Skip to content
Insurtrix
ProductPricingGet Started Free

Data Processing Agreement

Version 1.0Effective Date: June 18, 2025Last updated: March 23, 2026
  • Introduction
  • I. Definitions
  • II. Scope of Processing
  • III. Categories of Data Processed
  • IV. Data Collection and Access
  • V. Data Retention
  • VI. Data Ownership
  • VII. Data Subject Rights and Request Handling
  • VIII. Security Measures
  • IX. Subprocessors
  • X. Audit and Transparency
  • XI. Confidentiality
  • XII. Liability and Limitation
  • XIII. Term and Termination
  • XIV. Governing Law
  • XV. Notices
  1. 001

This Data Processing Agreement ("Agreement") is entered into by and between Insurtrix, as processor and service provider (the "Company"), and the Client identified in the applicable order, proposal, invoice, statement of work, subscription, or other commercial record governing the Services, as controller and business customer (the "Client"). This Agreement governs the Company's Processing of Personal Data and other Client Data in connection with the Services.

This Agreement is intended for business-to-business SaaS, software-enabled service, data, analytics, automation, and infrastructure support relationships. It supplements the commercial terms governing the Services and will control solely with respect to the Processing terms stated herein to the extent of any direct conflict, while all non-processing commercial matters remain governed by the applicable service terms, order documentation, or other binding agreement between the parties.

Section I

I. Definitions

For purposes of this Agreement, the following capitalized terms have the meanings set forth below. Defined terms will be interpreted broadly in favor of operational enforceability, service continuity, and the protection of the Company's systems, business methods, and legal rights.

Company means Insurtrix, together with its affiliates, personnel, contractors, professional advisors, successors, permitted assigns, and approved service providers acting on its behalf in connection with the Services.

Client means the business customer, controller, legal entity, organization, or other commercial party that receives or requests the Services, including its affiliates, personnel, administrators, representatives, agents, and authorized users acting through or on behalf of such party.

Services means the software, data engineering, analytics, automation, reporting, workflow, operational support, professional services, infrastructure support, implementation services, maintenance services, and related managed services made available by the Company to the Client from time to time.

Personal Data means any information that identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked, directly or indirectly, with an identified or identifiable natural person, household, or other protected individual under Applicable Law.

Client Data means all data, records, files, credentials, configurations, extracts, feeds, reports, and other information made available to the Company by or on behalf of the Client, whether sourced from Client systems, third-party systems authorized by the Client, or information otherwise submitted for Processing in connection with the Services.

Customer Data means Client Data relating to the Client's customers, consumers, purchasers, end users, account holders, visitors, or other customer-facing records, including information originating from point-of-sale systems, customer relationship systems, commerce systems, or comparable Client-authorized source systems.

Employee Data means Client Data relating to the Client's current, former, or prospective employees, contractors, officers, directors, temporary workers, or similar personnel records, including employment, payroll, tax, performance, and human resources information.

Business Data means Client Data relating to the Client's vendors, procurement, invoices, manifests, purchase records, expense records, operational records, financial administration, and other commercial or operational activities that do not solely consist of Customer Data or Employee Data.

Processing means any operation or set of operations performed on data or information, whether manual, automated, or semi-automated, including access, receipt, review, collection, recording, organization, structuring, storage, hosting, retrieval, consultation, use, analysis, transformation, aggregation, formatting, transmission, disclosure, export, restriction, deletion, destruction, or other handling of data.

Subprocessor means any third-party service provider, contractor, consultant, support provider, platform provider, hosting provider, infrastructure provider, payment processor, or similar external party engaged by the Company to assist in performing or supporting any portion of the Services or related Processing activities.

Data Subject means any identified or identifiable natural person to whom Personal Data relates, including a customer, employee, contractor, applicant, vendor representative, business contact, or other individual whose information is included within Client Data.

Applicable Law means all laws, regulations, governmental requirements, regulatory guidance, court orders, and legally binding obligations applicable to the parties, the Services, or the Processing of data under this Agreement, including privacy, data protection, employment, tax, records management, and commercial laws to the extent relevant to the Services.

Written Request means a written notice, instruction, or request delivered to support@zyntron.dev by an authorized representative of the Client or, where applicable, by a Data Subject, in each case containing sufficient detail to identify the requester, the relevant data, and the action sought.

Section II

II. Scope of Processing

The Company will Process Client Data solely as reasonably necessary to provide, administer, support, maintain, secure, document, and improve the Services engaged by the Client and to carry out related business operations that are integral to the delivery of those Services. The Company does not obtain or Process Client Data for unrelated consumer-facing purposes.

The Services may include software services, data engineering services, analytics services, automation services, reporting services, implementation services, and infrastructure support services. All Processing performed by the Company under this Agreement is undertaken on behalf of the Client in connection with the particular Services selected, purchased, requested, or otherwise used by the Client.

The scope, nature, frequency, duration, and volume of Processing will vary depending on the Services engaged, the systems made available by the Client, the instructions provided by the Client, the Client's operational requirements, and the Company's standard service delivery methods. The Client acknowledges that different service lines may require materially different forms of access, handling, retention, and Processing activity.

1. Client-Directed Service Relationship

The Client authorizes the Company to Process Client Data to the extent reasonably required for the Company to perform its contractual, support, administrative, analytical, automation, reporting, and operational obligations under the Services. Except as otherwise required by Applicable Law, the Company will not knowingly Process Client Data outside the bounds of the Services requested by the Client.

2. Operational Discretion

The Company retains discretion over the technical, administrative, and organizational methods used to deliver the Services, including the format, timing, workflow, sequencing, and service architecture through which Processing occurs, provided that such Processing remains tied to the provision of the Services and the Company's legitimate operational requirements.

Section III

III. Categories of Data Processed

The parties acknowledge that the Company may Process multiple categories of Client Data depending on the Services engaged. The categories below are illustrative of the data types contemplated by this Agreement and are intended to be interpreted broadly where necessary to support delivery of the Services.

1. Customer Data from Client Point-of-Sale and Related Customer Systems

Customer Data may be received from the Client's point-of-sale systems and other Client-authorized customer systems and may include the following categories of information:

(a) Names.

(b) Contact information.

(c) Date of birth.

(d) Driver's license numbers.

(e) Purchase and transaction history.

2. Employee Data

Employee Data may be Processed where the Services support workforce administration, reporting, analytics, document handling, or operational record management and may include the following categories of information:

(a) Names.

(b) Contact information.

(c) Social Security numbers.

(d) Tax documents, including W-2, W-9, and I-9 records.

(e) Banking and payroll information.

(f) Performance records and employment history.

3. Business and Operational Data

Business Data and operational records may be Processed where the Services support financial administration, procurement, reporting, reconciliation, workflow automation, or operational oversight and may include the following categories of information:

(a) Vendor data.

(b) Invoices.

(c) Manifests.

(d) Purchase records.

(e) Expense tracking data.

4. Payment Data Exclusion

For avoidance of doubt, the Company does not Process credit card data or banking transaction data for payment settlement or payment acceptance. Payment processing is handled by an independent third-party payment processor, and the Company is not the merchant processor of record for payment card transactions.

Section IV

IV. Data Collection and Access

The Company accesses Client Data only through systems, accounts, exports, integrations, files, credentials, or other sources that the Client authorizes. The Client is solely responsible for determining whether it has the legal right and internal authority to grant such access and to instruct the Company to Process the relevant data.

1. Client-Authorized Systems Only

The Company does not independently source, scrape, purchase, or obtain Client Data outside Client-authorized systems or Client-authorized data flows for purposes of this Agreement. Any Processing performed by the Company is dependent on the Client's affirmative decision to provide access to a particular source or dataset.

2. Credentials and Access Materials

The Client must provide the access credentials, integration permissions, application programming interface keys, exports, tokens, user access, and other access materials reasonably necessary for the Company to perform the Services. The Company may rely on the apparent validity of such access materials without independent investigation into the Client's internal approval chain.

3. Client Control and Revocation

The Client controls whether access is granted, limited, modified, or revoked and may revoke access at any time through the applicable source system, credential rotation, permission change, written instruction, or other access-control method. The Client acknowledges that revocation or degradation of access may suspend, limit, delay, or prevent the Services.

4. No Independent Collection

Except for routine operational metadata generated through the Company's provision of the Services, the Company does not independently collect Client Data outside of Client-authorized sources. The Company has no duty to collect or maintain datasets that the Client has not affirmatively chosen to make available.

Section V

V. Data Retention

The retention rules in this Section are material to the parties' commercial arrangement, operational model, and service design. The Client acknowledges and agrees that the Company's retention practices are not subject to unilateral modification by the Client absent a separate signed writing expressly approved by the Company.

1. Customer Data Retention

Retention of Customer Data is governed by the Company's Privacy Policy and internal retention practices applicable to the Services. Unless the Company expressly agrees otherwise in a separate signed writing, purging of Customer Data begins at ninety (90) days after Client offboarding, and complete deletion or final removal from active and archival locations may take up to one (1) year following offboarding.

The Client acknowledges that staged deletion, archival cycling, system integrity controls, dispute preservation, backup rotation, and related operational factors may affect the timing of full deletion. The Customer Data retention rule stated in this subsection is non-negotiable unless the Company expressly agrees otherwise in writing.

2. Business Data and Employee Data Retention

Business Data and Employee Data may be retained indefinitely. Their retention period depends on service requirements, record-keeping requirements, operational continuity, legal considerations, reporting history, platform integrity, dispute preservation, and other business needs determined by the Company in its discretion.

The Client expressly acknowledges that indefinite retention of Business Data and Employee Data is part of the Company's standard operating model and is not conditioned on the continuation of active Services. The Company is not obligated to apply a fixed deletion schedule to such categories of data.

3. Retention After Termination

Termination, cancellation, expiration, suspension, or offboarding does not create an immediate deletion obligation. The Company may retain, archive, suppress, anonymize, restrict, or delete Client Data in accordance with this Agreement, its internal practices, and Applicable Law.

Section VI

VI. Data Ownership

The parties agree that ownership and control rights in data are allocated as set forth in this Section. These allocations are fundamental to the Company's managed service model, pricing structure, and legal risk allocation and will be interpreted broadly in favor of preserving the Company's ownership of materials residing within its own systems and workflows.

1. Client Ownership of Original Source Data

As between the parties, the Client retains whatever ownership rights it possesses in the original source data maintained within the Client's own source systems and records. Nothing in this Agreement transfers ownership of the Client's original source-system records while such records remain within the Client-controlled environment.

2. Company Ownership of Processed and Derived Data

The Company owns all processed, structured, normalized, transformed, mapped, enriched, aggregated, analyzed, organized, reformatted, derived, output, and otherwise modified data residing within or generated through the Company's systems, workflows, reports, records, and service environments, together with all related metadata, logs, summaries, models, analytics, and operational records.

For purposes of this Agreement, any Client Data that has been imported into, handled within, or materially processed through the Company's systems may be maintained as part of the Company's service records, derived datasets, operational datasets, or analytical records, and the Company retains all rights, title, and interest in those processed and derived forms to the fullest extent permitted by Applicable Law.

3. No Return, Export, or Transfer Obligation

Upon termination or at any other time, the Company is not obligated to return, export, transfer, migrate, deliver, package, or make available any Client Data, processed data, derived data, or other records maintained within the Company's systems unless the Company separately agrees to do so in a signed writing. Any such work, if accepted by the Company, may be subject to additional fees, timing constraints, verification requirements, and scope limitations determined by the Company.

4. Company Discretion Over Retention and Deletion

The Company may retain or delete data within its systems at its discretion, subject to the express retention rules stated in this Agreement and any non-waivable requirements imposed by Applicable Law. Nothing in this Agreement obligates the Company to preserve data for the Client's convenience, future portability, or internal archival preferences.

Section VII

VII. Data Subject Rights and Request Handling

The Company will reasonably support requests for data access and deletion relating to Client Data and Customer Data where applicable. The parties acknowledge that prompt handling of such requests depends on adequate request detail, lawful authority, and the Company's ability to authenticate the requester and identify the relevant records.

1. Submission Requirements

All data access requests, deletion requests, and related privacy rights requests must be submitted in writing to support@zyntron.dev. Requests must identify the requesting party, the Client relationship if any, the data or records at issue, and the action requested with sufficient detail to permit reasonable verification and response.

2. Company Assistance

The Company may coordinate with the Client before acting on a request where the Company reasonably determines that the request concerns Client-directed Processing, requires validation of the Client's instructions, or implicates records that are maintained as part of broader service, legal, security, payroll, employment, or operational files.

3. Deletion Timing

The Company will process validated deletion requests within thirty (30) business days after receipt of the applicable Written Request. For purposes of this subsection, processing a deletion request may include deletion, anonymization, suppression, restriction, or a written determination that all or part of the requested data will be retained pursuant to this Agreement or Applicable Law.

This Section applies to Client Data and Customer Data where applicable. Nothing in this Section requires the Company to disregard the retention rights, ownership rights, confidentiality obligations, or lawful preservation rights expressly stated elsewhere in this Agreement.

Section VIII

VIII. Security Measures

The Company implements industry-standard administrative, technical, and organizational safeguards designed to protect Client Data against unauthorized access, disclosure, alteration, misuse, or destruction. Such safeguards are intended to reduce risk and to support a professional enterprise service environment, but they do not constitute an absolute guarantee against every security event or operational failure.

1. Access Control and Encryption

Client Data is protected through access-control measures, role-based limitations, and encryption practices appropriate to the nature of the Services and the sensitivity of the data involved. Access is limited to authorized personnel and authorized service providers with a legitimate operational need to know.

2. Ongoing Review

The Company continuously reviews and improves its security practices in light of evolving operational requirements, risk conditions, service changes, and recognized security standards. Security governance is designed to be practical, risk-based, and appropriate for an enterprise SaaS and managed services environment.

3. Framework Alignment

Without committing to any particular certification unless expressly stated in a signed writing, the Company aligns its security posture with recognized security frameworks and control principles, including ISO 27001-aligned concepts relating to access management, confidentiality, integrity, availability, change control, and operational discipline.

Section IX

IX. Subprocessors

The Company may use Subprocessors and other third-party service providers to support the performance of the Services and related Processing activities. The Company's ability to engage and replace such providers is part of its standard operating model and remains within the Company's reasonable discretion.

1. Permitted Categories of Subprocessors

Subprocessors may include providers of infrastructure, hosting, communications, support tooling, security tooling, observability tooling, professional services, consulting support, and payment processing or payment administration services, as applicable to the Services.

2. Protection Standards

The Company will take commercially reasonable steps to ensure that Subprocessors engaged for Processing activities are bound by contractual, professional, or legal obligations requiring appropriate confidentiality and data protection standards suitable for the nature of the work performed.

3. No Vendor Disclosure Obligation

Unless otherwise required by Applicable Law or expressly agreed in a signed writing, the Company is not obligated to disclose the identity, architecture, internal operating methods, or commercial terms of its Subprocessors as a condition of performing the Services.

Section X

X. Audit and Transparency

The Client acknowledges that the Company operates proprietary systems, workflows, security controls, and operational methods that constitute valuable confidential and trade secret information. The audit and transparency rights available under this Agreement are therefore limited as set forth below.

1. No Direct Audit Access

The Company does not provide the Client, the Client's auditors, or any third party with direct audit access to the Company's internal systems, facilities, tooling, logs, personnel, environments, repositories, or operational records. No on-site inspection, live penetration activity, intrusive testing, or unrestricted system review is permitted absent the Company's separate written consent.

2. No Disclosure of Proprietary Architecture

The Company does not disclose proprietary infrastructure details, internal security architecture, confidential operating procedures, source materials, or internal design documentation except to the limited extent the Company independently determines necessary and appropriate. Requests that would expose trade secrets, sensitive security information, or competitively sensitive information may be declined in full.

3. General Information Upon Request

Upon a reasonable Written Request, the Company may provide general information regarding its data protection practices, administrative controls, and general security posture. Any such response may be provided in summary form and may be conditioned on confidentiality, scope limitations, identity verification, and reimbursement of extraordinary response costs where appropriate.

Section XI

XI. Confidentiality

Each party will protect the other party's confidential information using at least reasonable care and no less than the degree of care it uses to protect its own confidential information of a similar nature. Confidential information includes Client Data, Personal Data, business records, technical information, non-public commercial terms, and all non-public materials disclosed or made accessible in connection with the Services.

1. Use Restriction

Confidential information may be used solely for the performance, receipt, administration, enforcement, or lawful protection of the Services and the parties' rights and obligations. Neither party may disclose the other party's confidential information except as permitted by this Agreement or as required by Applicable Law.

2. Permitted Recipients

The Company may disclose confidential information to its personnel, contractors, advisors, and Subprocessors with a legitimate need to know, provided such recipients are subject to confidentiality obligations or professional duties no less protective than those reflected in this Agreement.

3. Survival

The confidentiality obligations in this Section survive termination or expiration of the Services and continue for so long as the applicable information remains confidential or protected under Applicable Law.

Section XII

XII. Liability and Limitation

This Agreement allocates risk between the parties and reflects the pricing, service model, and legal assumptions on which the Company agreed to perform the Services. The limitations in this Section are material and will apply to the fullest extent permitted by Applicable Law.

1. Exclusion of Indirect Damages

In no event will the Company be liable for any indirect, incidental, consequential, special, exemplary, punitive, or similar damages, or for any loss of profits, loss of goodwill, loss of anticipated savings, loss of business opportunity, business interruption, reputational harm, or loss or corruption of data, even if advised of the possibility of such damages.

2. No Service Guarantee

The Company does not warrant that the Services will be uninterrupted, error-free, immune from delay, or free from every defect, vulnerability, or incompatibility. The Client acknowledges that data Processing services necessarily depend on third-party systems, source-system quality, timely Client cooperation, and numerous factors outside the Company's direct control.

3. Aggregate Liability Cap

To the fullest extent permitted by Applicable Law, the aggregate liability of the Company arising out of or relating to this Agreement, the Processing of Client Data, or the parties' relationship will not exceed the greater of: (a) the total amounts actually paid by the Client to the Company for the Services during the three (3) months immediately preceding the event first giving rise to the claim; or (b) five hundred United States dollars (US$500).

The limitations stated in this Section apply regardless of the form of action, whether in contract, tort, statute, strict liability, or otherwise, and they will not be enlarged by any failure of essential purpose or by any heightened theory of damages asserted by the Client or a third party.

Section XIII

XIII. Term and Termination

This Agreement becomes effective on the Effective Date stated above or, if earlier, on the date the Company first begins Processing Client Data in connection with the Services. This Agreement remains in effect for so long as the Services are active or the Company continues to Process Client Data under the parties' service relationship.

1. Termination Upon Service Cancellation

Unless the parties execute a separate signed writing stating otherwise, this Agreement automatically terminates when the Services are fully cancelled or otherwise concluded and the Company no longer maintains an active service relationship with the Client, except to the extent that continuing Processing, retention, or preservation is permitted or required under this Agreement or Applicable Law.

2. Surviving Provisions

All provisions that by their nature should survive termination will survive, including those relating to retention, ownership, confidentiality, limitation of liability, notices, governing law, dispute venue, payment obligations, and the Company's rights to retain or delete data in accordance with this Agreement.

Section XIV

XIV. Governing Law

This Agreement and any dispute, claim, or controversy arising out of or relating to this Agreement, the Services, or the Processing of Client Data will be governed by and construed in accordance with the laws of the State of Washington, without regard to conflict of laws rules that would require the application of another jurisdiction's laws.

The parties agree that the state courts located in King County, Washington, and, where federal jurisdiction exists, the United States District Court for the Western District of Washington, will have exclusive jurisdiction and venue over any action or proceeding arising out of or relating to this Agreement. Each party irrevocably consents to such jurisdiction and venue.

Section XV

XV. Notices

All notices, instructions, requests, complaints, privacy requests, and other communications under this Agreement must be sent to support@zyntron.dev. Notices from the Client must be transmitted from an address or representative reasonably associated with the Client and must contain sufficient detail to allow the Company to identify the matter at issue and respond appropriately.

The Company may provide notices, responses, and other communications under this Agreement through support@zyntron.dev or through another business contact channel that the Company has used with the Client in the ordinary course of the Services. The Client is responsible for maintaining accurate contact information and for monitoring its designated business communication channels.

Company

Contractor IQ gives commercial insurance agents a timing and context advantage across contractor profile review, workflow, and quote preparation.

Explore

  • Product
  • Pricing
  • Contact
  • Privacy
  • Terms

© 2025 Insurtrix | All rights reserved