Data Processing Addendum

Effective: Aug 1, 2023

This Data Processing Addendum (this “Addendum”) is incorporated into and forms part of the Master Services Agreement (the “Agreement”) between Verifiable Inc. (“Verifiable”) and the entity listed in the Order referencing the Agreement (“Customer”).  This Addendum will become effective on the earlier of the date Customer first uses or accesses the Services or accepts this Addendum or the Agreement or any Order Form, which Agreement or Order Form incorporates this Addendum by reference.

Capitalized terms used in this Addendum shall have the meanings set forth in this Addendum. Capitalized terms used but not otherwise defined herein shall have the meanings given to them in the Agreement.  Except as expressly modified below, the terms of the Agreement shall remain in full force and effect.

The parties hereby agree that the terms and conditions set out below shall be added as an addendum to the Agreement.  The following obligations shall only apply to the extent required by Data Protection Laws with regard to the relevant Customer Personal Data, if applicable.

1. Definitions.

Consumer” means the identified or identifiable natural person who is the subject of Personal Data.
1.2 Controller” means an entity that determines the purposes and means of the Processing of Personal Data.
1.3 Customer Personal Data” means Personal Data Processed by Verifiable on behalf of Customer to perform the Services under the Agreement. 
1.4 Data Protection Laws” means the data privacy and security laws and regulations of any jurisdiction applicable to the Processing of Customer Personal Data, including, in each case to the extent applicable, United States Data Protection Laws.
1.5 Personal Data means information that constitutes “personal information,” “personal data,” “personally identifiable information,” or similar term under Data Protection Laws.
1.6 Process” means any operation or set of operations performed upon Personal Data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation, alteration, retrieval, consultation, use, alignment, combination, restriction, erasure, destruction or disclosure by transmission, dissemination or otherwise making available.
1.7 Processor” means an entity that Processes Personal Data on behalf of a Controller.
1.8 Regulator” means an independent competent public authority established or recognized under Data Protection Laws.
1.9 Security Incident” means a breach of Verifiable’s security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Personal Data in Verifiable’s possession, custody, or control.  “Security Incident” does not include unsuccessful attempts or activities that do not compromise the security of Customer Personal Data, including unsuccessful log-in attempts, pings, port scans, denial of service attacks, or other network attacks on firewalls or networked systems.
1.10Services” means the services that Verifiable has agreed to provide to Customer under the Agreement.
1.11Subprocessor means any Processor appointed by Verifiable to Process Customer Personal Data on behalf of Customer under the Agreement.
1.12 United States Data Protection Laws” means, in each case to the extent applicable: (a) the California Consumer Privacy Act of 2018, as amended by the California Privacy Rights Act of 2020, and its implementing regulations (collectively, “CCPA”); (b) the Virginia Consumer Data Protection Act (“VCPDA”); (c) the Colorado Privacy Act and its implementing regulations (“CPA”), when effective; (d) the Utah Consumer Privacy Act (“UCPA”), when effective; (e) the Connecticut Data Privacy Act (“CTDPA”), when effective; and (f) any other applicable law or regulation related to the protection of Customer Personal Data in the United States that is already in force or that will come into force during the term of this Addendum. 

2. Processing of Customer Personal Data. 

2.1 Roles of the Parties; Compliance
.  The parties acknowledge and agree that, as between the parties, with regard to the Processing of Customer Personal Data under the Agreement, Customer is a Controller and Verifiable is a Processor.  In some circumstances, the parties acknowledge that Customer may be acting as a Processor to a third-party Controller in respect of Customer Personal Data, in which case Verifiable will remain a Processor with respect to the Customer in such event.  Each party will comply with the obligations applicable to it in such role under Data Protection Laws with respect to the Processing of Customer Personal Data.

2.2 Customer Instructions.  Verifiable will Process Customer Personal Data only in accordance with Customer’s documented instructions unless otherwise required by applicable law, in which case Verifiable will inform Customer of such Processing unless notification is prohibited by applicable law.  Customer hereby instructs Verifiable to Process Customer Personal Data: (a) to provide the Services to Customer; (b) to perform its obligations and exercise its rights under the Agreement and this Addendum; and (c) as necessary to prevent or address technical problems with the Services.  Verifiable will notify Customer if, in its opinion, an instruction of Customer infringes upon Data Protection Laws.  Customer’s instructions for the Processing of Customer Personal Data shall comply with Data Protection Laws.  Customer shall be responsible for: (i) giving adequate notice and making all appropriate disclosures to Consumers regarding Customer’s use and disclosure and Verifiable’s Processing of Customer Personal Data; and (ii) obtaining all necessary rights, and, where applicable, all appropriate and valid consents to disclose such Customer Personal Data to Verifiable to permit the Processing of such Customer Personal Data by Verifiable for the purposes of performing Verifiable’s obligations under the Agreement or as may be required by Data Protection Laws.  Customer shall notify Verifiable of any changes in, or revocation of, the permission to use, disclose, or otherwise Process Customer Personal Data that would impact Verifiable’s ability to comply with the Agreement, this Addendum, or Data Protection Laws. 

2.3 Details of Processing.  The parties acknowledge and agree that the nature and purpose of the Processing of Customer Personal Data, the types of Customer Personal Data Processed, the categories of Consumers, and other details regarding the Processing of Customer Personal Data are as set forth in Appendix 1.

2.4 Processing Subject to the CCPA.  As used in this Section 2.4, the terms “Sell,” “Share,” “Business Purpose,” and “Commercial Purpose” shall have the meanings given in the CCPA and “Personal Information” shall mean any personal information (as defined in the CCPA) contained in Customer Personal Data.  Verifiable will not: (a) Sell or Share any Personal Information; (b) retain, use, or disclose any Personal Information (i) for any purpose other than for the Business Purposes specified in the Agreement, including for any Commercial Purpose other than the Business Purposes specified in the Agreement, or as otherwise permitted by the CCPA, or (ii) outside of the direct business relationship between Customer and Verifiable; or (c) combine Personal Information received from, or on behalf of, Customer with Personal Data received from or on behalf of any third party, or collected from Verifiable’s own interaction with Consumers, except to perform any Business Purpose permitted by the CCPA.  Verifiable hereby certifies that it understands the foregoing restrictions under this Section 2.4 and will comply with them.  The parties acknowledge that the Personal Information disclosed by Customer to Verifiable is provided to Verifiable only for the limited and specified purposes set forth in Appendix 1.  Verifiable will comply with applicable obligations under the CCPA and provide the same level of privacy protection to Personal Information as is required by the CCPA.  Customer has the right to take reasonable and appropriate steps to help ensure that Verifiable uses the Personal Information transferred in a manner consistent with Customer’s obligations under the CCPA by exercising Customer’s audit rights in Section 8.  Verifiable will notify Customer if it makes a determination that Verifiable can no longer meet its obligations under the CCPA.  If Verifiable notifies Customer of unauthorized use of Personal Information, including under the foregoing sentence, Customer will have the right to take reasonable and appropriate steps to stop and remediate such unauthorized use by limiting the Personal Information shared with Verifiable, terminating the portion of the Agreement relevant to such unauthorized use, or such other steps mutually agreed between the parties in writing. 

3. Confidentiality.  Verifiable shall take reasonable steps to ensure that Verifiable personnel who Process Customer Personal Data are subject to obligations of confidentiality or are under an appropriate statutory obligation of confidentiality with respect to such Customer Personal Data.

4. Security

4.1 Security Measures.  Taking into account the state of the art, the costs of implementation and the nature, scope, context, and purposes of Processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Verifiable shall implement appropriate technical and organizational measures designed to ensure a level of security appropriate to the risk, in accordance with the security standards in Appendix 2 (the “Security Measures”).  Customer acknowledges that the Security Measures may be updated from time to time to reflect process improvements or changing practices, provided that the modifications will not materially decrease Verifiable’s security obligations hereunder.

4.2 Security Incidents.  Upon becoming aware of a confirmed Security Incident, Verifiable will: (a) notify Customer of the Security Incident without undue delay after becoming aware of the Security Incident; and (b) take reasonable steps to identify the cause of such Security Incident, minimize harm, and prevent a recurrence.  Verifiable will take reasonable steps to provide Customer with information available to Verifiable that Customer may reasonably require to comply with its obligations under Data Protection Laws.  Verifiable’s notification of or response to a Security Incident under this Section 4.2 will not be construed as an acknowledgement by Verifiable of any fault or liability with respect to the Security Incident.

4.3 Customer Responsibilities.  Customer agrees that, without limitation of Verifiable’s obligations under this Section 4, Customer is solely responsible for its use of the Services, including: (a) making appropriate use of the Services to ensure a level of security appropriate to the risk in respect of the Customer Personal Data; and (b) securing any account authentication credentials, systems, and devices Customer uses to access or connect to the Services, where applicable.  Without limiting Verifiable’s obligations hereunder, Customer is responsible for reviewing the information made available by Verifiable relating to data security and making an independent determination as to whether the Services meet Customer’s requirements and legal obligations under Data Protection Laws.  

5. Subprocessing.  Subject to the requirements of this Section 5, Customer generally authorizes Verifiable to engage Subprocessors as Verifiable considers reasonably appropriate for the Processing of Customer Personal Data.  Customer hereby approves Verifiable’s Subprocessors, which can be found at ("Subprocessor List"), including their functions and locations. Subprocessors may be updated by Verifiable from time to time in accordance with this Section by updating the Subprocessor List.  Verifiable will notify Customer of the addition or replacement of any Subprocessor at least ten (10) days prior to such engagement by posting such changes to the Subprocessor List, which shall have a mechanism allowing Customer to subscribe to notifications of new Subprocessors as provided in this Addendum (“Notification Mechanism”) or sending email notification to Customer.  If Customer does not subscribe to such Notification Mechanism, Customer shall be deemed to have received notice of a new Subprocessor ten (10) days following Verifiable’s posting of such changes to the Subprocessor List.  Customer may object to such changes on reasonable data protection grounds by providing Verifiable written notice of such objection within ten (10) days.  Upon receiving such an objection, where practicable and at Verifiable’s sole discretion Verifiable will use commercially reasonable efforts to: (a) work with Customer in good faith to make available a commercially reasonable change in the provision of the Services which avoids the use of that proposed Subprocessor; or (b) take corrective steps requested by Customer in its objection and proceed to use the new Subprocessor.  If Verifiable informs Customer that such change or corrective steps cannot be made, Customer may, as its sole and exclusive remedy available under this Section 5, terminate the relevant portion of the Agreement involving the Services which require the use of the proposed Subprocessor by providing written notice to Verifiable.  When engaging any Subprocessor, Verifiable will enter into a written contract with such Subprocessor containing data protection obligations not less protective than those in this Addendum.  Verifiable shall be liable for the acts and omissions of the Subprocessor to the extent Verifiable would be liable under the Agreement and this Addendum.

6. Consumer Rights.  Verifiable will, taking into account the nature of the Processing of Customer Personal Data and the functionality of the Services, provide reasonable assistance to Customer by appropriate technical and organizational measures, insofar as this is possible, as necessary for Customer to fulfill its obligations under Data Protection Laws to respond to requests by Consumers to exercise their rights under Data Protection Laws.  Verifiable reserves the right to charge Customer on a time and materials basis in the event that Verifiable considers that such assistance is onerous, complex, frequent, or time consuming.  If Verifiable receives a request from a Consumer under any Data Protection Laws with respect to Customer Personal Data, Verifiable will advise the Consumer to submit the request to Customer and Customer will be responsible for responding to any such request.  

7. Assessments and Prior Consultations.  In the event that Data Protection Laws require Customer to conduct a data protection impact assessment, transfer impact assessment, or prior consultation with a Regulator in connection with Verifiable’s Processing of Customer Personal Data, following written request from Customer, Verifiable shall use reasonable commercial efforts to provide relevant information and assistance to Customer to fulfill such request, taking into account the nature of Verifiable’s Processing of Customer Personal Data and the information available to Verifiable.  Verifiable reserves the right to charge Customer on a time and materials basis in the event that Verifiable considers that such assistance is onerous, complex, frequent, or time consuming.

8. Relevant Records and Audit Rights.  

8.1 Review of Information and Records.  Upon Customer’s reasonable written request, Verifiable will make available to Customer all information in Verifiable’s possession reasonably necessary to demonstrate Verifiable’s compliance with Data Protection Laws and Verifiable’s obligations set out in this Addendum.  Such information will be made available to Customer no more than once per calendar year and subject to the confidentiality obligations of the Agreement or a mutually-agreed non-disclosure agreement.

8.2 Audits.  At the request of Customer, during the term of the Agreement, if available, Verifiable will provide a copy of its most recent SOC Type II report or similar industry certification or any successor standards (“Report”) for information security management. If Verifiable’s Report is not dated within a year of such request by Customer or otherwise not available, or if Customer requires information for its compliance with Data Protection Laws in addition to the information provided by the Report or under Section 8.1, at Customer’s sole expense and to the extent Customer is unable to access the additional information on its own, Verifiable will allow for, cooperate with, and contribute to reasonable assessments and audits, including inspections, by Customer or an auditor mandated by Customer (“Mandated Auditor”), provided that (a) Customer provides Verifiable with reasonable advance written notice including the anticipated date of the audit, the proposed scope of the audit, and the identity of any Mandated Auditor, which shall not be a competitor of Verifiable; (b) Verifiable approves the Mandated Auditor in writing, with such approval not to be unreasonably withheld; (c) the audit is conducted during normal business hours and in a manner that does not have any adverse impact on Verifiable’s normal business operations; (d) Customer or any Mandated Auditor complies with Verifiable’s standard safety, confidentiality, and security policies or procedures in conducting any such audits; (e) any records, data, or information accessed by Customer or any Mandated Auditor in the performance of any such audit, or any results of any such audit, will be deemed to be the Confidential Information of Verifiable and subject to a nondisclosure agreement to be provided by Verifiable; and (f) Customer may initiate such audit not more than once per calendar year unless otherwise required by a Regulator or Data Protection Laws.
8.3 Results of Audits.  Customer will promptly notify Verifiable of any non-compliance discovered during the course of an audit and provide Verifiable any reports generated in connection with any audit under this Section, unless prohibited by Data Protection Laws or otherwise instructed by a Regulator.  Customer may use the audit reports solely for the purposes of meeting Customer’s audit requirements under Data Protection Laws to confirm that Verifiable’s Processing of Customer Personal Data complies with this Addendum.

9. Data Transfers. During the term of the Addendum, Customer Personal Data shall at all times be hosted on servers that are physically located in the United States, unless otherwise agreed in writing by the parties.  Customer shall comply, and provide Verifiable with commercially reasonable assistance to comply, with all applicable data privacy, security, and cross-border transfer laws, regulations, and guidelines in the country to which and from which Customer Personal Data will be transferred.  The parties will work together to legitimize any cross-border exchange of Customer Personal Data through data transfer mechanisms approved under Data Protection Laws, such as United Kingdom - or Europe Union - approved standard contractual clauses or binding corporate rules with respect to transfers of Personal Data out of the United Kingdom or Europe Union.

Deletion or Return of Customer Personal Data.  Following termination or expiration of the Agreement, Verifiable shall, at Customer's option, delete or return Customer Personal Data and all copies to Customer, except as required by applicable law.  If Verifiable retains Customer Personal Data pursuant to applicable law, Verifiable agrees that all such Customer Personal Data will continue to be protected in accordance with this Addendum.

11. General Terms.  This Addendum will, notwithstanding the expiration or termination of the Agreement, remain in effect until, and automatically expire upon, Verifiable’s deletion or return of all Customer Personal Data.  Should any provision of this Addendum be invalid or unenforceable, then the remainder of this Addendum shall remain valid and in force.  The invalid or unenforceable provision shall be either (a) amended as necessary to ensure its validity and enforceability, while preserving the intent of the provision as closely as possible; or, if this is not possible, (b) construed in a manner as if the invalid or unenforceable part had never been contained therein.  To the extent of any conflict or inconsistency between this Addendum and the other terms of the Agreement in relation to the Processing of Customer Personal Data, this Addendum will govern.  Unless otherwise expressly stated herein, the parties will provide notices under this Addendum in accordance with the Agreement, provided that all such notices may be sent via email.  Any liabilities arising in respect of this Addendum are subject to the limitations of liability under the Agreement.  This Addendum will be governed by and construed in accordance with the governing law and jurisdiction provisions in the Agreement, unless required otherwise by Data Protection Laws.
Last Updated: August 1, 2023


1. Subject matter and duration of the Processing of Customer Personal Data
The subject matter and duration of the Processing are as described in the Agreement and the Addendum.

2. Nature and purpose of the Processing of Customer Personal DataThe nature of the Processing involves those activities reasonably required to facilitate or support the provision of the Services as described in the Agreement and the Addendum.The purpose of the Processing of Customer Personal Data includes the following:

• Helping to ensure security and integrity, to the extent the use of Customer Personal Data is reasonably necessary and proportionate for these purposes;

• Debugging to identify and repair errors that impair existing intended functionality;

• Short-term, transient use, specifically identity verification and fraud prevention;

• Performing the Services as described in the Agreement and carrying out the instructions set forth in Section 2.2, including providing customer service, processing or fulfilling orders and transactions, verifying customer information, processing payments, providing financing, providing analytic services, providing storage, or providing similar services on behalf of Customer;

• Undertaking internal research for technological development and demonstration; and

• Undertaking activities to verify or maintain the quality or safety of the Services, and to improve, upgrade, or enhance the Services.

3. The categories of Consumers to whom Customer Personal Data relatesThe categories of Consumers shall be as is contemplated or related to the Processing described in the Agreement, and may include, healthcare physicians, nurses, and therapists.

4. The categories of Customer Personal Data The categories of Customer Personal Data Processed are those categories contemplated in and permitted by Agreement, and may include name, license type, license number, license state, and other licensing or credentialing information.

5. The sensitive data included in Customer Personal DataThe categories of sensitive Customer Personal Data Processed are those categories contemplated in and permitted by the Agreement, and may include Social Security Number.The restrictions or safeguards applied to such data are described in Appendix 2.   

6. The frequency of Customer’s transfer of Customer Personal Data to Verifiable:On a continuous basis for the term of the Agreement.

7. The period for which Customer Personal Data will be retained, or, if that is not possible, the criteria used to determine that period:As set forth in the Addendum or the Agreement.

8. For transfers to Subprocessors, the subject matter, nature and duration of the Processing of Customer Personal Data:For the same subject matter, nature, and duration set forth above.


1. Information Security Program.  Implement, maintain, and comply with information security policies and procedures designed to protect the confidentiality, integrity, and availability of Customer Personal Data and any systems that store or otherwise Process it, which are: (a) aligned with an industry-standard control framework (e.g., NIST SP 800-53, ISO 27001, CIS Critical Security Controls); (b) approved by executive management; (c) reviewed and updated at least annually; and (d) communicated to all personnel with access to Customer Personal Data. 

2. Risk Assessment.  Maintain risk assessment procedures for the purposes of periodic review and assessment of risks to the organization, monitoring and maintaining compliance with the organization’s policies and procedures, and reporting the condition of the organization’s information security and compliance to internal senior management.

3. Personnel Training.  Train personnel to maintain the confidentiality, integrity, and availability of Customer Personal Data, consistent with the terms of the Agreement and Data Protection Laws.

4. Vendor Management.  Prior to engaging Subprocessors and other subcontractors, conduct reasonable due diligence and monitoring to ensure subcontractors are capable of maintaining the confidentiality, integrity, and availability of Customer Personal Data.

5. Access Controls.  Only authorized personnel and third parties are permitted to access Customer Personal Data.  Maintain logical access controls designed to limit access to Customer Personal Data and relevant information systems (e.g., granting access on a need-to-know basis, use of unique IDs and passwords for all users, periodic review and revoking or changing access when employment terminates or changes in job functions occur).

6. Secure User Authentication.  Maintain password controls designed to manage and control password strength, expiration, and usage.  These controls include prohibiting users from sharing passwords and requiring that passwords controlling access to Customer Personal Data must: (a) not be stored in readable format on the organization’s computer systems; and (b) if newly issued, be changed after first use.

7. Incident Detection and Response.  Maintain policies and procedures to detect and respond to actual or reasonably suspected Security Incidents, and encourage the reporting of such incidents.

8. Encryption.  Apply industry standard encryption to Customer Personal Data: (a) stored on any medium (i.e., laptops, mobile devices, portable storage devices, file servers and application databases); and (b) transmitted across any public network (such as the Internet) or wirelessly.

9. Network Security.  Implement network security controls such as up-to-date firewalls, layered DMZs, updated intrusion detection and prevention systems and other traffic and event correlation procedures designed to protect systems from intrusion and limit the scope of any successful attack.

10. Vulnerability Management.  Detect, assess, mitigate, remove, and protect against new and existing security vulnerabilities and threats, including viruses, bots, and other malicious code, by implementing vulnerability management, threat protection technologies, and scheduled monitoring procedures.

11. Change Control.  Follow change management procedures and implement tracking mechanisms designed to test, approve, and monitor all changes to the organization’s technology and information assets.

12. Physical Security.  Take steps to ensure the physical and environmental security of data centers, server room facilities and other areas containing Customer Personal Data, including those managed by our Subprocessors, which can be found at

13. Business Continuity and Disaster Recovery.  Maintain business continuity and disaster recovery policies and procedures designed to maintain service and recover from foreseeable emergency situations or disasters.