TILT LEGAL HUB

Data Processing Agreement

Data Processing Agreement

Last Updated: April 15, 2024

This Data Processing Agreement (“DPA”) reflects the parties’ agreement with respect to the Processing of Personal Data by us on behalf of you in connection with the Tilt Subscription Services under the Tilt Customer Terms of Service available at https://hellotilt.com/customer-terms-of-service/ between you and us (also referred to in this DPA as the “Agreement”). 

This DPA is supplemental to, and forms an integral part of, the Agreement and is effective upon its incorporation into the Agreement, which may be specified in the Agreement, an Order Form, or an executed amendment to the Agreement. In case of any conflict or inconsistency this DPA will take precedence over the terms of the Agreement unless otherwise noted in an Order Form. 

1. Definitions

“California Personal Information” means Personal Data that is subject to the protection of the CCPA.

“CCPA” means California Civil Code Sec. 1798.100 et seq. (also known as the California Consumer Privacy Act of 2018), and its amendments.

“Consumer”, “Business”, “Sell” and “Service Provider” will have the meanings given to them in the CCPA. 

“Controller” means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the Processing of Personal Data.

“Data Protection Laws” means all applicable worldwide legislation relating to data protection and privacy which applies to the respective party in the role of Processing Personal Data in question under the Agreement, including without limitation European Data Protection Laws, and the CCPA; in each case as amended, repealed, consolidated or replaced from time to time. 

“Data Subject” means the individual to whom Personal Data relates.

“Europe” means the European Union, the European Economic Area and/or their member states, Switzerland and the United Kingdom. 

“European Data” means Personal Data that is subject to the protection of European Data Protection Laws.

“European Data Protection Laws” means data protection laws applicable in Europe, including: (i) Regulation 2016/679 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (“GDPR”); (ii) Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector; and (iii) applicable national implementations of (i) and (ii); or (iii) GDPR as it forms parts of the United Kingdom domestic law by virtue of Section 3 of the European Union (Withdrawal) Act 2018 (“UK GDPR”); in each case, as may be amended, superseded or replaced.  

“Instructions” means the written, documented instructions issued by a Controller to a Processor, and directing the same to perform a specific or general action with regard to Personal Data (including, but not limited to, depersonalizing, blocking, deletion, making available).

“Permitted Affiliates” means any of your Affiliates that (i) are permitted to use the Subscription Services pursuant to the Agreement, but have not signed their own separate agreement with us and are not a “Customer” as defined under the Agreement, (ii) qualify as a Controller of Personal Data Processed by us, and (iii) are subject to European Data Protection Laws.

“Personal Data” means any information relating to an identified or identifiable individual where (i) such information is contained within Customer Data; and (ii) is protected similarly as personal data, personal information or personally identifiable information under applicable Data Protection Laws.

“Personal Data Breach” means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Personal Data transmitted, stored or otherwise Processed by us and/or our Sub-Processors in connection with the provision of the Subscription Services. “Personal Data Breach” will not include unsuccessful attempts or activities that do not compromise the security of Personal Data, including unsuccessful log-in attempts, pings, port scans, denial of service attacks, and other network attacks on firewalls or networked systems.

“Processing” means any operation or set of operations which is performed on Personal Data, encompassing the collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction or erasure of Personal Data. The terms “Process”, “Processes” and “Processed” will be construed accordingly.

“Processor” means a natural or legal person, public authority, agency or other body which Processes Personal Data on behalf of the Controller.

“Standard Contractual Clauses” means the standard contractual clauses annexed to the European Commission’s Decision (EU) 2021/914 of 4 June 2021 currently found here as may be amended, superseded or replaced.

“Sub-Processor” means any Processor engaged by us or our Affiliates to assist in fulfilling our obligations with respect to the provision of the Subscription Services under the Agreement.  Sub-Processors may include third parties or our Affiliates but will exclude any Tilt employee or consultant.  

2. Tilt Obligations

2.1 Compliance with Instructions. We will only Process Personal Data for the purposes described in this DPA or as otherwise agreed within the scope of your lawful Instructions, except where and to the extent otherwise required by applicable law.  We will not sell any Customer Data. We are not responsible for compliance with any Data Protection Laws applicable to you or your industry that are not applicable to us.

2.2 Conflict of Laws. If we become aware that we cannot Process Personal Data in accordance with your Instructions due to a legal requirement under any applicable law, we will (i) promptly notify you of that legal requirement to the extent permitted by the applicable law; and (ii) where necessary, cease all Processing (other than merely storing and maintaining the security of the affected Personal Data) until such time as you issue new Instructions with which we are able to comply. If this provision is invoked, we will not be liable to you under the Agreement for any failure to perform the applicable Subscription Services until such time as you issue new lawful Instructions with regard to the Processing.

2.3 Security. We will implement and maintain appropriate technical and organizational measures to protect Personal Data from Personal Data Breaches, as described under Annex 2 to this DPA (“Security Measures”). Notwithstanding any provision to the contrary, we may modify or update the Security Measures at our discretion provided that such modification or update does not result in a material degradation in the protection offered by the Security Measures and still complies with our obligations under applicable law.  

2.4 Confidentiality. We will ensure that any personnel whom we authorize to Process Personal Data on our behalf is subject to appropriate confidentiality obligations (whether a contractual or statutory duty) with respect to that Personal Data.

2.5 Personal Data Breaches. We will notify you without undue delay (no later than 3 business days) after we become aware of any Personal Data Breach and will provide timely information relating to the Personal Data Breach as it becomes known or reasonably requested by you. At your request, we will promptly provide you with such reasonable assistance as necessary to enable you to notify relevant Personal Data Breaches to competent authorities and/or affected Data Subjects, if you are required to do so under Data Protection Laws.

2.6 Deletion or Return of Personal Data. We will delete or return all Customer Data, including Personal Data (including copies thereof) Processed pursuant to this DPA, on termination or expiration of your Subscription Service in accordance with the procedures set out in our security policies. This term will apply except where we are required by applicable law to retain some or all of the Customer Data, or where we have archived Customer Data on back-up systems, which data we will securely isolate and protect from any further Processing and delete in accordance with our deletion practices. You may request the deletion of your Tilt account after expiration or termination of your subscription by sending a request to security@hellotilt.com with a cc to legal@hellotilt.com.

3. Customer Responsibilities

 

3.1 Compliance with Laws and Data Accuracy. You acknowledge and agree that you will be solely responsible for: (i) the accuracy, quality, and legality of Customer Data and the means by which you acquired Personal Data; (ii) complying with all necessary transparency and lawfulness requirements under applicable Data Protection Laws for the collection and use of the Personal Data, including obtaining any necessary consents and authorizations (particularly for use by Customer for marketing purposes); (iii) ensuring you have the right to transfer, or provide access to, the Personal Data to us for Processing in accordance with the terms of the Agreement (including this DPA); (iv) ensuring that your Instructions to us regarding the Processing of Personal Data comply with applicable laws, including Data Protection Laws; and (v) complying with all laws (including Data Protection Laws) applicable to content created, sent or managed through the Subscription Services. You will inform us without undue delay if you are not able to comply with your responsibilities under this “Compliance with Laws” section or applicable Data Protection Laws.

3.2 Controller Instructions. You agree that the Agreement together with this DPA cover your Instructions to us in relation to the Processing of Personal Data. However, we understand and agree that you may provide additional instructions during the subscription term that are consistent with the Agreement, this DPA and the nature and lawful use of the Subscription Service.

3.3 Security. You are responsible for independently determining whether the data security provided for in the Subscription Service adequately meets your obligations under applicable Data Protection Laws. You are also responsible for your secure use of the Subscription Service, including protecting the security of Personal Data in transit to and from the Subscription Service (including to securely backup or encrypt any such Personal Data).

4. Data Subject Requests. 

Upon your written request we will provide reasonable assistance to you to respond to any Data Subject Requests or requests from data protection authorities relating to the Processing of Personal Data under the Agreement. 

If a Data Subject Request or other communication regarding the Processing of Personal Data under the Agreement is made directly to us, we will promptly inform you and will advise the Data Subject to submit their request to you. You will be solely responsible for responding substantively to any such Data Subject Requests or communications involving Personal Data.

5. Sub-Processors

You agree we may engage Sub-Processors to Process Personal Data on your behalf, and we do so in three ways. First, we may engage Sub-Processors to assist us with hosting and infrastructure. Second, we may engage with Sub-Processors to support product features and integrations. Third, we may engage with Sub-Processors for service and support. We have currently appointed, as Sub-Processors, the third parties and Tilt Affiliates listed in Annex 3 to this DPA. 

Where we engage Sub-Processors, we will impose data protection terms on the Sub-Processors that provide at least the same level of protection for Personal Data as those in this DPA (including, where appropriate, the Standard Contractual Clauses), to the extent applicable to the nature of the services provided by such Sub-Processors. We will remain responsible for each Sub-Processor’s compliance with the obligations of this DPA and for any acts or omissions of such Sub-Processor that cause us to breach any of its obligations under this DPA.

6. Data Transfers

 

You acknowledge and agree that we may access and Process Personal Data as necessary to provide the Subscription Service in accordance with the Agreement, and in particular that Personal Data may be transferred to and Processed by Tilt in the United States and to other jurisdictions where Sub-Processors have operations. Wherever Personal Data is transferred outside its country of origin, each party will ensure such transfers are made in compliance with the requirements of Data Protection Laws.

 

7. Additional Provisions for California Personal Information

7.1 Scope. The “Additional Provisions for California Personal Information” section of the DPA will apply only with respect to California Personal Information.

 

7.2 Roles of the Parties. When processing California Personal Information in accordance with your Instructions, the parties acknowledge and agree that you are a Business and we are a Service Provider for the purposes of the CCPA.

 

7.3 Responsibilities. The parties agree that we will Process California Personal Information as a Service Provider strictly for the purpose of performing the Subscription Services and Consulting Services under the Agreement  (the “Business Purpose”) or as otherwise permitted by the CCPA.

8.  General Provisions

8.1 Amendments. Notwithstanding anything else to the contrary in the Agreement and without prejudice to the “Compliance with Instructions” or ‘Security’ sections of this DPA, we reserve the right to make any updates and changes to this DPA. 

 

8.2 Severability. If any individual provisions of this DPA are determined to be invalid or unenforceable, the validity and enforceability of the other provisions of this DPA will not be affected.

 

8.3 Permitted Affiliates. You enter into this DPA (including, where applicable, the Standard Contractual Clauses) on behalf of yourself and in the name and on behalf of your Permitted Affiliates. For the purposes of this DPA only, and except where indicated otherwise, the terms “Customer”, “you” and “your” will include you and such Permitted Affiliates.

 

8.4 Authorization. The legal entity agreeing to this DPA as Customer represents that it is authorized to agree to and enter into this DPA for and on behalf of itself and, as applicable, each of its Permitted Affiliates.

 

Annex 1 – Details of Processing

A. List of Parties

 

Data exporter:

Name: Customer’s legal entity name as stated in the Order Form. 

Address: Customer’s physical address as stated in the Order Form.

Contact person’s name, company role, and contact details: Customer’s security contact details as stated in the Order Form.

Activities relevant to the data transferred under these Clauses: Processing of Personal Data in connection with Customer’s use of the Subscription Services under the Agreement and Customer Terms of Service. 

Role (controller/processor): Controller

Data importer:

Name: Career Allies, Inc. dba Tilt

Address: 1281 E. Magnolia Street, Ste D, Fort Collins, Colorado, USA 

Contact person’s name, position and contact details: Royce Haynes, Data Protection Officer, security@hellotilt.com, 1281 E. Magnolia Street, Ste D, Fort Collins, Colorado, USA

Activities relevant to the data transferred under these Clauses: Processing of Personal Data in connection with Customer’s use of Tilt’s Subscription Services under the Agreement and Customer Terms of Service.

Role (controller/processor): Processor

B.  Description of Transfer

 

Categories of Data Subjects whose Personal Data is Transferred

You may submit Personal Data in the course of using the Subscription Service, the extent of which is determined and controlled by you in your sole discretion, and which may include, but is not limited to Personal Data relating to the following categories of Data Subjects:

End users including your employees, contractors, collaborators. 

Categories of Personal Data Transferred

You may submit Personal Data to the Subscription Services which may include but is not limited to the following categories of Personal Data: 

  1. Contact Information including legal name, email address, home address, phone number, pay information such as salary history and current compensation, and job title. 
  2. Any other Personal Data submitted by, sent to, or received by you, or your end users, via the Subscription Service.

 

Sensitive Data Transferred

The transfer of sensitive data may include medical information related to an employee’s leave of absence. 

Frequency of the transfer

Continuous

Nature of the Processing

Personal Data will be Processed in accordance with the Agreement (including this DPA) and may be subject to the following Processing activities: 

  1. Storage and other Processing necessary to provide, maintain and improve the Subscription Services provided to you; and/or
  1. Disclosure in accordance with the Agreement (including this DPA) and/or as compelled by applicable laws.

 

Purpose of the transfer and further processing

We will Process Personal Data as necessary to provide the Subscription Services pursuant to the Agreement, as further specified in the Order Form, and as further instructed by you in your use of the Subscription Services.

Period for which Personal Data will be retained

Subject to the “Deletion or Return of Personal Data” section of this DPA, we will Process Personal Data for the duration of the Agreement, unless otherwise mutually agreed to in writing. 

C.  Competent Supervisory Authority

For the purposes of the Standard Contractual Clauses, the supervisory authority that will act as competent supervisory authority will be determined in accordance with GDPR.

Annex 2 – Security Measures

We currently observe the Security Measures described in this Annex 2. All capitalized terms not otherwise defined herein will have the meanings as set forth in the General Terms.  For more information on these security measures, please refer to Tilt’s SOC 2 Type II Report, Security Overview, and Penetration Test Summaries, available upon request by emailing your Account Manager or Customer Success Manager

a) Access Control

i)  Preventing Unauthorized Product Access

Outsourced processing: We host our Service with cloud infrastructure providers. Additionally, we maintain contractual relationships with vendors in order to provide the Service in accordance with our DPA. We rely on contractual agreements, privacy policies, and vendor compliance programs in order to protect data processed or stored by these vendors.

Physical and environmental security: We host our product infrastructure with multi-tenant, outsourced infrastructure providers. We do not own or maintain hardware located at the outsourced infrastructure providers’ data centers. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems. Our physical and environmental security controls are audited for SOC 2 Type II compliance. Our outsourced infrastructure providers maintain their own SOC2 Type II compliance.

Authentication: We implement a uniform password policy for our customer products. Customers who interact with the products via the user interface must authenticate before accessing non-public customer data.

Authorization: Customer Data is stored in multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of our products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set.

ii)  Preventing Unauthorized Product Use

We implement industry standard access controls and detection capabilities for the internal networks that support its products.

Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure  providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules.

Intrusion detection and prevention: We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services.

Static code analysis: Code stored in our source code repositories  is checked for best practices and identifiable software flaws using automated tooling.

Penetration testing: We maintain relationships with industry recognized penetration testing service providers and perform penetration tests. The intent of the penetration tests is to identify and resolve foreseeable attack vectors and potential abuse scenarios. Penetration tests are performed against the application layers and infrastructure layers of the Tilt technology stack.

iii)    Limitations of Privilege & Authorization Requirements

Product access: A subset of our employees have access to the products and to customer data via controlled interfaces. The intent of providing access to a subset of employees is to provide effective customer support, product development and research, to troubleshoot potential problems, to detect and respond to security incidents and implement data security. Access is enabled through “just in time” (JITA) requests for access; all such requests are logged. Employees are granted access by role. Administrative or high risk access permissions are reviewed at least once every six months.

Background checks: Where permitted by applicable law,  Tilt employees undergo a third-party background or reference check. Employment offers are contingent upon the results of a third-party background check. All Tilt employees are required to conduct themselves in a manner consistent with company guidelines, non-disclosure requirements, and ethical standards.

b) Transmission Control

In-transit: We require HTTPS encryption (also referred to as SSL or TLS)  on all login interfaces by default. Our HTTPS implementation uses industry standard algorithms and certificates.

At-rest: We store user passwords following policies that follow industry standard practices for security.  We have implemented technologies to ensure that stored data is encrypted at rest. 

c) Input Control

Detection: We designed our infrastructure to log information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate employees of malicious, unintended, or anomalous activities. Our personnel, including security, operations, and support personnel, are responsive to known incidents.

Response and tracking: We maintain a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, we will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Notification to you will be in accordance with the terms of the Agreement. 

d) Availability Control

Infrastructure availability: The infrastructure providers use commercially reasonable efforts to ensure a minimum of 99.95% uptime. The providers maintain a minimum of N+1 redundancy to power, network, and heating, ventilation and air conditioning (HVAC) services.

Fault tolerance: Backup and replication strategies are designed to ensure redundancy and fail-over protections during a significant processing failure. Customer data is backed up to multiple durable data stores and replicated across multiple availability zones.

Online replicas and backups: Where feasible, production databases are designed to replicate data between no less than 1 primary and 1 secondary database. All databases are backed up and maintained using at least industry standard methods.

Disaster Recovery Plans: We maintain and regularly test disaster recovery plans to help ensure availability of information following interruption to, or failure of, critical business processes.

Our products are designed to ensure redundancy and seamless failover. The server instances that support the products are also architected with a goal to prevent single points of failure. This design assists our operations in maintaining and updating the product applications and backend while limiting downtime.

Annex 3 – Sub-Processors 

To help Tilt deliver the Subscription Services, we engage Sub-Processors to assist with our data processing activities. A list of our Sub-Processors and our purpose for engaging them is listed below. 

Third Party Sub-Processor Location Purpose and Applicable Service
Amazon AWS USA Cloud Infrastructure for our apps and services.
Google, Inc. USA Site analytics (web), customer interactions (email), and cloud Infrastructure for our apps and services.
Twilio, Inc. (SendGrid) USA Cloud Infrastructure for our apps and services.
Slack Technologies, LLC USA Communication platform for internal company use.
Atlassian, Inc. USA Project and workflow management tools and platform for internal company use.
Kustomer, Inc. USA Customer support.
AgileBits Inc. dba 1Password USA Password management.
Functional Software, Inc. dba Sentry USA Bug/error reporting tool.
Mixpanel, Inc. USA User engagement analytics.
HashiCorp, Inc. (Terraform Cloud) USA Remote state infrastructure management.
GitHub, Inc. USA Software development collaboration tool.
Zoom, Inc. USA Video conferencing, customer support.
Gong.io Inc. USA Video conferencing, customer support.
Hubspot USA Customer relationship management tool.