including Nevada SB 370). Provider does not act as a processor of consumer health data and will not sign CHD-specific processor terms. Customer will not submit CHD unless the parties first execute a signed addendum that expressly enables such processing and sets out required instructions. If CHD is submitted without such addendum, Provider may promptly delete it and suspend the affected task, and such submission is a material breach of this DPA.

13. Liability; Precedence

13.1 Liability.

This DPA is subject to the limitations of liability in the Agreement; it adds no separate indemnities.

13.2 Precedence.

In case of conflict between this DPA and the Agreement regarding data protection, this DPA controls; otherwise, the Agreement controls (including liability caps).

14. Miscellaneous

14.1 Effectiveness.

This DPA is effective upon execution of the Agreement or this DPA, whichever occurs later. This DPA may be executed in counterparts, each of which will be deemed an original, and all of which together constitute one and the same instrument. Signatures delivered electronically (including via e-signature service or PDF scan) are deemed originals.

14.2 Contacts.

Privacy/data requests: [email protected]. Security/incidents: [email protected].

Security Schedule (Technical & Organizational Measures)

• Governance & Access: least‑privilege; unique accounts; MFA on administrative access; access provisioning on least-privilege; access revocation on role change/end-of-engagement; access checks performed on a change-driven basis (e.g., when roles, vendors, or infrastructure change); MFA enabled for cloud consoles and code repositories used to operate the Services.

• Data Isolation: database RLS for account‑scoped segregation; no production Customer Data used in development/test environments.

• Encryption: TLS 1.2+ in transit; AES‑256‑equivalent at rest for databases/object storage; provider-managed keys (SSE); time-limited pre-signed URLs for uploads/downloads.

• Hosting: U.S.‑based app servers, database, and object storage.

• AI Processing: vetted providers; no training on Customer Data; retention disabled/minimized.

• Logging & Monitoring: platform and application logs are captured for operations and security; authentication and administrative events are logged by underlying providers where available; log retention follows provider defaults; pipeline/debug logs ≤24h.

• Secure SDLC: secrets management; code review for security-relevant changes; vulnerability management and remediation on a risk basis.

• Data Lifecycle: uploads auto‑deleted ≤24h; outputs auto‑deleted 90d; dashboard manual deletion available.

• Backups & DR: provider‑managed database snapshots (encrypted) where enabled; R2 objects not separately backed up; lifecycle deletion enforced. DR approach: redeploy application and restore the database from the most recent snapshot; restore exercises are performed on a change- or incident-driven basis.

• Incident Response: detect, contain, eradicate; notify ≤48h; post-incident review and corrective actions; preserve relevant logs and coordinate with subprocessors as needed.

• Vendor Management: DPAs/terms with subprocessors; live list with 15-day change notices; security/privacy due diligence at onboarding and on material change.

• Personnel: employees (including founder) and vetted contractors subject to written confidentiality and appropriate security awareness; access promptly removed on role change or termination.

Annex A - Description of Processing

• Subject matter: Automated extraction of data from Customer-submitted invoice files (Customer Content) and the creation and administration of Customer accounts and organizational access (Customer Account Data) for use of the Services.

• Duration: The Term of the Agreement plus the deletion windows in §4.

- Customer Content: uploads and pipeline/debug logs ≤ 24 hours after processing; generated outputs retained 90 days, then deleted. Manual deletion available any time from user’s dashboard area.

- Customer Account Data: retained for the Term to operate and secure the Services and as necessary to comply with law; deletion/return per §4.4; database provider snapshots rotate on standard cycles (currently ~7 days).

• Nature & purpose of processing:

- Receiving invoice files; transmitting Customer Content to vetted AI model providers solely for inference to perform extraction as instructed by Customer; generating and returning structured outputs; limited troubleshooting/support.

- Creating and administering Customer accounts and organizational access (Customer Account Data), including authentication, organization membership and role assignment, usage and security logging, and support communications.

- AI model providers process Customer Content only; they do not receive Customer Account Data. No model training; provider retention disabled or minimized where configurable.

• Types of personal information:

- Customer Content (may contain): names; business contact details; billing/shipping addresses; tax IDs (including sole proprietors); invoice numbers; line items; amounts; payment terms; and other data appearing on invoices. No special-category data intended; do not upload PHI or sector-regulated data (see §12).

- Customer Account Data: names; business email addresses; authentication identifiers; organization membership and role assignments; account-level preferences; support correspondence metadata. (Payment card/buyer billing data is handled by Paddle as Merchant of Record and is outside “Customer Data” scope per §1.3.)

• Categories of data subjects:

- Individuals whose information appears on invoices (e.g., Customer’s employees/contractors, vendors, other payees/payors).

- Customer’s authorized users and administrators (for Customer Account Data).

• Location of processing:

- Primary application hosting, database, and object storage in the United States.

- Customer Content used for extraction may be processed on global infrastructure operated by AI model providers (inference only; no training; retention disabled/minimized).

- Customer Account Data is primarily processed in the United States; the authentication provider may operate global infrastructure.

- Transfers from the EEA or UK are subject to the transfer mechanisms described in Section 4.5.

• Retention: See §4 (uploads/logs ≤ 24h; outputs 90 days; manual deletion available).

- Customer Account Data retained for the Term and as needed to provide the Services and comply with law; deletion/return per §4.4; backups rotate out per provider cycles (currently ~7 days).

• Frequency: on-demand/continuous as initiated by Customer (extraction workflows) and continuous/ongoing for account administration and security.

Annex B - Current Subprocessors (Customer Data only)

For the authoritative, always-current list and 15-day change notices, see the Subprocessors page. If there is any discrepancy between this Annex and the live page, the live page controls.

• Render - application hosting (infrastructure; incidental access possible) - US

• Supabase - managed Postgres (account & task metadata used for processing) - US

• Cloudflare R2 - object storage (uploads/outputs and short-lived pipeline/debug logs, if stored as objects) - US

• OpenAI / Anthropic / Google Gemini / OpenRouter (selected models) - AI inference (no training; retention disabled/minimized) - global infrastructure possible

• Google Workspace - business email/support (may receive Customer Data only if you email content/files) – US

• Clerk - authentication/identity (Customer Account Data only; no Customer Content) - US (global infra possible)

Note: Other third parties (e.g., Paddle for payments) support Provider’s own business operations and do not process “Customer Data” as defined in this DPA.