Data Processing Addendum (Service Provider Addendum)
Last updated: November 06, 2025
Applicability: This DPA applies automatically to business customers that accept our Terms.
Signed copy: Need a countersigned copy for your records? Email[email protected]and we’ll send one. The countersigned version is identical to this page.
Custom terms (limited): We generally don’t modify the DPA. For larger purchases (≥ 20,000 credits), contact us to discuss limited commercial edits.
This Data Processing Addendum (“DPA”) is between DEH Technologies LLC, a Wyoming limited liability company, doing business as Invoice Data Extraction (“Provider”), and the “Customer,” meaning (i) the entity named in the signature block below; (ii) if no signature block is used, the business entity identified in the applicable order, quote, or online checkout/receipt for the Services (including a Paddle checkout/receipt); or (iii) if no order, quote, or checkout is used, the business entity identified in the account registration/profile for the Services, in each case as the purchaser or account holder. This DPA forms part of the agreement governing Customer’s use of the Services (the “Agreement”), which for online purchases or click-through use means Provider’s Terms of Service (as updated from time to time) together with any applicable order, quote, or checkout/receipt, and, where the Terms so state, is incorporated by reference. Capitalized terms not defined here have the meanings in the Agreement.
1. Definitions; Scope; Instructions
1.1 Applicable US Data Protection Laws.
“Applicable Laws” means US state privacy laws to the extent they apply to Provider’s processing of Personal Information as a service provider/processor, including the California Consumer Privacy Act (as amended by the CPRA) and its regulations (collectively, “CCPA”), the Colorado Privacy Act (“CPA”), the Connecticut Data Privacy Act (“CTDPA”), the Virginia Consumer Data Protection Act (“VCDPA”), the Utah Consumer Privacy Act (“UCPA”), the Texas Data Privacy and Security Act (TDPSA), the Oregon Consumer Privacy Act (OCPA), and materially similar US state privacy laws as enacted or amended.
1.2 Personal Information.
“Personal Information” (or “Personal Data”) has the meaning given in Applicable Laws and includes personal information contained within Customer Data.
1.3 Roles.
For Customer Data that Provider processes to deliver the Services, Customer is a business/controller and Provider is a service provider/processor under Applicable Laws. For Provider’s own operations (e.g., account administration, billing via Paddle, business email via Google Workspace), Provider acts as an independent business/controller. For clarity, Paddle acts as Merchant of Record and reseller for billing and buyer/payment data; it is not a party to this DPA and does not process Customer Data as defined here.
1.4 Customer Data.
“Customer Data” means data submitted to or generated in the Services by or on behalf of Customer, including (a) Customer Content (e.g., invoice files, prompts, extracted fields and associated task metadata) and (b) Customer Account Data (e.g., users’ names, emails, authentication identifiers, organization membership and role assignments) processed to create and administer Customer’s access to the Services. Customer Data excludes Provider’s own business records (e.g., buyer/billing data handled by Paddle and Provider’s business communications).
1.5 Instructions.
Provider will process Customer Data only (a) to provide and support the Services as described in the Agreement and Provider documentation (including theSecurityandAI Data Usepages), (b) per Customer’s documented instructions, and (c) as required by law. “Documented instructions” include configurations and actions Customer makes in the Services (e.g., dashboard settings, task submissions) and any written instructions Customer provides to Provider’s support team. Customer is responsible for its users’ instructions and any necessary notices/consents, and will not instruct Provider to process PHI or other sector-regulated data except as expressly agreed in Section 12.
2. Service-Provider/Processor Restrictions (US State Privacy Law Certification)
2.1 Purpose limitation; no sale/share/targeted advertising.
Provider will not sell or share Customer Data (as “share” is defined for cross-context behavioral advertising) or use Customer Data for targeted advertising (as defined by Applicable Laws). Provider will not retain, use, or disclose Customer Data for any purpose other than the business purpose of performing the Services or as otherwise permitted by Applicable Laws.
2.2 Combining data.
Provider will not combine Customer Data with personal information from other customers or sources, except as permitted by Applicable Laws for limited purposes such as detecting security incidents, protecting against malicious or illegal activity, and debugging.
2.3 Monitoring; notice of inability to comply.
Customer may take reasonable and appropriate steps to help ensure Provider uses Customer Data consistent with this DPA (e.g., review Provider’s written security documentation and a completed security questionnaire). Customer may direct Provider to stop and remediate per Section 9.3. Provider will promptly notify Customer if it determines it can no longer meet its obligations under Applicable Laws.
2.4 Certification.
Provider certifies it understands and will comply with the restrictions in this Section 2 and Applicable Laws.
3. Subprocessors
3.1 Authorization.
Customer grants a general authorization for Provider to engage subprocessors to support the Services (e.g., hosting, storage, database, AI model providers, and business communications platforms (e.g., Google Workspace) which may incidentally process Customer Data if Customer emails such content or files).
3.2 Flow-down.
Provider will maintain written contracts with subprocessors that contain obligations materially equivalent to those imposed on Provider under this DPA to the extent applicable to the subprocessor’s services (including, where applicable, no sale/share, purpose limitation, confidentiality, security, deletion/return, and reasonable assistance with consumer/privacy requests). Where a subprocessor offers non-negotiable standard terms (e.g., major cloud or AI providers), Provider may satisfy this requirement by entering into or relying on that subprocessor’s standard data-processing terms, product documentation, and configuration controls that, taken together, provide protections materially equivalent to the relevant obligations in this DPA. If Provider cannot obtain such protections, Provider will not use that subprocessor for Customer Data or will notify Customer and allow termination of the affected Service(s) under Section 3.4.
3.3 Responsibility.
Provider remains responsible for its subprocessors’ performance of obligations under this DPA.
3.4 Notice & Objection.
Provider maintains a current list of subprocessors and will give 15 days’ prior notice of material changes (e.g., adding or replacing a subprocessor) by posting on its Subprocessors page. Customer may object in writing on reasonable data-protection grounds; the parties will discuss in good faith. If unresolved, Customer may terminate the affected Service(s) only and receive a refund of pre-paid, unused fees for those Service(s).
(a) Deemed approval. If Customer does not object with reasonable, written data-protection grounds within 10 days after Provider’s notice, the change is deemed approved.
(b) Emergency changes. Provider may add or replace a subprocessor immediately where reasonably necessary to address security, availability, or legal requirements, and will notify Customer promptly thereafter. Customer may object under this Section 3.4.
(c) Reasonable grounds. “Reasonable data-protection grounds” means documented concerns that the change would materially reduce protections for Customer Data or cause non-compliance with Applicable Laws.
3.5 Record-keeping.
Provider will maintain an internal record identifying each Subprocessor that processes Customer Data, the data-processing terms or product documentation relied upon, and the current AI-related settings relevant to Section 6 (e.g., training disabled; retention setting). Upon Customer’s written request no more than once per 12 months (and otherwise as permitted under Section 9.1), or (i) following a confirmed Security Incident primarily attributable to Provider’s controls, (ii) in response to a verifiable regulatory inquiry that compels Customer to validate Provider’s controls, or (iii) after a material Subprocessor change that Customer has objected to under Section 3.4, Provider will provide a high-level summary of such record, subject to confidentiality. Nothing in this Section requires Provider to disclose full Subprocessor contracts or security-sensitive details; Provider may provide summaries or redacted excerpts sufficient to demonstrate compliance.
4. Security; Location; Retention & Deletion
4.1 Security Measures.
Provider will implement and maintain appropriate technical and organizational measures designed to protect Customer Data, including encryption in transit and at rest, least‑privilege access, multi‑factor authentication for administrative access, database Row‑Level Security (RLS), logging/monitoring, environment separation, secrets management, vulnerability remediation on a risk basis, and incident response, as summarized in the Security Schedule.
4.2 Hosting & Location.
Provider’s primary application hosting, database, and object storage are located in the United States. Certain AI model providers used to process invoice content may operate global infrastructure. Provider configures such providers per Section 6 (no training; retention disabled or minimized).
4.3 Default retention during term.
• Source uploads and pipeline/debug logs: deleted within 24 hours after processing completes.
• Generated outputs (e.g., spreadsheets): retained 90 days to support redownload/continuity, then deleted.
• Manual deletion: Customer may delete a task at any time in the dashboard, which deletes associated files and task metadata
4.4 Return/Deletion upon instruction or termination.
During the Term, upon Customer’s written instruction, Provider will export available Customer Data in a commercially reasonable, machine-readable format and delete such data from active systems, subject to (i)–(ii) below. Following termination/expiration, Customer may request export within 30 days; thereafter, Provider will delete Customer Data from active systems within 60 days, subject to (i) provider-managed backups rotating out on standard cycles and (ii) retention required by law. On request, Provider will confirm deletion in writing. Provider will instruct relevant Subprocessors that process Customer Data to delete such data from their active systems within their standard deletion windows consistent with this Section, with deletion from backups occurring per each Subprocessor’s standard rotation cycles, currently ~7 days for the managed database snapshots.
5. Security Incidents
5.1 Definition.
A “Security Incident” means a confirmed breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Data transmitted, stored, or otherwise processed by Provider. Unsuccessful attempts or activities that do not compromise security (e.g., pings, port scans, blocked malware, failed logins) are not Security Incidents.
5.2 Notice.
Provider will notify Customer without undue delay and no later than 48 hours after becoming aware of a confirmed Security Incident affecting Customer Data in Provider-controlled systems, and will provide updates reasonably available, including: (a) a summary of the event and timeline; (b) the types of Customer Data reasonably believed affected; (c) steps taken or planned for containment and remediation; and (d) a contact point.
5.3 Subprocessor incidents.
Where a subprocessor experiences a Security Incident affecting Customer Data, Provider will promptly request and relay available information and subsequent updates from the subprocessor to Customer as they are made available.
5.4 Cooperation; scope & costs.
Provider will provide reasonable cooperation to support Customer’s investigation and required notifications to the extent related to Provider’s processing, taking into account Provider’s organization size; out-of-scope work (e.g., bespoke forensics, regulator responses unrelated to Provider’s systems) may be at Customer’s expense. The parties will use commercially reasonable efforts to preserve privilege and protect sensitive security information (e.g., detailed forensics) under confidentiality.
5.5 No admission; notification responsibility.
Notices are not an admission of fault or liability. Unless law requires Provider to notify individuals or authorities directly, Customer is responsible for regulatory and individual notifications.
6. AI Model Providers (Inference Only; No Training; Limited Retention)
6.1 Purpose-limited use.
Provider may transmit invoice content, prompts, and extraction context to vetted AI model providers solely to perform extraction as instructed by Customer. For clarity, model outputs and derived fields are Customer Data under Section 1.4.
6.2 No training or secondary use.
Provider will not permit AI model providers to (a) train or fine-tune models on Customer Data, or (b) use Customer Data for advertising, profiling, or any purpose other than providing the requested inference.
6.3 Retention controls.
Provider will configure provider settings to disable data retention where available, or otherwise rely on short, provider-imposed retention windows required for abuse prevention/debugging. Upon written request, Provider will summarize current configurations for active providers within a reasonable time.
6.4 Contractual & technical controls.
Provider will impose written terms on AI model providers consistent with Section 3 (service-provider/processor restrictions, including no sale/share and purpose limitation) and will use encrypted channels for such transmissions.
6.5 Provider selection & notice.
Provider may select among AI model providers to deliver the Services; changes are subject to Section 3.3 (Subprocessor notice and Customer’s objection/termination rights).
7. Consumer Requests; Assistance
7.1 Routing.
If Provider receives a privacy/consumer request relating to Customer Data, Provider will promptly notify Customer and will not respond except per Customer’s instructions, unless legally required. Where legally permitted, Provider will forward the request to Customer and include any information reasonably available; if legally prohibited from notifying, Provider will notify Customer promptly after the prohibition lifts.
7.2 Assistance.
Taking into account the nature of processing and Provider’s organizational size and resources, Provider will provide commercially reasonable assistance for Customer to respond to verifiable consumer requests (e.g., access, deletion) and to meet applicable security/privacy obligations that relate to Provider’s processing of Customer Data. Such assistance is limited to Customer Data in Provider’s systems and is provided at Customer’s expense where requests are excessive, repetitive, unfounded, or require measures beyond Provider’s standard tooling and records.
8. Confidentiality; Personnel
8.1 Confidentiality.
Provider will ensure that persons authorized to process Customer Data are bound by confidentiality obligations, on a need-to-know basis, and receive appropriate security awareness.
8.2 Personnel.
“Personnel” means Provider’s employees (including the founder) and vetted contractors engaged by Provider. Provider will ensure such Personnel are subject to written confidentiality and data-protection obligations (e.g., employment agreements or policy acknowledgments for employees, services agreements for contractors) no less protective than those in this DPA, and that access to Customer Data is promptly removed upon role change or termination.
9. Audits; Information Rights
9.1 Documentation & questionnaire.
No more than once per 12 months and with reasonable prior notice, Customer may (a) review Provider’s then‑current written security documentation (e.g., Security page, retention settings summary, subprocessor list), and (b) submit a reasonable security questionnaire (e.g., SIG Lite/CAIQ‑Lite) which Provider will complete in good faith within a commercially reasonable timeframe.
9.2 On-site audits.
On-site inspections or intrusive technical audits (including remote vulnerability scanning or penetration testing) are not permitted unless (i) required by Applicable Laws that expressly override this DPA, or (ii) following a confirmed Security Incident primarily attributable to Provider’s controls. Any permitted audit must: (a) be preceded by reasonable prior written notice; (b) be limited to records and systems within Provider’s control that process Customer Data; (c) exclude access to Provider’s subprocessors’ premises, systems, or data; (d) avoid disruption and occur during normal business hours; (e) not require disclosure of other customers’ data, trade secrets, or security-sensitive information; (f) be conducted by Customer or an independent, non-competitor auditor bound by confidentiality; and (g) be at Customer’s expense. Provider may satisfy audit requests by making available existing security documentation and third-party reports or summaries to the extent they address the scope.
9.3 Remedial steps.
If Customer reasonably determines Provider has violated this DPA, Customer may direct Provider to take reasonable and appropriate steps to stop and remediate unauthorized use of Customer Data.
10. Government & Law-Enforcement Requests
Provider will promptly notify Customer of any legally binding request by a court, law-enforcement, or other public authority for disclosure of Customer Data and, where legally permissible and feasible, prior to disclosure, unless legally prohibited. Provider will (a) request that the authority seek the data directly from Customer where appropriate; (b) if the request appears facially overbroad, unlawful, or lacking proper legal process, ask the authority in writing to narrow or withdraw it; and (c) disclose only the minimum Customer Data necessary to comply. Provider is not required to take further steps to challenge a request (e.g., litigation, administrative appeals, or retaining outside counsel).
11. Deidentified/Aggregated Data (internal-use only)
Provider may process aggregated service metrics (e.g., usage volumes, performance, error rates) that do not include Customer Data and cannot reasonably be used to identify any consumer, household, or Customer, and may create deidentified datasets derived from Customer’s use of the Services solely for internal analytics and service improvement. Provider will (a) implement technical safeguards that prohibit reidentification and remove direct/indirect identifiers and linkage keys; (b) maintain a public commitment to process deidentified data only in deidentified form and not to attempt to reidentify; and (c) will not disclose deidentified datasets to any third party other than Provider’s subprocessors acting on Provider’s behalf.
12. No PHI / Not a Business Associate
The Services are not designed for PHI. Provider does not act as a HIPAA Business Associate and will not sign a BAA. Customer agrees not to submit PHI or other sector‑regulated data (e.g., PCI DSS cardholder data, GLBA, FERPA) unless separately agreed in writing.
12A. No Consumer Health Data.
The Services are not designed to process “consumer health data” as defined by Washington’s My Health My Data Act, RCW 19.373, and materially similar U.S. state laws (including Nevada SB 370). Provider does not act as a processor of consumer health data and will not sign CHD-specific processor terms. Customer will not submit CHD unless the parties first execute a signed addendum that expressly enables such processing and sets out required instructions. If CHD is submitted without such addendum, Provider may promptly delete it and suspend the affected task, and such submission is a material breach of this DPA.
13. Liability; Precedence
13.1 Liability.
This DPA is subject to the limitations of liability in the Agreement; it adds no separate indemnities.
13.2 Precedence.
In case of conflict between this DPA and the Agreement regarding data protection, this DPA controls; otherwise, the Agreement controls (including liability caps).
14. Miscellaneous
14.1 Effectiveness.
This DPA is effective upon execution of the Agreement or this DPA, whichever occurs later. This DPA may be executed in counterparts, each of which will be deemed an original, and all of which together constitute one and the same instrument. Signatures delivered electronically (including via e-signature service or PDF scan) are deemed originals.
14.2 Contacts.
Privacy/data requests: [email protected]. Security/incidents: [email protected].
Security Schedule (Technical & Organizational Measures)
• Governance & Access: least‑privilege; unique accounts; MFA on administrative access; quarterly access reviews; immediate access revocation on role change/end-of-engagement; MFA required for cloud consoles and code repo.
• Data Isolation: database RLS for account‑scoped segregation; no production Customer Data used in development/test environments..
• Encryption: TLS 1.2+ in transit; AES‑256‑equivalent at rest for databases/object storage; provider-managed keys (SSE); time-limited pre-signed URLs for uploads/downloads.
• Hosting: U.S.‑based app servers, database, and object storage.
• AI Processing: vetted providers; no training on Customer Data; retention disabled/minimized.
• Logging & Monitoring: platform and application logs are captured for operations and security; authentication and administrative events are logged by underlying providers where available; log retention follows provider defaults; pipeline/debug logs ≤24h.
• Secure SDLC: secrets management; code review for security-relevant changes; vulnerability management and remediation on a risk basis.
• Data Lifecycle: uploads auto‑deleted ≤24h; outputs auto‑deleted 90d; dashboard manual deletion available.
• Backups & DR: provider‑managed database snapshots (encrypted) where enabled; R2 objects not separately backed up; lifecycle deletion enforced. DR approach: redeploy application and restore the database from the most recent snapshot; restore exercises are performed on a change- or incident-driven basis.
• Incident Response: detect, contain, eradicate; notify ≤48h; post-incident review and corrective actions; preserve relevant logs and coordinate with subprocessors as needed.
• Vendor Management: DPAs/terms with subprocessors; live list with 15-day change notices; security/privacy due diligence at onboarding and on material change.
• Personnel: employees (including founder) and vetted contractors subject to written confidentiality and appropriate security awareness; access promptly removed on role change or termination.
Annex A - Description of Processing
• Subject matter: Automated extraction of data from Customer-submitted invoice files (Customer Content) and the creation and administration of Customer accounts and organizational access (Customer Account Data) for use of the Services.
• Duration: The Term of the Agreement plus the deletion windows in §4.
- Customer Content: uploads and pipeline/debug logs ≤ 24 hours after processing; generated outputs retained 90 days, then deleted. Manual deletion available any time from user’s dashboard area.
- Customer Account Data: retained for the Term to operate and secure the Services and as necessary to comply with law; deletion/return per §4.4; database provider snapshots rotate on standard cycles (currently ~7 days).
• Nature & purpose of processing:
- Receiving invoice files; transmitting Customer Content to vetted AI model providers solely for inference to perform extraction as instructed by Customer; generating and returning structured outputs; limited troubleshooting/support.
- Creating and administering Customer accounts and organizational access (Customer Account Data), including authentication, organization membership and role assignment, usage and security logging, and support communications.
- AI model providers process Customer Content only; they do not receive Customer Account Data. No model training; provider retention disabled or minimized where configurable.
• Types of personal information:
- Customer Content (may contain): names; business contact details; billing/shipping addresses; tax IDs (including sole proprietors); invoice numbers; line items; amounts; payment terms; and other data appearing on invoices. No special-category data intended; do not upload PHI or sector-regulated data (see §12).
- Customer Account Data: names; business email addresses; authentication identifiers; organization membership and role assignments; account-level preferences; support correspondence metadata. (Payment card/buyer billing data is handled by Paddle as Merchant of Record and is outside “Customer Data” scope per §1.3.)
• Categories of data subjects:
- Individuals whose information appears on invoices (e.g., Customer’s employees/contractors, vendors, other payees/payors).
- Customer’s authorized users and administrators (for Customer Account Data).
• Location of processing:
- Primary application hosting, database, and object storage in the United States.
- Customer Content used for extraction may be processed on global infrastructure operated by AI model providers (inference only; no training; retention disabled/minimized).
- Customer Account Data is primarily processed in the United States; the authentication provider may operate global infrastructure.
• Retention: See §4 (uploads/logs ≤ 24h; outputs 90 days; manual deletion available).
- Customer Account Data retained for the Term and as needed to provide the Services and comply with law; deletion/return per §4.4; backups rotate out per provider cycles (currently ~7 days).
• Frequency: on-demand/continuous as initiated by Customer (extraction workflows) and continuous/ongoing for account administration and security.
Annex B - Current Subprocessors (Customer Data only)
For the authoritative, always-current list and 15-day change notices, see the Subprocessors page. If there is any discrepancy between this Annex and the live page, the live page controls.
• Render - application hosting (infrastructure; incidental access possible) - US
• Supabase - managed Postgres (account & task metadata used for processing) - US
• Cloudflare R2 - object storage (uploads/outputs) - US
• OpenAI / Anthropic / Google Gemini / OpenRouter (selected models) - AI inference (no training; retention disabled/minimized) - global infrastructure possible
• Google Workspace - business email/support (may receive Customer Data only if you email content/files) – US
• Clerk - authentication/identity (Customer Account Data only; no Customer Content) - US (global infra possible)
Note: Other third parties (e.g., Paddle for payments) support Provider’s own business operations and do not process “Customer Data” as defined in this DPA.