Data Processing Addendum

Last Updated: November 6, 2025

This Data Processing Addendum ("DPA") forms part of the Terms of Use between I Made It Up ("Processor") and you ("Controller") for the use of I Made It Up's services ("Services").

Note: This DPA applies to customers who process Personal Data subject to Data Protection Laws. By using our Services to process Personal Data, you agree to the terms of this DPA.

1. Definitions

Term Definition
Data Protection Laws All applicable laws and regulations relating to the processing of Personal Data, including the GDPR, CCPA, and any successor legislation.
GDPR General Data Protection Regulation (EU) 2016/679
CCPA California Consumer Privacy Act
Personal Data Any information relating to an identified or identifiable natural person that is processed by Processor on behalf of Controller in connection with the Services.
Processing Has the meaning given in applicable Data Protection Laws (collecting, storing, and using data).
Sub-processor Any third party engaged by Processor to process Personal Data.
Data Subject The individual to whom Personal Data relates.

2. Scope and Purpose

2.1 Application

This DPA applies to the Processing of Personal Data by Processor on behalf of Controller in connection with the Services.

2.2 Processing Activities

Processor shall process Personal Data only:

2.3 Nature and Purpose of Processing

The nature and purpose of Processing includes:

2.4 Categories of Data Subjects

Data Subjects may include:

2.5 Types of Personal Data

Personal Data processed may include:

Note on AI Processing: When using AI model providers (OpenAI, Anthropic, Google), we send a pseudonymised user identifier for abuse monitoring and your user-submitted content for processing. Your content contains PII only if you choose to input it. AI providers have contractual commitments not to use API data for model training.

3. Duration of Processing

Processor will process Personal Data for the duration of the agreement with Controller, and as required by law or to enforce our terms. Controller may request deletion of Personal Data as described in Section 6 below.

4. Controller and Processor Obligations

4.1 Controller Responsibilities

Controller represents and warrants that:

4.2 Processor Responsibilities

Processor shall:

5. Security Measures

Processor implements appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including:

5.1 Technical Measures

5.2 Organizational Measures

6. Data Subject Rights

Processor shall assist Controller in fulfilling its obligations to respond to Data Subject requests to exercise their rights under Data Protection Laws, including:

6.1 Rights Supported

6.2 Procedure

Data Subjects may exercise their rights by:

7. Sub-processors

7.1 Authorized Sub-processors

Controller authorizes Processor to engage the Sub-processors listed at imadeitup.ai/subprocessors.

7.2 Sub-processor Requirements

Processor ensures that Sub-processors:

7.3 Changes to Sub-processors

Processor will provide at least 30 days advance notice before:

Notification will be sent via email to the Controller's registered address.

Controller may object to a new Sub-processor on reasonable data protection grounds by notifying Processor in writing within 30 days of notice.

Timing of Implementation: Processor will not begin processing Personal Data with the new Sub-processor until the earlier of:

If Controller objects: Processor will either:

Controller's failure to object within 30 days constitutes acceptance of the new Sub-processor.

8. International Data Transfers

8.1 Transfer Mechanisms

To the extent Processor transfers Personal Data from the UK or EEA to countries without an adequacy decision, Processor relies on:

Transfer Safeguards: All data transferred to the United States is transferred to sub-processors who have implemented appropriate safeguards through one or more of these mechanisms.

8.2 Sub-processor Transfers

Processor ensures that Sub-processors located outside the EEA/UK implement appropriate transfer mechanisms and safeguards.

9. Audits and Compliance

9.1 Audit Rights

Upon reasonable written notice and subject to confidentiality obligations, Processor shall allow Controller to:

9.2 Third-Party Audits

Processor may engage independent third-party auditors to verify compliance. Audit reports may be shared with Controller subject to confidentiality agreements.

10. Data Breach Notification

10.1 Notification Obligation

Processor shall notify Controller without undue delay (and in any event within 72 hours) after becoming aware of a Personal Data breach.

10.2 Breach Information

Notifications shall include, to the extent known:

11. Deletion and Return of Data

11.1 Upon Termination

Upon termination or expiration of the agreement, Processor shall:

11.2 Data Export

Before deletion, Controller may request export of Personal Data in a commonly used, machine-readable format.

12. Liability and Indemnification

12.1 Processor Liability

Processor shall be liable for damages caused by Processing only where:

12.2 Limitation

Subject to applicable law, Processor's liability is limited as set forth in the Terms of Use.

13. General Provisions

13.1 Conflict

In the event of conflict between this DPA and the Terms of Use, this DPA shall prevail with respect to Processing of Personal Data.

13.2 Amendments

Processor may amend this DPA from time to time to reflect changes in law or business practices. Material changes will be communicated with at least 30 days notice.

13.3 Severability

If any provision of this DPA is held invalid or unenforceable, the remaining provisions shall remain in full force and effect.

13.4 Governing Law

This DPA shall be governed by the laws specified in the Terms of Use.

14. Enterprise Customers

For enterprise customers requiring custom data processing terms, additional security controls, or specific compliance requirements (e.g., HIPAA BAA), please contact us at enterprise@imadeitup.ai.

Custom agreements may include:

Contact Information

For questions about this DPA or data processing practices:

← Back to Terms of Use | View Sub-processors