Verification: d8278a814616010a
logo-black

Last Modified Date: August 2024

Individuals seeking data contained in Prospect Accel should first contact the data owner directly for access. Prospect Accel informs customers of requests for their data unless prohibited by law or in cases of urgent emergencies involving potential death or serious physical injury, where Prospect Accel may possess the information needed to prevent harm.

Every legal request is examined by Prospect Accel to determine its viability, and those that raise legal doubts are contested. In order to reduce the amount of private information disclosed, we carefully consider legal requests.

Prospect Accel Data Processing Agreement

The parties' agreement on our processing of personal data in connection with the Prospect Accel Subscription Services under the Prospect Accel Customer Terms of Service is reflected in this Prospect Accel Data Processing Agreement and its Annexes (the "DPA").

This DPA is an integral element of the Agreement and is supplemental to it. It becomes effective when it is incorporated into the Agreement, which could happen through an executed amendment to the Agreement, an Order Form, or the Agreement itself. In the event that this DPA and the terms of the Agreement conflict or are inconsistent, this DPA will apply to the extent of the conflict or contradiction.

Authentication for login: We apply a standard password policy to all of our client products. Prior to accessing private client information, users must authenticate.

Only application user interfaces and application programming interfaces provide customers with access to the multi-tenant storage systems where customer data is kept. Direct access to the underlying application infrastructure is not permitted for customers. Every one of our products has an authorization mechanism that makes sure that only people who have been given the proper permissions can access the features, views, and customization choices that are relevant to them. Validating the user's permissions against the attributes linked to each data set is how authorization to data sets is carried out.