Back to home

DATA PROTECTION

Data Security and Confidentiality Policy

Version 1.1 - August 2025

This is a translation of the French Data Policy. In case of discrepancy, the French version shall prevail.

CLEAVR SAS

55 rue du Général de Gaulle, 77410 Annet sur Marne, France

DPO: baptiste.nassoy@cleavr.fr

00

Definitions

To ensure clear understanding, the following terms are defined in accordance with GDPR and applicable data protection laws: • Personal Data: Any information relating to an identified or identifiable natural person (e.g., name, email, financial information). • Processing: Any operation on Personal Data, automated or otherwise (e.g., collection, storage, deletion). • Security Incident: Any confirmed breach resulting in the destruction, loss, alteration, unauthorized disclosure or unauthorized access to Personal Data (excluding minor attempts with no impact). • Sensitive Data: Data revealing racial/ethnic origin, political opinions, religious beliefs, health data, or relating to criminal offenses. • Sub-Processor: Any entity authorized by Cleavr to process Personal Data. • Data Controller: The client who determines the purposes and means of processing.

01

Introduction and Commitment

Cleavr is a technological debt recovery assistance solution designed for businesses wishing to secure their receivables while respecting the highest standards of compliance, security and confidentiality. We process our clients' data with strict compliance with legal obligations, particularly the General Data Protection Regulation (GDPR), and we are committed to total transparency regarding their processing.

1.1 Types of Data Processed and Legal Bases

Cleavr processes, on client instruction, personal data such as identities (surname, first name), contact details (address, email, phone), financial information (invoices, amounts due) and supporting documents (such as national ID card via Stripe) of debtors. The legal bases rely on the execution of the contract with the client (data controller) and compliance with legal obligations regarding debt recovery, in application of the principles of minimization, purpose limitation and proportionality.

02

Data Location and Hosting

All data processed by Cleavr is hosted on our partner Supabase's infrastructure, using AWS regions located exclusively in the European Union: eu-west-1 (Ireland), eu-west-3 (Paris) and eu-central-1 (Frankfurt). The client may choose a specific region for primary storage and processing, subject to legal compliance; Cleavr undertakes to respect this choice. These regions comply with European Union requirements for personal data protection. The infrastructures used are certified to the strictest security standards (ISO 27001, SOC 2, etc.).

03

Sub-Processors and Authorized Third Parties

As part of our operations, we use the following sub-processors: • Stripe: for payment management, identity verification and collection of supporting documents (such as national ID card). This data is transmitted directly to Stripe, without Cleavr having access. Stripe is PCI DSS certified and GDPR compliant. • Brevo: for sending transactional emails and notifications. Brevo is established in France and fully GDPR compliant. • Vercel: for hosting and deploying our front-end applications, offering a scalable and secure infrastructure compliant with GDPR via its pre-signed Data Processing Agreement (DPA), with AES-256 encryption, ISO 27001 and SOC 2 certifications, and no transfers outside EU without standard contractual clauses. • StackAuth: for secure user authentication management, using JWT or encrypted cookies, supporting over 60 OAuth/SAML providers, and ensuring GDPR compliance by minimizing sensitive data collection without permanent storage of credentials. All our sub-processors are established in the European Union or comply with standard contractual clauses established by the European Commission to guarantee an equivalent level of protection. The client grants general authorization for these sub-processors; Cleavr notifies any change at least 30 days in advance. The client may object within 5 days; in case of disagreement, Cleavr resolves in good faith or allows termination of affected services. Cleavr remains fully responsible for the acts of its sub-processors.

04

Data Security

Access to data is strictly controlled via secure authentication systems and role management. Only authorized persons within Cleavr can access certain categories of data, according to their function. Data is systematically encrypted: • In transit, via HTTPS/TLS 1.2+; • At rest, via AES-256 on our host's servers. • Logical partitioning between clients is in place to prevent unauthorized access to other accounts' data. • A security log monitoring and alerting system is in place to detect anomalies, unauthorized access attempts or potential incidents in real time. Logs are retained for a minimum period of 6 to 12 months, in accordance with CNIL recommendations, and protected against any alteration.

4.1 Detailed Authentication and Access Management

Authentication uses unique identifiers and complex passwords (minimum 12 characters, including uppercase, lowercase, numbers and special characters, with mandatory multi-factor authentication - MFA - not based on SMS). Access is reviewed annually and revoked immediately upon departure or role change. The "Least Privilege" principle is applied.

4.2 Employee Awareness and Training

All Cleavr staff are trained annually on data security and GDPR. An internal IT charter, signed by each employee, defines usage rules (no password sharing, incident reporting) and includes phishing simulations to strengthen vigilance against human risks.

4.3 Physical and Premises Security

Hosting infrastructures (via Supabase/AWS) include physical security measures: alarms, zoned access controls, video surveillance and redundancy against disasters (fire, flood). For more information: https://docs.aws.amazon.com/whitepapers/latest/aws-overview/security-and-compliance.html

4.4 Measures Against Sensitive Data

No Sensitive Data is processed by default, unless specified by the client. Additional measures such as pseudonymization are applied to minimize risks.

05

Data Retention and Deletion

Data is retained only for the duration necessary to provide the service, on client instruction. At the end of the contract or upon request, it is securely erased (irreversible deletion, with confirmation provided to the client). By default, active data is retained for the duration of the contract, and backups are retained for 30 days before final deletion. A copy can be provided upon request during this period.

06

Backups and Service Continuity

Automatic encrypted logical backups are performed daily to ensure service continuity. These backups are stored on secure and replicated servers, guaranteeing their availability in case of failure (target: 99.99%). We regularly perform restoration tests to guarantee the integrity and resilience of our infrastructure.

07

Regulatory Compliance (GDPR)

Cleavr acts as a processor within the meaning of GDPR. We commit to: • Process data only on documented instruction from the client (data controller); • Respect the principles of minimization, purpose limitation and proportionality; • Guarantee users their rights of access, rectification, objection, portability and erasure; • Provide an up-to-date register of processing activities upon request; • Fully cooperate with competent supervisory authorities, including CNIL. A Data Protection Officer (DPO) is available for any request or clarification.

7.1 Exercise of Data Subject Rights

Requests to exercise rights (access, rectification, etc.) are transmitted to the client (data controller) within 72 hours. Cleavr assists the client in responding, via our DPO, by providing the necessary information securely.

7.2 Risk Management and Audits

Cleavr conducts an inventory of data processing and assesses risks (illegitimate access, loss, modification).

08

Security Incident Management

In case of proven or suspected personal data breach, Cleavr commits to: • Inform affected clients as soon as possible; • Document the incident (date, nature, impact, measures taken); • Immediately implement necessary corrective actions; • Inform CNIL within 72 hours if the incident presents a high risk to the rights and freedoms of the data subjects.

09

Security & DPO Contact

For any questions regarding security, confidentiality or data processing, please contact our DPO: baptiste.nassoy@cleavr.fr