Data Processing Agreement

Last Updated: November 2025

This Data Processing Agreement ("DPA") is entered into between VaultPoint Consulting LLC ("VaultPoint," "Processor," "we") and the law firm or legal organization subscribing to the Service ("Client," "Controller," "you").


This DPA supplements the Terms of Service and governs VaultPoint's processing of personal data and Client Documents on behalf of Client.

1. Definitions

1.1 Key Terms


  • "Personal Data": Any information relating to an identified or identifiable individual, including but not limited to client names, contact information, case details, and privileged communications contained in Client Documents.

  • "Client Documents": All documents, files, and data uploaded to the Service by Client, including legal briefs, memos, templates, case files, and related materials.

  • "Processing": Any operation performed on Personal Data, including collection, storage, retrieval, use, disclosure, deletion, or destruction.

  • "Sub-Processor": Any third-party service provider engaged by VaultPoint to process Personal Data on Client's behalf.

  • "Data Subject": An individual whose Personal Data is processed (e.g., Client's clients, opposing parties, witnesses).


VaultPoint does not provide legal advice. All AI Outputs are drafts requiring review by a supervising attorney before use.


1.2 Regulatory Terms


  • "GDPR": General Data Protection Regulation (EU) 2016/679

  • "CCPA": California Consumer Privacy Act

  • "HIPAA": Health Insurance Portability and Accountability Act (if applicable to Client's practice)

2. Roles and Scope

2.1 Controller and Processor

  • Client is the Data Controller: Client determines the purposes and means of processing Personal Data contained in Client Documents.

  • VaultPoint is the Data Processor: VaultPoint processes Personal Data solely on Client's documented instructions via the Service.


2.2 Scope of Processing

VaultPoint will process Personal Data only to:

  • Store and retrieve Client Documents in Client's isolated environment

  • Generate AI outputs (drafts, summaries, research) based on Client's queries

  • Maintain audit logs for compliance and privilege protection

  • Provide technical support via metadata-only system logs (no content access)


2.3 Client Instructions


Client instructs VaultPoint to process Personal Data as necessary to provide the Service as described in the Terms of Service. VaultPoint will not process Personal Data for any other purpose unless required by law or with Client's prior written consent.

3. Sub-Processors

3.1 Authorized Sub-Processors

VaultPoint engages third-party Sub-Processors to provide infrastructure and services necessary to operate the platform. Each Sub-Processor maintains its own security certifications and contractual obligations to VaultPoint.


Sub-Processor Categories and Certifications:

Cloud Infrastructure Providers: These Sub-Processors host Client data in isolated, encrypted environments. Sub-Processors in this category hold SOC 2 Type II, ISO 27001, and FedRAMP certifications.


AI Model Providers: These Sub-Processors process Client queries with contractual zero-data-retention guarantees. Sub-Processors in this category hold SOC 2 Type II certification and maintain agreements prohibiting data storage or training on Client data.


Vector Database Providers: These Sub-Processors store encrypted document embeddings used for retrieval. Sub-Processors in this category hold SOC 2 Type II certification.


Payment Processors: These Sub-Processors handle billing and subscription management. Sub-Processors in this category hold PCI DSS Level 1 certification.


Communication Services: These Sub-Processors deliver transactional emails (account notifications, password resets, security alerts). Sub-Processors in this category maintain standard email security protocols.


VaultPoint does not hold independent SOC 2, ISO 27001, or other third-party security certifications. Instead, VaultPoint:


  • Selects Sub-Processors with certifications equivalent to or exceeding industry standards for their respective categories

  • Implements the technical and organizational security measures described in Section 4 of this DPA

  • Conducts due diligence on all Sub-Processors before engagement, including review of their security documentation and certifications

  • Requires all Sub-Processors to sign Data Processing Agreements meeting GDPR Article 28 standards


A detailed list of current Sub-Processor names (not just categories) is available upon written request to hello@vaultpoint.io.



3.2 Sub-Processor Obligations

VaultPoint ensures all Sub-Processors:

  • Sign written Data Processing Agreements imposing data protection obligations equivalent to this DPA

  • Maintain security certifications meeting or exceeding industry standards for their category (SOC 2 for cloud providers, PCI DSS for payment processors, etc.)

  • Are contractually prohibited from using Client data for their own purposes, including training AI models, marketing, or analytics

  • Notify VaultPoint of data breaches within 24 hours of discovery

  • Provide VaultPoint with evidence of compliance (audit reports, certifications) upon request


VaultPoint's due diligence process includes:


  • Reviewing Sub-Processor security documentation, including SOC 2 Type II reports, penetration test results, and Data Processing Agreements

  • Verifying that certifications are current and scope-appropriate for the services provided

  • Monitoring for security incidents via Sub-Processor status pages and security bulletins

  • Replacing Sub-Processors that fail to maintain adequate security standards


VaultPoint does not conduct independent audits of Sub-Processors' infrastructure or operations. Instead, VaultPoint relies on third-party audit reports (such as SOC 2 Type II reports produced by independent auditors) and contractual commitments. This approach is consistent with industry standards for technology service providers.


Clients may request copies of Sub-Processor certifications or audit summaries (with confidential sections redacted as required by Sub-Processor agreements) by contacting hello@vaultpoint.io.


3.3 Changes to Sub-Processors


VaultPoint will notify Client at least 30 days before adding or replacing Sub-Processors that process Client Documents or Personal Data.


Notification will be sent via email to the primary contact address associated with Client's account and will include:


  • The name and category of the new Sub-Processor

  • The purpose for which the Sub-Processor will process data

  • A summary of the Sub-Processor's security certifications


Client may object to a new Sub-Processor by providing written notice to hello@vaultpoint.io within 30 days of notification. Objections must be based on reasonable concerns about the Sub-Processor's ability to meet the data protection obligations outlined in this DPA.


If Client objects, VaultPoint will either:


  • Not engage that Sub-Processor for Client's data, or

  • Allow Client to terminate the Service without penalty, with full data export provided within 30 days


If Client does not object within 30 days, the new Sub-Processor is deemed accepted.


4. Data Security Measures

4.1 Technical and Organizational Measures

VaultPoint implements the following security measures to protect Client Documents and Personal Data:

Encryption:


  • TLS 1.3 encryption for all data in transit between Client's devices and VaultPoint's infrastructure

  • AES-256 encryption for all data at rest (documents, outputs, audit logs, backups)

  • End-to-end encryption for all API communications between VaultPoint's services and Sub-Processors


Access Controls:


  • Multi-factor authentication (MFA) required for all user accounts

  • Role-based access control (RBAC) with four permission levels: Admin, Attorney, Paralegal, Read-Only

  • AWS Identity and Access Management (IAM) policies configured with least-privilege principles

  • Automatic session timeouts after 30 minutes of inactivity

  • Password requirements: minimum 12 characters, complexity requirements enforced


Isolation:


  • Dedicated Virtual Private Cloud (VPC) provisioned for each Client

  • No commingling of Client data across environments

  • Isolated database instances and storage buckets per Client

  • Network segmentation preventing cross-Client access

  • Separate encryption keys per Client environment


Monitoring and Logging:


  • Real-time intrusion detection and automated threat response

  • Automated anomaly detection for unusual access patterns

  • Immutable audit logs (tamper-proof, append-only) with 7-year retention

  • All queries, document uploads, user actions, and system events logged with timestamps and user IDs

  • Quarterly review of access logs and security events


Testing and Maintenance:


  • Quarterly vulnerability scans of all production systems

  • Annual third-party penetration testing by certified security firms

  • Continuous security patching and updates applied within 30 days of release for critical vulnerabilities

  • Automated backup integrity testing (monthly restoration drills)

  • Incident response plan tested annually



4.2 Personnel Security

  • Security awareness training provided annually to all personnel

  • Access to Client data limited to personnel with legitimate business need (support, infrastructure maintenance)

  • VaultPoint personnel cannot view Client Documents or AI Outputs; support is provided via metadata-only system logs



4.3 Data Retention and Deletion

Client Documents: Retained in Client's isolated environment until Client deletes them or terminates the subscription. VaultPoint does not automatically delete Client Documents.

AI Outputs: Retained in Client's environment until Client deletes them or for 30 days after subscription termination, whichever occurs first.

Audit Logs: Retained for 7 years from the date of creation, or as required by applicable bar association rules and legal hold obligations, whichever is longer.

Backups: Daily automated backups retained for 7 days on a rolling basis. All backups permanently deleted within 30 days of subscription termination.

Payment Data: Retained by Sub-Processor payment processors per PCI DSS requirements. VaultPoint does not store full credit card numbers or sensitive payment information.

Upon termination of the Service, VaultPoint will:

  • Provide Client 30 days to export all Client Documents, AI Outputs, and audit logs via the admin portal

  • Permanently delete all Client data (documents, outputs, backups, metadata) from all systems within 30 days of termination

  • Provide written certification of data deletion upon Client's request

  • Ensure all Sub-Processors delete Client data per their respective Data Processing Agreements


Exceptions: VaultPoint may retain anonymized, aggregated usage statistics (e.g., "average queries per firm") that cannot be traced back to any specific Client or Data Subject. Such data is used solely for internal analytics and service improvement.

5. Data Subject Rights

VaultPoint will assist Client in responding to requests from Data Subjects (individuals whose Personal Data is processed) to exercise their rights under applicable privacy laws, including:



  • Right of Access: Data Subjects may request access to their Personal Data. Client is responsible for responding to such requests. VaultPoint will provide Client with the technical means to export relevant data via the admin portal.

  • Right to Rectification: Data Subjects may request correction of inaccurate Personal Data. Client may update or correct data directly via the admin portal.

  • Right to Erasure ("Right to be Forgotten"): Data Subjects may request deletion of their Personal Data. Client may delete specific documents or outputs via the admin portal. VaultPoint will permanently delete data within 30 days of Client's deletion request.

  • Right to Restriction of Processing: Data Subjects may request temporary restriction of processing. Client may suspend specific user accounts or restrict access to specific documents via admin controls.

  • Right to Data Portability: Data Subjects may request their Personal Data in a machine-readable format. VaultPoint provides export functionality in CSV, JSON, and PDF formats via the admin portal.

  • Right to Object: Data Subjects may object to processing for specific purposes. Client is responsible for evaluating such objections and instructing VaultPoint accordingly.


VaultPoint will respond to Client's requests for assistance with Data Subject rights within 10 business days. If VaultPoint receives a Data Subject request directly (rather than through Client), VaultPoint will forward the request to Client within 5 business days and will not respond to the Data Subject without Client's prior authorization.



6. Data Breach Notification

6.1 VaultPoint's Obligations

In the event of a data breach affecting Client Documents or Personal Data, VaultPoint will:


  • Notify Client within 24 hours of discovery via email to the primary account contact from support@vaultpoint.io

  • Provide a written description of the breach, including:

    • The nature of the breach (unauthorized access, data loss, system compromise, etc.)

    • The categories and approximate number of Data Subjects affected

    • The categories and approximate number of Client Documents affected

    • The likely consequences of the breach

    • Immediate remediation steps taken by VaultPoint

  • Provide ongoing updates every 24 hours until the incident is fully resolved and all affected systems are secured

  • Cooperate fully with Client's investigation, regulatory notifications, and client disclosures

  • Provide technical assistance in assessing the scope and impact of the breach

  • Implement additional security measures to prevent recurrence


6.2 Client's Obligations

Client is responsible for:


  • Evaluating whether the breach requires notification to Data Subjects, regulatory authorities (e.g., state attorneys general, bar associations), or professional liability insurers

  • Making all required notifications to Data Subjects and authorities within applicable deadlines (e.g., 72 hours under GDPR, as required by state breach notification laws)

  • Managing client communications and public relations related to the breach


VaultPoint will provide reasonable assistance with these obligations but is not responsible for Client's compliance with notification requirements.


6.3 Definition of Data Breach

For purposes of this DPA, a "data breach" means:


  • Unauthorized access to Client Documents or Personal Data by individuals not authorized under this DPA

  • Accidental or unlawful destruction, loss, alteration, or disclosure of Client Documents or Personal Data

  • Any incident that compromises the confidentiality, integrity, or availability of Client data


A data breach does NOT include:


  • Authorized access by Client's users or VaultPoint personnel acting within the scope of this DPA

  • Incidents affecting only metadata or system logs that do not expose Client Documents or Personal Data

  • Unsuccessful intrusion attempts that are blocked by VaultPoint's security controls



7. Audits and Compliance

7.1 Client's Audit Rights

Client or Client's authorized auditor may, upon reasonable notice (at least 30 days) and during normal business hours, audit VaultPoint's compliance with this DPA, provided that:

  • Audits occur no more than once per calendar year (unless required by applicable law or following a data breach)

  • The auditor is bound by confidentiality obligations equivalent to this DPA

  • The audit does not unreasonably interfere with VaultPoint's business operations

  • The audit focuses on VaultPoint's technical and organizational measures, not Sub-Processor infrastructure (Sub-Processor audit reports are available upon request per Section 3.2)


VaultPoint may charge Client for reasonable costs incurred in facilitating the audit (e.g., personnel time, documentation preparation) if the audit exceeds 8 hours or requires access to systems beyond those directly processing Client data.


7.2 VaultPoint-Provided Documentation

As an alternative to on-site audits, VaultPoint will provide Client (upon written request to hello@vaultpoint.io) with:

  • Summaries of Sub-Processor SOC 2 Type II audit reports (with confidential sections redacted)

  • Documentation of VaultPoint's technical security measures implemented per Section 4.1

  • Evidence of Sub-Processor Data Processing Agreements

  • Incident response procedures and breach notification protocols

  • Data retention and deletion policies


This documentation is typically sufficient to demonstrate compliance with GDPR Article 28 and similar regulatory requirements.



8. International Data Transfers


VaultPoint operates exclusively within the United States. All Client data is stored and processed in AWS data centers located in the United States (US-East or US-West regions).


If Client is located outside the United States and chooses to use the Service:


  • Client's data will be transferred to and processed in the United States

  • Client acknowledges that U.S. privacy laws may differ from those in Client's jurisdiction

  • VaultPoint provides the same security protections (encryption, isolation, zero-data-retention, audit logging) regardless of Client's location


VaultPoint does not currently offer non-U.S. data residency options. If Client's organization is subject to data localization requirements (e.g., EU data must remain in the EU), Client should not use the Service or should contact hello@vaultpoint.io to discuss custom arrangements (additional fees may apply).

9. Limitation of Liability


9.1 Cap on Damages

To the maximum extent permitted by law, VaultPoint's total liability arising from this DPA or any breach of its obligations under this DPA shall not exceed the fees paid by Client in the 12 months preceding the claim (or $7,000 if less than 12 months have elapsed).

9.2 Excluded Damages

VaultPoint shall not be liable for:

  • Indirect, incidental, consequential, special, or punitive damages

  • Lost profits, lost revenue, lost data (except as provided in Section 4.3 regarding backups), or lost business opportunities

  • Damages arising from Client's failure to implement appropriate security measures on Client's own systems (e.g., weak passwords, failure to enable MFA)

  • Damages caused by Sub-Processor actions beyond VaultPoint's reasonable control, provided VaultPoint exercised reasonable care in selecting and monitoring Sub-Processors

  • Damages arising from Client's instructions that violate applicable law or this DPA

  • Damages resulting from unauthorized access caused by Client's users sharing credentials or failing to report compromised accounts


9.3 Exceptions

These limitations do not apply to:


  • VaultPoint's gross negligence or willful misconduct

  • VaultPoint's breach of confidentiality obligations under Section 2 of the Terms of Service

  • Claims that cannot be limited by law (e.g., certain statutory violations, fraud)

  • VaultPoint's obligations to assist with data breach notifications under Section 6


9.4 Allocation of Risk

Client acknowledges that the fees charged by VaultPoint reflect this allocation of risk. Higher limits of liability are available through separate negotiation and additional fees.


10. Term and Termination


10.1 Term

This DPA takes effect on the date Client activates the Service and remains in effect until the earlier of:


  • Client's termination of the Service per the Terms of Service

  • VaultPoint's termination of the Service per the Terms of Service

  • Mutual written agreement to terminate


10.2 Effect of Termination


Upon termination of this DPA or the underlying Service subscription:


  • VaultPoint will cease all processing of Client Documents and Personal Data, except as necessary to fulfill data export and deletion obligations

  • Client will have 30 days to export all Client Documents, AI Outputs, and audit logs via the admin portal

  • After 30 days, VaultPoint will permanently delete all Client data (documents, outputs, backups, metadata) from all systems, including Sub-Processor systems

  • VaultPoint will provide written certification of data deletion upon Client's written request to hello@vaultpoint.io

  • Sections of this DPA that by their nature should survive termination (confidentiality, limitation of liability, dispute resolution) will continue to apply


10.3 Data Retention Exceptions


Notwithstanding Section 10.2, VaultPoint may retain:


  • Audit logs for the remainder of the 7-year retention period (or as required by legal hold obligations)

  • Anonymized, aggregated usage statistics that cannot be traced back to Client or any Data Subject

  • Financial records (invoices, payment receipts) as required by tax and accounting regulations

  • Information required to be retained by law, court order, or government investigation


VaultPoint will notify Client if legally required to retain data beyond the 30-day deletion period.



11. General Provisions


11.1 Amendments

VaultPoint may update this DPA by posting the revised version at vaultpoint.io/legal and notifying Client via email at least 30 days before the changes take effect.


If changes materially reduce Client's rights or VaultPoint's obligations, Client may terminate the Service without penalty by providing written notice within 30 days of notification.


Continued use of the Service after changes take effect constitutes acceptance of the revised DPA.


11.2 Governing Law


This DPA is governed by the laws of the State of Florida, without regard to conflict of law principles. Disputes arising from this DPA are subject to the dispute resolution provisions in Section 11 of the Terms of Service (arbitration in Miami, Florida).


11.3 Relationship to Terms of Service


This DPA supplements and is incorporated into the Terms of Service. In the event of conflict between this DPA and the Terms of Service regarding data processing obligations, this DPA controls.

11.4 Severability


If any provision of this DPA is found unenforceable, the remaining provisions remain in full force and effect. The unenforceable provision will be modified to the minimum extent necessary to make it enforceable while preserving its original intent.

11.5 No Third-Party Beneficiaries


This DPA is between VaultPoint and Client only. Data Subjects and Sub-Processors are not third-party beneficiaries with independent rights to enforce this DPA.


11.6 Assignment


Client may not assign this DPA without VaultPoint's prior written consent. VaultPoint may assign this DPA to an acquirer or successor entity in connection with a merger, acquisition, or sale of substantially all assets, provided the assignee agrees to be bound by this DPA.


11.7 Notices


All notices under this DPA must be in writing and sent to:


Client notices to VaultPoint:

Email: hello@vaultpoint.io

Subject: "DPA Notice - [Your Firm Name]"



VaultPoint notices to Client:

Email: The primary contact email associated with your account



For security incidents:

Email: support@vaultpoint.io

Subject: "[SECURITY INCIDENT] - [Your Firm Name]"

Phone: Available in account dashboard for true emergencies


Notices are deemed received 24 hours after email transmission or upon confirmation of receipt, whichever is earlier.



12. Contact Information



For questions about this DPA or to exercise rights under this agreement, contact:


VaultPoint Consulting LLC
Email: hello@vaultpoint.io
Website: vaultpoint.io
Subject line for DPA inquiries: "DPA Question - [Your Firm Name]"



For data subject rights requests:
Email: hello@vaultpoint.io
Subject line: "Data Rights Request - [Your Firm Name]"



For security incidents or data breaches:
Email: support@vaultpoint.io
Subject line: "[SECURITY INCIDENT] - [Your Firm Name]"



We will respond within 10 business days for general DPA questions, within 5 business days for data subject rights requests, and within 24 hours for security incidents.

1. Definitions


1.1 Key Terms


  • "Personal Data": Any information relating to an identified or identifiable individual, including but not limited to client names, contact information, case details, and privileged communications contained in Client Documents.

  • "Client Documents": All documents, files, and data uploaded to the Service by Client, including legal briefs, memos, templates, case files, and related materials.

  • "Processing": Any operation performed on Personal Data, including collection, storage, retrieval, use, disclosure, deletion, or destruction.

  • "Sub-Processor": Any third-party service provider engaged by VaultPoint to process Personal Data on Client's behalf.

  • "Data Subject": An individual whose Personal Data is processed (e.g., Client's clients, opposing parties, witnesses).


VaultPoint does not provide legal advice. All AI Outputs are drafts requiring review by a supervising attorney before use.


1.2 Regulatory Terms


  • "GDPR": General Data Protection Regulation (EU) 2016/679

  • "CCPA": California Consumer Privacy Act

  • "HIPAA": Health Insurance Portability and Accountability Act (if applicable to Client's practice)

2. Roles and Scope


2.1 Controller and Processor


  • Client is the Data Controller: Client determines the purposes and means of processing Personal Data contained in Client Documents.

  • VaultPoint is the Data Processor: VaultPoint processes Personal Data solely on Client's documented instructions via the Service.


2.2 Scope of Processing

VaultPoint will process Personal Data only to:

  • Store and retrieve Client Documents in Client's isolated environment

  • Generate AI outputs (drafts, summaries, research) based on Client's queries

  • Maintain audit logs for compliance and privilege protection

  • Provide technical support via metadata-only system logs (no content access)


2.3 Client Instructions


Client instructs VaultPoint to process Personal Data as necessary to provide the Service as described in the Terms of Service. VaultPoint will not process Personal Data for any other purpose unless required by law or with Client's prior written consent.

3. Sub-Processors


3.1 Authorized Sub-Processors

VaultPoint engages third-party Sub-Processors to provide infrastructure and services necessary to operate the platform. Each Sub-Processor maintains its own security certifications and contractual obligations to VaultPoint.


Sub-Processor Categories and Certifications:

Cloud Infrastructure Providers: These Sub-Processors host Client data in isolated, encrypted environments. Sub-Processors in this category hold SOC 2 Type II, ISO 27001, and FedRAMP certifications.


AI Model Providers: These Sub-Processors process Client queries with contractual zero-data-retention guarantees. Sub-Processors in this category hold SOC 2 Type II certification and maintain agreements prohibiting data storage or training on Client data.


Vector Database Providers: These Sub-Processors store encrypted document embeddings used for retrieval. Sub-Processors in this category hold SOC 2 Type II certification.


Payment Processors: These Sub-Processors handle billing and subscription management. Sub-Processors in this category hold PCI DSS Level 1 certification.


Communication Services: These Sub-Processors deliver transactional emails (account notifications, password resets, security alerts). Sub-Processors in this category maintain standard email security protocols.


VaultPoint does not hold independent SOC 2, ISO 27001, or other third-party security certifications. Instead, VaultPoint:


  • Selects Sub-Processors with certifications equivalent to or exceeding industry standards for their respective categories

  • Implements the technical and organizational security measures described in Section 4 of this DPA

  • Conducts due diligence on all Sub-Processors before engagement, including review of their security documentation and certifications

  • Requires all Sub-Processors to sign Data Processing Agreements meeting GDPR Article 28 standards


A detailed list of current Sub-Processor names (not just categories) is available upon written request to hello@vaultpoint.io.



3.2 Sub-Processor Obligations

VaultPoint ensures all Sub-Processors:

  • Sign written Data Processing Agreements imposing data protection obligations equivalent to this DPA

  • Maintain security certifications meeting or exceeding industry standards for their category (SOC 2 for cloud providers, PCI DSS for payment processors, etc.)

  • Are contractually prohibited from using Client data for their own purposes, including training AI models, marketing, or analytics

  • Notify VaultPoint of data breaches within 24 hours of discovery

  • Provide VaultPoint with evidence of compliance (audit reports, certifications) upon request


VaultPoint's due diligence process includes:


  • Reviewing Sub-Processor security documentation, including SOC 2 Type II reports, penetration test results, and Data Processing Agreements

  • Verifying that certifications are current and scope-appropriate for the services provided

  • Monitoring for security incidents via Sub-Processor status pages and security bulletins

  • Replacing Sub-Processors that fail to maintain adequate security standards


VaultPoint does not conduct independent audits of Sub-Processors' infrastructure or operations. Instead, VaultPoint relies on third-party audit reports (such as SOC 2 Type II reports produced by independent auditors) and contractual commitments. This approach is consistent with industry standards for technology service providers.


Clients may request copies of Sub-Processor certifications or audit summaries (with confidential sections redacted as required by Sub-Processor agreements) by contacting hello@vaultpoint.io.


3.3 Changes to Sub-Processors


VaultPoint will notify Client at least 30 days before adding or replacing Sub-Processors that process Client Documents or Personal Data.


Notification will be sent via email to the primary contact address associated with Client's account and will include:


  • The name and category of the new Sub-Processor

  • The purpose for which the Sub-Processor will process data

  • A summary of the Sub-Processor's security certifications


Client may object to a new Sub-Processor by providing written notice to hello@vaultpoint.io within 30 days of notification. Objections must be based on reasonable concerns about the Sub-Processor's ability to meet the data protection obligations outlined in this DPA.


If Client objects, VaultPoint will either:


  • Not engage that Sub-Processor for Client's data, or

  • Allow Client to terminate the Service without penalty, with full data export provided within 30 days


If Client does not object within 30 days, the new Sub-Processor is deemed accepted.


4. Data Security Measures


4.1 Technical and Organizational Measures

VaultPoint implements the following security measures to protect Client Documents and Personal Data:

Encryption:


  • TLS 1.3 encryption for all data in transit between Client's devices and VaultPoint's infrastructure

  • AES-256 encryption for all data at rest (documents, outputs, audit logs, backups)

  • End-to-end encryption for all API communications between VaultPoint's services and Sub-Processors


Access Controls:


  • Multi-factor authentication (MFA) required for all user accounts

  • Role-based access control (RBAC) with four permission levels: Admin, Attorney, Paralegal, Read-Only

  • AWS Identity and Access Management (IAM) policies configured with least-privilege principles

  • Automatic session timeouts after 30 minutes of inactivity

  • Password requirements: minimum 12 characters, complexity requirements enforced


Isolation:


  • Dedicated Virtual Private Cloud (VPC) provisioned for each Client

  • No commingling of Client data across environments

  • Isolated database instances and storage buckets per Client

  • Network segmentation preventing cross-Client access

  • Separate encryption keys per Client environment


Monitoring and Logging:


  • Real-time intrusion detection and automated threat response

  • Automated anomaly detection for unusual access patterns

  • Immutable audit logs (tamper-proof, append-only) with 7-year retention

  • All queries, document uploads, user actions, and system events logged with timestamps and user IDs

  • Quarterly review of access logs and security events


Testing and Maintenance:


  • Quarterly vulnerability scans of all production systems

  • Annual third-party penetration testing by certified security firms

  • Continuous security patching and updates applied within 30 days of release for critical vulnerabilities

  • Automated backup integrity testing (monthly restoration drills)

  • Incident response plan tested annually



4.2 Personnel Security

  • Security awareness training provided annually to all personnel

  • Access to Client data limited to personnel with legitimate business need (support, infrastructure maintenance)

  • VaultPoint personnel cannot view Client Documents or AI Outputs; support is provided via metadata-only system logs



4.3 Data Retention and Deletion

Client Documents: Retained in Client's isolated environment until Client deletes them or terminates the subscription. VaultPoint does not automatically delete Client Documents.


AI Outputs: Retained in Client's environment until Client deletes them or for 30 days after subscription termination, whichever occurs first.


Audit Logs: Retained for 7 years from the date of creation, or as required by applicable bar association rules and legal hold obligations, whichever is longer.


Backups: Daily automated backups retained for 7 days on a rolling basis. All backups permanently deleted within 30 days of subscription termination.


Payment Data: Retained by Sub-Processor payment processors per PCI DSS requirements. VaultPoint does not store full credit card numbers or sensitive payment information.

Upon termination of the Service, VaultPoint will:

  • Provide Client 30 days to export all Client Documents, AI Outputs, and audit logs via the admin portal

  • Permanently delete all Client data (documents, outputs, backups, metadata) from all systems within 30 days of termination

  • Provide written certification of data deletion upon Client's request

  • Ensure all Sub-Processors delete Client data per their respective Data Processing Agreements


Exceptions: VaultPoint may retain anonymized, aggregated usage statistics (e.g., "average queries per firm") that cannot be traced back to any specific Client or Data Subject. Such data is used solely for internal analytics and service improvement.

5. Data Subject Rights


VaultPoint will assist Client in responding to requests from Data Subjects (individuals whose Personal Data is processed) to exercise their rights under applicable privacy laws, including:



  • Right of Access: Data Subjects may request access to their Personal Data. Client is responsible for responding to such requests. VaultPoint will provide Client with the technical means to export relevant data via the admin portal.

  • Right to Rectification: Data Subjects may request correction of inaccurate Personal Data. Client may update or correct data directly via the admin portal.

  • Right to Erasure ("Right to be Forgotten"): Data Subjects may request deletion of their Personal Data. Client may delete specific documents or outputs via the admin portal. VaultPoint will permanently delete data within 30 days of Client's deletion request.

  • Right to Restriction of Processing: Data Subjects may request temporary restriction of processing. Client may suspend specific user accounts or restrict access to specific documents via admin controls.

  • Right to Data Portability: Data Subjects may request their Personal Data in a machine-readable format. VaultPoint provides export functionality in CSV, JSON, and PDF formats via the admin portal.

  • Right to Object: Data Subjects may object to processing for specific purposes. Client is responsible for evaluating such objections and instructing VaultPoint accordingly.


VaultPoint will respond to Client's requests for assistance with Data Subject rights within 10 business days. If VaultPoint receives a Data Subject request directly (rather than through Client), VaultPoint will forward the request to Client within 5 business days and will not respond to the Data Subject without Client's prior authorization.



6. Data Breach Notification


6.1 VaultPoint's Obligations


In the event of a data breach affecting Client Documents or Personal Data, VaultPoint will:


  • Notify Client within 24 hours of discovery via email to the primary account contact and support@vaultpoint.io

  • Provide a written description of the breach, including:

    • The nature of the breach (unauthorized access, data loss, system compromise, etc.)

    • The categories and approximate number of Data Subjects affected

    • The categories and approximate number of Client Documents affected

    • The likely consequences of the breach

    • Immediate remediation steps taken by VaultPoint

  • Provide ongoing updates every 24 hours until the incident is fully resolved and all affected systems are secured

  • Cooperate fully with Client's investigation, regulatory notifications, and client disclosures

  • Provide technical assistance in assessing the scope and impact of the breach

  • Implement additional security measures to prevent recurrence


6.2 Client's Obligations

Client is responsible for:


  • Evaluating whether the breach requires notification to Data Subjects, regulatory authorities (e.g., state attorneys general, bar associations), or professional liability insurers

  • Making all required notifications to Data Subjects and authorities within applicable deadlines (e.g., 72 hours under GDPR, as required by state breach notification laws)

  • Managing client communications and public relations related to the breach


VaultPoint will provide reasonable assistance with these obligations but is not responsible for Client's compliance with notification requirements.


6.3 Definition of Data Breach

For purposes of this DPA, a "data breach" means:


  • Unauthorized access to Client Documents or Personal Data by individuals not authorized under this DPA

  • Accidental or unlawful destruction, loss, alteration, or disclosure of Client Documents or Personal Data

  • Any incident that compromises the confidentiality, integrity, or availability of Client data


A data breach does NOT include:


  • Authorized access by Client's users or VaultPoint personnel acting within the scope of this DPA

  • Incidents affecting only metadata or system logs that do not expose Client Documents or Personal Data

  • Unsuccessful intrusion attempts that are blocked by VaultPoint's security controls


7. Audits and Compliance


7.1 Client's Audit Rights


Client or Client's authorized auditor may, upon reasonable notice (at least 30 days) and during normal business hours, audit VaultPoint's compliance with this DPA, provided that:

  • Audits occur no more than once per calendar year (unless required by applicable law or following a data breach)

  • The auditor is bound by confidentiality obligations equivalent to this DPA

  • The audit does not unreasonably interfere with VaultPoint's business operations

  • The audit focuses on VaultPoint's technical and organizational measures, not Sub-Processor infrastructure (Sub-Processor audit reports are available upon request per Section 3.2)


VaultPoint may charge Client for reasonable costs incurred in facilitating the audit (e.g., personnel time, documentation preparation) if the audit exceeds 8 hours or requires access to systems beyond those directly processing Client data.


7.2 VaultPoint-Provided Documentation

As an alternative to on-site audits, VaultPoint will provide Client (upon written request to hello@vaultpoint.io) with:

  • Summaries of Sub-Processor SOC 2 Type II audit reports (with confidential sections redacted)

  • Documentation of VaultPoint's technical security measures implemented per Section 4.1

  • Evidence of Sub-Processor Data Processing Agreements

  • Incident response procedures and breach notification protocols

  • Data retention and deletion policies


This documentation is typically sufficient to demonstrate compliance with GDPR Article 28 and similar regulatory requirements.


8. International Data Transfers


VaultPoint operates exclusively within the United States. All Client data is stored and processed in AWS data centers located in the United States (US-East or US-West regions).


If Client is located outside the United States and chooses to use the Service:


  • Client's data will be transferred to and processed in the United States

  • Client acknowledges that U.S. privacy laws may differ from those in Client's jurisdiction

  • VaultPoint provides the same security protections (encryption, isolation, zero-data-retention, audit logging) regardless of Client's location


VaultPoint does not currently offer non-U.S. data residency options. If Client's organization is subject to data localization requirements (e.g., EU data must remain in the EU), Client should not use the Service or should contact hello@vaultpoint.io to discuss custom arrangements (additional fees may apply).

9. Limitation of Liability


9.1 Cap on Damages

To the maximum extent permitted by law, VaultPoint's total liability arising from this DPA or any breach of its obligations under this DPA shall not exceed the fees paid by Client in the 12 months preceding the claim (or $7,000 if less than 12 months have elapsed).


9.2 Excluded Damages


VaultPoint shall not be liable for:

  • Indirect, incidental, consequential, special, or punitive damages

  • Lost profits, lost revenue, lost data (except as provided in Section 4.3 regarding backups), or lost business opportunities

  • Damages arising from Client's failure to implement appropriate security measures on Client's own systems (e.g., weak passwords, failure to enable MFA)

  • Damages caused by Sub-Processor actions beyond VaultPoint's reasonable control, provided VaultPoint exercised reasonable care in selecting and monitoring Sub-Processors

  • Damages arising from Client's instructions that violate applicable law or this DPA

  • Damages resulting from unauthorized access caused by Client's users sharing credentials or failing to report compromised accounts


9.3 Exceptions

These limitations do not apply to:


  • VaultPoint's gross negligence or willful misconduct

  • VaultPoint's breach of confidentiality obligations under Section 2 of the Terms of Service

  • Claims that cannot be limited by law (e.g., certain statutory violations, fraud)

  • VaultPoint's obligations to assist with data breach notifications under Section 6


9.4 Allocation of Risk

Client acknowledges that the fees charged by VaultPoint reflect this allocation of risk. Higher limits of liability are available through separate negotiation and additional fees.


10. Term and Termination


10.1 Term

This DPA takes effect on the date Client activates the Service and remains in effect until the earlier of:


  • Client's termination of the Service per the Terms of Service

  • VaultPoint's termination of the Service per the Terms of Service

  • Mutual written agreement to terminate


10.2 Effect of Termination


Upon termination of this DPA or the underlying Service subscription:


  • VaultPoint will cease all processing of Client Documents and Personal Data, except as necessary to fulfill data export and deletion obligations

  • Client will have 30 days to export all Client Documents, AI Outputs, and audit logs via the admin portal

  • After 30 days, VaultPoint will permanently delete all Client data (documents, outputs, backups, metadata) from all systems, including Sub-Processor systems

  • VaultPoint will provide written certification of data deletion upon Client's written request to hello@vaultpoint.io

  • Sections of this DPA that by their nature should survive termination (confidentiality, limitation of liability, dispute resolution) will continue to apply


10.3 Data Retention Exceptions


Notwithstanding Section 10.2, VaultPoint may retain:


  • Audit logs for the remainder of the 7-year retention period (or as required by legal hold obligations)

  • Anonymized, aggregated usage statistics that cannot be traced back to Client or any Data Subject

  • Financial records (invoices, payment receipts) as required by tax and accounting regulations

  • Information required to be retained by law, court order, or government investigation


VaultPoint will notify Client if legally required to retain data beyond the 30-day deletion period.



11. General Provisions


11.1 Amendments

VaultPoint may update this DPA by posting the revised version at vaultpoint.io/legal and notifying Client via email at least 30 days before the changes take effect.


If changes materially reduce Client's rights or VaultPoint's obligations, Client may terminate the Service without penalty by providing written notice within 30 days of notification.


Continued use of the Service after changes take effect constitutes acceptance of the revised DPA.


11.2 Governing Law


This DPA is governed by the laws of the State of Florida, without regard to conflict of law principles. Disputes arising from this DPA are subject to the dispute resolution provisions in Section 11 of the Terms of Service (arbitration in Miami, Florida).


11.3 Relationship to Terms of Service


This DPA supplements and is incorporated into the Terms of Service. In the event of conflict between this DPA and the Terms of Service regarding data processing obligations, this DPA controls.

11.4 Severability


If any provision of this DPA is found unenforceable, the remaining provisions remain in full force and effect. The unenforceable provision will be modified to the minimum extent necessary to make it enforceable while preserving its original intent.

11.5 No Third-Party Beneficiaries


This DPA is between VaultPoint and Client only. Data Subjects and Sub-Processors are not third-party beneficiaries with independent rights to enforce this DPA.


11.6 Assignment


Client may not assign this DPA without VaultPoint's prior written consent. VaultPoint may assign this DPA to an acquirer or successor entity in connection with a merger, acquisition, or sale of substantially all assets, provided the assignee agrees to be bound by this DPA.


11.7 Notices


All notices under this DPA must be in writing and sent to:


Client notices to VaultPoint:

Email: hello@vaultpoint.io

Subject: "DPA Notice - [Your Firm Name]"



VaultPoint notices to Client:

Email: The primary contact email associated with your account



For security incidents:

Email: support@vaultpoint.io

Subject: "[SECURITY INCIDENT] - [Your Firm Name]"

Phone: Available in account dashboard for true emergencies


Notices are deemed received 24 hours after email transmission or upon confirmation of receipt, whichever is earlier.



12. Contact Information



For questions about this DPA or to exercise rights under this agreement, contact:


VaultPoint Consulting LLC
Email: hello@vaultpoint.io
Website: vaultpoint.io
Subject line for DPA inquiries: "DPA Question - [Your Firm Name]"



For data subject rights requests:
Email: hello@vaultpoint.io
Subject line: "Data Rights Request - [Your Firm Name]"



For security incidents or data breaches:
Email: support@vaultpoint.io
Subject line: "[SECURITY INCIDENT] - [Your Firm Name]"



We will respond within 10 business days for general DPA questions, within 5 business days for data subject rights requests, and within 24 hours for security incidents.

1. Definitions


1.1 Key Terms


  • "Personal Data": Any information relating to an identified or identifiable individual, including but not limited to client names, contact information, case details, and privileged communications contained in Client Documents.

  • "Client Documents": All documents, files, and data uploaded to the Service by Client, including legal briefs, memos, templates, case files, and related materials.

  • "Processing": Any operation performed on Personal Data, including collection, storage, retrieval, use, disclosure, deletion, or destruction.

  • "Sub-Processor": Any third-party service provider engaged by VaultPoint to process Personal Data on Client's behalf.

  • "Data Subject": An individual whose Personal Data is processed (e.g., Client's clients, opposing parties, witnesses).


VaultPoint does not provide legal advice. All AI Outputs are drafts requiring review by a supervising attorney before use.


1.2 Regulatory Terms


  • "GDPR": General Data Protection Regulation (EU) 2016/679

  • "CCPA": California Consumer Privacy Act

  • "HIPAA": Health Insurance Portability and Accountability Act (if applicable to Client's practice)

2. Roles and Scope


2.1 Controller and Processor

  • Client is the Data Controller: Client determines the purposes and means of processing Personal Data contained in Client Documents.

  • VaultPoint is the Data Processor: VaultPoint processes Personal Data solely on Client's documented instructions via the Service.


2.2 Scope of Processing

VaultPoint will process Personal Data only to:

  • Store and retrieve Client Documents in Client's isolated environment

  • Generate AI outputs (drafts, summaries, research) based on Client's queries

  • Maintain audit logs for compliance and privilege protection

  • Provide technical support via metadata-only system logs (no content access)


2.3 Client Instructions


Client instructs VaultPoint to process Personal Data as necessary to provide the Service as described in the Terms of Service. VaultPoint will not process Personal Data for any other purpose unless required by law or with Client's prior written consent.

3. Sub-Processors


3.1 Authorized Sub-Processors

VaultPoint engages third-party Sub-Processors to provide infrastructure and services necessary to operate the platform. Each Sub-Processor maintains its own security certifications and contractual obligations to VaultPoint.


Sub-Processor Categories and Certifications:

Cloud Infrastructure Providers: These Sub-Processors host Client data in isolated, encrypted environments. Sub-Processors in this category hold SOC 2 Type II, ISO 27001, and FedRAMP certifications.


AI Model Providers: These Sub-Processors process Client queries with contractual zero-data-retention guarantees. Sub-Processors in this category hold SOC 2 Type II certification and maintain agreements prohibiting data storage or training on Client data.


Vector Database Providers: These Sub-Processors store encrypted document embeddings used for retrieval. Sub-Processors in this category hold SOC 2 Type II certification.


Payment Processors: These Sub-Processors handle billing and subscription management. Sub-Processors in this category hold PCI DSS Level 1 certification.


Communication Services: These Sub-Processors deliver transactional emails (account notifications, password resets, security alerts). Sub-Processors in this category maintain standard email security protocols.


VaultPoint does not hold independent SOC 2, ISO 27001, or other third-party security certifications. Instead, VaultPoint:


  • Selects Sub-Processors with certifications equivalent to or exceeding industry standards for their respective categories

  • Implements the technical and organizational security measures described in Section 4 of this DPA

  • Conducts due diligence on all Sub-Processors before engagement, including review of their security documentation and certifications

  • Requires all Sub-Processors to sign Data Processing Agreements meeting GDPR Article 28 standards


A detailed list of current Sub-Processor names (not just categories) is available upon written request to hello@vaultpoint.io.



3.2 Sub-Processor Obligations

VaultPoint ensures all Sub-Processors:

  • Sign written Data Processing Agreements imposing data protection obligations equivalent to this DPA

  • Maintain security certifications meeting or exceeding industry standards for their category (SOC 2 for cloud providers, PCI DSS for payment processors, etc.)

  • Are contractually prohibited from using Client data for their own purposes, including training AI models, marketing, or analytics

  • Notify VaultPoint of data breaches within 24 hours of discovery

  • Provide VaultPoint with evidence of compliance (audit reports, certifications) upon request


VaultPoint's due diligence process includes:


  • Reviewing Sub-Processor security documentation, including SOC 2 Type II reports, penetration test results, and Data Processing Agreements

  • Verifying that certifications are current and scope-appropriate for the services provided

  • Monitoring for security incidents via Sub-Processor status pages and security bulletins

  • Replacing Sub-Processors that fail to maintain adequate security standards


VaultPoint does not conduct independent audits of Sub-Processors' infrastructure or operations. Instead, VaultPoint relies on third-party audit reports (such as SOC 2 Type II reports produced by independent auditors) and contractual commitments. This approach is consistent with industry standards for technology service providers.


Clients may request copies of Sub-Processor certifications or audit summaries (with confidential sections redacted as required by Sub-Processor agreements) by contacting hello@vaultpoint.io.


3.3 Changes to Sub-Processors


VaultPoint will notify Client at least 30 days before adding or replacing Sub-Processors that process Client Documents or Personal Data.


Notification will be sent via email to the primary contact address associated with Client's account and will include:


  • The name and category of the new Sub-Processor

  • The purpose for which the Sub-Processor will process data

  • A summary of the Sub-Processor's security certifications


Client may object to a new Sub-Processor by providing written notice to hello@vaultpoint.io within 30 days of notification. Objections must be based on reasonable concerns about the Sub-Processor's ability to meet the data protection obligations outlined in this DPA.


If Client objects, VaultPoint will either:


  • Not engage that Sub-Processor for Client's data, or

  • Allow Client to terminate the Service without penalty, with full data export provided within 30 days


If Client does not object within 30 days, the new Sub-Processor is deemed accepted.


4. Data Security Measures


4.1 Technical and Organizational Measures

VaultPoint implements the following security measures to protect Client Documents and Personal Data:

Encryption:


  • TLS 1.3 encryption for all data in transit between Client's devices and VaultPoint's infrastructure

  • AES-256 encryption for all data at rest (documents, outputs, audit logs, backups)

  • End-to-end encryption for all API communications between VaultPoint's services and Sub-Processors


Access Controls:


  • Multi-factor authentication (MFA) required for all user accounts

  • Role-based access control (RBAC) with four permission levels: Admin, Attorney, Paralegal, Read-Only

  • AWS Identity and Access Management (IAM) policies configured with least-privilege principles

  • Automatic session timeouts after 30 minutes of inactivity

  • Password requirements: minimum 12 characters, complexity requirements enforced


Isolation:


  • Dedicated Virtual Private Cloud (VPC) provisioned for each Client

  • No commingling of Client data across environments

  • Isolated database instances and storage buckets per Client

  • Network segmentation preventing cross-Client access

  • Separate encryption keys per Client environment


Monitoring and Logging:


  • Real-time intrusion detection and automated threat response

  • Automated anomaly detection for unusual access patterns

  • Immutable audit logs (tamper-proof, append-only) with 7-year retention

  • All queries, document uploads, user actions, and system events logged with timestamps and user IDs

  • Quarterly review of access logs and security events


Testing and Maintenance:


  • Quarterly vulnerability scans of all production systems

  • Annual third-party penetration testing by certified security firms

  • Continuous security patching and updates applied within 30 days of release for critical vulnerabilities

  • Automated backup integrity testing (monthly restoration drills)

  • Incident response plan tested annually



4.2 Personnel Security

  • Security awareness training provided annually to all personnel

  • Access to Client data limited to personnel with legitimate business need (support, infrastructure maintenance)

  • VaultPoint personnel cannot view Client Documents or AI Outputs; support is provided via metadata-only system logs



4.3 Data Retention and Deletion

Client Documents: Retained in Client's isolated environment until Client deletes them or terminates the subscription. VaultPoint does not automatically delete Client Documents.


AI Outputs: Retained in Client's environment until Client deletes them or for 30 days after subscription termination, whichever occurs first.


Audit Logs: Retained for 7 years from the date of creation, or as required by applicable bar association rules and legal hold obligations, whichever is longer.


Backups: Daily automated backups retained for 7 days on a rolling basis. All backups permanently deleted within 30 days of subscription termination.


Payment Data: Retained by Sub-Processor payment processors per PCI DSS requirements. VaultPoint does not store full credit card numbers or sensitive payment information.

Upon termination of the Service, VaultPoint will:

  • Provide Client 30 days to export all Client Documents, AI Outputs, and audit logs via the admin portal

  • Permanently delete all Client data (documents, outputs, backups, metadata) from all systems within 30 days of termination

  • Provide written certification of data deletion upon Client's request

  • Ensure all Sub-Processors delete Client data per their respective Data Processing Agreements


Exceptions: VaultPoint may retain anonymized, aggregated usage statistics (e.g., "average queries per firm") that cannot be traced back to any specific Client or Data Subject. Such data is used solely for internal analytics and service improvement.

5. Data Subject Rights


VaultPoint will assist Client in responding to requests from Data Subjects (individuals whose Personal Data is processed) to exercise their rights under applicable privacy laws, including:



  • Right of Access: Data Subjects may request access to their Personal Data. Client is responsible for responding to such requests. VaultPoint will provide Client with the technical means to export relevant data via the admin portal.

  • Right to Rectification: Data Subjects may request correction of inaccurate Personal Data. Client may update or correct data directly via the admin portal.

  • Right to Erasure ("Right to be Forgotten"): Data Subjects may request deletion of their Personal Data. Client may delete specific documents or outputs via the admin portal. VaultPoint will permanently delete data within 30 days of Client's deletion request.

  • Right to Restriction of Processing: Data Subjects may request temporary restriction of processing. Client may suspend specific user accounts or restrict access to specific documents via admin controls.

  • Right to Data Portability: Data Subjects may request their Personal Data in a machine-readable format. VaultPoint provides export functionality in CSV, JSON, and PDF formats via the admin portal.

  • Right to Object: Data Subjects may object to processing for specific purposes. Client is responsible for evaluating such objections and instructing VaultPoint accordingly.


VaultPoint will respond to Client's requests for assistance with Data Subject rights within 10 business days. If VaultPoint receives a Data Subject request directly (rather than through Client), VaultPoint will forward the request to Client within 5 business days and will not respond to the Data Subject without Client's prior authorization.



6. Data Breach Notification


6.1 VaultPoint's Obligations

In the event of a data breach affecting Client Documents or Personal Data, VaultPoint will:


  • Notify Client within 24 hours of discovery via email to the primary account contact and support@vaultpoint.io

  • Provide a written description of the breach, including:

    • The nature of the breach (unauthorized access, data loss, system compromise, etc.)

    • The categories and approximate number of Data Subjects affected

    • The categories and approximate number of Client Documents affected

    • The likely consequences of the breach

    • Immediate remediation steps taken by VaultPoint

  • Provide ongoing updates every 24 hours until the incident is fully resolved and all affected systems are secured

  • Cooperate fully with Client's investigation, regulatory notifications, and client disclosures

  • Provide technical assistance in assessing the scope and impact of the breach

  • Implement additional security measures to prevent recurrence


6.2 Client's Obligations

Client is responsible for:


  • Evaluating whether the breach requires notification to Data Subjects, regulatory authorities (e.g., state attorneys general, bar associations), or professional liability insurers

  • Making all required notifications to Data Subjects and authorities within applicable deadlines (e.g., 72 hours under GDPR, as required by state breach notification laws)

  • Managing client communications and public relations related to the breach


VaultPoint will provide reasonable assistance with these obligations but is not responsible for Client's compliance with notification requirements.


6.3 Definition of Data Breach

For purposes of this DPA, a "data breach" means:


  • Unauthorized access to Client Documents or Personal Data by individuals not authorized under this DPA

  • Accidental or unlawful destruction, loss, alteration, or disclosure of Client Documents or Personal Data

  • Any incident that compromises the confidentiality, integrity, or availability of Client data


A data breach does NOT include:


  • Authorized access by Client's users or VaultPoint personnel acting within the scope of this DPA

  • Incidents affecting only metadata or system logs that do not expose Client Documents or Personal Data

  • Unsuccessful intrusion attempts that are blocked by VaultPoint's security controls


7. Audits and Compliance


7.1 Client's Audit Rights

Client or Client's authorized auditor may, upon reasonable notice (at least 30 days) and during normal business hours, audit VaultPoint's compliance with this DPA, provided that:

  • Audits occur no more than once per calendar year (unless required by applicable law or following a data breach)

  • The auditor is bound by confidentiality obligations equivalent to this DPA

  • The audit does not unreasonably interfere with VaultPoint's business operations

  • The audit focuses on VaultPoint's technical and organizational measures, not Sub-Processor infrastructure (Sub-Processor audit reports are available upon request per Section 3.2)


VaultPoint may charge Client for reasonable costs incurred in facilitating the audit (e.g., personnel time, documentation preparation) if the audit exceeds 8 hours or requires access to systems beyond those directly processing Client data.


7.2 VaultPoint-Provided Documentation

As an alternative to on-site audits, VaultPoint will provide Client (upon written request to hello@vaultpoint.io) with:

  • Summaries of Sub-Processor SOC 2 Type II audit reports (with confidential sections redacted)

  • Documentation of VaultPoint's technical security measures implemented per Section 4.1

  • Evidence of Sub-Processor Data Processing Agreements

  • Incident response procedures and breach notification protocols

  • Data retention and deletion policies


This documentation is typically sufficient to demonstrate compliance with GDPR Article 28 and similar regulatory requirements.


8. International Data Transfers


VaultPoint operates exclusively within the United States. All Client data is stored and processed in AWS data centers located in the United States (US-East or US-West regions).


If Client is located outside the United States and chooses to use the Service:


  • Client's data will be transferred to and processed in the United States

  • Client acknowledges that U.S. privacy laws may differ from those in Client's jurisdiction

  • VaultPoint provides the same security protections (encryption, isolation, zero-data-retention, audit logging) regardless of Client's location


VaultPoint does not currently offer non-U.S. data residency options. If Client's organization is subject to data localization requirements (e.g., EU data must remain in the EU), Client should not use the Service or should contact hello@vaultpoint.io to discuss custom arrangements (additional fees may apply).

9. Limitation of Liability


9.1 Cap on Damages

To the maximum extent permitted by law, VaultPoint's total liability arising from this DPA or any breach of its obligations under this DPA shall not exceed the fees paid by Client in the 12 months preceding the claim (or $7,000 if less than 12 months have elapsed).


9.2 Excluded Damages


VaultPoint shall not be liable for:

  • Indirect, incidental, consequential, special, or punitive damages

  • Lost profits, lost revenue, lost data (except as provided in Section 4.3 regarding backups), or lost business opportunities

  • Damages arising from Client's failure to implement appropriate security measures on Client's own systems (e.g., weak passwords, failure to enable MFA)

  • Damages caused by Sub-Processor actions beyond VaultPoint's reasonable control, provided VaultPoint exercised reasonable care in selecting and monitoring Sub-Processors

  • Damages arising from Client's instructions that violate applicable law or this DPA

  • Damages resulting from unauthorized access caused by Client's users sharing credentials or failing to report compromised accounts


9.3 Exceptions

These limitations do not apply to:


  • VaultPoint's gross negligence or willful misconduct

  • VaultPoint's breach of confidentiality obligations under Section 2 of the Terms of Service

  • Claims that cannot be limited by law (e.g., certain statutory violations, fraud)

  • VaultPoint's obligations to assist with data breach notifications under Section 6


9.4 Allocation of Risk

Client acknowledges that the fees charged by VaultPoint reflect this allocation of risk. Higher limits of liability are available through separate negotiation and additional fees.


10. Term and Termination


10.1 Term

This DPA takes effect on the date Client activates the Service and remains in effect until the earlier of:


  • Client's termination of the Service per the Terms of Service

  • VaultPoint's termination of the Service per the Terms of Service

  • Mutual written agreement to terminate


10.2 Effect of Termination


Upon termination of this DPA or the underlying Service subscription:


  • VaultPoint will cease all processing of Client Documents and Personal Data, except as necessary to fulfill data export and deletion obligations

  • Client will have 30 days to export all Client Documents, AI Outputs, and audit logs via the admin portal

  • After 30 days, VaultPoint will permanently delete all Client data (documents, outputs, backups, metadata) from all systems, including Sub-Processor systems

  • VaultPoint will provide written certification of data deletion upon Client's written request to hello@vaultpoint.io

  • Sections of this DPA that by their nature should survive termination (confidentiality, limitation of liability, dispute resolution) will continue to apply


10.3 Data Retention Exceptions


Notwithstanding Section 10.2, VaultPoint may retain:


  • Audit logs for the remainder of the 7-year retention period (or as required by legal hold obligations)

  • Anonymized, aggregated usage statistics that cannot be traced back to Client or any Data Subject

  • Financial records (invoices, payment receipts) as required by tax and accounting regulations

  • Information required to be retained by law, court order, or government investigation


VaultPoint will notify Client if legally required to retain data beyond the 30-day deletion period.



11. General Provisions


11.1 Amendments

VaultPoint may update this DPA by posting the revised version at vaultpoint.io/legal and notifying Client via email at least 30 days before the changes take effect.


If changes materially reduce Client's rights or VaultPoint's obligations, Client may terminate the Service without penalty by providing written notice within 30 days of notification.


Continued use of the Service after changes take effect constitutes acceptance of the revised DPA.


11.2 Governing Law


This DPA is governed by the laws of the State of Florida, without regard to conflict of law principles. Disputes arising from this DPA are subject to the dispute resolution provisions in Section 11 of the Terms of Service (arbitration in Miami, Florida).


11.3 Relationship to Terms of Service


This DPA supplements and is incorporated into the Terms of Service. In the event of conflict between this DPA and the Terms of Service regarding data processing obligations, this DPA controls.

11.4 Severability


If any provision of this DPA is found unenforceable, the remaining provisions remain in full force and effect. The unenforceable provision will be modified to the minimum extent necessary to make it enforceable while preserving its original intent.

11.5 No Third-Party Beneficiaries


This DPA is between VaultPoint and Client only. Data Subjects and Sub-Processors are not third-party beneficiaries with independent rights to enforce this DPA.


11.6 Assignment


Client may not assign this DPA without VaultPoint's prior written consent. VaultPoint may assign this DPA to an acquirer or successor entity in connection with a merger, acquisition, or sale of substantially all assets, provided the assignee agrees to be bound by this DPA.


11.7 Notices


All notices under this DPA must be in writing and sent to:


Client notices to VaultPoint:

Email: hello@vaultpoint.io

Subject: "DPA Notice - [Your Firm Name]"



VaultPoint notices to Client:

Email: The primary contact email associated with your account



For security incidents:

Email: support@vaultpoint.io

Subject: "[SECURITY INCIDENT] - [Your Firm Name]"

Phone: Available in account dashboard for true emergencies


Notices are deemed received 24 hours after email transmission or upon confirmation of receipt, whichever is earlier.



12. Contact Information



For questions about this DPA or to exercise rights under this agreement, contact:


VaultPoint Consulting LLC
Email: hello@vaultpoint.io
Website: vaultpoint.io
Subject line for DPA inquiries: "DPA Question - [Your Firm Name]"



For data subject rights requests:
Email: hello@vaultpoint.io
Subject line: "Data Rights Request - [Your Firm Name]"



For security incidents or data breaches:
Email: support@vaultpoint.io
Subject line: "[SECURITY INCIDENT] - [Your Firm Name]"



We will respond within 10 business days for general DPA questions, within 5 business days for data subject rights requests, and within 24 hours for security incidents.

© 2025 VaultPoint. Available exclusively through approved partners.

© 2025 VaultPoint. Available exclusively through approved partners.