Data Processing Addendum

EEA/UK Data Processing Addendum

This EEA/UK Data Processing Addendum (“Addendum”) supplements and is incorporated into the Shippo Customer Terms of Use (the “Agreement”) entered into by and between Popout, Inc D/B/A Shippo, Inc, with registered address 731 Market St Ste 200 San Francisco, CA, 94103-2005 United States (“Shippo”), and the entity that is the other signatory to this Addendum (“Customer”).  By executing the Addendum in accordance with Section 13 herein, Shippo and Customer enter into this Addendum.  In the event of a conflict between the terms and conditions of this Addendum and the Agreement, the terms and conditions of this Addendum shall supersede and control.  Nothing in this Addendum is intended to conflict with the C2C SCCs or C2P SCCs (as defined below). To the extent of any conflict between the Addendum and the terms of the C2C SCCs, the terms of the C2C SCCs supersede and control. To the extent of any conflict between the Addendum and the terms of the C2P SCCs, the terms of the C2P SCCs supersede and control.

Definitions

  1. Affiliate” means (i) an entity of which a party directly or indirectly owns fifty percent (50%) or more of the stock or other equity interest, (ii) an entity that owns at least fifty percent (50%) or more of the stock or other equity interest of a party, or (iii) an entity which is under common control with a party by having at least fifty percent (50%) or more of the stock or other equity interest of such entity and a party owned by the same person, but such entity shall only be deemed to be an Affiliate so long as such ownership exists.
  2. Authorized Employee” means an employee of Processor who has a need to know or otherwise access Personal Data to enable Processor to perform their obligations under this Addendum or the Agreement.
  3. Authorized Sub-Processor” means a third-party engaged by or on behalf of the Processor who has a need to know or otherwise access or Process Personal Data to enable Processor to perform its obligations under this Addendum or the Agreement, and who is either (1) listed in Exhibit C or (2) authorized by Controller to do so under Section 4.2 of this Addendum.
  4. C2C SCCs” means Module I (Controller to Controller) of the Standard Contractual Clauses completed in accordance with Part 1 of Exhibit D to this Addendum.
  5. C2P SCCs” means Module II (Controller to Processor) of the Standard Contractual Clauses completed in accordance with Part 2 of Exhibit D to this Addendum.
  6. Data Controller”, “Data Processor” “Data Subject”, “Data Subject Access Request”, “Processing”, “Personal Data Breach”, “Sub-Processor” have the meaning set out in the applicable Data Protection Laws in force at the time.
  7. Controller” means the entity that determines the purposes and means of the Processing of Personal Data, as set out at Section 2.1.
  8. Data Protection Laws” means all applicable privacy and data protection laws, including (but not limited to) the GDPR and any applicable national implementing laws and regulations relating to the Processing of Personal Data.
  9. GDPR” means (as applicable): (a) Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (“EU GDPR”); and/or (b) the EU GDPR as it forms part of the law of England and Wales, Scotland and Northern Ireland by virtue of section 3 of the European Union (Withdrawal) Act 2018 (“UK GDPR”).
  10. Personal Data” has the meaning set out in the applicable Data Protection Laws in force at the time. 
  11. Processor” means the entity which Processes Personal Data on behalf of the Controller, as set out at Section 2.1.
  12.  “Restricted Transfers” means a transfer of personal data from one Party to another, which transfer would be prohibited by applicable Data Protection Legislation in the absence of the relevant Restricted Transfer Agreement to be established under paragraph 6 of the DPA (or an agreement comparable thereto). There will not be a Restricted Transfer where: (a) the Data Importer is within a jurisdiction which has been deemed to provide an adequate level of data protection for the purposes of applicable data protection law; or (b) the transfer falls within the terms of an alternative safeguard or a derogation under applicable data protection law, including as set out in Article 46 and Article 49 GDPR respectively.
  13. Restricted Transfer Agreement” means C2C SCCs or C2P SCCs, as applicable.
  14. Services” shall have the meaning set forth in the Agreement.
  15.  “SCCs” means the standard contractual clauses for the transfer of personal data to third countries pursuant to Regulation (EU) 2016/679 contained in the annex to European Commission decision 2021/914 of 4 June 2021.
  16.  “Supervisory Authority” means an independent public authority which is established by a member state of the European Union, the United Kingdom, Switzerland, Iceland, Liechtenstein, or Norway.  
  17. UK Addendummeans the International Data Transfer Addendum to the EU Commission Standard Contractual Clauses issued by the Information Commissioner under Section 119A(1) of the Data Protection Act 2018 (as amended or replaced from time to time), completed in accordance with Exhibit E of the DPA.

  1. Data Processor
      1. Subject to Clause 11, the parties agree and acknowledge that Shippo may process Personal Data shared by Customer for the purposes of delivering the Services and with regard to such processing, Customer is a data controller (“Controller”) and Shippo is a data processor (“Processor”). To the extent that Shippo acts a data processor, clauses 2, 3, 4 , 5, 6, 7 and 8 shall apply. 
      2. The rights and obligations of the Controller with respect to this Processing are described herein. Controller shall, in its use of the Services, at all times Process Personal Data, and provide instructions for the Processing of Personal Data, in compliance with “Data Protection Laws”). Controller shall ensure that its instructions comply with all laws, rules and regulations applicable in relation to the Personal Data, and that the Processing of Personal Data in accordance with Controller’s instructions will not cause Processor to be in breach of the Data Protection Laws.  Controller is solely responsible for the accuracy, quality, and legality of (i) the Personal Data provided to Processor by or on behalf of Controller, (ii) the means by which Controller acquired any such Personal Data, and (iii) the instructions it provides to Processor regarding the Processing of such Personal Data. Controller shall not provide or make available to Processor any Personal Data in violation of the Agreement or otherwise inappropriate for the nature of the Services, and shall indemnify Processor from all claims and losses in connection therewith..
      3. Subject to Clause 11, Processor shall not Process Personal Data (i) for purposes other than those set forth in the Agreement and/or Exhibit A, (ii) in a manner inconsistent with the terms and conditions set forth in this Addendum or any other documented instructions provided by Controller,  including with regard to transfers of personal data to a third country or an international organization, unless required to do so by Supervisory Authority to which the Processor is subject; in such a case, the Processor shall inform the Controller of that legal requirement before Processing, unless that law prohibits such information on important grounds of public interest and (iii) in violation of applicable Data Protection Laws.  Controller hereby instructs Processor to Process Personal Data in accordance with the foregoing and as part of any Processing initiated by Controller in its use of the Services.
      4. The subject matter, nature, purpose, and duration of this Processing, as well as the types of Personal Data collected and categories of Data Subjects, are described in Exhibit A to this Addendum.
      5. Following completion of the Services, at Controller’s choice, Processor shall return or delete the Personal Data, unless further storage of Personal Data is required or authorized by applicable law. If return or destruction is impracticable or prohibited by law, rule or regulation, Processor shall take measures to block such Personal Data from any further Processing (except to the extent necessary for its continued hosting or Processing required by law, rule or regulation) and shall continue to appropriately protect the Personal Data remaining in its possession, custody, or control. If Controller and Processor have entered into Standard Contractual Clauses as described in Section 6 (Transfers of Personal Data), the parties agree that the certification of deletion of Personal Data that is described in Clause 8.5 of the C2P SCCs [or Clause 3.5 of the C2C SCCs (as applicable)] shall be provided by Processor to Controller only upon Controller’s request. 
  • Authorized Employees
    1. Processor shall take commercially reasonable steps to ensure the reliability and appropriate training of any Authorized Employee.
    2. Processor shall ensure that all Authorized Employees are made aware of the confidential nature of Personal Data and have executed confidentiality agreements that prevent them from disclosing or otherwise Processing, both during and after their engagement with Processor, any Personal Data except in accordance with their obligations in connection with the Services. 
    3. Processor shall take commercially reasonable steps to limit access to Personal Data to only Authorized Employees.

  • Authorized Sub-Processors
      1. Controller acknowledges and agrees that Processor may (1) engage its affiliates and the Authorized Sub-Processors listed in Exhibit C to this Addendum to access and Process Personal Data in connection with the Services and (2) from time to time engage additional third parties for the purpose of providing the Services, including without limitation the Processing of Personal Data. By way of this Addendum, Controller provides general written authorization to Processor to engage sub-processors as necessary to perform the Services.
      2. A list of Processor’s current Authorized Sub-Processors (the “List”) will be made available to Controller, either attached hereto, at a link provided to Controller, via email or through another means made available to Controller.  Such List which may be updated by Processor from time to time.  The List may provide a mechanism to subscribe to notifications of new Authorized Sub-Processors and Controller agrees to subscribe to such notifications where available.  At least ten (10) days before enabling any third party other than Authorized Sub-Processors to access or participate in the Processing of Personal Data, Processor will add such third party to the List. Controller may reasonably object to such an engagement on legitimate grounds by informing Processor in writing within ten (10) days of receipt of the aforementioned notice by Controller. Controller acknowledges that certain sub-processors are essential to providing the Services and that objecting to the use of a sub-processor may prevent Processor from offering the Services to Controller.
      3. If Controller reasonably objects to an engagement in accordance with Section 4.2, and Processor cannot provide a commercially reasonable alternative within a reasonable period of time, Processor may terminate this Addendum.  Termination shall not relieve Controller of any fees owed to Processor under the Agreement. 
      4. If Controller does not object to the engagement of a third party in accordance with Section 4.2 within ten (10) days of notice by Processor, that third party will be deemed an Authorized Sub-Processor for the purposes of this Addendum.
      5. Processor will enter into a written agreement with the Authorized Sub-Processor imposing on the Authorized Sub-Processor data protection obligations comparable to those imposed on Processor under this Addendum with respect to the protection of Personal Data.  In case an Authorized Sub-Processor fails to fulfill its data protection obligations under such written agreement with Processor, Processor will remain liable to Controller for the performance of the Authorized Sub-Processor’s obligations under such agreement
      6. If Controller and Processor have entered into C2P SCCs as described in Section 6 (Transfers of Personal Data), (i) the above authorizations will constitute Controller’s prior written consent to the subcontracting by Processor of the processing of Personal Data if such consent is required under the Standard Contractual Clauses, and (ii) the parties agree that the copies of the agreements with Authorized Sub-Processors that must be provided by Processor to Controller pursuant to Clause 9(c) of the C2P SCCs may have commercial information, or information unrelated to the C2P SCCs or their equivalent, removed by the Processor beforehand, and that such copies will be provided by the Processor only upon request by Controller.
  • Security of Personal Data.  Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Processor shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of Processing Personal Data. 
  • Rights of Data Subjects
      1. Processor shall, to the extent permitted by law, notify Controller upon receipt of a request by a Data Subject to exercise the Data Subject’s right of: access, rectification, erasure, data portability, restriction or cessation of Processing, withdrawal of consent to Processing, and/or objection to being subject to Processing that constitutes automated decision-making (such requests individually and collectively “Data Subject Request(s)”). If Processor receives a Data Subject Request in relation to Controller’s data, Processor will advise the Data Subject to submit their request to Controller and Controller will be responsible for responding to such request, including, where necessary, by using the functionality of the Services. Controller is solely responsible for ensuring that Data Subject Requests for erasure, restriction or cessation of Processing, or withdrawal of consent to Processing of any Personal Data are communicated to Processor, and, if applicable, for ensuring that a record of consent to Processing is maintained with respect to each Data Subject
      2. Processor shall, at the request of the Controller, and taking into account the nature of the Processing applicable to any Data Subject Request, apply appropriate technical and organizational measures to assist Controller in complying with Controller’s obligation to respond to such Data Subject Request and/or in demonstrating such compliance, where possible, provided that (i) Controller is itself unable to respond without Processor’s assistance and (ii) Processor is able to do so in accordance with all applicable laws, rules, and regulations. Controller shall be responsible to the extent legally permitted for any costs and expenses arising from any such assistance by Processor.
  • Actions and Access Requests
      1. Processor shall, taking into account the nature of the Processing and the information available to Processor, provide Controller with reasonable cooperation and assistance where necessary for Controller to comply with its obligations under the GDPR to conduct a data protection impact assessment and/or to demonstrate such compliance, provided that Controller does not otherwise have access to the relevant information. Controller shall be responsible to the extent legally permitted for any costs and expenses arising from any such assistance by Processor.
      2. Processor shall, taking into account the nature of the Processing and the information available to Processor, provide Controller with reasonable cooperation and assistance with respect to Controller’s cooperation and/or prior consultation with any Supervisory Authority, where necessary and where required by applicable Data Protection Laws. Controller shall be responsible to the extent legally permitted for any costs and expenses arising from any such assistance by Processor.
      3. Processor shall maintain records sufficient to demonstrate its compliance with its obligations under this Addendum, and retain such records for a period of three (3) years after the termination of the Agreement.  Controller shall, with reasonable notice to Processor, have the right to review, audit and copy such records at Processor’s offices during regular business hours.
      4. Upon Controller’s request, Processor shall, no more than once per calendar year, either (i) make available for Controller’s review copies of certifications or reports demonstrating Processor’s compliance with prevailing data security standards applicable to the Processing of Controller’s Personal Data, or (ii) if the provision of reports or certifications pursuant to (i) is not reasonably sufficient under Data Protection Laws, allow Controller or its authorized representative, upon reasonable notice and at a mutually agreeable date and time, to conduct an audit or inspection of Processor’s data security infrastructure and procedures that is sufficient to demonstrate Processor’s compliance with its obligations under this Addendum, provided that Controller shall provide reasonable prior notice of any such request for an audit and such inspection shall not be unreasonably disruptive to Processor’s business. Controller shall be responsible for the costs of any such audits or inspections, including without limitation a reimbursement to Processor for any time expended for on-site audits.  If Controller and Processor have entered into Standard Contractual Clauses as described in Section 6 (Transfers of Personal Data), the parties agree that the audits described in Clause 13 of each of the Standard Contractual Clauses shall be carried out in accordance with this Section 8.4. 
      5. Processor shall, without delay, notify Controller if an instruction, in the Processor’s opinion, infringes the Data Protection Laws or Supervisory Authority.
      6. In the event of a Personal Data Breach, Processor shall, without undue delay, inform Controller of the Personal Data Breach and take such steps as Processor in its sole discretion deems necessary and reasonable to remediate such violation (to the extent that remediation is within Processor’s reasonable control).
      7. In the event of a Personal Data Breach, Processor shall, taking into account the nature of the Processing and the information available to Processor, provide Controller with reasonable cooperation and assistance necessary for Controller to comply with its obligations under applicable Data Protection Laws with respect to notifying (i) the relevant Supervisory Authority and (ii) Data Subjects affected by such Personal Data Breach without undue delay.
      8. The obligations described in Sections 8.6 and 8.7 shall not apply in the event that a Personal Data Breach results from the actions or omissions of Controller. Processor’s obligation to report or respond to a Personal Data Breach under Sections 8.5 and 8.6 will not be construed as an acknowledgement by Processor of any fault or liability with respect to the Personal Data Breach.
  • Law Enforcement Requests. If a law enforcement or government agency sends Processor a demand for Personal Data, Processor shall attempt to redirect the agency to request that data directly from Controller. As part of this effort, Processor may provide Controller’s basic contact information to the law enforcement or government agency. If compelled to disclose Personal Data to a law enforcement or government agency, then Processor shall give Controller reasonable notice of the demand and cooperation to allow Controller to seek a protective order or other appropriate remedy unless Processor is legally prohibited from doing so. 
  • The total liability of each of Controller and Processor (and their respective employees, directors, officers, affiliates, successors, and assigns), arising out of or related to this Addendum, whether in contract, tort, or other theory of liability, shall not, when taken together in the aggregate, exceed the limitation of liability set forth in the Agreement.
  1. Shippo’s Role as a Data Controller. The parties acknowledge and agree that to the extent Shippo processes Personal Data in connection with the Agreement to: (i) monitor, prevent and detect fraud, investigate potential criminal activity and to prevent harm to Customer, Shippo and Shippos’ affiliates, and to third parties; (ii) comply with legal or regulatory obligations applicable to the processing and retention of Personal Data to which Shippo is subject; (iii) conducting analytics, and developing and improve Shippo’s products and services; (iv) market to business contacts at the Customer; or (v) share Personal Data with selected partners for their further use (provided such partners agree to anonymise the relevant Personal Data before further using it) Shippo is acting as a data controller with respect to the Processing of such Personal Data it receives from or through Customer. 

10.2  To the extent that each party acts as a Data Controller in connection with this Agreement, each agrees that all Personal Data collected which is otherwise provided or made available to the other Party shall have been collected or otherwise obtained in compliance with Data Protection Laws, and may be processed, disclosed and transferred as described in or in connection with this Agreement.

  • Transfers of Personal Data
    1. The parties agree that Shippo may transfer Personal Data processed under this Addendum outside the European Economic Area (“EEA”), the United Kingdom, or Switzerland as necessary provided that, if Shippo transfers Personal Data protected under this Addendum to a jurisdiction which has not been deemed to provide an adequate level of data protection for the purposes of applicable data protection law, Shippo will ensure that appropriate safeguards have been implemented for the transfer of Personal Data in accordance with Data Protection Laws.
    2. The parties agree that agree that, in respect of Restricted Transfers (whether direct transfers or onwards transfers of Personal Data from the EEA or UK): 
      1. the C2C SCCs will apply to such transfers from Customer as Controller to Shippo as Controller; and
      2. the C2P SCCs will apply to such transfers from Customer as Controller to Shippo as Processor.
    3. The C2P SCCs and the C2C SCCs are hereby incorporated by reference into this DPA in respect of such transfers.

Where a Restricted Transfer is subject to the UK GDPR, the C2C SCCs, or the C2P SCCs, as applicable, shall incorporate the UK Addendum.

  • Execution of this Addendum.  Shippo has pre-signed this Addendum, in the signature block below. To complete this Addendum, Customer must complete the information requested in the signature block below and sign there and send the completed and signed Addendum to Shippo by email to privacy@goshippo.com. Upon receipt of the validly completed Addendum by Shippo at this email address, this Addendum will become legally binding.

 

Customer Popout, Inc D/B/A Shippo

Customer Name::

Signature: _______________________________    Signature: ____________________________________

Contact Information::____________________________________ Contact Information: Olivier@goshippo.com

Name and Title:____________________________________       Name and Title: Olivier Adler, SVP, Finance

Date: ____________________________________    Date:____________________________________

Data Processing Addendum – Shippo (Revised Jan. 2023)

EXHIBIT A

Details of Processing

Contact Details (for both controller-to-controller, and controller-to-processor transfers)
Data Exporter: Contact Contact Name, Job Title and Contact Details: 

As provided in the Customer signature block in the EEA/UK Data Processing Addendum

Data Exporter: Activities relevant to processing activities: See Description of Transfer below.
Data Importer: Contact Contact Name: Michael Machado

Job Title: Chief Data and Security Officer

Contact Details: mmachado@goshippo.com

Data Importer: Activities relevant to processing activities: See “Description of Transfer” below.
Description of Transfer
Shippo as Controller Shippo as Processor
Categories of data subjects whose personal data is transferred Merchants and their employees, advisors and freelancers (i.e. business contacts)

Recipients of shipping

Merchants and their employees, advisors and freelancers (i.e. business contacts)

Recipients of shipping

Categories of personal data transferred Merchants and their employees, advisors and freelancers (i.e. business contacts)

Contact details including: name, address, email address, phone number

Payment/ billing information

IP address

UserID

Recipients of shipping:

Contact details including: name, address, phone number

Merchants and their employees, advisors and freelancers (i.e. business contacts)

Contact details including: name, address, email address, phone number

Payment/ billing information

IP address

UserID

Recipients of shipping:

Contact details including: name, address, phone number

Sensitive data transferred (if applicable) None None
Frequency of transfer (e.g. whether the data is transferred on a one-off or continuous basis). Continuous Continuous
Nature and purpose the transfer and further processing Merchants and their employees, advisors and freelancers (i.e. business contacts), and Recipients: 

Complying with certain regulatory requirements or legal obligations applicable to Shippo

Monitor, investigate, prevent and detect fraud, potential criminal activity, or breach of carrier regulations, and to prevent harm to Customer, Shippo and Shippo’s affiliates, and to third parties

Conduct analytics on use of Shippo’s services, and develop and improve Shippo’s products and services

Share Personal Data with selected partners for their further use (provided such partners agree to anonymise the relevant Personal Data before further using it)

Merchants and their employees, advisors and freelancers (i.e. business contacts) only:

Marketing

Merchants and their employees, advisors and freelancers (i.e. business contacts), and Recipients: 

Provision of the Services: facilitating shipping, shipping insurance, creating labels, tracking shipments, address validation

Retention period (or relevant criteria for retention) The personal data will be retained for no longer than is necessary for the purposes for which it was collected, in accordance with Shippo’s data retention practices. The personal data will be retained for no longer than is necessary for the purposes for which it was collected, in accordance with Shippo’s data retention practices.
Description of technical and organisational measures implemented by the data importer As set out in Exhibit B As set out in Exhibit B
Subject matter, nature and duration of processing by sub-processors N/A The personal data will be retained for no longer than is necessary for the purposes for which it was collected, in accordance with Shippo’s data retention practices.
List of sub-processors N/A As set out in Exhibit C

 

EXHIBIT B

Technical and Organisational Measures

  1. Access Control
    1. Preventing Unauthorized Access
      1. Outsourced processing: Shippo hosts its Service with outsourced cloud infrastructure providers. Additionally, Shippo maintains contractual relationships with vendors in order to provide the Service in accordance with our Data Processing Agreement. Shippo relies on contractual agreements, privacy policies, and vendor compliance programs in order to protect data processed or stored by these vendors.
      2. Physical and environmental security: Shippo hosts its product infrastructure with multi-tenant, outsourced infrastructure providers. The physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications.
      3. Authentication: Shippo implemented a uniform password policy for its customer products. Customers who interact with the products via the user interface must authenticate before accessing non-public customer data.
      4. Authorization: Customer data is stored in multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure.
      5. Application Programming Interface (API) access: Public product APIs may be accessed using an API key or through Oauth authorization. 
  2. Preventing Unauthorized Product Use
    1. Shippo implements industry standard access controls and detection capabilities for the internal networks that support its products.
      1. Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. 
      2. Static code analysis: Security review of code stored in Shippo’s source code repositories is performed, checking for coding best practices and identifiable software flaws.
      3. Penetration testing: Shippo maintains relationships with industry recognized penetration testing service providers for at least one annual penetration test. The intent of the penetration tests is to identify and resolve foreseeable attack vectors and potential abuse scenarios.
  3. Limitations of Privilege & Authorization Requirements
    1. Production access: A subset of Shippo’s employees have access to the products and to customer data via controlled interfaces. The intent of providing access to a subset of employees is to provide effective customer support, to troubleshoot potential problems, to detect and respond to security incidents and implement data security. Access is enabled through “just in time” requests for access; all such requests are logged. Employees are granted access by role, and reviews of high risk privilege grants are initiated daily. Employee roles are reviewed at least once every six months.
    2. Background checks: All Shippo employees undergo a third-party background check prior to being extended an employment offer, in accordance with the applicable laws. All employees are required to conduct themselves in a manner consistent with company guidelines, non-disclosure requirements, and ethical standards.
  4. Transmission Control
  1. In-transit: Shippo makes HTTPS encryption (also referred to as SSL or TLS) available on of its login interfaces. Shippo’s HTTPS implementation uses industry standard algorithms and certificates. 
  2. At-rest: Shippo stores user passwords following policies that follow industry standard practices for security. Our databases are encrypted at rest at our multi-tenants  hosting facility. 
  1. Input Control
    1. Detection: Shippo designed its infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregated log data and alert appropriate employees of malicious, unintended, or anomalous activities. Shippo personnel, including security, operations, and support personnel, are responsive to known incidents. 
    2. Response and tracking: Shippo maintains a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, Shippo will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. 
    3. Communication: If Shippo becomes aware of unlawful access to Customer data stored within its products, Shippo will follow the Shippo Security and Privacy Incident Response policy dealing with incidents and mitigate the potential harm to customers. 
  2. Availability Control 
    1. Infrastructure availability: The infrastructure providers use commercially reasonable efforts to ensure a minimum of 99.9% uptime. The providers maintain a minimum of N+1 redundancy to power, network, and HVAC services. 
    2. Fault tolerance: Backup and replication strategies are designed to ensure redundancy and failover protections during a significant processing failure. Customer data is backed up to multiple durable data stores and replicated across multiple availability zones. 
    3. Online replicas and backups: Where feasible, production databases are designed to replicate data between no less than 1 primary and 1 secondary database. All databases are backed up and maintained using at least industry standard methods. 
    4. Shippo’s products are designed to ensure redundancy and seamless failover. The server instances that  support the products are also architected with a goal to prevent single points of failure. This design assists Shippo operations in maintaining and updating the product applications and backend while limiting downtime.

EXHIBIT C

Authorized Sub-Processors

 

Controller acknowledges and agrees that the following entities shall be deemed Authorized Sub-Processors that may Process Personal Data pursuant to this Addendum:

  • Appcues
  • Amazon Web Services (AWS)
  • Braintree (PayPal)
  • Cloudflare
  • Drift
  • FullStory
  • Google Analytics
  • Google Workspace
  • Heap Analytics
  • Launch Darkly
  • Looker Data Sciences
  • Mailchimp (SendGrid)
  • Marketo
  • Melissa Data
  • Mode Analytics
  • OneTrust
  • Salesforce
  • Salesloft
  • Sift Science
  • SmartyStreets
  • Spycloud
  • Stripe
  • Sumo Logic
  • Zendesk

 

EXHIBIT D

Standard Contractual Clauses

Part 1: Controller-Controller Agreement (Module I)

The parties acknowledge and agree that the C2C SCCs entered into by pursuant to Section 6.3.1 of the Addendum are completed by the insertion of the information set out below:

C2C SCCs reference Information required to complete C2C SCCs Response
Clause 7 Docking clause to be included or deleted Deleted
Clause 11 Right for data subjects to lodge complaints with independent dispute resolution body to be included or deleted Deleted
Clause 17 Option 1 (Governing law in member state allowing third-party beneficiary rights) or Option 2 (Governing law in member state not allowing third-party beneficiary rights)  Option 1
Specify governing law of a member state Ireland
Clause 18(b) Specify location of competent courts of a member state Ireland
Annex I, Section A (List of parties), Part 1 (Data exporter) Name Customer (as defined in the Addendum)
Address As set out in the Addendum
Contact As set out in Exhibit A 
Activities relevant to processing activities As set out in Exhibit A
Signature and date As set out in the Addendum
Role Controller
Annex I, Section A (List of parties), Part 2 (Data importer) Name Shippo (as defined in the Addendum)  
Address As set out in the Addendum
Contact As set out in Exhibit A
Activities relevant to processing activities As set out in Exhibit A
Signature and date As set out in the Addendum
Role Controller
Annex I, Section B (Description of transfer) Categories of data subjects whose personal data is transferred As set out in Exhibit A
Categories of personal data transferred As set out in Exhibit A
Sensitive data transferred As set out in Exhibit A
Frequency of transfer As set out in Exhibit A
Nature of the processing As set out in Exhibit A
Purpose of the data transfer and further processing As set out in Exhibit A
Retention period (or relevant criteria for retention) As set out in Exhibit A
Subject matter, nature and duration of processing by sub-processors As set out in Exhibit A
Annex 1, Section C (Competent Supervisory Authority)  Competent supervisory authority Shall be determined in accordance with Data Protection Laws
Annex II (Technical and organisational measures including technical and organisational measures to ensure the security of the data) Description of technical and organisational measures implemented by the data importer As set out in Exhibit B

 

Part 2: Controller-Processor Agreement (Module II)

The parties acknowledge and agree that the C2P SCCs entered into by pursuant to Section 6.3.2 of the Addendum are completed by the insertion of the information set out below:

C2P SCCs reference Information required to complete C2P SCCs Response
Clause 7 Docking clause to be included or deleted Deleted
Clause 9(a) Option 1 (Specific prior authorisation) or Option 2 (General written authorisation)  Option 2 
Notice period for a request for specific authorisation of sub-processors 10 days
Clause 11 Right for data subjects to lodge complaints with independent dispute resolution body to be included or deleted Deleted
Clause 17 Option 1 (Governing law in member state allowing third-party beneficiary rights) or Option 2 (Governing law in member state not allowing third-party beneficiary rights)  Option 1
Specify governing law of a member state Ireland
Clause 18(b) Specify location of competent courts of a member state Ireland
Annex I, Section A (List of parties), Part 1 (Data exporter) Name Customer (as defined in the Addendum)
Address As set out in the Addendum
Contact As set out in Exhibit A
Activities relevant to processing activities As set out in Exhibit A
Signature and date As set out in the Addendum
Role Controller
Annex I, Section A (List of parties), Part 2 (Data importer) Name Shippo (as defined in the Addendum)  
Address As set out in the Addendum
Contact As set out in Exhibit A
Activities relevant to processing activities As set out in Exhibit A
Signature and date As set out in the Addendum
Role Processor
Annex I, Section B (Description of transfer) Categories of data subjects whose personal data is transferred As set out in Exhibit A
Categories of personal data transferred As set out in Exhibit A
Sensitive data transferred As set out in Exhibit A
Frequency of transfer As set out in Exhibit A
Nature of the processing As set out in Exhibit A
Purpose of the data transfer and further processing As set out in Exhibit A
Retention period (or relevant criteria for retention) As set out in Exhibit A
Subject matter, nature and duration of processing by sub-processors As set out in Exhibit A
Annex 1, Section C (Competent Supervisory Authority)  Competent supervisory authority Shall be determined in accordance with Data Protection Laws
Annex II (Technical and organisational measures including technical and organisational measures to ensure the security of the data) Description of technical and organisational measures implemented by the data importer As set out in Exhibit B
Annex III (List of sub-processors) List of sub-processors authorised by the controller As set out in Exhibit C

EXHIBIT E

UK Addendum

The parties acknowledge and agree that the tables in the UK Addendum are amended by the insertion of the information set out below:

Table 1: Parties

Start date As set out in the Agreement
The Parties Exporter (who sends the Restricted Transfer) Importer (who receives the Restricted Transfer) 
Parties’ details Full legal name: Customer (as defined in the Addendum) Full legal name: Shippo (as defined in the Addendum)  
Trading name (if different): N/A Trading name (if different): N/A
Main trading address (if a company registered address): As set out in the Addendum Main trading address (if a company registered address): As set out in the Addendum
Official registration number (if any) (company number or similar identifier): As set out in the Addendum Official registration number (if any) (company number or similar identifier): As set out in the Addendum
Key Contact Full name (optional): N/A Full name (optional): 
Job title: As set out in Exhibit A Job title: As set out in Exhibit A
Contact details including email: As set out in Exhibit A Contact details including email: As set out in Exhibit A
Signature (if required for the purposes of Section 2) N/A N/A

 

Table 2: Selected SCCs, Modules and Selected Clauses

Addendum EU SCCs The version of the Approved EU SCCs which this Addendum is appended to, detailed below, including the Appendix Information .

Reference: the C2P SCCs and C2C SCCs entered into pursuant to Section 6 of the Addendum.

 

Table 3: Appendix Information

Annex 1A: List of Parties: As set out in Exhibit A and Parts 1 and 2 to Exhibit D 
Annex 1B: Description of Transfer:  As set out in Exhibit A
Annex II: Technical and organisational measures including technical and organisational measures to ensure the security of the data:  As set out in Exhibit B
Annex III: List of Sub processors (Modules 2 and 3 only): As set out in Exhibit C

 

Table 4: Ending this Addendum when the Approved Addendum Changes

Ending this Addendum when the Approved Addendum Changes Which Parties may end the UK Addendum as set out in Section 19: 
Importer Yes
Exporter No
Neither Party No

Get Started Today for Free

Everything you need for professional-grade shipping + deep discounts from top carriers.
Sign Up Free