CINXE.COM

<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8" data-next-head=""/><meta name="viewport" content="width=device-width" data-next-head=""/><title data-next-head="">Strong security and privacy standards by default</title><link rel="apple-touch-icon" sizes="152x152" href="/favicon/apple-touch-icon.png" data-next-head=""/><link rel="icon" type="image/png" sizes="32x32" href="/favicon/favicon-32x32.png" data-next-head=""/><link rel="icon" type="image/png" sizes="16x16" href="/favicon/favicon-16x16.png" data-next-head=""/><link rel="manifest" href="/favicon/site.webmanifest" data-next-head=""/><link rel="mask-icon" href="/favicon/safari-pinned-tab.svg" color="#5bbad5" data-next-head=""/><meta name="msapplication-TileColor" content="#00aba9" data-next-head=""/><meta name="theme-color" content="#ffffff" data-next-head=""/><meta name="description" content="We take precautions to ensure your data stays protected" data-next-head=""/><meta name="image" content="https://www.navattic.com/img/og-image.png" data-next-head=""/><script id="schema-org" type="application/ld+json" data-next-head="">{"@context":"https://schema.org","@type":"Organization","name":"Navattic","url":"https://www.navattic.com","logo":"https://www.navattic.com/img/icon.png"}</script><script id="schema-org-webpage" type="application/ld+json" data-next-head="">{"@context":"https://schema.org","@type":"WebPage","url":"https://www.navattic.com","inLanguage":"en","mainEntityOfPage":"https://www.navattic.com","description":"Delight your prospects with interactive product demo software. Embed your product on your website, share in the sales cycle, and send in email campaigns.","name":"Interactive Product Demo Software That Delights","author":{"@type":"Organization","name":"Navattic"},"copyrightHolder":{"@type":"Organization","name":"Navattic"},"copyrightYear":2024,"creator":{"@type":"Organization","name":"Navattic"},"publisher":{"@type":"Organization","name":"Navattic"},"datePublished":"2019-01-18T10:30:00+01:00","image":{"@type":"ImageObject","url":"https://www.navattic.com/img/og-image.png"}}</script><meta property="og:url" content="https://www.navattic.com/security" data-next-head=""/><meta property="og:type" content="website" data-next-head=""/><meta property="og:title" content="Strong security and privacy standards by default" data-next-head=""/><meta property="og:description" content="We take precautions to ensure your data stays protected" data-next-head=""/><meta property="og:image" content="https://www.navattic.com/img/og-image.png" data-next-head=""/><meta property="og:site_name" content="Navattic" data-next-head=""/><meta name="twitter:card" content="summary_large_image" data-next-head=""/><meta name="twitter:creator" content="navattic" data-next-head=""/><meta name="twitter:title" content="Strong security and privacy standards by default" data-next-head=""/><meta name="twitter:description" content="We take precautions to ensure your data stays protected" data-next-head=""/><meta name="twitter:image" content="https://www.navattic.com/img/og-image.png" data-next-head=""/><link rel="preload" href="/_next/static/media/2a1a9af154176195-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/8c356de1ceadefc2-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/8b51fdbf00838903-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/a74be9929f395589-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/fe50c3a9343c48d0-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/css/f9b762b1cc6c9566.css" as="style"/><link rel="stylesheet" href="/_next/static/css/f9b762b1cc6c9566.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-42372ed130431b0a.js"></script><script src="/_next/static/chunks/webpack-090b4088232e9b77.js" defer=""></script><script src="/_next/static/chunks/framework-5e67a37a0bcc6e4b.js" defer=""></script><script src="/_next/static/chunks/main-b24bcf9f673ce84d.js" defer=""></script><script src="/_next/static/chunks/pages/_app-56bd52f60c54863f.js" defer=""></script><script src="/_next/static/chunks/4392-52bca9d0af14925e.js" defer=""></script><script src="/_next/static/chunks/806-2f99e725928069a3.js" defer=""></script><script src="/_next/static/chunks/9965-77d98210cf1ad31a.js" defer=""></script><script src="/_next/static/chunks/5496-e03d62b20dd1fff4.js" defer=""></script><script src="/_next/static/chunks/3253-18552d9380ba482e.js" defer=""></script><script src="/_next/static/chunks/1499-4c5b540e0d6b95df.js" defer=""></script><script src="/_next/static/chunks/3786-0e4bd217695f5855.js" defer=""></script><script src="/_next/static/chunks/pages/security-fd10d8694067976c.js" defer=""></script><script src="/_next/static/6xMcT4mna6bO2HRp-eZUW/_buildManifest.js" defer=""></script><script src="/_next/static/6xMcT4mna6bO2HRp-eZUW/_ssgManifest.js" defer=""></script><style id="__jsx-2741586647">html{font-family:'inter', 'inter Fallback'}</style></head><body><div id="__next"><noscript><img height="1" width="1" style="display:none" alt="" src="https://dc.ads.linkedin.com/collect/?pid=6365961&amp;fmt=gif"/></noscript><div class="min-h-screen bg-[#FCFCFE]"><header class="dark:border-slate-800 dark:lg:border-transparent lg:border-transparent sticky top-0 z-40 flex border-b w-full justify-center h-[65px] transition-bg ease-in"><nav class="px-6 2xl:px-10 container flex w-full items-center justify-between gap-6"><a class="mr-2 flex min-w-[100px] items-center sm:mr-2 md:mr-4 lg:mr-10 " href="/"><svg height="30px" viewBox="0 0 221 41" fill="currentColor" class="text-royal-light dark:text-white h-[22px] sm:h-[24px] shrink-0"><g stroke="none" stroke-width="1" fill="none" fill-rule="evenodd"><g fill="currentColor" fill-rule="nonzero"><path d="M68.384 11.293l.148 1.971.03.77.019 1.055h.148c.296-.617.698-1.193 1.207-1.728a8.72 8.72 0 0 1 1.749-1.412A8.67 8.67 0 0 1 73.853 11a8.85 8.85 0 0 1 2.463-.341c1.511 0 2.808.252 3.892.755s1.987 1.176 2.709 2.02 1.256 1.834 1.601 2.969.517 2.353.517 3.651v14.312h-4.631V21.565a15.51 15.51 0 0 0-.222-2.677c-.148-.844-.419-1.59-.813-2.239s-.936-1.168-1.626-1.558-1.576-.584-2.66-.584c-1.839 0-3.342.69-4.508 2.069s-1.749 3.221-1.749 5.525v12.267h-4.631V16.259l-.049-2.385-.148-2.58h4.384zm37.045 8.129c0-1.72-.525-2.994-1.576-3.821s-2.447-1.241-4.187-1.241c-1.314 0-2.553.252-3.719.755s-2.143 1.144-2.931 1.923l-2.463-2.921c1.149-1.071 2.553-1.915 4.212-2.531s3.44-.925 5.345-.925c1.675 0 3.128.235 4.36.706s2.241 1.111 3.03 1.923a7.86 7.86 0 0 1 1.773 2.872c.394 1.103.591 2.288.591 3.554v10.076l.074 2.458c.049.86.14 1.566.271 2.118h-4.187a14.23 14.23 0 0 1-.394-3.31h-.148a8.93 8.93 0 0 1-3.227 2.872c-1.297.682-2.833 1.022-4.606 1.022-.92 0-1.88-.122-2.882-.365s-1.913-.641-2.734-1.193-1.503-1.282-2.044-2.191-.813-2.028-.813-3.359c0-1.752.476-3.14 1.429-4.162s2.2-1.801 3.744-2.337 3.284-.884 5.222-1.047l5.862-.243v-.633zm-1.133 3.943l-3.572.146c-1.232.097-2.348.292-3.35.584s-1.831.73-2.488 1.314-.985 1.363-.985 2.337c0 .682.14 1.249.419 1.704s.649.828 1.108 1.12a4.49 4.49 0 0 0 1.527.608c.558.114 1.133.17 1.724.17 2.168 0 3.834-.641 5-1.923s1.749-2.896 1.749-4.844v-1.217h-1.133zm22.316 11.001h-5.025l-9.508-23.074h5.123l6.848 18.157h.099l6.897-18.157h4.926l-9.36 23.074zm26.405-14.944c0-1.72-.525-2.994-1.576-3.821s-2.447-1.241-4.187-1.241c-1.314 0-2.553.252-3.719.755s-2.143 1.144-2.931 1.923l-2.463-2.921c1.149-1.071 2.553-1.915 4.212-2.531s3.44-.925 5.345-.925c1.675 0 3.128.235 4.36.706s2.241 1.111 3.03 1.923a7.86 7.86 0 0 1 1.773 2.872c.394 1.103.591 2.288.591 3.554v10.076l.074 2.458c.049.86.14 1.566.271 2.118h-4.187a14.23 14.23 0 0 1-.394-3.31h-.148a8.93 8.93 0 0 1-3.227 2.872c-1.297.682-2.833 1.022-4.606 1.022-.92 0-1.88-.122-2.882-.365s-1.913-.641-2.734-1.193-1.503-1.282-2.044-2.191-.813-2.028-.813-3.359c0-1.752.476-3.14 1.429-4.162s2.2-1.801 3.744-2.337 3.284-.884 5.222-1.047l5.862-.243v-.633zm-1.133 3.943l-3.572.146c-1.232.097-2.348.292-3.35.584s-1.831.73-2.488 1.314-.985 1.363-.985 2.337c0 .682.14 1.249.419 1.704s.649.828 1.108 1.12a4.49 4.49 0 0 0 1.527.608c.558.114 1.133.17 1.724.17 2.168 0 3.834-.641 5-1.923s1.749-2.896 1.749-4.844v-1.217h-1.133zm22.267-8.324h-6.207v12.024c0 1.395.263 2.393.788 2.994s1.363.901 2.512.901c.427 0 .887-.049 1.379-.146a5.32 5.32 0 0 0 1.33-.438l.148 3.748a11.25 11.25 0 0 1-1.847.462 12.57 12.57 0 0 1-2.094.17c-2.2 0-3.884-.6-5.049-1.801s-1.749-3.002-1.749-5.403v-12.51h-4.483v-3.748h4.483v-6.62h4.581v6.62h6.207v3.748zm13.498 0h-6.207v12.024c0 1.395.263 2.393.788 2.994s1.363.901 2.512.901c.427 0 .887-.049 1.379-.146a5.32 5.32 0 0 0 1.33-.438l.148 3.748a11.25 11.25 0 0 1-1.847.462 12.57 12.57 0 0 1-2.094.17c-2.2 0-3.884-.6-5.049-1.801s-1.749-3.002-1.749-5.403v-12.51h-4.483v-3.748h4.483v-6.62h4.581v6.62h6.207v3.748zm7.488 19.325h-4.631V11.293h4.631v23.074zm.788-31.398c0 .844-.304 1.541-.911 2.093s-1.338.828-2.192.828-1.576-.284-2.168-.852a2.76 2.76 0 0 1-.887-2.069c0-.844.296-1.55.887-2.118s1.314-.85 2.168-.85 1.585.284 2.192.852a2.78 2.78 0 0 1 .911 2.118zm21.676 14.166c-.493-.746-1.232-1.371-2.217-1.874s-2.036-.755-3.153-.755c-1.215 0-2.291.227-3.227.682s-1.732 1.063-2.389 1.825-1.158 1.647-1.503 2.653a9.69 9.69 0 0 0-.517 3.164 9.69 9.69 0 0 0 .517 3.164c.345 1.006.846 1.89 1.503 2.653s1.461 1.371 2.414 1.825 2.036.682 3.251.682c1.182 0 2.258-.227 3.227-.682s1.765-1.071 2.389-1.85L221 31.398c-.985 1.136-2.217 2.02-3.695 2.653s-3.153.949-5.025.949c-1.806 0-3.473-.292-5-.876s-2.849-1.404-3.966-2.458-1.995-2.328-2.636-3.821-.961-3.164-.961-5.014c0-1.817.312-3.472.936-4.965s1.494-2.775 2.611-3.846 2.438-1.898 3.966-2.483 3.177-.876 4.951-.876c1.642 0 3.276.325 4.902.974s2.915 1.59 3.867 2.823l-3.35 2.677zM14.614 33.38l-.944 1.548a11 11 0 0 1-10.137 5.247l-1.255-.089-2.166-.235c-.078-.111.395-2.16 1.42-6.147 5.227-2.321 9.588-2.43 13.081-.325zm23.478-9.783l-1.842 7.858c.002.062-.031.12-.085.15-10.419 5.766-23.317-6.584-33.741-.992-.111.06-.213.039-.217-.088l1.797-7.296c-.002-.063.031-.12.085-.15 10.419-5.766 23.696 6.777 33.632.367.097-.063.368.024.371.152zm2.454-10.624l-1.842 7.858c.002.062-.031.12-.085.15-10.419 5.766-23.317-6.584-33.741-.992-.111.06-.213.039-.217-.088l1.797-7.296c-.002-.063.031-.12.085-.15 10.419-5.766 23.696 6.777 33.632.367.097-.063.368.024.371.152zm2.035-9.923c.087.104-.483 2.276-1.711 6.518-4.952 2.735-9.26 3.207-12.924 1.415l1.019-1.906a11 11 0 0 1 8.879-5.782l2.665-.186c1.344-.084 2.035-.104 2.072-.059z"></path></g></g></svg></a><div class="text-sm hidden items-baseline h-full items-center gap-6 lg:flex md:gap-4 lg:gap-4 xl:gap-5"><div class="relative group items-center flex self-center"><button class="self-center px-3.5 py-1.5 rounded-md group-hover:bg-slate-200/50 dark:group-hover:bg-slate-800" id="headlessui-popover-button-:Rd66:" type="button" aria-expanded="false"><span class="group h-full relative flex items-center gap-1.5 font-semibold text-royal-light dark:text-white">Product<svg height="1rem" width="1rem" class="inline self-center h-4 w-4 stroke-[5px] group-hover:rotate-180 transition duration-200 ease-in-out"><use href="/icons/sprite.svg#lucide/chevron-down"></use></svg></span></button></div><div class="relative group items-center flex self-center"><button class="self-center px-3.5 py-1.5 rounded-md group-hover:bg-slate-200/50 dark:group-hover:bg-slate-800" id="headlessui-popover-button-:Rl66:" type="button" aria-expanded="false"><span class="group h-full relative flex items-center gap-1.5 font-semibold text-royal-light dark:text-white">Customers<svg height="1rem" width="1rem" class="inline self-center h-4 w-4 stroke-[5px] group-hover:rotate-180 transition duration-200 ease-in-out"><use href="/icons/sprite.svg#lucide/chevron-down"></use></svg></span></button></div><a class="self-center relative rounded-md flex items-center gap-1 px-3.5 py-1.5 font-semibold text-royal-light dark:text-white group:bg-slate-200/50 dark:hover:bg-slate-800" href="/pricing">Pricing</a><div class="relative group items-center flex self-center"><button class="self-center px-3.5 py-1.5 rounded-md group-hover:bg-slate-200/50 dark:group-hover:bg-slate-800" id="headlessui-popover-button-:R1566:" type="button" aria-expanded="false"><span class="group h-full relative flex items-center gap-1.5 font-semibold text-royal-light dark:text-white">Resources<svg height="1rem" width="1rem" class="inline self-center h-4 w-4 stroke-[5px] group-hover:rotate-180 transition duration-200 ease-in-out"><use href="/icons/sprite.svg#lucide/chevron-down"></use></svg></span></button></div><div class="relative group items-center flex self-center"><button class="self-center px-3.5 py-1.5 rounded-md group-hover:bg-slate-200/50 dark:group-hover:bg-slate-800" id="headlessui-popover-button-:R1d66:" type="button" aria-expanded="false"><span class="group h-full relative flex items-center gap-1.5 font-semibold text-royal-light dark:text-white">Company<svg height="1rem" width="1rem" class="inline self-center h-4 w-4 stroke-[5px] group-hover:rotate-180 transition duration-200 ease-in-out"><use href="/icons/sprite.svg#lucide/chevron-down"></use></svg></span></button></div></div><div class="text-sm flex items-center "><div class="hidden flex-none items-baseline gap-6 lg:flex"><a href="https://app.navattic.com/auth/login" class="relative flex items-center gap-1 py-1 font-semibold text-royal-light dark:text-white">Sign in<svg height="1rem" width="1rem" class="inline self-center h-3.5 w-3.5"><use href="/icons/sprite.svg#lucide/chevron-right"></use></svg></a> <a class="bg-[rgba(236,232,240,0)] text-[#455cad] flex flex-shrink-0 items-center justify-center rounded-lg border border-[#455cad]/50 dark:border-slate-500 dark:text-white px-4 py-2 font-semibold transition-all ease-in hover:ring-4 active:bg-white lg:px-3" href="https://app.navattic.com/auth/sign-up">Sign up free</a><a class="dark:bg-slate-200/20 bg-white text-[#455cad] flex flex-shrink-0 items-center justify-center rounded-lg border border-[#455cad]/50 dark:border-slate-500 dark:text-white px-4 py-2 font-semibold transition-all ease-in hover:bg-white hover:ring-4 active:bg-white lg:px-3" href="/get-demo">Get a demo</a></div><div class="relative"><button class="border dark:border-slate-700 outline-none ml-3 active:bg-gray=100 cursor-pointer rounded-md p-1 text-royal-light dark:text-white transition-all ease-in-out hover:bg-gray-100 dark:hover:bg-gray-700 lg:hidden" id="headlessui-popover-button-:Rn66:" type="button" aria-expanded="false"><svg height="1rem" width="1rem" class="inline self-center h-5 w-5"><use href="/icons/sprite.svg#lucide/menu"></use></svg></button></div></div></nav></header><main class="overflow-x-hidden lg:overflow-x-visible relative -mt-[65px]"><div class="absolute inset-0 bg-grid [mask-image:linear-gradient(180deg,#fff,rgba(0,0,0,0.05))]"></div><section class="pt-32 pb-16 text-center relative"><div class="max-w-5xl mx-auto px-4 sm:px-6 text-royal-light"><div class="flex justify-center mb-4 text-lg font-medium text-slate-600 tracking-wide"><div class="mb-3 uppercase text-sm text-slate-600 tracking-wide">Security &amp; Privacy</div></div><h1 class="text-royal-light dark:text-white mb-4 leading-14 font-semibold text-4xl sm:text-5xl md:text-7xl tracking-[-0.02em] opacity-0 animate-[fadeUp_700ms_300ms_ease-in-out_forwards]">Strong security and privacy standards by default</h1><div class="mt-5 mx-auto max-w-2xl text-[1.125rem] leading-relaxed text-slate-600 dark:text-[#95A2B3] opacity-0 animate-[fadeUp_500ms_500ms_ease-in-out_forwards]">We take precautions to ensure your data stays protected</div><div class="mt-10 gap-4 flex justify-center content-center sm:mt-12 opacity-0 animate-[fadeUp_300ms_700ms_ease-in-out_forwards]"><a target="_blank" rel="noopener noreferrer" href="https://trust.navattic.com"><button class="relative flex bg-white mt-8 mx-auto items-center inline-block justify-center rounded-md border border-gray-300 px-5 py-3 text-base font-medium text-gray-700 shadow-sm hover:bg-gray-50 focus:outline-none focus:ring-2 focus:border-blue-primary text-sm focus:ring-blue-200">View Trust Center<span aria-hidden="true" class="bg-gray-300/40 p-[2px] rounded-full ml-2 -mr-1 leading-none flex items-center">→</span></button></a></div></div></section><div class="space-y-0 relative pt-10 md:pb-36 pb-20 lg:pb-24 max-w-7xl mx-auto px-4 sm:px-6"><div class=""><div class="gap-y-8 md:grid-cols-2 md:gap-x-10 lg:gap-x-24 grid items-center"><div class="md:col-start-2 col-start-1 row-start-1"><h3 class="font-semibold text-4xl sm:text-5xl sm:leading-[1.1em] text-royal-light" style="margin-top:0;padding-top:0">Industry-standard<br/> best practices</h3><div class="lg:text-lg my-4 text-zinc-800"><div class="mt-8"><div class="space-y-6 mt-3 text-gray-500"><div><strong class="font-medium text-royal-light">SOC II Type II Compliance</strong><p class="text-base">Navattic’s security posture is audited annually by external auditors. We are SOC II Type 2 compliant with zero exceptions reported.</p></div><div><strong class="font-medium text-royal-light">Annual third-party security testing</strong><p class="text-base">Yearly penetration-testing audits conducted by a third-party. See below for information about obtaining a report.</p></div><div><strong class="font-medium text-royal-light">Hosted on trusted cloud architecture</strong><p class="text-base">Hosted and served on cloud providers like Cloudflare and AWS that have the highest standards for security requirements.</p></div></div></div></div></div><div class="row-start-1 flex-1 col-start-1 relative flex justify-center max-w-xl max-h-[36rem] mx-auto w-full col-start-1 row-start-2 md:row-start-1"><img alt="SOC II Compliance" loading="lazy" width="180" height="180" decoding="async" data-nimg="1" class="rounded-2xl relative overflow-hidden max-h-[180px]" style="color:transparent" srcSet="/_next/image?url=%2F_next%2Fstatic%2Fmedia%2FsocII.7e7f1a03.png&amp;w=256&amp;q=75 1x, /_next/image?url=%2F_next%2Fstatic%2Fmedia%2FsocII.7e7f1a03.png&amp;w=384&amp;q=75 2x" src="/_next/image?url=%2F_next%2Fstatic%2Fmedia%2FsocII.7e7f1a03.png&amp;w=384&amp;q=75"/></div></div></div><div class="max-w-7xl mx-auto pt-16 pb-8 px-4 sm:px-6 lg:px-8"><h2 class="text-3xl tracking-tight font-semibold text-royal-light">Frequently asked questions</h2><div class="mt-6 pt-8"><dl class="space-y-10 md:space-y-0 md:grid md:grid-cols-2 md:gap-x-8 md:gap-y-12"><div><dt class="text-lg leading-6 font-medium text-royal-light">Is Navattic SOC II compliant?</dt><dd class="mt-2 text-base text-gray-500">Yes, Navattic achieved SOC II Type 2 compliance with zero exceptions. To access the report, please send an email<!-- --> <a href="mailto:security@navattic.com" class="link-base">security@navattic.com</a></dd></div><div><dt class="text-lg leading-6 font-medium text-royal-light">Where can I find the list of data subprocessors?</dt><dd class="mt-2 text-base text-gray-500">For more information on other companies that process data, see our<!-- --> <a class="link-base" href="/legal/subprocessors">List of Subprocessors</a>.</dd></div><div><dt class="text-lg leading-6 font-medium text-royal-light">Do you have a pen test report available to share?</dt><dd class="mt-2 text-base text-gray-500">Yes, Navattic completes third party penetration tests annually. To request access to our latest pen test report, send an email to<!-- --> <a href="mailto:security@navattic.com" class="link-base">security@navattic.com</a>.</dd></div><div><dt class="text-lg leading-6 font-medium text-royal-light">How is data encrypted?</dt><dd class="mt-2 text-base text-gray-500">Our platform uses encryption at rest (AES-256) and in transit (HTTPS/TLS).</dd></div><div><dt class="text-lg leading-6 font-medium text-royal-light">What is the process for reporting security issues?</dt><dd class="mt-2 text-base text-gray-500">If you are interested in submitting a security issue, first please read about our<!-- --> <a class="link-base" href="/legal/responsible-disclosure">Responsible disclosure program</a>, and then send an email to<!-- --> <a href="mailto:security@navattic.com" class="link-base">security@navattic.com</a></dd></div></dl></div></div><div class="max-w-6xl mx-auto pt-32"><h2 class="text-3xl tracking-tight font-semibold text-royal-light">Interested in learning more?</h2><div class="grid sm:grid-cols-2 gap-8 mt-8"><a href="/legal/responsible-disclosure"><div class="py-7 px-10 group border border-dotted border-slate-300 rounded-xl shadow-sm bg-white flex justify-between items-center"><div class="max-w-sm"><div class="shadow p-1 text-gray-600 rounded inline-block"><svg xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" aria-hidden="true" class="h-4 w-4"><path stroke-linecap="round" stroke-linejoin="round" d="M20 13V6a2 2 0 00-2-2H6a2 2 0 00-2 2v7m16 0v5a2 2 0 01-2 2H6a2 2 0 01-2-2v-5m16 0h-2.586a1 1 0 00-.707.293l-2.414 2.414a1 1 0 01-.707.293h-3.172a1 1 0 01-.707-.293l-2.414-2.414A1 1 0 006.586 13H4"></path></svg></div><h3 class="mt-2 mb-1 text-base text-royal-light font-medium">Responsible Disclosure Program</h3><div class="text-gray-500">Our program to facilitate the responsible disclosure of possible security vulnerabilities</div></div><svg xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" aria-hidden="true" class="hidden group-hover:block h-5 w-5 text-gray-300"><path stroke-linecap="round" stroke-linejoin="round" d="M9 5l7 7-7 7"></path></svg></div></a><a href="/legal/privacy"><div class="py-7 px-10 group border border-dotted border-slate-300 rounded-xl shadow-sm bg-white flex justify-between items-center"><div class="max-w-sm"><div class="shadow p-1 text-gray-600 rounded inline-block"><svg xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" aria-hidden="true" class="h-4 w-4"><path stroke-linecap="round" stroke-linejoin="round" d="M12 11c0 3.517-1.009 6.799-2.753 9.571m-3.44-2.04l.054-.09A13.916 13.916 0 008 11a4 4 0 118 0c0 1.017-.07 2.019-.203 3m-2.118 6.844A21.88 21.88 0 0015.171 17m3.839 1.132c.645-2.266.99-4.659.99-7.132A8 8 0 008 4.07M3 15.364c.64-1.319 1-2.8 1-4.364 0-1.457.39-2.823 1.07-4"></path></svg></div><h3 class="mt-2 mb-1 text-base text-royal-light font-medium">Privacy Policy</h3><div class="text-gray-500">How we handle collect, use, and disclose data from the Navattic website and services</div></div><svg xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" aria-hidden="true" class="hidden group-hover:block h-5 w-5 text-gray-300"><path stroke-linecap="round" stroke-linejoin="round" d="M9 5l7 7-7 7"></path></svg></div></a><a href="/legal/security-overview"><div class="py-7 px-10 group border border-dotted border-slate-300 rounded-xl shadow-sm bg-white flex justify-between items-center"><div class="max-w-sm"><div class="shadow p-1 text-gray-600 rounded inline-block"><svg xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" aria-hidden="true" class="h-4 w-4"><path stroke-linecap="round" stroke-linejoin="round" d="M9 12l2 2 4-4m5.618-4.016A11.955 11.955 0 0112 2.944a11.955 11.955 0 01-8.618 3.04A12.02 12.02 0 003 9c0 5.591 3.824 10.29 9 11.622 5.176-1.332 9-6.03 9-11.622 0-1.042-.133-2.052-.382-3.016z"></path></svg></div><h3 class="mt-2 mb-1 text-base text-royal-light font-medium">Security Overview</h3><div class="text-gray-500">A cursory overview of the infrastructure and operational security practices of Navattic </div></div><svg xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" aria-hidden="true" class="hidden group-hover:block h-5 w-5 text-gray-300"><path stroke-linecap="round" stroke-linejoin="round" d="M9 5l7 7-7 7"></path></svg></div></a><a href="/legal/data-processing-agreement"><div class="py-7 px-10 group border border-dotted border-slate-300 rounded-xl shadow-sm bg-white flex justify-between items-center"><div class="max-w-sm"><div class="shadow p-1 text-gray-600 rounded inline-block"><svg xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" aria-hidden="true" class="h-4 w-4"><path stroke-linecap="round" stroke-linejoin="round" d="M9 12l2 2 4-4m5.618-4.016A11.955 11.955 0 0112 2.944a11.955 11.955 0 01-8.618 3.04A12.02 12.02 0 003 9c0 5.591 3.824 10.29 9 11.622 5.176-1.332 9-6.03 9-11.622 0-1.042-.133-2.052-.382-3.016z"></path></svg></div><h3 class="mt-2 mb-1 text-base text-royal-light font-medium">Data Processing Agreement</h3><div class="text-gray-500">An overview of Navattic&#x27;s data processing policies and procedures</div></div><svg xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" aria-hidden="true" class="hidden group-hover:block h-5 w-5 text-gray-300"><path stroke-linecap="round" stroke-linejoin="round" d="M9 5l7 7-7 7"></path></svg></div></a><a href="/legal/subprocessors"><div class="py-7 px-10 group border border-dotted border-slate-300 rounded-xl shadow-sm bg-white flex justify-between items-center"><div class="max-w-sm"><div class="shadow p-1 text-gray-600 rounded inline-block"><svg xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" aria-hidden="true" class="h-4 w-4"><path stroke-linecap="round" stroke-linejoin="round" d="M3 10h18M3 14h18m-9-4v8m-7 0h14a2 2 0 002-2V8a2 2 0 00-2-2H5a2 2 0 00-2 2v8a2 2 0 002 2z"></path></svg></div><h3 class="mt-2 mb-1 text-base text-royal-light font-medium">List of Subprocessesors</h3><div class="text-gray-500">Information on the location, role, and identity of our subprocessesors</div></div><svg xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" aria-hidden="true" class="hidden group-hover:block h-5 w-5 text-gray-300"><path stroke-linecap="round" stroke-linejoin="round" d="M9 5l7 7-7 7"></path></svg></div></a></div></div></div><div class="container mb-20"><div class="relative overflow-hidden bg-slate-900 border-t border-slate-500 px-5 md:px-20 md:rounded-2xl"><div class="text-white py-16 relative z-10"><section class="flex justify-between items-center flex-col md:flex-row gap-y-10"><div class="flex-1 mr-10 md:mr-0"><div class="mb-3 font-medium text-white">Get started</div><h2 class="mb-6 text-xl font-medium md:max-w-[500px] md:text-3xl">Build demos that delight.</h2><p class="mt-5 md:text-lg text-slate-400 max-w-[400px] md:max-w-[480px]">Unlock faster sales cycles and empower your go-to-market team to drive growth with your product.</p></div><div class="w-full md:w-32 flex flex-col gap-y-5"><a class="flex py-3 w-full items-center justify-center whitespace-nowrap rounded-lg bg-[#455cad] px-6 font-medium text-white ring-2 ring-[#98A4F7]/20 ring-offset-2 ring-offset-[#0B0C14] sm:w-auto" href="/get-demo">Get a demo</a> <a class="bg-white/10 text-white flex items-center justify-center rounded-lg border border-white/30 px-5 py-3 font-medium shadow-sm hover:bg-white/20 focus:outline-none focus:ring-2 focus:border focus:border-slate-100 text-sm focus:ring-slate-200/30" href="/demo">Try a demo</a></div></section></div><div class="bg-radial-gradient-light opacity-50 h-[500px] top-[-90px] right-[-250px] transform-none"></div></div></div></main></div><nav class="bg-white text-sm border-t border-slate-100 text-[#363D4E]"><div class="mx-auto px-5 md:px-0 pt-8 lg:pt-14 pb-10 md:pb-20 md:flex container"><div class="lg:flex-none flex-2 flex flex-wrap gap-20 md:gap-36"><div class="flex-1 lg:flex-none mb-16"><div class="font-medium text-black ">Product</div><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/product-demos">Product demos</a><br/><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/engage">Engage</a><br/><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/integrations">Integrations</a><br/></div><div class="flex-1 lg:flex-none mb-16"><div class="font-medium text-black ">Customers</div><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/customers">Highlights</a><br/><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/showcase">Showcase</a><br/></div><div class="flex-1 lg:flex-none mb-16"><div class="font-medium text-black ">Company</div><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/careers">Careers</a><br/><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/contact">Contact</a><br/><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/security">Security</a><br/></div><div class="flex-1 lg:flex-none mb-16"><div class="font-medium text-black ">Resources</div><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/blog">Blog</a><br/><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/offer/newsletter">Buyer First Bites Newsletter</a><br/><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/product-announcements">Product announcements</a><br/><a href="https://listen.casted.us/public/174/Revenue-on-the-Rocks-e2c6af77" target="_blank" class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap">Podcast</a><br/><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/demo-consultants">Demo consultants</a><br/><a class="inline-block -mx-1 px-1 mt-3 whitespace-nowrap" href="/report/state-of-the-interactive-product-demo-2024">State of the Interactive Demo</a><br/></div></div></div></nav><footer class="bg-slate-50 w-full flex justify-between border-neutral-300/10 border-t"><div class="container px-5 md:px-0 my-5 py-3 flex flex-col gap-y-2 lg:flex-row justify-between w-full marker:items-center text-[12px] leading-[18px]"><div class="flex flex-wrap justify-between items-center gap-10 whitespace-nowrap"><a class="-mx-1 px-1" href="https://trust.navattic.com">Trust Center</a><a class="-mx-1 px-1" href="/legal/terms">Terms of Use</a><a class="-mx-1 px-1" href="/legal/privacy">Privacy Policy</a><a class="-mx-1 px-1" href="/legal/data-processing-agreement">DPA</a></div><div class="flex items-center text-neutral-300">© 2024 Navattic, Inc.</div></div></footer></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"legalDocs":[{"updatedDate":"2022-09-14T16:16:00.000Z","_id":"17723610-1421-4301-a794-2389620ca299","title":"Responsible Disclosure Program","description":"Our program to facilitate the responsible disclosure of possible security vulnerabilities","slug":"responsible-disclosure","content":[{"_key":"0d4fdbf3df73","markDefs":[],"children":[{"text":"Data security is a top priority for Navattic, and Navattic believes that working with skilled security researchers can identify weaknesses in any technology. If you believe you’ve found a security vulnerability in Navattic’s service, please notify us; we will work with you to resolve the issue promptly.","_key":"fbe76979fdf5","_type":"span","marks":[]}],"_type":"block","style":"normal"},{"markDefs":[],"children":[{"_key":"f87756af0567","_type":"span","marks":[],"text":""}],"_type":"block","style":"normal","_key":"d0ba62bdb295"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Disclosure Policy","_key":"fa7bb7938079"}],"_type":"block","style":"h5","_key":"0d1cefc162e9"},{"children":[{"_type":"span","marks":[],"text":"If you believe you’ve discovered a potential vulnerability, please let us know by emailing us at ","_key":"7a3c38912b4a0"},{"_type":"span","marks":["f389d717d0a2"],"text":"security@navattic.com","_key":"7a3c38912b4a1"},{"marks":[],"text":".","_key":"7a3c38912b4a2","_type":"span"}],"level":1,"_type":"block","style":"normal","_key":"5d3c9f98488a","listItem":"bullet","markDefs":[{"href":"mailto:security@navattic.com","_key":"f389d717d0a2","_type":"link"}]},{"children":[{"text":"Provide us with a reasonable amount of time to resolve the issue before disclosing it to the public or a third party.","_key":"96008975a4e50","_type":"span","marks":[]}],"level":1,"_type":"block","style":"normal","_key":"e72b94334c60","listItem":"bullet","markDefs":[]},{"style":"normal","_key":"a241a5814f55","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Make a good faith effort to avoid violating privacy, destroying data, or interrupting or degrading the Navattic service. Please only interact with accounts you own or for which you have explicit permission from the account holder.","_key":"2fbec20d366f0"}],"level":1,"_type":"block"},{"_key":"213a1fff1c48","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Exclusions","_key":"efe98e16d5a50"}],"_type":"block","style":"h5"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"While researching, we’d like you to refrain from:","_key":"3505510f00190"}],"_type":"block","style":"normal","_key":"214a77620193"},{"_key":"e6a87dcb6d8b","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Distributed Denial of Service (DDoS)","_key":"ec8df43585000"}],"level":1,"_type":"block","style":"normal"},{"listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Spamming","_key":"00178b4fa48c0"}],"level":1,"_type":"block","style":"normal","_key":"7adc68d91286"},{"style":"normal","_key":"06efba608a15","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Social engineering or phishing of Navattic employees or contractors","_key":"e88346071b9a0"}],"level":1,"_type":"block"},{"level":1,"_type":"block","style":"normal","_key":"29d195d60a9c","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Any attacks against Navattic’s physical property or data centers","_key":"bf4cb686b9f90"}]},{"_type":"block","style":"normal","_key":"85a5bcf01971","markDefs":[],"children":[{"text":"Thank you for helping to keep Navattic and our users safe.","_key":"934c8ac42ff50","_type":"span","marks":[]}]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Contact","_key":"a860e6ef19470"}],"_type":"block","style":"h5","_key":"2ffd86429c3b"},{"children":[{"_key":"b562b02c67670","_type":"span","marks":[],"text":"Navattic is always open to feedback, questions, and suggestions. If you would like to talk to us, please feel free to email us at "},{"_type":"span","marks":["604a20a7111e"],"text":"security@navattic.com","_key":"b562b02c67671"},{"_type":"span","marks":[],"text":".","_key":"b562b02c67672"}],"_type":"block","style":"normal","_key":"7ec6a54d4643","markDefs":[{"_type":"link","href":"mailto:security@navattic.com","_key":"604a20a7111e"}]}],"publishedDate":"2021-05-11T12:53:00.000Z"},{"slug":"privacy","content":[{"markDefs":[],"children":[{"_type":"span","marks":["strong"],"text":"Navattic Privacy Policy","_key":"cb312dab8e83"}],"_type":"block","style":"normal","_key":"341c944c3166"},{"style":"normal","_key":"9b2e65ac2d66","markDefs":[],"children":[{"_key":"797435e8337b0","_type":"span","marks":[],"text":"Navattic, Inc. (“Navattic,” “we,” “us,” “our”) care about how your personal information is used and shared, and we take your privacy seriously. Please read the following to learn more about our Privacy Policy. By visiting or using the various websites owned and operated by Navattic under the navattic.com domain, including, without limitation, the https://navattic.com/ website (each, a “Website, and collectively, the “Websites”), accessing, or viewing demos hosted by Navattic and/or accessing or using any other functionalities, features, applications or services offered from time to time by Navattic in connection with the Websites (collectively, the “Services”) in any manner, you acknowledge that you accept the practices and policies outlined in this Privacy Policy, and you hereby consent to our collection, use, and sharing of your information in the following ways.\n"}],"_type":"block"},{"_key":"3f05e8b52d9e","markDefs":[],"children":[{"_type":"span","marks":[],"text":"I. What Does This Privacy Policy Cover?","_key":"e70f58dc11ab0"}],"_type":"block","style":"normal"},{"_type":"block","style":"normal","_key":"b4718927c174","markDefs":[],"children":[{"_type":"span","marks":[],"text":"This Privacy Policy covers our treatment of (1) personally identifiable information, as defined by numerous statutes in the United States (such statutes, the “PII Laws”), (2) information protected by the California Consumer Privacy Act (the “CCPA”) and the California Online Privacy Protection Act (“CalOPPA”), (3) personal information and private information, as defined by the New York Stop Hacks and Improve Electronic Data Security Act (the “SHIELD Act”); (4) personal data, as defined by the European Union General Data Protection Regulation (the “GDPR”), and (5) personal information, as defined by Canada’s Personal Information Protection and Electronics Documents Act (“PIPEDA,” and collectively with the PII Laws, CCPA, CalOPPA, the SHIELD Act, and GDPR, the “Privacy Laws”) (collectively, “Personal Information”), which we gather when you are accessing, viewing or using any of our Websites, Media and/or Services. This policy does not apply to the practices of companies that we do not own or control, or to individuals that we do not employ or manage. ","_key":"93a0355623210"}]},{"children":[{"_type":"span","marks":[],"text":"II. What Information Does Navattic Collect?","_key":"36845850f4540"}],"_type":"block","style":"normal","_key":"f0ee5bce7ad8","markDefs":[]},{"_key":"f458574ef2d6","markDefs":[],"children":[{"_key":"d2f21828afab0","_type":"span","marks":[],"text":"Navattic does not collect Personal Information indiscriminately. We limit the type of Personal Information and the amount of Personal Information to what is necessary to fulfill the purposes identified in this Privacy Policy. With that in mind, we collect the following types of information:\n"}],"_type":"block","style":"normal"},{"style":"normal","_key":"fd2e8303f131","markDefs":[],"children":[{"marks":[],"text":"A. Information You Provide to Us:","_key":"e1d114e690820","_type":"span"}],"_type":"block"},{"style":"normal","_key":"c1b29ba89041","markDefs":[],"children":[{"_type":"span","marks":[],"text":"We may collect Personal Information from you when you visit any of our Websites, register for or subscribe to our Services, contact us with questions or concerns, and/or otherwise interact with our Websites or Services. For example, when you register for our Services, we may collect your name and e-mail address so you can access the Services. You can choose not to provide us with certain information, although that may affect the functionality of the Services.\n","_key":"91a805ddb6c60"}],"_type":"block"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"B. Information Collected Automatically:","_key":"fb24f8f648680"}],"_type":"block","style":"normal","_key":"c42aa585cccb"},{"markDefs":[],"children":[{"text":"Whenever you interact with any of our Websites, we automatically receive and record information on our server logs from your browser including data related to demo usage and “cookie” information. “Cookies” are identifiers we transfer to your computer or mobile device that allow us to recognize your browser or mobile device and tell us how and when pages in our Website are visited and used and by how many people. You may be able to change the preferences on your browser or mobile device to send “do not track” signals or to prevent or limit your computer or device’s acceptance of cookies, but this may prevent you from taking advantage of some of our Website’s features. If you click on a link to a third party website, such third party may also transmit cookies to you. This Privacy Policy does not cover the use of cookies by any third parties.\n","_key":"9b4107c224730","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"b52acd316d7a"},{"children":[{"_type":"span","marks":[],"text":"C. E-mail and Other Communications:","_key":"8786df5f07350"}],"_type":"block","style":"normal","_key":"054aa53d6f90","markDefs":[]},{"_type":"block","style":"normal","_key":"7bdb37cde775","markDefs":[],"children":[{"_type":"span","marks":[],"text":"We may contact you, by email or other means; for example, we may send you promotional offers on behalf of other businesses, or communicate with you about your use of any of the Websites. When we do this, we may receive a confirmation when you open an email from us. This confirmation helps us make emails more interesting and improve our service.\n","_key":"54ba1e5ad85c0"}]},{"style":"normal","_key":"9d22597759f3","markDefs":[],"children":[{"_type":"span","marks":[],"text":"D. Personal Information Navattic Has Collected in the Last 12 Months:","_key":"89fb11123be00"}],"_type":"block"},{"markDefs":[],"children":[{"marks":[],"text":"Navattic has collected the following categories of Personal Information in the 12 months immediately preceding the Effective Date of this Privacy Policy, listed at the bottom of this document: names; contact information; payment card information; browser information; device information; information related to the use of the Websites and Services; email confirmations; e-mail addresses to permit access to the Services; the content of communications and user profile information and submissions. Please see the other portions of Section II above for an explanation of the categories of sources from which we collect the information described in the previous sentence. The business purposes of this information are described in Section III below. The categories of third parties we share this information with are described in Section IV.\n","_key":"b12b017c4acd0","_type":"span"}],"_type":"block","style":"normal","_key":"f5f65bac3f9d"},{"_key":"62252ce3a1ea","markDefs":[],"children":[{"_type":"span","marks":[],"text":"III. What Does Navattic Do With Personal Information?","_key":"537ee91e84d90"}],"_type":"block","style":"normal"},{"_type":"block","style":"normal","_key":"cfeffdedbea5","markDefs":[],"children":[{"_type":"span","marks":[],"text":"We may use Personal Information (including: names; contact information; browser information; device information; information related to the use of the Websites and Services; email confirmations; the content of communications and user profile information) to personalize and improve our Services, to administer and improve our Websites, to allow our users to set up a user account and profile, to contact users, to fulfill your requests for certain products and services, to analyze how users utilize the Websites, and as otherwise set forth in this Privacy Policy. We require that users verify their e-mail address to protect user accounts. We may use payment card information to process payments to Navattic. In addition, we may also provide Customers with the information listed above so that they may (i) assess, improve, and develop interactive demos built on Navattic (ii) use this information to maintain and grow their organizations.\n","_key":"91d61c75d1030"}]},{"_type":"block","style":"normal","_key":"ad4386120c9a","markDefs":[],"children":[{"_type":"span","marks":[],"text":"IV. Will Navattic Share Any of the Personal Information it Collects?","_key":"c97aaf06ed570"}]},{"_type":"block","style":"normal","_key":"2bf3e217e156","markDefs":[],"children":[{"_type":"span","marks":[],"text":"We share your Personal Information with third parties as described below.","_key":"c31d04ff3b4c0"}]},{"markDefs":[],"children":[{"_key":"f6d3fc346b790","_type":"span","marks":[],"text":""}],"_type":"block","style":"normal","_key":"2d125bae69a4"},{"style":"normal","_key":"bf884bd17e9d","markDefs":[],"children":[{"_type":"span","marks":[],"text":"A. Customers:","_key":"c640d4e42f790"}],"_type":"block"},{"style":"normal","_key":"c0f95281f499","markDefs":[],"children":[{"_type":"span","marks":[],"text":"As mentioned above, we may provide Customers with certain identifiable usage information directly related to demos built on Navattic. Such information may include information collected via Navattic forms, browser information, device information, and information related to the use of the Websites and Services.","_key":"ff66a7126c0b0"}],"_type":"block"},{"markDefs":[],"children":[{"marks":[],"text":"","_key":"fd53b6a89f140","_type":"span"}],"_type":"block","style":"normal","_key":"3d4aee098729"},{"style":"normal","_key":"afcf63105b8d","markDefs":[],"children":[{"marks":[],"text":"B. Business Transfers:","_key":"5e94f42edd3e0","_type":"span"}],"_type":"block"},{"children":[{"_type":"span","marks":[],"text":"We may choose to buy or sell assets. In these types of transactions, customer information is typically one of the business assets that is transferred. Also, if we (or substantially all of our assets) are acquired, or if we go out of business, enter bankruptcy, or go through some other change of control, Personal Information would be one of the assets transferred to or acquired by a third party.","_key":"031a038e0ddc0"}],"_type":"block","style":"normal","_key":"1a8fd256884d","markDefs":[]},{"style":"normal","_key":"b71357fb59d3","markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"d0532122ed320"}],"_type":"block"},{"_type":"block","style":"normal","_key":"924f93c62272","markDefs":[],"children":[{"_type":"span","marks":[],"text":"C. Protection of Navattic and Others:","_key":"63b2f2cf222e0"}]},{"_key":"72b035e8af2d","markDefs":[],"children":[{"text":"We reserve the right to access, read, preserve, and disclose any information that we reasonably believe is necessary to comply with law or court order; enforce or apply our conditions of use and other agreements; or protect the rights, property, or safety of Navattic, our employees, our users, or others. This includes exchanging information with other companies and organizations for fraud protection and credit risk reduction.\n","_key":"690653f5b8ba0","_type":"span","marks":[]}],"_type":"block","style":"normal"},{"children":[{"text":"D. With Your Consent:","_key":"85ff6daf6be10","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"116d00eb347e","markDefs":[]},{"markDefs":[],"children":[{"text":"Except as set forth above, you will be notified when your Personal Information may be shared with third parties, and will be able to prevent the sharing of this information.","_key":"49ccbad589100","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"277278fc7374"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"E. What Is Navattic’s Legal Basis for Collecting and Using Your Personal Information?","_key":"ab9ed7f74d700"}],"_type":"block","style":"normal","_key":"200612e4351b"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"As relevant, Navattic collects and uses your Personal Information (1) pursuant to your informed consent, which you have granted by confirming the prompts produced by the Websites and by continuing to use the Websites and Services, consistent with the Privacy Policy and Navattic’s terms of service, (2) in order to pursue Navattic’s legitimate business interests providing the Services, and maintaining the Websites, and/or (3) in order to perform a contract to which you are a party. Any one or more of the bases in the previous sentence are the legal basis for Navattic’s collection and use of your Personal Information, depending on how your use of the Websites and Services, and your relationship with Navattic. For further information about the specific legal basis or bases permitting Navattic to collect and use your Personal Information, please contact Navattic at privacy@navattic.com.\n","_key":"3240f2ed5a310"}],"_type":"block","style":"normal","_key":"96e329dda868"},{"_type":"block","style":"normal","_key":"369889b78695","markDefs":[],"children":[{"_key":"8c14d3e05d550","_type":"span","marks":[],"text":"F. How Long Does Navattic Retain Your Personal Information?"}]},{"_type":"block","style":"normal","_key":"f7bf578cdfff","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Except upon the request of an individual, as explained in Section VII below, and except as the law permits and requires, Navattic maintains Personal Information as follows: a. Logs of known users of the Websites are retained while Navattic has reason to believe that particular user may return to use the Websites. b. Emails submitted and used for marketing are retained while Navattic pursues relevant marketing efforts. Other than as listed above, we will determine the retention period for Personal Information based on the following criteria:\n","_key":"cc3e0e501e4c0"}]},{"level":1,"_type":"block","style":"normal","_key":"d384c1ccd50e","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"The nature of our relationship with the relevant Customer;","_key":"edbbf25a7eee0"}]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"The existence of other ongoing or expected projects with the relevant Customer;","_key":"a62e452886370"}],"level":1,"_type":"block","style":"normal","_key":"cd69b5c1d579","listItem":"bullet"},{"level":1,"_type":"block","style":"normal","_key":"6662ba3f17d1","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"The nature of the Personal Information in question; and","_key":"1a9f3665470c0"}]},{"style":"normal","_key":"a4b6df6864b6","listItem":"bullet","markDefs":[],"children":[{"marks":[],"text":"Our business needs.","_key":"1e23aef90e880","_type":"span"}],"level":1,"_type":"block"},{"_key":"31fd2cd19541","markDefs":[],"children":[{"marks":[],"text":"V. What Are Users’ Rights to Control Their Personal Information?","_key":"4518edbd1cc40","_type":"span"}],"_type":"block","style":"normal"},{"_key":"ab6072ff3688","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Except where permitted or required by law (including, but not limited to, compliance with a legal obligation, to further a public interest, and establishing and/or exercising a legal claim or defense), you have the following rights regarding Navattic’s collection and use of your Personal Information.\n","_key":"e745fe5b12a30"}],"_type":"block","style":"normal"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"A. Requests to Navattic:","_key":"a20db83fa9710"}],"_type":"block","style":"normal","_key":"3c4a61e62c25"},{"style":"normal","_key":"ddc60b1a60e8","markDefs":[],"children":[{"marks":[],"text":"You may request (1) the correction, updating, deletion, or restriction of collection and use of your Personal Information, (2) the categories of Personal Information Navattic has collected, (3) the categories of sources from which Navattic has collected your Personal Information, (4) the business purpose(s) for collecting and disclosing your Personal Information, (5) an account of how Navattic has used or is using your Personal Information, (6) a copy of your Personal Information retained by Navattic, to be delivered in a structured, commonly used and machine readable format to review or to transfer or transmit to another entity without hindrance, to the extent that that is technically feasible, (7) the categories of third parties with whom Navattic shares your Personal Information, (8) the categories of Personal Information which we share with third parties, and the contact information for such affiliates and/or third parties, (9) a list of all third parties that have received your Personal Information from Navattic, and (10) the specific pieces of Personal Information Navattic has collected about you.\n","_key":"151d14b7e81e0","_type":"span"}],"_type":"block"},{"_type":"block","style":"normal","_key":"62b2d8fde143","markDefs":[],"children":[{"text":"We will respond to all such requests within 30 days, subject to lawful extension of that period, and there may be a delay in processing a request while we verify that the request is valid and originates from you as opposed to an unauthorized third party. Our verification process varies based on the source and nature of the request, but may include: comparing data in the request against Personal Information we retain; contacting you using other contact information; and requesting further information, although we will avoid doing so to the extent possible. To the extent permitted by the Privacy Laws, Navattic retains the right to deny any request if we cannot verify that it originated from you. If you request that your Personal Information be deleted or that we restrict our disclosure of your Personal Information such that we cannot provide that information to third parties we rely on to provide Websites and Services, we reserve the right to terminate and/or limit your access to the Websites and Services. If we do not have your Personal Information, have not collected your Personal Information, or have not disclosed or transferred your Personal Information to another party, we will inform you in response to a request regarding your Personal Information.","_key":"efd854a88a490","_type":"span","marks":[]}]},{"children":[{"_type":"span","marks":[],"text":"","_key":"de0907fb799c0"}],"_type":"block","style":"normal","_key":"703e41a9c3ac","markDefs":[]},{"children":[{"_type":"span","marks":[],"text":"In order to make any of the requests above, please follow the following directions:","_key":"c006a4a046230"}],"_type":"block","style":"normal","_key":"6e41b38df29d","markDefs":[]},{"children":[{"_type":"span","marks":[],"text":"Requests for (a) the categories of Personal Information Navattic has collected, (b) the categories of sources from which Navattic has collected your Personal Information, (c) the business purpose(s) for collecting and disclosing your Personal Information, (d) the categories of third parties with whom Navattic shares your Personal Information, (e) the categories of Personal Information which we share with third parties, and the contact information for such affiliates and/or third parties, (f) the specific pieces of Personal Information Navattic has collected about you, and (g) a copy of your Personal Information retained by Navattic, to be delivered in a structured, commonly used and machine readable format to review or to transfer or transmit to another entity without hindrance, to the extent that that is technically feasible, may be sent to us at privacy@navattic.com.\n","_key":"6d76582a82740"}],"_type":"block","style":"normal","_key":"0fd636d4464e","markDefs":[]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"When you update information, we may maintain a copy of the unrevised information in our records. Please note that some information may remain in our private records after your deletion of such information from your account. We may use any aggregated data derived from or incorporating your Personal Information after you update or delete it, but not in a manner that would identify you personally.\n","_key":"a95942deedf20"}],"_type":"block","style":"normal","_key":"a6a178998e08"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"B. Authorized Agent:","_key":"051946975ff40"}],"_type":"block","style":"normal","_key":"cd6f2c8223c2"},{"markDefs":[],"children":[{"text":"You may authorize an agent to request information about your Personal Information, to request that Navattic delete your Personal Information, and to opt out of the sale of your Personal Information. In order to do so, you must provide written permission to the authorized agent and written notice to Navattic that Navattic may act on requests for information, deletion, and opting out of sales submitted to Navattic by the agent on your behalf.","_key":"8ea97f1f983e0","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"46d69c5ae48c"},{"style":"normal","_key":"8ba9bccaabe9","markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"14441b6f6b620"}],"_type":"block"},{"children":[{"_type":"span","marks":[],"text":"C. Withdrawal of Consent:","_key":"6ba6eb5f29d20"}],"_type":"block","style":"normal","_key":"cd59c33375dd","markDefs":[]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"You may withdraw your consent at any time by contacting us at privacy@navattic.com.","_key":"3ee5eed335bf0"}],"_type":"block","style":"normal","_key":"108f74098c5d"},{"children":[{"text":"","_key":"474b0cf7bcd30","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"d5e569064c40","markDefs":[]},{"_type":"block","style":"normal","_key":"fbb8b56fb1f3","markDefs":[],"children":[{"_type":"span","marks":[],"text":"D. Object or Challenge:","_key":"7134c5fcb8bb0"}]},{"_type":"block","style":"normal","_key":"41f0630a7e00","markDefs":[],"children":[{"_type":"span","marks":[],"text":"You may object, on grounds relating to your particular situation, at any time to the collection and use of your Personal Information based on Navattic’s legitimate interests or based on public interests, or otherwise challenge our compliance with the Privacy Laws, by contacting us at privacy@navattic.com.\n","_key":"5991381ed8200"}]},{"markDefs":[],"children":[{"_key":"ee14f169b4870","_type":"span","marks":[],"text":"Navattic shall respond within at least 30 days, subject to lawful extension of that period. Where such objection is received from an individual whose Personal Information Navattic collects and uses as the processor for a controller (as those terms are defined in the GDPR), Navattic shall inform the controller of the objection within at least 30 days, subject to lawful extension of that period."}],"_type":"block","style":"normal","_key":"539d7779c762"},{"_key":"0394cd85622e","markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"15a1502b75930"}],"_type":"block","style":"normal"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"E. Prohibit Automated Processing:","_key":"41ea680ef25f0"}],"_type":"block","style":"normal","_key":"b47edc8be437"},{"markDefs":[],"children":[{"text":"At your request, Navattic will terminate any automated decision making that is the sole source of decisions that produce a legal effect concerning you or similarly significantly affect you. Please note that consistent with Section XIII, Navattic does not employ any such decision making at this time.\n","_key":"c44a806454aa0","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"72ffe811f29b"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"F. Accessibility for Users with Disabilities:","_key":"da771d2c576c0"}],"_type":"block","style":"normal","_key":"6f3416cfe8e4"},{"_key":"1687e8b32093","markDefs":[],"children":[{"_type":"span","marks":[],"text":"If you are unable to review this Privacy Policy or any portion of this Policy, please contact us at privacy@navattic.com to receive the information in an alternative format.\n","_key":"bc77e982e6180"}],"_type":"block","style":"normal"},{"style":"normal","_key":"81777ef55b63","markDefs":[],"children":[{"marks":[],"text":"G. Non-Discrimination:","_key":"b5ee910829f90","_type":"span"}],"_type":"block"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Navattic will not discriminate against you because you have exercised any of the rights above or any other rights you retain pursuant to Privacy Laws, including, but not limited to by: denying goods or services to you or providing a different level or quality of goods or services to you.\n","_key":"15f7fcda4d0b0"}],"_type":"block","style":"normal","_key":"24f82fd121bd"},{"markDefs":[],"children":[{"text":"VI. Is Personal Information About Me Secure?","_key":"99c54d8d85c60","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"2166eb059e6a"},{"_key":"8106221a7699","markDefs":[],"children":[{"_type":"span","marks":[],"text":"We employ appropriate administrative, organizational, technical, and physical measures to protect your Personal Information, which we regularly review and update as necessary. Further information follows. Your account is protected by email verification for your privacy and security. You must prevent unauthorized access to your account and Personal Information by limiting access to your computer or device and browser by signing off after you have finished accessing your account. We endeavor to protect the privacy of your account and other Personal Information we hold in our records, but we cannot guarantee complete security. Unauthorized entry or use, hardware or software failure, and other factors, may compromise the security of user information at any time. The Websites may contain links to other sites. We are not responsible for the privacy policies and/or practices on other sites. When following a link to another site you should read that site’s privacy policy.\n","_key":"3448afe12bd20"}],"_type":"block","style":"normal"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"VII. Children’s Privacy","_key":"2c256b40733e0"}],"_type":"block","style":"normal","_key":"d033ac42a297"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Our Services do not address anyone under the age of 13. We do not knowingly collect personal identifiable information from children under 13. In the case we discover that a child under 13 has provided us with personal information, we immediately delete this from our servers. If you are a parent or guardian and you are aware that your child has provided us with personal information, please contact us at privacy@navattic.com so that we can take appropriate action.","_key":"090a8d5926a90"}],"_type":"block","style":"normal","_key":"e62b16334278"},{"_key":"8433441e3954","markDefs":[],"children":[{"text":"","_key":"7564346bc13c0","_type":"span","marks":[]}],"_type":"block","style":"normal"},{"_key":"13731eb8b29a","markDefs":[],"children":[{"_type":"span","marks":[],"text":"VIII. Contractual or Statutory Requirement","_key":"67be9685bed70"}],"_type":"block","style":"normal"},{"_key":"1837c577eca1","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Except as noted in this Privacy Policy or in contractual documents, Navattic’s collection and use of Personal Information is not a contractual or statutory requirement or a requirement necessary to enter into a contract.\n","_key":"b71396b9f6a60"}],"_type":"block","style":"normal"},{"_key":"82c52ac9dadb","markDefs":[],"children":[{"_type":"span","marks":[],"text":"IX. Failure to Provide Personal Information","_key":"e2d64b12efbc0"}],"_type":"block","style":"normal"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"You can always opt not to disclose information to us, but keep in mind some information may be needed to register with us or to take advantage of some of our special features.\n","_key":"d73a49927bd00"}],"_type":"block","style":"normal","_key":"9cfe83253fb6"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"X. Automated Decision Making","_key":"4b32eab37dc10"}],"_type":"block","style":"normal","_key":"3a95b837a191"},{"children":[{"_key":"279ddaec55140","_type":"span","marks":[],"text":"Navattic does not rely on automated decision making, including profiling, and will not subject you to decisions based solely on automated processing which will produce legal effects concerning you or similarly significantly affecting you."}],"_type":"block","style":"normal","_key":"f5789d7e99f9","markDefs":[]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"5ef6d4d2b6ff0"}],"_type":"block","style":"normal","_key":"1c201cbbb900"},{"children":[{"_key":"4eb210559be90","_type":"span","marks":[],"text":"XI. Changes to this Privacy Policy"}],"_type":"block","style":"normal","_key":"25cea1f1be97","markDefs":[]},{"style":"normal","_key":"cd8ee0178811","markDefs":[],"children":[{"text":"We may amend this Privacy Policy from time to time. Use of information we collect now is subject to the Privacy Policy in effect at the time such information is used. If we make changes in the way we use Personal Information, we will update the privacy policy found on the Websites. You are bound by any changes to the Privacy Policy when you use the Website after such changes have been first posted.","_key":"273eff0ff3dd0","_type":"span","marks":[]}],"_type":"block"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"b1d24d18cc10"}],"_type":"block","style":"normal","_key":"f8c206dd2fc4"},{"children":[{"text":"XII. Questions or Concerns; Contact Information","_key":"e0ad3df2ab050","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"6450b8a1e598","markDefs":[]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"If you have any questions or concerns regarding our privacy policies, please contact our privacy team at privacy@navattic.com\n\n\n\n","_key":"babef6a7e9460"}],"_type":"block","style":"normal","_key":"8bece984743a"}],"publishedDate":"2020-10-07T12:54:00.000Z","updatedDate":"2023-07-21T16:19:00.000Z","_id":"b58f369e-bbc5-4062-9c06-b9503b4ef657","title":"Privacy Policy","description":"How we handle collect, use, and disclose data from the Navattic website and services"},{"description":"A cursory overview of the infrastructure and operational security practices of Navattic ","slug":"security-overview","content":[{"_key":"ff5a422f6332","markDefs":[],"children":[{"text":"Introduction","_key":"09153e5ceb590","_type":"span","marks":[]}],"_type":"block","style":"h4"},{"style":"normal","_key":"a4835eb46c0f","markDefs":[],"children":[{"_type":"span","marks":[],"text":"At Navattic, security is paramount. Interactive demos built on Navattic are often integrated into essential parts of the go-to-market motion: embedded on high-traffic landing pages, shared in marketing campaigns or used by front-line sellers to deliver demos over Zoom. In line with this, we have always prided ourselves on having robust security safeguards and being extremely responsive to our customers’ special security requirements.","_key":"02ab7afaf4ad0"}],"_type":"block"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Navattic is SOC 2 Type II certified. Our examination was performed by the Johanson Group. For each of the security criteria mapped to Navattic’s controls over the course of the audit, no exceptions in the controls were noted. SOC 2 Type II is an important industry standard, verifying that Navattic current and future customers can be confident about their data security and integrity. Our report is available on request, under NDA.","_key":"47c39f8c98410"}],"_type":"block","style":"normal","_key":"22ecf0b21ab1"},{"_key":"8df1a5cdf2e9","markDefs":[],"children":[{"marks":[],"text":"Product Security","_key":"8b2a1f7fe4040","_type":"span"}],"_type":"block","style":"h4"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Authentication","_key":"347e7bfba54d0"}],"_type":"block","style":"h5","_key":"9f9cffe22753"},{"style":"normal","_key":"c61fc1a2eadc","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Navattic only allows authentication from Google Workspace (formerly GSuite) and verified corporate emails. Navattic does not store any passwords.","_key":"89708847bbce0"}],"_type":"block"},{"_key":"f72647f67005","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Permissions","_key":"096e7755dd0d0"}],"_type":"block","style":"h5"},{"_type":"block","style":"normal","_key":"528802329500","markDefs":[],"children":[{"text":"Navattic supports flexible permission levels for teammates. Permission levels can be set globally within the Navattic settings tab.","_key":"02f318ebb96b0","_type":"span","marks":[]}]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Servers \u0026 Networking","_key":"d996aa2388360"}],"_type":"block","style":"h5","_key":"e154cd80a886"},{"markDefs":[{"_type":"link","href":"https://planetscale.com/","_key":"ddf7ea530246"}],"children":[{"_type":"span","marks":[],"text":"All Navattic servers and structured datastores use managed infrastructure services provided and secured by ","_key":"a49c64bf1d640"},{"_type":"span","marks":["ddf7ea530246"],"text":"PlanetScale","_key":"a49c64bf1d641"},{"_type":"span","marks":[],"text":".","_key":"a49c64bf1d642"}],"_type":"block","style":"normal","_key":"7a84bb1fea7a"},{"_type":"block","style":"normal","_key":"3bc88c00225b","markDefs":[],"children":[{"marks":[],"text":"Our web servers encrypt data in transit using the industry standard for HTTPS security (TLS 1.2) so that requests are protected from eavesdroppers and man in-the-middle attacks. Our SSL certificates are 2048 bit RSA, signed with SHA256.","_key":"3162ead5e9d50","_type":"span"}]},{"markDefs":[],"children":[{"marks":[],"text":"Storage","_key":"a5318296ecc30","_type":"span"}],"_type":"block","style":"h5","_key":"df01e6802f23"},{"markDefs":[],"children":[{"marks":[],"text":"All persistent data is encrypted at rest using industry standard AES-256 algorithms.","_key":"55bd58996dbf0","_type":"span"}],"_type":"block","style":"normal","_key":"a4d7719198d1"},{"style":"h4","_key":"c36b1f172db0","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Operational Security","_key":"41c5134838c40"}],"_type":"block"},{"_key":"7381fef5e2df","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Policies","_key":"6cb1dee861940"}],"_type":"block","style":"h5"},{"style":"normal","_key":"e491637253b3","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Navattic has developed a comprehensive set of security policies covering a range of security-related topics. These policies are updated frequently and shared with all employees.","_key":"7fee40a2222e0"}],"_type":"block"},{"style":"h5","_key":"64579e35ac94","markDefs":[],"children":[{"_key":"798d8832ac580","_type":"span","marks":[],"text":"Employee Training"}],"_type":"block"},{"style":"normal","_key":"ea7f497f5f90","markDefs":[],"children":[{"_type":"span","marks":[],"text":"All Navattic employees are trained on security best practices and awareness during onboarding. We perform annual disaster recovery and data restoration tests.","_key":"01e5cfcda1a90"}],"_type":"block"},{"markDefs":[],"children":[{"marks":[],"text":"Employee Equipment","_key":"02dd8bc8737d0","_type":"span"}],"_type":"block","style":"h5","_key":"13eed138850d"},{"children":[{"_type":"span","marks":[],"text":"All employee computers have strong passwords, encrypted disks, and monitoring agents. No Windows computers or servers are used in development other than in isolated testing environments.","_key":"7c0bd2c84d510"}],"_type":"block","style":"normal","_key":"0438b438e9ce","markDefs":[]},{"children":[{"_type":"span","marks":[],"text":"Employee Access","_key":"e9344a05c47f0"}],"_type":"block","style":"h5","_key":"36628167f84a","markDefs":[]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"We use Google account infrastructure to verify employee account identity and require two-factor authentication for apps that access critical infrastructure or customer data.","_key":"e2b3341bd0410"}],"_type":"block","style":"normal","_key":"d489b4bd865e"},{"_type":"block","style":"normal","_key":"cdd66980ab2c","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Access to administrative interfaces additionally enforce administrator permissions where applicable, and all administrative access is logged and auditable both in the form of traditional web server logs and session recordings to make it easy to find and review any administrative activities with full fidelity.","_key":"215aee4cf7f20"}]},{"markDefs":[],"children":[{"marks":[],"text":"All employee contracts include a confidentiality agreement.","_key":"b658fe9b82c40","_type":"span"}],"_type":"block","style":"normal","_key":"e1ab4bf5822c"},{"children":[{"_key":"450c850c21e30","_type":"span","marks":[],"text":"Code Reviews and Production Deployment"}],"_type":"block","style":"h5","_key":"a654e3b09c62","markDefs":[]},{"style":"normal","_key":"9fa3018ff5e2","markDefs":[],"children":[{"marks":[],"text":"All changes to source code are subject to automated testing and any that affect security require pre-commit code review by a qualified engineering manager that includes security, performance, and potential-for-abuse analysis.","_key":"e06bdc2efd3d0","_type":"span"}],"_type":"block"},{"markDefs":[],"children":[{"marks":[],"text":"All code is deployed to a staging environment for quality assurance and automated tests must pass prior to updating production services.","_key":"17c43731860f0","_type":"span"}],"_type":"block","style":"normal","_key":"1e5b5331675e"},{"children":[{"_type":"span","marks":[],"text":"Backups and Recovery","_key":"c8e8f97b02780"}],"_type":"block","style":"h5","_key":"6aee0236d36f","markDefs":[]},{"style":"normal","_key":"8ae2578fd17c","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Navattic uses highly redundant datastores, rapid recovery infrastructure, and point-in-time backups making unintentional loss of customer data very unlikely.","_key":"9d0f89dec4550"}],"_type":"block"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Pentests","_key":"a014010b26130"}],"_type":"block","style":"h5","_key":"d18cd2b7785c"},{"_type":"block","style":"normal","_key":"3e774829dc44","markDefs":[],"children":[{"_type":"span","marks":[],"text":"We engage third-party security experts to perform detailed penetration tests on the Navattic app and infrastructure.","_key":"4e2bf96bf3670"}]},{"style":"h5","_key":"4a9f2a891864","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Customer Payment Information","_key":"4d9b4e9b44f50"}],"_type":"block"},{"markDefs":[],"children":[{"_key":"969a4248168a0","_type":"span","marks":[],"text":"We use Stripe for payment processing and do not store any credit card information. Stripe is a trusted, Level 1 PCI Service Provider."}],"_type":"block","style":"normal","_key":"1b9cdfd7b5b4"},{"_key":"b363b203403d","markDefs":[],"children":[{"text":"Incident Reporting","_key":"0776f277160f0","_type":"span","marks":[]}],"_type":"block","style":"h4"},{"children":[{"_type":"span","marks":[],"text":"Incident Response","_key":"d2625994a4710"}],"_type":"block","style":"h5","_key":"c5490552659b","markDefs":[]},{"style":"normal","_key":"fa0378c2d421","markDefs":[],"children":[{"marks":[],"text":"Navattic implements a protocol for handling security events which includes escalation procedures, rapid mitigation, and post mortem. All employees are informed of our policies.","_key":"7a9105ecf5130","_type":"span"}],"_type":"block"},{"children":[{"_type":"span","marks":[],"text":"Responsible Disclosure","_key":"0a38816574640"}],"_type":"block","style":"h5","_key":"5f398d6f3a78","markDefs":[]},{"style":"normal","_key":"d330c148f46f","markDefs":[{"_type":"link","href":"https://www.navattic.com/legal/responsible-disclosure","_key":"0630a1f54de7"}],"children":[{"_type":"span","marks":[],"text":"Navattic has a ","_key":"bf40b17313c10"},{"_type":"span","marks":["0630a1f54de7"],"text":"Responsible Vulnerability Disclosure","_key":"bf40b17313c11"},{"_type":"span","marks":[],"text":" program. Please see the program detail page to learn more about the program, rules of engagement, and processes to submit vulnerability reports.","_key":"bf40b17313c12"}],"_type":"block"},{"_key":"6a8878428d36","markDefs":[{"_type":"link","href":"mailto:security@navattic.com","_key":"0f92cf902514"}],"children":[{"_type":"span","marks":[],"text":"If you have a security concern, question, or are aware of an incident, please send an email to ","_key":"33f1a6680f7e0"},{"_type":"span","marks":["0f92cf902514"],"text":"security@navattic.com","_key":"33f1a6680f7e1"},{"_type":"span","marks":[],"text":".","_key":"33f1a6680f7e2"}],"_type":"block","style":"normal"},{"_type":"block","style":"normal","_key":"43e8986c67d8","markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"4f166c77a2af0"}]}],"publishedDate":"2021-05-11T12:51:00.000Z","updatedDate":"2022-07-12T16:16:00.000Z","_id":"b97bbb32-c164-4f63-a88c-587c2895d59f","title":"Security Overview"},{"title":"Data Processing Agreement","description":"An overview of Navattic's data processing policies and procedures","slug":"data-processing-agreement","content":[{"_type":"block","style":"normal","_key":"0dcc4eeb1037","markDefs":[],"children":[{"_type":"span","marks":["strong"],"text":"EU and UK Data Processing Addendum\n","_key":"81b1527a8313"},{"_key":"7497cfb01b8f0","_type":"span","marks":[],"text":"\nThis EU and UK Data Processing Addendum (“Addendum”) supplements the Navattic Customer Agreement (the “Agreement”) entered into by and between the customer signing this Addendum (“Customer”) and Navattic, Inc (“Company”). By executing the Addendum in accordance with Section 11 herein, Customer enters into this Addendum on behalf of itself and, to the extent required under applicable Data Protection Laws (defined below), in the name and on behalf of its Affiliates (defined below), if any. This Addendum incorporates the terms of the Agreement, and any terms not defined in this Addendum shall have the meaning set forth in the Agreement.\n\n"},{"text":"1. Definitions\n","_key":"f79d7e30f79f","_type":"span","marks":["strong"]},{"_type":"span","marks":[],"text":"\n1.1 “Affiliate” means (i) an entity of which a party directly or indirectly owns fifty percent (50%) or more of the stock or other equity interest, (ii) an entity that owns at least fifty percent (50%) or more of the stock or other equity interest of a party, or (iii) an entity which is under common control with a party by having at least fifty percent (50%) or more of the stock or other equity interest of such entity and a party owned by the same person, but such entity shall only be deemed to be an Affiliate so long as such ownership exists.\n\n1.1 “Authorized Sub-Processor” means a third-party who has a need to know or otherwise access Customer’s Personal Data to enable Company to perform its obligations under this Addendum or the Agreement, and who is either (1) listed in Exhibit B or (2) subsequently authorized under Section 4.2 of this Addendum.\n\n1.2“ Customer Account Data” means personal data that relates to Customer’s relationship with Company, including the names or contact information of individuals authorized by Customer to access Customer’s account and billing information of individuals that Customer has associated with its account. Customer Account Data also includes any data Company may need to collect for the purpose of managing its relationship with Customer, identity verification, or as otherwise required by applicable laws and regulations.\n\n1.3 “Customer Usage Data” means Service usage data collected and processed by Company in connection with the provision of the Services, including without limitation data used to identify the source and destination of a communication, activity logs, and data used to optimize and maintain performance of the Services, and to investigate and prevent system abuse.\n\n1.4“ Data Exporter” means Customer.\n\n1.5“ Data Importer” means Company.\n\n1.6 “Data Protection Laws” means any applicable laws and regulations in any relevant jurisdiction relating to the use or processing of Personal Data including: (i) the California Consumer Privacy Act (“CCPA”), (ii) the General Data Protection Regulation (Regulation (EU) 2016/679) (“EU GDPR” or “GDPR”), (iii) the Swiss Federal Act on Data Protection, (iv) the EU GDPR as it forms part of the law of England and Wales by virtue of section 3 of the European Union (Withdrawal) Act 2018 (the “UK GDPR”); (v) the UK Data Protection Act 2018; and (vi) the Privacy and Electronic Communications (EC Directive) Regulations 2003; in each case, as updated, amended or replaced from time to time. The terms “Data Subject”, “Personal Data”, “Personal Data Breach”, “processing”, “processor,” “controller,” and “supervisory authority” shall have the meanings set forth in the GDPR.\n\n1.7 “EU SCCs” means the standard contractual clauses approved by the European Commission in Commission Decision 2021/914 dated 4 June 2021, for transfers of personal data to countries not otherwise recognized as offering an adequate level of protection for personal data by the European Commission (as amended and updated from time to time).\n\n1.8 “ex-EEA Transfer” means the transfer of Personal Data, which is processed in accordance with the GDPR, from the Data Exporter to the Data Importer (or its premises) outside the European Economic\nArea (the “EEA”), and such transfer is not governed by an adequacy decision made by the European Commission in accordance with the relevant provisions of the GDPR.\n\n1.9 “ex-UK Transfer” means the transfer of Personal Data, which is processed in accordance with the UK GDPR and the Data Protection Act 2018, from the Data Exporter to the Data Importer (or its premises) outside the United Kingdom (the “UK”), and such transfer is not governed by an adequacy decision made by the Secretary of State in accordance with the relevant provisions of the UK GDPR and the Data Protection Act 2018.\n\n1.10 “Services” shall have the meaning set forth in the Agreement.\n\n1.11 “Standard Contractual Clauses” means the EU SCCs and the UK SCCs.\n\n1.12 “UK SCCs” means the standard contractual clauses approved by the European Commission for transfers of personal data to countries not otherwise recognized as offering an adequate level of protection for personal data by the European Commission, being either (i) controller-to-processor clauses as approved by the European Commission in Commission Decision 2010/87/EU, dated 5 February 2010 (as amended and updated from time to time) (“UK Controller-to-Processor SCCs”); or (ii) controller-to-controller clauses as approved by the European Commission in Commission Decision 2004/915/EC, dated 27 December 2004 (as amended and updated from time to time) (“UK Controller-to-Controller SCCs”).\n\n","_key":"36ff6eb312e5"},{"_type":"span","marks":["strong"],"text":"2. Relationship of the Parties; Processing of Data","_key":"4df4d9192b60"},{"text":"\n\n2.1 The parties acknowledge and agree that with regard to the processing of Personal Data, Customer may act either as a controller or processor and, except as expressly set forth in this Addendum or the Agreement, Company is a processor. Customer shall, in its use of the Services, at all times process Personal Data, and provide instructions for the processing of Personal Data, in compliance with Data Protection Laws. Customer shall ensure that the processing of Personal Data in accordance with Customer’s instructions will not cause Company to be in breach of the Data Protection Laws. Customer is solely responsible for the accuracy, quality, and legality of (i) the Personal Data provided to Company by or on behalf of Customer, (ii) the means by which Customer acquired any such Personal Data, and (iii) the instructions it provides to Company regarding the processing of such Personal Data. Customer shall not provide or make available to Company any Personal Data in violation of the Agreement or otherwise inappropriate for the nature of the Services, and shall indemnify Company from all claims and losses in connection therewith.\n\n2.2 Company shall not process Personal Data (i) for purposes other than those set forth in the Agreement and/or Exhibit A, (ii) in a manner inconsistent with the terms and conditions set forth in this Addendum or any other documented instructions provided by Customer, including with regard to transfers of personal data to a third country or an international organization, unless required to do so by Supervisory Authority to which the Company is subject; in such a case, the Company shall inform the Customer of that legal requirement before processing, unless that law prohibits such information on important grounds of public interest, or (iii) in violation of Data Protection Laws. Customer hereby instructs Company to process Personal Data in accordance with the foregoing and as part of any processing initiated by Customer in its use of the Services.\n\n2.3 The subject matter, nature, purpose, and duration of this processing, as well as the types of Personal Data collected and categories of Data Subjects, are described in Exhibit A to this Addendum.\n\n2.4 Following completion of the Services, at Customer’s choice, Company shall return or delete Customer’s Personal Data, unless further storage of such Personal Data is required or authorized by applicable law. If return or destruction is impracticable or prohibited by law, rule or regulation, Company shall take measures to block such Personal Data from any further processing (except to the extent necessary for its continued hosting or processing required by law, rule or regulation) and shall continue to appropriately protect the Personal Data remaining in its possession, custody, or control. If Customer and Company have entered into Standard Contractual Clauses as described in Section 6 (Transfers of Personal Data), the parties agree that the certification of deletion of Personal Data that is described in Clause 12(1) of the UK SCCs and Clause 8.1(d) and Clause 8.5 of the EU SCCs (as applicable) shall be provided by Company to Customer only upon Customer’s request.","_key":"40be76da264c","_type":"span","marks":[]}]},{"_key":"c982aa10ca5f","markDefs":[],"children":[{"_type":"span","marks":[],"text":"\n2.5 CCPA. Except with respect to Customer Account Data and Customer Usage Data, the parties acknowledge and agree that Company is a service provider for the purposes of the CCPA (to the extent it applies) and is receiving personal information from Customer in order to provide the Services pursuant to the Agreement, which constitutes a business purpose. Company shall not sell any such personal information. Company shall not retain, use or disclose any personal information provided by Customer pursuant to the Agreement except as necessary for the specific purpose of performing the Services for Customer pursuant to the Agreement, or otherwise as set forth in the Agreement or as permitted by the CCPA. The terms “personal information,” “service provider,” “sale,” and “sell” are as defined in Section 1798.140 of the CCPA. Company certifies that it understands the restrictions of this Section 2.5.","_key":"7aafe3a34e11"}],"_type":"block","style":"normal"},{"style":"normal","_key":"62b0541f2ba0","markDefs":[],"children":[{"text":"\n3. Confidentiality","_key":"951dbc84a7ed","_type":"span","marks":["strong"]}],"_type":"block"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"\n3.1 Company shall ensure that any person it authorizes to process Personal Data has agreed to protect Personal Data in accordance with Company’s confidentiality obligations in the Agreement. Customer agrees that Company may disclose Personal Data to its advisers, auditors or other third parties as reasonably required in connection with the performance of its obligations under this Addendum, the Agreement, or the provision of Services to Customer.","_key":"83b2bdd29737"}],"_type":"block","style":"normal","_key":"b3927990b9fe"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"\n","_key":"7168f6616a3b"},{"_type":"span","marks":["strong"],"text":"4. Authorized Sub-Processors","_key":"9c5a3b1d4463"},{"_type":"span","marks":[],"text":"\n\n4.1 Customer acknowledges and agrees that Company may (1) engage its affiliates and the Authorized Sub-Processors on the List (defined below) to access and process Personal Data in connection with the Services and (2) from time to time engage additional third parties for the purpose of providing the Services, including without limitation the processing of Personal Data. By way of this Addendum, Customer provides general written authorization to Company to engage sub-processors as necessary to perform the Services.\n\n4.2 A list of Company’s current Authorized Sub-Processors (the “List”) will be made available to Customer upon request. Such List may be updated by Company from time to time. Company will provide a mechanism to subscribe to notifications (which may include but are not limited to email) of new Authorized Sub-Processors and Customer, if it wishes, will subscribe to such notifications where available. If Customer does not subscribe to such notifications, Customer will have waived any right it may have to prior notice of changes to Authorized Sub-Processors. At least ten (10) days before enabling any third party other than existing Authorized Sub-Processors to access or participate in the processing of Personal Data, Company will add such third party to the List and notify subscribers, including Customer, via the aforementioned notifications. Customer may object to such an engagement by informing Company in writing within ten (10) days of receipt of the aforementioned notice by Customer, provided such objection is in writing and based on reasonable grounds relating to data protection. Customer acknowledges that certain sub-processors are essential to providing the Services and that objecting to the use of a sub-processor may prevent Company from offering the Services to Customer.","_key":"35e9a0db25f9"}],"_type":"block","style":"normal","_key":"d8359cef4565"},{"markDefs":[],"children":[{"text":"\n4.3 If Customer reasonably objects to an engagement in accordance with Section 4.2, and Company cannot provide a commercially reasonable alternative within a reasonable period of time, Customer may discontinue the use of the affected Service by providing written notice to Company. Discontinuation shall not relieve Customer of any fees owed to Company under the Agreement.","_key":"69857ab61c85","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"1a37a1506758"},{"children":[{"_key":"6e0c0a73afd5","_type":"span","marks":[],"text":"\n4.4 If Customer does not object to the engagement of a third party in accordance with Section 4.2 within ten (10) days of notice by Company, that third party will be deemed an Authorized Sub-Processor for the purposes of this Addendum."}],"_type":"block","style":"normal","_key":"90c8d4a40e2b","markDefs":[]},{"_type":"block","style":"normal","_key":"dc19e6e31474","markDefs":[],"children":[{"_type":"span","marks":[],"text":"\n4.5 Company will enter into a written agreement with the Authorized Sub-Processor imposing on the Authorized Sub-Processor data protection obligations comparable to those imposed on Company under this Addendum with respect to the protection of Personal Data. In case an Authorized Sub-Processor fails to fulfill its data protection obligations under such written agreement with Company, Company will remain liable to Customer for the performance of the Authorized Sub-Processor’s obligations under such agreement.","_key":"f07e5326a24b"}]},{"_type":"block","style":"normal","_key":"79bb1e301c0b","markDefs":[],"children":[{"_type":"span","marks":[],"text":"\n4.6 If Customer and Company have entered into Standard Contractual Clauses as described in Section 6 (Transfers of Personal Data), (i) the above authorizations will constitute Customer’s prior written consent to the subcontracting by Company of the processing of Personal Data if such consent is required under the Standard Contractual Clauses, and (ii) the parties agree that the copies of the agreements with Authorized Sub-Processors that must be provided by Company to Customer pursuant to Clause 5(j) of the UK SCCs or Clause 9(c) of the EU SCCs may have commercial information, or information unrelated to the Standard Contractual Clauses or their equivalent, removed by the Company beforehand, and that such copies will be provided by the Company only upon request by Customer.","_key":"878f0db66e4a"}]},{"style":"normal","_key":"b08b16510664","markDefs":[],"children":[{"_type":"span","marks":[],"text":"\n","_key":"158c25da5772"},{"_type":"span","marks":["strong"],"text":"5. Security of Personal Data\n","_key":"57def8306392"},{"marks":[],"text":"\n5.1 Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Company shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of processing Personal Data. Exhibit B sets forth additional information about Company’s technical and organizational security measures.\n\n","_key":"ad57b3641e6f","_type":"span"},{"_type":"span","marks":["strong"],"text":"6.\tTransfers of Personal Data","_key":"b2ca94debe89"},{"_key":"5596a6864a8c","_type":"span","marks":[],"text":"\n\n6.1 The parties agree that Company may transfer Personal Data processed under this Addendum outside the EEA, the UK, or Switzerland as necessary to provide the Services. Customer acknowledges that Company’s primary processing operations take place in the United States, and that the transfer of Customer’s Personal Data to the United States is necessary for the provision of the Services to Customer. If Company transfers Personal Data protected under this Addendum to a jurisdiction for which the European Commission has not issued an adequacy decision, Company will ensure that appropriate safeguards have been implemented for the transfer of Personal Data in accordance with Data Protection Laws.\n\n6.2 Ex-EEA Transfers. The parties agree that ex-EEA Transfers are made pursuant to the EU SCCs, which are deemed entered into (and incorporated into this Addendum by this reference) and completed as follows:\n\n6.2.1. Module One (Controller to Controller) of the EU SCCs apply when Company is processing Personal Data as a controller pursuant to Section 9 of this Addendum.\n\n6.2.2. Module Two (Controller to Processor) of the EU SCCs apply when Customer is a controller and Company is processing Personal Data for Customer as a processor pursuant to Section 2 of this Addendum.\n\n6.2.3 Module Three (Processor to Sub-Processor) of the EU SCCs apply when Customer is a processor and Company is processing Personal Data on behalf of Customer as a sub-processor.\n\n6.3 For each module, where applicable the following applies:\n\n6.3.1 The optional docking clause in Clause 7 does not apply.\n\n6.3.2 In Clause 9, Option 2 (general written authorization) applies, and the minimum time period for prior notice of sub-processor changes shall be as set forth in Section 4.2 of this Addendum;\n\n6.3.3 In Clause 11, the optional language does not apply;\n\n6.3.4 All square brackets in Clause 13 are hereby removed;\n\n6.3.5 In Clause 17 (Option 1), the EU SCCs will be governed by Irish law;\n\n6.3.6. In Clause 18(b), disputes will be resolved before the courts of Ireland;\n\n6.37 Exhibit B to this Addendum contains the information required in Annex I of the EU SCCs;\n\n6.3.8 Exhibit C to this Addendum contains the information required in Annex II of the EU SCCs; and\n\n6.3.9 By entering into this Addendum, the parties are deemed to have signed the EU SCCs incorporated herein, including their Annexes.\n\n6.4 Ex-UK Transfers. The parties agree that ex-UK Transfers are made pursuant to the UK SCCs, which are deemed entered into and incorporated into this Addendum by reference, and completed as follows:\n\n6.4.1 References to the GDPR will be deemed to be references to the UK GDPR and the UK Data Protection Act 2018, references to “supervisory authorities” will be deemed to be references to the UK Information Commissioner, and references to “Member State(s)” or the EU will be deemed to be references to the UK.\n\n6.4.2 The UK Controller-to-Processor SCCs apply when the Company processes Customer’s Personal Data as a processor. The illustrative indemnification clause does not apply. In Clause 4(f) the language “adequate protection within the meaning of Directive 95/46/EC” is deleted and replaced with “a level of data protection that is considered adequate under, or equivalent to, the applicable data protection law.” Clause 9, Governing Law, shall read “The Clauses shall be governed by the law of the Member State in which the data exporter is established, but without prejudice to the rights and freedoms that data subjects may enjoy under their national data protection laws.” In Clause 11(3), the language “, namely…” at the end of the sentence is hereby deleted. Exhibit B of this Addendum serves as Appendix I of the UK Controller-to-Processor SCCs. Exhibit C of this Addendum serves as Appendix II of the UK Controller-to-Processor SCCs.\n\n6.4.3 The UK Controller-to-Controller SCCs apply when the Company processes Customer’s Personal Data as a controller pursuant to Section 9 of this Addendum. Clause II(h) of the UK Controller-to-Controller SCCs shall be deemed to state that the Company will process Personal Data in accordance with the data processing principles set forth in Annex A of the UK Controller-to-Controller SCCs. The illustrative commercial clause does not apply. Clause IV (Governing Law) shall read “The Clauses shall be governed by the law of the Member State in which the data exporter is established, but without prejudice to the rights and freedoms that data subjects may enjoy under their national data protection laws.” Exhibit B of this Addendum serves as Annex B of the UK Controller-to-Controller SCCs.\n\n6.4.4 The parties acknowledge and agree that if any of the UK SCCs are replaced or superseded by new standard contractual clauses issued and approved pursuant to Article 46 of the UK GDPR and related provisions of the UK Data Protection Act 2018 (“New UK SCCs”), the Data Importer may give notice to the Data Exporter and, with effect from the date set forth in such notice, the application of the UK SCCs set forth in this Addendum shall be amended so that the UK SCCs cease to apply to ex-UK Transfers, and the New UK SCCs specified in such notice shall apply going forward. To the extent that the use of the New UK SCCs require the parties to complete additional information, the parties shall reasonably and promptly work together to complete such additional information.\n\n6.5 Transfers from Switzerland. The parties agree that transfers from Switzerland are made pursuant to the EU SCCs with the following modifications:\n6.5.1. The terms “General Data Protection Regulation” or “Regulation (EU) 2016/679” as utilized in the EU SCCs shall be interpreted to include the Federal Act on Data Protection of 19 June 1992 (the “FADP,” and as revised as of 25 September 2020, the “Revised FADP”) with respect to data transfers subject to the FADP.\n\n6.5.2 The terms of the EU SCCs shall be interpreted to protect the data of legal entities until the effective date of the Revised FADP.\n6.5.3 Clause 13 of the EU SCCs is modified to provide that the Federal Data Protection and Information Commissioner (“FDPIC”) of Switzerland shall have authority over data transfers governed by the FADP and the appropriate EU supervisory authority shall have authority over data transfers governed by the GDPR. Subject to the foregoing, all other requirements of Section 13 shall be observed.\n\n6.5.4 The term “EU Member State” as utilized in the EU SCCs shall not be interpreted in such a way as to exclude Data Subjects in Switzerland from exercising their rights in their place of habitual residence in accordance with Clause 18(c) of the EU SCCs.\n\n6.6 Supplementary Measures. In respect of any ex-EEA Transfer or ex-UK Transfer, the following supplementary measures shall apply:\n6.6.1 As of the date of this Addendum, the Data Importer has not received any formal legal requests from any government intelligence or security service/agencies in the country to which the Personal Data is being exported, for access to (or for copies of) Customer’s Personal Data (“Government Agency Requests”);\n\n6.6.2 If, after the date of this Addendum, the Data Importer receives any Government Agency Requests, Company shall attempt to redirect the law enforcement or government agency to request that data directly from Customer. As part of this effort, Company may provide Customer’s basic contact information to the government agency. If compelled to disclose Customer’s Personal Data to a law enforcement or government agency, Company shall give Customer reasonable notice of the demand and cooperate to allow Customer to seek a protective order or other appropriate remedy unless Company is legally prohibited from doing so. Company shall not voluntarily disclose Personal Data to any law enforcement or government agency. Data Exporter and Data Importer shall (as soon as reasonably practicable) discuss and determine whether all or any transfers of Personal Data pursuant to this Addendum should be suspended in the light of the such Government Agency Requests; and\n\n6.6.3 The Data Exporter and Data Importer will meet as needed to consider whether:\n(i) the protection afforded by the laws of the country of the Data Importer to data subjects whose Personal Data is being transferred is sufficient to provide broadly equivalent protection to that afforded in the EEA or the UK, whichever the case may be;\n(ii) additional measures are reasonably necessary to enable the transfer to be compliant with the Data Protection Laws; and\n(iii) it is still appropriate for Personal Data to be transferred to the relevant Data Importer, taking into account all relevant information available to the parties, together with guidance provided by the supervisory authorities.\n\n6.6.4 If Data Protection Laws require the Data Exporter to execute the Standard Contractual Clauses applicable to a particular transfer of Personal Data to a Data Importer as a separate agreement, the Data Importer shall, on request of the Data Exporter, promptly execute such Standard Contractual Clauses incorporating such amendments as may reasonably be required by the Data Exporter to reflect the applicable appendices and annexes, the details of the transfer and the requirements of the relevant Data Protection Laws.\n\n6.6.5 If either (i) any of the means of legitimizing transfers of Personal Data outside of the EEA or UK set forth in this Addendum cease to be valid or (ii) any supervisory authority requires transfers of Personal Data pursuant to those means to be suspended, then Data Importer may by notice to the Data Exporter, with effect from the date set out in such notice, amend or put in place alternative arrangements in respect of such transfers, as required by Data Protection Laws.\n\n"},{"_type":"span","marks":["strong"],"text":"7. Rights of Data Subjects","_key":"9ec0c3312010"},{"_type":"span","marks":[],"text":"\n\n7.1 Company shall, to the extent permitted by law, notify Customer upon receipt of a request by a Data Subject to exercise the Data Subject’s right of: access, rectification, erasure, data portability, restriction or cessation of processing, withdrawal of consent to processing, and/or objection to being subject to processing that constitutes automated decision-making (such requests individually and collectively “Data Subject Request(s)”). If Company receives a Data Subject Request in relation to Customer’s data, Company will advise the Data Subject to submit their request to Customer and Customer will be responsible for responding to such request, including, where necessary, by using the functionality of the Services. Customer is solely responsible for ensuring that Data Subject Requests for erasure, restriction or cessation of processing, or withdrawal of consent to processing of any Personal Data are communicated to Company, and, if applicable, for ensuring that a record of consent to processing is maintained with respect to each Data Subject.\n\n7.2 Company shall, at the request of the Customer, and taking into account the nature of the processing applicable to any Data Subject Request, apply appropriate technical and organizational measures to assist Customer in complying with Customer’s obligation to respond to such Data Subject Request and/or in demonstrating such compliance, where possible, provided that (i) Customer is itself unable to respond without Company’s assistance and (ii) Company is able to do so in accordance with all applicable laws, rules, and regulations. Customer shall be responsible to the extent legally permitted for any costs and expenses arising from any such assistance by Company.\n\n","_key":"d1b7f9801e08"},{"_type":"span","marks":["strong"],"text":"8. Actions and Access Requests; Audits","_key":"29f2336ff892"},{"_type":"span","marks":[],"text":"\n\n8.1 Company shall, taking into account the nature of the processing and the information available to Company, provide Customer with reasonable cooperation and assistance where necessary for Customer to comply with its obligations under the GDPR to conduct a data protection impact assessment and/or to demonstrate such compliance, provided that Customer does not otherwise have access to the relevant information. Customer shall be responsible to the extent legally permitted for any costs and expenses arising from any such assistance by Company.\n\n8.2 Company shall, taking into account the nature of the processing and the information available to Company, provide Customer with reasonable cooperation and assistance with respect to Customer’s cooperation and/or prior consultation with any Supervisory Authority, where necessary and where required by the GDPR. Customer shall be responsible to the extent legally permitted for any costs and expenses arising from any such assistance by Company.\n\n8.3 Company shall maintain records sufficient to demonstrate its compliance with its obligations under this Addendum, and retain such records for a period of three (3) years after the termination of the Agreement. Customer shall, with reasonable notice to Company, have the right to review, audit and copy such records at Company’s offices during regular business hours.\n\n8.4 Upon Customer’s written request at reasonable intervals, and subject to reasonable confidentiality controls, Company shall, either (i) make available for Customer’s review copies of certifications or reports demonstrating Company’s compliance with prevailing data security standards applicable to the processing of Customer’s Personal Data, or (ii) if the provision of reports or certifications pursuant to (i) is not reasonably sufficient under Data Protection Laws, allow Customer’s independent third party representative to conduct an audit or inspection of Company’s data security infrastructure and procedures that is sufficient to demonstrate Company’s compliance with its obligations under Data Protection Laws, provided that (a) Customer provides reasonable prior written notice of any such request for an audit and such inspection shall not be unreasonably disruptive to Company’s business; (b) such audit shall only be performed during business hours and occur no more than once per calendar year; and (c) such audit shall be restricted to data relevant to Customer. Customer shall be responsible for the costs of any such audits or inspections, including without limitation a reimbursement to Company for any time expended for on-site audits. If Customer and Company have entered into Standard Contractual Clauses as described in Section 6 (Transfers of Personal Data), the parties agree that the audits described in Clause 5(f) and Clause 12(2) of the UK SCCs and Clause 8.9 of the EU SCCs shall be carried out in accordance with this Section 8.4.\n\n8.5 Company shall immediately notify Customer if an instruction, in the Company’s opinion, infringes the Data Protection Laws or Supervisory Authority.\n\n8.6 In the event of a Personal Data Breach, Company shall, without undue delay, inform Customer of the Personal Data Breach and take such steps as Company in its sole discretion deems necessary and reasonable to remediate such violation (to the extent that remediation is within Company’s reasonable control).\n\n8.7 In the event of a Personal Data Breach, Company shall, taking into account the nature of the processing and the information available to Company, provide Customer with reasonable cooperation and assistance necessary for Customer to comply with its obligations under the GDPR with respect to notifying (i) the relevant Supervisory Authority and (ii) Data Subjects affected by such Personal Data Breach without undue delay.\n\n8.8 The obligations described in Sections 8.5 and 8.6 shall not apply in the event that a Personal Data Breach results from the actions or omissions of Customer. Company’s obligation to report or respond to a Personal Data Breach under Sections 8.5 and 8.6 will not be construed as an acknowledgement by Company of any fault or liability with respect to the Personal Data Breach.\n\n9. Company’s Role as a Controller. The parties acknowledge and agree that with respect to Customer Account Data and Customer Usage data, Company is an independent controller, not a joint controller with Customer. Company will process Customer Account Data and Customer Usage Data as a controller (i) to manage the relationship with Customer; (ii) to carry out Company’s core business operations, such as accounting, audits, tax preparation and filing and compliance purposes; (iii) to monitor, investigate, prevent and detect fraud, security incidents and other misuse of the Services, and to prevent harm to Customer; (iv) for identity verification purposes; (v) to comply with legal or regulatory obligations applicable to the processing and retention of Personal Data to which Company is subject; and (vi) as otherwise permitted under Data Protection Laws and in accordance with this Addendum and the Agreement. Company may also process Customer Usage Data as a controller to provide, optimize, and maintain the Services, to the extent permitted by Data Protection Laws. Any processing by the Company as a controller shall be in accordance with the Company’s privacy policy set forth at https://www.navattic.com/legal/privacy.\n\n10. Conflict. In the event of any conflict or inconsistency among the following documents, the order of precedence will be: (1) the applicable terms in the Standard Contractual Clauses; (2) the terms of this Addendum; (3) the Agreement; and (4) the Company’s privacy policy. Any claims brought in connection with this Addendum will be subject to the terms and conditions, including, but not limited to, the exclusions and limitations set forth in the Agreement.\n\n11. Execution of this Addendum. Company has pre-signed this Addendum, in the signature block below and in each of the main body, and Exhibit B (as the “data importer”). To complete this Addendum, Customer must: (i) complete the information requested in the signature block below and sign there, (ii) complete the information requested of the “data exporter” on Exhibit B, and (iii) send the completed and signed Addendum to Company by email to legal@navattic.com. Upon receipt of the validly completed Addendum by Company at this email address, this Addendum will become legally binding.\n","_key":"d4644ea21910"}],"_type":"block"},{"_key":"43df3c7a0ec0","markDefs":[],"children":[{"text":"Exhibit A","_key":"15a161b5aa050","_type":"span","marks":["strong"]},{"_type":"span","marks":[],"text":"\n\n","_key":"b0402c9d29ae"},{"text":"Nature and Purpose of Processing","_key":"6add011a48d2","_type":"span","marks":["strong"]},{"_type":"span","marks":[],"text":": Company will process Customer’s Personal Data as necessary to provide the Services under the Agreement, for the purposes specified in the Agreement and this Addendum, and in accordance with Customer’s instructions as set forth in this Addendum.","_key":"19cdeba063ad"}],"_type":"block","style":"normal"},{"children":[{"_type":"span","marks":["strong"],"text":"Duration of Processing","_key":"8cd23e948c300"},{"_type":"span","marks":[],"text":": Company will process Customer’s Personal Data as long as required (i) to provide the Services to Customer under the Agreement; (ii) for Company’s legitimate business needs; or (iii) by applicable law or regulation. Customer Account Data and Customer Usage Data will be processed and stored as set forth in Company’s privacy policy.","_key":"95b478a6faa8"}],"_type":"block","style":"normal","_key":"7f9a96c5d858","markDefs":[]},{"_key":"0b3b19ac8cbd","markDefs":[],"children":[{"_type":"span","marks":["strong"],"text":"Categories of Data Subjects","_key":"6d4a4c76f6380"},{"text":": Customer’s employees, consultants, contractors, and/or agents.","_key":"8f6c9e2f1f23","_type":"span","marks":[]}],"_type":"block","style":"normal"},{"children":[{"_type":"span","marks":["strong"],"text":"Categories of Personal Data","_key":"f562a8bbdb5f0"},{"_type":"span","marks":[],"text":": Company processes Personal Data contained in Customer Account Data, Customer Usage Data, and any Personal Data provided by Customer or collected by Company in order to provide the Services or as otherwise set forth in the Agreement or this Addendum. Categories of Personal Data include name, email, job title, username, Company device identifiers (e.g. serial number), IP address for company device, installed applications for company device, background check verification records (at discretion of Controller), security training records.","_key":"8ef8b1df3985"}],"_type":"block","style":"normal","_key":"5cf5e008c24f","markDefs":[]},{"_key":"2faada2de637","markDefs":[],"children":[{"_type":"span","marks":["strong"],"text":"Sensitive Data or Special Categories of Data","_key":"74ed6b3166c00"},{"_type":"span","marks":[],"text":": Customers are prohibited from providing sensitive personal data or special categories of data to Company, including any data which discloses the criminal history of any persons.\n\n","_key":"fef213f0a596"},{"_type":"span","marks":["strong"],"text":"Exhibit B\n","_key":"ec4a996e1987"},{"_type":"span","marks":[],"text":"\nThe following includes the information required by Annex I and Annex III of the EU SCCs, and Appendix 1 of the UK SCCs.\n\n1. The Parties","_key":"a2a84634762c"}],"_type":"block","style":"normal"},{"markDefs":[],"children":[{"_key":"ead1803e5e3e0","_type":"span","marks":[],"text":"Data exporter(s): ["},{"_type":"span","marks":["em"],"text":"Identity and contact details of the data exporter(s) and, where applicable, of its/their data protection officer and/or representative in the European Union","_key":"b6a0ab2d5e7a"},{"_type":"span","marks":[],"text":"]\nName: [__________]\nAddress: [__________]","_key":"b0676380eb29"}],"_type":"block","style":"normal","_key":"bb853c91c92b"},{"_type":"block","style":"normal","_key":"8f69d92ef05e","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Contact person’s name, position and contact details: [__________]\nActivities relevant to the data transferred under these Clauses: As described in Section 2 of the Addendum.\nSignature and date:\nRole (controller/processor): Controller","_key":"fd00c28bc3b60"}]},{"children":[{"_key":"0c55f294daf10","_type":"span","marks":[],"text":"Data importer(s): ["},{"_type":"span","marks":["em"],"text":"Identity and contact details of the data importer(s), including any contact person with responsibility for data protection","_key":"591efa47fac9"},{"_type":"span","marks":[],"text":"]\nName: Navattic, Inc.\nAddress: 2261 Market Street #4301 San Francisco, CA 94114\nEmail: privacy@navattic.com\nActivities relevant to the data transferred under these Clauses: ...As described in Section 2 of the Addendum.\nName: Randy Frank\nRole (controller/processor): Processor\n","_key":"55653e0bef25"}],"_type":"block","style":"normal","_key":"e627b5c32906","markDefs":[]},{"children":[{"_type":"span","marks":[],"text":"2. Description of the Transfer\n","_key":"a846c66da0600"}],"_type":"block","style":"normal","_key":"64a7f78db01a","markDefs":[]},{"style":"normal","_key":"9d496b38cad4","markDefs":[],"children":[{"text":"Data Subjects:","_key":"0f84892e8b0e0","_type":"span","marks":["strong"]},{"_type":"span","marks":[],"text":" The data exporter may submit personal data to the data importer through its software, services, systems, products, and/or technologies, the extent of which is determined and controlled by the data exporter in compliance with applicable data protection laws and regulations, and which may include but is not limited to personal data relating to the following categories of data subjects: data exporter’s employees, consultants, contractors, and/or agents.\n","_key":"9407937987e1"},{"_type":"span","marks":["strong"],"text":"Categories of Personal Data: ","_key":"a4e28df6b244"},{"_type":"span","marks":[],"text":"The personal data transferred concern the following categories of data: Any personal data comprised in all data and information submitted by data exporter to data importer’s software, services, systems, products, and/or technologies, which may include name, contact information, and information about security practices and compliance.\n","_key":"f56bf3601fdc"},{"marks":["strong"],"text":"Special Category Personal Data (if applicable):","_key":"56e2745675dd","_type":"span"},{"_type":"span","marks":[],"text":" Data exporters are prohibited from providing sensitive data or special categories to data importer.\n","_key":"e35dfe11def8"},{"_type":"span","marks":["strong"],"text":"Nature of the Processing:","_key":"309e463fcf06"},{"_key":"e73e345ae75c","_type":"span","marks":[],"text":" Data is processed in order for Customer to manage its information security and data privacy programs and evidence said programs for third-party audit.\n"},{"marks":["strong"],"text":"Purposes of Processing:","_key":"c6de25b26ce6","_type":"span"},{"text":" To fulfill each party’s obligations under the Agreement.\n","_key":"73da62bad540","_type":"span","marks":[]},{"_type":"span","marks":["strong"],"text":"Duration of Processing and Retention (or the criteria to determine such period): ","_key":"42a64a7f87d5"},{"marks":[],"text":"During the term of the Agreement\n","_key":"56d3bb74620b","_type":"span"},{"text":"Frequency of the transfer:","_key":"4dd9c4602f0a","_type":"span","marks":["strong"]},{"text":" During the term of the Agreement on a periodic basis throughout the day and/or at the discretion of the customer.\n","_key":"c31be3042e1c","_type":"span","marks":[]},{"_key":"42cd9debc0c8","_type":"span","marks":["strong"],"text":"Recipients of Personal Data Transferred to the Data Importer:"},{"_type":"span","marks":[],"text":" Company will maintain a list of Subprocessors, available upon request.\n","_key":"dada4d920e4d"}],"_type":"block"},{"style":"normal","_key":"673ee86fc1c6","markDefs":[],"children":[{"_type":"span","marks":[],"text":"3. Competent Supervisory Authority\n","_key":"d02fb29074d20"}],"_type":"block"},{"_key":"922c0cf44322","markDefs":[],"children":[{"_type":"span","marks":[],"text":"The supervisory authority shall be the supervisory authority of the Data Exporter, as determined in accordance with Clause 13.","_key":"cb685c9717230"}],"_type":"block","style":"normal"},{"children":[{"_type":"span","marks":[],"text":"","_key":"f507afb958e70"}],"_type":"block","style":"normal","_key":"8c619385aaf8","markDefs":[]}],"publishedDate":"2023-10-28T20:38:00.000Z","updatedDate":"2023-10-28T20:38:00.000Z","_id":"d4b09fa3-74af-4853-8905-141ec4ca6ebb"},{"_id":"dee1bc80-9e03-4629-b738-dc275b051875","title":"List of Subprocessesors","description":"Information on the location, role, and identity of our subprocessesors","slug":"subprocessors","content":[{"_type":"block","style":"normal","_key":"a428db773af2","markDefs":[],"children":[{"_type":"span","marks":[],"text":"To support delivery of our Services, Navattic, Inc. may engage and use data processors with access to certain Customer Data (each a “Subprocessor”). This page provides important information about the identity, location and role of each Subprocessor. Terms used on this page but not defined will have the meaning set forth in the Navattic Terms of Service or superseding written agreement between Customer and Navattic (the “Agreement”).","_key":"ba7776af9797"}]},{"markDefs":[],"children":[{"_key":"c24be728ec530","_type":"span","marks":[],"text":"Third Parties"}],"_type":"block","style":"h5","_key":"4a7c11de155e"},{"children":[{"marks":[],"text":"Navattic currently uses third party Subprocessors to provide infrastructure services, and to help us provide customer support and email notifications. Prior to engaging any third party Subprocessor, Navattic performs diligence to evaluate their security, privacy and confidentiality practices, and signs an agreement with each such Subprocessor implementing its applicable obligations.\n","_key":"8852b6c01c370","_type":"span"}],"_type":"block","style":"normal","_key":"90a6ed2d703e","markDefs":[]},{"style":"normal","_key":"b317e37cfc00","markDefs":[],"children":[{"_key":"307535381b11","_type":"span","marks":["strong"],"text":"Front"}],"_type":"block"},{"level":1,"_type":"block","style":"normal","_key":"787b0a8375fd","listItem":"bullet","markDefs":[],"children":[{"marks":[],"text":"Processing Activity: Customer ticketing","_key":"1df4087273f2","_type":"span"}]},{"listItem":"bullet","markDefs":[],"children":[{"_key":"2893d65e5b96","_type":"span","marks":[],"text":"Location: United States"}],"level":1,"_type":"block","style":"normal","_key":"98a8e80baa12"},{"level":1,"_type":"block","style":"normal","_key":"0650c0c05b5b","listItem":"bullet","markDefs":[{"_type":"link","href":"https://front.com/legal/list-of-subprocessors","_key":"9e089c245b38"}],"children":[{"_type":"span","marks":["9e089c245b38"],"text":"Subprocessors","_key":"d286a3bf21b3"}]},{"children":[{"_type":"span","marks":[],"text":"Google Workspace","_key":"d5a2b3fa160c0"}],"_type":"block","style":"h5","_key":"f7b866f44792","markDefs":[]},{"level":1,"_type":"block","style":"normal","_key":"fd8dedb7cba7","listItem":"bullet","markDefs":[],"children":[{"marks":[],"text":"Processing Activity: General Business Services","_key":"411b523f9b470","_type":"span"}]},{"markDefs":[],"children":[{"_key":"4d50e169ea8d0","_type":"span","marks":[],"text":"Location: United States"}],"level":1,"_type":"block","style":"normal","_key":"4dea9d37877f","listItem":"bullet"},{"children":[{"_key":"8feb8cf113900","_type":"span","marks":["28606fa7f741"],"text":"Subprocessors"}],"level":1,"_type":"block","style":"normal","_key":"1a6e219eb73b","listItem":"bullet","markDefs":[{"_type":"link","href":"https://workspace.google.com/terms/subprocessors.html","_key":"28606fa7f741"}]},{"_type":"block","style":"h5","_key":"261f6db6bfaf","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Hubspot","_key":"ce618959dac0"}]},{"listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Processing Activity: Lead Contact Management","_key":"2daa9a494920"}],"level":1,"_type":"block","style":"normal","_key":"ab595c103732"},{"children":[{"_type":"span","marks":[],"text":"Location: United States","_key":"5f2a4c290fcf"}],"level":1,"_type":"block","style":"normal","_key":"73d853e2b978","listItem":"bullet","markDefs":[]},{"children":[{"_type":"span","marks":["61a9caac8b8c"],"text":"Subprocessors","_key":"21618ba0cd80"}],"level":1,"_type":"block","style":"normal","_key":"9088178d2361","listItem":"bullet","markDefs":[{"_type":"link","href":"https://legal.hubspot.com/sub-processors-page","_key":"61a9caac8b8c"}]},{"style":"normal","_key":"02f839a5491d","markDefs":[],"children":[{"text":"","_key":"b96b3b67125d","_type":"span","marks":[]}],"_type":"block"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Madkudu","_key":"24b5292b5141"}],"_type":"block","style":"h5","_key":"cc9ad2d420fa"},{"listItem":"bullet","markDefs":[],"children":[{"text":"Processing Activity: Sales Intelligence","_key":"e8f93cae71a7","_type":"span","marks":[]}],"level":1,"_type":"block","style":"normal","_key":"97f73954768f"},{"level":1,"_type":"block","style":"normal","_key":"a892f4a54c5f","listItem":"bullet","markDefs":[],"children":[{"_key":"8d1feb23c453","_type":"span","marks":[],"text":"Location: United States"}]},{"listItem":"bullet","markDefs":[{"_type":"link","href":"https://posthog.com/handbook/company/security","_key":"80251c8c24ad"}],"children":[{"_key":"e5cb84eeb0b0","_type":"span","marks":["80251c8c24ad"],"text":"Subprocessors"}],"level":1,"_type":"block","style":"normal","_key":"3e9583ecf9cf"},{"children":[{"_type":"span","marks":[],"text":"PlanetScale","_key":"948eb4f96478"}],"_type":"block","style":"h5","_key":"019fdc47e310","markDefs":[]},{"listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Processing Activity: Database Services","_key":"c6e29bdc141f0"}],"level":1,"_type":"block","style":"normal","_key":"08940feb84e9"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Location: United States","_key":"c709b980758e0"}],"level":1,"_type":"block","style":"normal","_key":"c5b880e643aa","listItem":"bullet"},{"_type":"block","style":"h5","_key":"2e485bd6b381","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Slack","_key":"2eddd08e34d60"}]},{"children":[{"_key":"612ed58612ec0","_type":"span","marks":[],"text":"Processing Activity: Internal Communication Tool"}],"level":1,"_type":"block","style":"normal","_key":"44de373d9d3c","listItem":"bullet","markDefs":[]},{"level":1,"_type":"block","style":"normal","_key":"471f4a208e87","listItem":"bullet","markDefs":[],"children":[{"_key":"7b67be15f78f0","_type":"span","marks":[],"text":"Location: United States"}]},{"_key":"a342ab018c05","listItem":"bullet","markDefs":[{"_type":"link","href":"https://slack.com/slack-subprocessors","_key":"b72f76c39cc0"}],"children":[{"_key":"7c3529fa38460","_type":"span","marks":["b72f76c39cc0"],"text":"Subprocessors"}],"level":1,"_type":"block","style":"normal"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Salesforce","_key":"f49d9f495ac90"}],"_type":"block","style":"h5","_key":"f8d9d7cec49a"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Processing Activity: CRM Database","_key":"6c69a3a978330"}],"level":1,"_type":"block","style":"normal","_key":"181040f18f3a","listItem":"bullet"},{"_type":"block","style":"normal","_key":"fc6f0e3a3a1e","listItem":"bullet","markDefs":[],"children":[{"_key":"af42628cc7350","_type":"span","marks":[],"text":"Location: United States"}],"level":1},{"children":[{"_type":"span","marks":["58eefff022d9"],"text":"Subprocessors","_key":"35664b246f160"}],"level":1,"_type":"block","style":"normal","_key":"0e711e0fe35d","listItem":"bullet","markDefs":[{"_type":"link","href":"https://www.salesforce.com/company/legal/trust-and-compliance-documentation/","_key":"58eefff022d9"}]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Stripe","_key":"db4ca8120b950"}],"_type":"block","style":"h5","_key":"a648fdc66adc"},{"_type":"block","style":"normal","_key":"41bfd48ebe95","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Processing Activity: Payment Infrastructure Provider","_key":"9fe0bd3e7e8e0"}],"level":1},{"_key":"d39f0158a789","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Location: United States","_key":"97491da84b650"}],"level":1,"_type":"block","style":"normal"},{"style":"normal","_key":"c47d49881cb1","listItem":"bullet","markDefs":[{"_type":"link","href":"https://snyk.io/policies/subprocessors/","_key":"eb505ffccfeb"}],"children":[{"text":"Subprocessors","_key":"a2071eb4319f0","_type":"span","marks":["eb505ffccfeb"]}],"level":1,"_type":"block"},{"children":[{"_type":"span","marks":[],"text":"Snyk","_key":"6219d9709b8d0"}],"_type":"block","style":"h5","_key":"8b963d646450","markDefs":[]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Processing Activity: Vulnerability Management","_key":"d24ae11b7ce30"}],"level":1,"_type":"block","style":"normal","_key":"ca58a50ba0a9","listItem":"bullet"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Location: United States","_key":"155c97e740fc0"}],"level":1,"_type":"block","style":"normal","_key":"a55b9854e8f1","listItem":"bullet"},{"_key":"c59e445312ee","listItem":"bullet","markDefs":[{"_type":"link","href":"https://snyk.io/policies/sub-processors/","_key":"634ca5dd21ad"}],"children":[{"_key":"56a10bf861250","_type":"span","marks":["634ca5dd21ad"],"text":"Subprocessors"}],"level":1,"_type":"block","style":"normal"},{"style":"h5","_key":"e705fcbe487d","markDefs":[],"children":[{"text":"Tinybird","_key":"acfefc7a28bc","_type":"span","marks":[]}],"_type":"block"},{"_type":"block","style":"normal","_key":"d6191217f16e","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Processing Activity: Data Hosting Provider","_key":"cf1089968d3b"}],"level":1},{"level":1,"_type":"block","style":"normal","_key":"42a520521e64","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Location: United States","_key":"473f9a6d821a"}]},{"children":[{"_type":"span","marks":["2f9dd3147ea8"],"text":"Subprocessors","_key":"01c6a716d171"}],"level":1,"_type":"block","style":"normal","_key":"23dd3a2c59cc","listItem":"bullet","markDefs":[{"_key":"2f9dd3147ea8","_type":"link","href":"https://www.tinybird.co/tinybird-subprocessors.pdf"}]},{"markDefs":[],"children":[{"text":"Upstash","_key":"e9b394eda50c","_type":"span","marks":[]}],"_type":"block","style":"h5","_key":"b08f24ca24fc"},{"style":"normal","_key":"fa19889fb4f3","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Processing Activity: Data Hosting Provider","_key":"1bea034624d2"}],"level":1,"_type":"block"},{"level":1,"_type":"block","style":"normal","_key":"0a0231139e23","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Location: United States","_key":"81cbceef8334"}]},{"_type":"block","style":"normal","_key":"a4cd7058c2c3","listItem":"bullet","markDefs":[{"href":"https://upstash.com/trust/subprocessors.pdf","_key":"f1c662da4f77","_type":"link"}],"children":[{"text":"Subprocessors","_key":"c8f0f5fff255","_type":"span","marks":["f1c662da4f77"]}],"level":1},{"style":"h5","_key":"0fcfcd0430c0","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Vitally","_key":"f4d138353d830"}],"_type":"block"},{"style":"normal","_key":"81f5f4f31c10","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Processing Activity: Customer Success Management","_key":"8b116fbc14280"}],"level":1,"_type":"block"},{"listItem":"bullet","markDefs":[],"children":[{"text":"Location: United States","_key":"1cc03c8275e30","_type":"span","marks":[]}],"level":1,"_type":"block","style":"normal","_key":"e2b93288c39e"},{"children":[{"marks":["375c86238b49"],"text":"Subprocessors","_key":"51169a329f5f0","_type":"span"}],"level":1,"_type":"block","style":"normal","_key":"da004edffd63","listItem":"bullet","markDefs":[{"_key":"375c86238b49","_type":"link","href":"https://docs.vitally.io/privacy-and-security/gdpr"}]},{"markDefs":[],"children":[{"marks":[],"text":"Updates","_key":"2046324f5f210","_type":"span"}],"_type":"block","style":"h5","_key":"da916618db81"},{"children":[{"_type":"span","marks":[],"text":"As Navattic’s business grows and evolves, the Subprocessors used to deliver our Service may change. We will endeavor to provide the owner of Customer’s account with notice of any new Subprocessors to the extent required under the Agreement, along with posting such updates here.","_key":"a0a2a468d9430"}],"_type":"block","style":"normal","_key":"c7d9bb74efa6","markDefs":[]}],"publishedDate":"2021-10-05T12:52:00.000Z","updatedDate":"2024-05-07T14:11:00.000Z"}],"preview":false},"__N_SSG":true},"page":"/security","query":{},"buildId":"6xMcT4mna6bO2HRp-eZUW","isFallback":false,"isExperimentalCompile":false,"gsp":true,"scriptLoader":[]}</script><script id="mutiny-init">(function(){var a=window.mutiny=window.mutiny||{};if(!window.mutiny.client){a.client={_queue:{}};var b=["identify","trackConversion"];var c=[].concat(b,["defaultOptOut","optOut","optIn"]);var d=function factory(c){return function(){for(var d=arguments.length,e=new Array(d),f=0;f<d;f++){e[f]=arguments[f]}a.client._queue[c]=a.client._queue[c]||[];if(b.includes(c)){return new Promise(function(b,d){a.client._queue[c].push({args:e,resolve:b,reject:d});setTimeout(d,500)})}else{a.client._queue[c].push({args:e})}}};c.forEach(function(b){a.client[b]=d(b)})}})();</script><script id="mutiny" data-cfasync="false" src="https://client-registry.mutinycdn.com/personalize/client/1a3054bd309da90d.js"></script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10