Data Processing
1. Scope & Applicability
This Data Processing Addendum ("DPA") applies specifically to the processing of data within the Apstal neural engine. It defines the technical and organizational measures taken to ensure data integrity during real-time analysis, predictive demographic estimation, and geographic mapping.
2. Processing Operations
Apstal acts as a Processor of data submitted via the platform. Our primary objective is to transform raw interaction metadata into actionable business intelligence through automated neural modeling.
- Data Extraction: Capturing behavioral signals from registered domains.
- Anonymization Cluster: Immediate masking of full IP addresses at the edge.
- Neural Inference: Processing anonymized telemetry to estimate demographics (Age/Gender).
- Geographic Mapping: Converting masked network data into City/Country level coordinates.
3. Technical Security Measures
We implement rigorous technical controls to protect the processing environment:
- Edge Processing: Data anonymization occurs at the nearest network edge, before reaching core database clusters.
- Encryption Matrix: All data is encrypted using TLS 1.3 in transit and AES-256 at rest.
- Access Control: Strict identity-based access (IAM) to neural model parameters.
- Audit Logging: Automated tracking of all system-level data access events.
4. Infrastructure Sub-processors
Apstal utilizes top-tier global infrastructure to maintain system uptime and processing speed. Our list of core sub-processors includes:
- Vercel, Inc.: Global edge compute and front-end delivery infrastructure.
- Supabase / AWS: Scalable database hosting and authentication services.
- Cloudflare: Global CDN and DDOS protection for neural data streams.
5. Data Sovereignty & Transfers
Metadata processed by the Apstal engine is distributed across global clusters to ensure ultra-low latency. We ensure that any cross-border transfers comply with standard contractual clauses (SCCs) and regional data protection frameworks.
6. Infrastructure Integrity
Apstal maintains a dedicated Incident Response Team. In the event of a system disruption or integrity breach, all affected accounts are notified through the System Status dashboard and direct technical channels.
Infrastructure Compliance
Our data processing infrastructure is continuously monitored for compliance with SOC2 Type II and ISO 27001 standards via our sub-processor audits.