Platform
Docs
Solutions
ContactLog In

Courier Data Processing Addendum

This Data Processing Addendum (including all Schedules attached hereto, the “DPA”) is incorporated into, and is subject to the terms and conditions of, the Terms of Service or other written or electronic agreement (“Agreement”) between trycourier.com, Inc. doing business as Courier (“Courier”) and the entity identified as “Customer” in the Agreement (“Customer”). This DPA applies to the extent Courier’s Processing of Customer Personal Data is subject to the Data Protection Laws. This DPA shall be effective for the term of the Agreement.

1. Definitions

1.1. For this DPA:

1.1.1. “CCPA” means the California Consumer Privacy Act and its implementing regulations;

1.1.2. “Controller” means the entity which determines the purposes and means of the Processing of Personal Data;

1.1.3. “Customer Personal Data” means the Personal Data described under Schedule 1 to this DPA;

1.1.4. “Data Protection Laws” means all laws relating to data protection and privacy applicable to Courier’s Processing of Customer Personal Data, including without limitation, the CCPA, the GDPR and member state laws implementing the GDPR, the United Kingdom’s Data Protection Act 2018, and applicable privacy and data protection laws of any other jurisdiction, each as amended, repealed, consolidated or replaced from time to time;

1.1.5. “Data Subjects” means the individuals identified in Schedule 1

1.1.6. “EU SCCs” means the Standard Contractual Clauses approved with Commission Implementing Decision (EU) 2021/914 of June 4, 2021 on standard contractual clauses for the transfer of personal data to third countries pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council, as amended, supplemented, updated or replaced from time to time; 

1.1.7. “GDPR” means the General Data Protection Regulation (EU) 2016/679 together with any national implementing laws in any member state of the EEA (“EU GDPR”) and the EU GDPR as incorporated into the laws of the United Kingdom (“UK GDPR”);

1.1.8. “Personal Data”, “Personal Data Breach” and “Processing” will each have the meaning given to them in the Data Protection Laws. The term “Personal Data” includes “personal information,” “personally identifiable information,” and equivalent terms as such terms may be defined by the Data Protection Laws. The term “Personal Data Breach” includes equivalent terms as defined by the Data Protection Laws;

1.1.9. “Processor” means the entity which Processes Personal Data on behalf of the Controller; 

1.1.10. “Sell” has the meaning given in the Data Protection Laws; and

1.1.11. “UK SCCs” means the Standard Contractual Clauses for controller to processor transfers set forth in the European Commission’s decision (C(2010)593) of 5 February 2010. 

1.2. Capitalized terms not otherwise defined herein shall have the meaning given to them in the Agreement.

2. Processing of Customer Personal Data

2.1. The parties acknowledge and agree that Customer is the Controller or Processor of Customer Personal Data and Courier is a Processor of Customer Personal Data. Courier will only Process Customer Personal Data as a Processor on behalf of and in accordance with Customer’s prior written instructions, including any instructions provided through Customer’s use of the Service. Courier is hereby instructed to Process Customer Personal Data to the extent necessary to provide the Service as set forth in the Agreement and this DPA. Courier shall not (1) retain, use, or disclose Customer Personal Data other than as provided for in the Agreement, as needed to provide the Service, or as otherwise permitted by Data Protection Laws; or (2) Sell Customer Personal Data. Courier certifies that it understands and will comply with the restrictions contained in this Section 2.1.

2.2. Courier will immediately inform Customer if, in its opinion, an instruction from Customer infringes the Data Protection Laws. 

2.3. The details of Courier’s Processing of Customer Personal Data are described in Schedule 1

2.4. If applicable laws preclude Courier from complying with Customer’s instructions, Courier will inform Customer of its inability to comply with the instructions, to the extent permitted by law. 

2.5. Each of Customer and Courier will comply with their respective obligations under the Data Protection Laws. 

3. Cross-Border Transfers of Personal Data

3.1. With respect to Customer Personal Data originating from the European Economic Area (“EEA”) or Switzerland that is transferred from Customer to Courier in the United States, the parties agree to comply with the general clauses and with “Module Two” (Controller to Processor) of the EU SCCs, which are incorporated herein by reference, with Customer as the “data exporter” and Courier as the “data importer.” 

3.2. For the EU SCCs the parties agree that:

3.2.1. In Clause 7, the optional docking clause will not apply;

3.2.2. In Clause 9, Option 2 will apply and the time period for prior notice of Sub-Processor changes will be as set forth in Section 5.1 of this DPA;

3.2.3. In Clause 11, the optional language will not apply;

3.2.4. In Clause 17, the EU SCCs shall be governed by the laws of Ireland;

3.2.5. In Clause 18(b), the parties agree to submit to the jurisdiction of the courts of Ireland;

3.2.6. In Annex I, Section A (List of Parties), (i) the data exporter’s and the data importer’s identity and contact details and, where applicable, information about their respective data protection officer and/or representative in the EEA are those set forth in the Agreement or as otherwise communicated by each party to the other party; (ii) Customer is a Controller and Courier is a Processor; (iii) the activities relevant to the data transferred under the EU SCCs relate to the provision of the Services pursuant to the Agreement; and (iv) entering into this DPA shall be treated as each party’s signature of Annex I, Section A, as of the effective date of this DPA;

3.2.7. In Annex I, Section B (Description of Transfer): (i) Schedule 1 to this DPA describes Courier’s Processing of Customer Personal Data; (ii) the frequency of the transfer is continuous (for as long as Customer uses the Services); (iii) Customer Personal Data will be retained in accordance with Clause 8.5 of the EU SCCs and this DPA; (iv) Courier uses the Sub-Processors identified at https://www.courier.com/subprocessors/ to support the provision of the Services. 

3.2.8. In Annex I, Section C (Competent Supervisory Authority), the competent supervisory authority identified in accordance with Clause 13 of the EU SCCs is the competent supervisory authority communicated by Customer to Courier. Unless and until Customer communicates a competent supervisory authority to Courier, the competent supervisory authority shall be the Irish Data Protection Commission.

3.2.9. In Annex II, Courier has implemented and will maintain appropriate technical and organizational measures to protect the security, confidentiality and integrity of Customer Personal Data as described in Schedule 2

3.3. If the transfer of Customer Personal Data is subject to the Swiss Federal Act on Data Protection, the parties agree to rely on the EU SCCs with the following modifications: (i) references to the ‘GDPR’ in the EU SCCs will be understood as references to the Swiss Federal Act on Data Protection insofar as the transfer of Customer Personal Data is subject to the Swiss Federal Act on Data Protection; (ii) the Federal Data Protection and Information Commissioner (FDPIC) will be the competent supervisory authority under Clause 13 of the EU SCCs; (iii) the parties agree to abide by the GDPR standard in relation to all Processing of Customer Personal Data that is governed by the Swiss Federal Act on Data Protection; and (iv) the term ‘Member State’ in the EU SCCs will not be interpreted in such a way as to exclude Data Subjects who habitually reside in Switzerland from initiating legal proceedings in Switzerland in accordance with Clause 18(c) of the EU SCCs.

3.4. With respect to transfers from Customer to Courier of Customer Personal Data originating from the United Kingdom, the parties agree to comply with the UK SCCs, which are incorporated herein by reference. The parties agree that, for the UK SCCs: (i) Customer is the “data exporter”, and Courier is the “data importer”; (ii) all references to the “Directive 95/46/EC” and its provisions shall be deemed to refer to the relevant provisions of the UK GDPR and the Data Protection Act 2018 of the United Kingdom; (iii) all references to the “Commission” shall be deemed to refer to the Information Commissioner; (iv) all references to the “European Economic Area” or the “European Union” shall be deemed to refer to the United Kingdom; (v) for Appendix 1 to the UK SCCs, information about the exporter and importer, the categories of Data Subjects, types of Personal Data and type of Processing operations are as set out in Schedule 1 to this DPA; and (vi) for Appendix 2 to the UK SCCs, the security measures are as described in Schedule 2. The parties acknowledge that the Information Commissioner’s Office has not yet approved new standard contractual clauses under the UK GDPR. The UK SCCs will apply only until the Information Commissioner’s Office issues new standard contractual clauses under the UK GDPR. If the Information Commissioner’s Office approves the EU SCCs for transfers from the UK, the parties agree that the EU SCCS as implemented by this DPA will be the mechanism to legitimize such transfers. Where necessary, the parties shall work together, in good faith, to enter into an updated version of the UK SCCs or negotiate an alternative solution to enable transfers of Customer Personal Data in compliance with Data Protection Laws.

4. Confidentiality and Security

4.1. Courier will require Courier’s personnel who access Customer Personal Data to commit to protect the confidentiality of Customer Personal Data.

4.2. Courier will implement commercially reasonable technical and organisational measures, as further described Schedule 2, that are designed to protect against accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Personal Data. 

4.3. To the extent required by Data Protection Laws, Courier will provide Customer with reasonable assistance as necessary for the fulfilment of Customer’s obligations under Data Protection Laws to maintain the security of Customer Personal Data.

5. Sub-Processing

5.1. Customer agrees that Courier may engage Sub-Processors to Process Customer Personal Data on Customer's behalf. Courier will inform Customer of any intended changes concerning the addition or replacement of Sub-Processors and Customer will have an opportunity to object to such changes on reasonable grounds within seven days after being notified. If the parties are unable to resolve such objection, either party may terminate the Agreement by providing written notice to the other party.

5.2. Courier will impose on its Sub-Processors substantially the same obligations that apply to Courier under this DPA. Courier will be liable to Customer for breaches of its Sub-Processors’ obligations as it would be for its own.

5.3. The parties agree that the copies of the Authorized Sub-Processor agreements that must be provided by Courier to Customer pursuant to Clause 9(c) of the EU SCCs and Clause 5 of the UK SCCs, if applicable, may have commercial information or clauses unrelated to the EU or UK SCCs removed by Courier beforehand; and, that such copies will be provided by Courier, in a manner to be determined in its discretion, only upon Customer’s written request.

6. Data Subject Rights

Customer is responsible for responding to any Data Subject requests relating to Customer Personal Data (“Requests”). If Courier receives any Requests during the term, Courier will advise the Data Subject to submit the request directly to Customer or the appropriate Controller. Courier will provide Customer with self-service functionality or other reasonable assistance to permit Customer to respond to Requests. 

7. Personal Data Breaches

Upon becoming aware of a Personal Data Breach affecting Customer Personal Data, Courier will (i) promptly take measures designed to remediate the Personal Data Breach and (ii) notify Customer without undue delay. Customer is solely responsible for complying with Personal Data Breach notification requirements applicable to Customer. At Customer’s request, Courier will reasonably assist Customer’s efforts to notify Personal Data Breaches to the competent data protection authorities and/or affected Data Subjects, if Customer is required to do so under the Data Protection Laws. Courier’s notice of or response to a Personal Data Breach under this Section 7 will not be an acknowledgement or admission by Courier of any fault or liability with respect to the Personal Data Breach.

8. Data Protection Impact Assessment; Prior Consultation

Taking into account the nature of the Processing and the information available to Courier, Courier will reasonably assist Customer in conducting data protection impact assessments and consultation with data protection authorities if Customer is required to engage in such activities under applicable Data Protection Laws and such assistance is necessary and relates to the Processing by Courier of Customer Personal Data.

9. Deletion of Customer Personal Data

Customer instructs Courier to delete Customer Personal Data within 90 days of the termination of the Agreement and delete existing copies unless applicable law requires otherwise. The parties agree that the certification of deletion described in Clause 8.5 of the EU SCCs and Clause 12 of the UK SCCs, if applicable, shall be provided only upon Customer’s written request. Notwithstanding the foregoing, Courier may retain Customer Personal Data to the extent and for the period required by applicable laws provided that Courier maintains the confidentiality of all such Customer Personal Data and Processes such Customer Personal Data only as necessary for the purpose(s) specified in the applicable laws requiring its storage.

10. Audits

10.1. Customer may audit Courier’s compliance with its obligations under this DPA up to once per year. In addition, Customer may perform more frequent audits (including inspections) in the event: (1) Courier suffers a Personal Data Breach affecting Customer Personal Data; (2) Customer has genuine, documented concerns regarding Courier’s compliance with this DPA or the Data Protection Laws; or (3) where required by the Data Protection Laws, including where mandated by regulatory or governmental authorities with jurisdiction over Customer Personal Data. Courier will contribute to such audits by providing Customer or Customer’s regulatory or governmental authority with the information and assistance reasonably necessary to conduct the audit, including any relevant records of Processing activities applicable to the Service, as described below.

10.2. To request an audit, Customer must submit a detailed proposed audit plan to privacy@courier.com at least one month in advance of the proposed audit start date. The proposed audit plan must describe the proposed scope, duration, start date of the audit, and the identity of any third party Customer intends to appoint to perform the audit. Courier will review the proposed audit plan and provide Customer with any concerns or questions (for example, Courier may object to the third party auditor as described in Section 10.3, provide an Audit Report as described in Section 10.4, or identify any requests for information that could compromise Courier confidentiality obligations or security, privacy, employment or other relevant policies). The parties will negotiate in good faith to agree on a final audit plan at least two weeks in advance of the proposed audit start date.  Nothing in this Section 10 shall require Courier to breach any duties of confidentiality.

10.3. Courier may object to third party auditors that are, in Courier’s reasonable opinion, not suitably qualified or independent, a competitor of Courier, or otherwise manifestly unsuitable.  Customer will appoint another auditor or conduct the audit itself if the parties cannot resolve the objection after negotiating in good faith.

10.4. If the requested audit scope is addressed in an SSAE 16/ISAE 3402 Type 2, ISO, NIST or similar audit report performed by a qualified third party auditor on Courier’s systems that Process Customer Personal Data (“Audit Reports”) within twelve (12) months of Customer’s audit request and Courier confirms there are no known material changes in the controls audited, Customer agrees to accept the Audit Report in lieu of requesting an audit of the controls covered by the Audit Report.

10.5. The audit must be conducted at a mutually agreeable time during regular business hours at the applicable facility, subject to the agreed final audit plan and Courier’s health and safety or other relevant policies and may not unreasonably interfere with Courier business activities.

10.6. Any audits are at Customer’s expense and Customer will promptly disclose to Courier any perceived non-compliance or security concerns discovered during the audit, together with all relevant details.

10.7. The parties agree that the audits described in Clause 8.9 of the EU SCCs and Clause 5(f) of the UK SCCs, if applicable, shall be performed in accordance with this Section 10. 

11. Analytics Data

Customer acknowledges and agrees that Courier may create and derive from Processing related to the Service anonymized and/or aggregated data that does not identify or relate to Customer or any Data Subject (“Analytics Data”), and use, publicize or share with third parties such Analytics Data to improve the Service and for Courier’s other legitimate business purposes.

12. Liability

12.1. Each party’s liability towards the other party under or in connection with this DPA will be limited in accordance with the provisions of the Agreement.

12.2. Customer acknowledges that Courier is reliant on Customer for direction as to the extent to which Courier is entitled to Process Customer Personal Data on behalf of Customer in performance of the Service.  Consequently, Courier will not be liable under the Agreement for any claim brought by a Data Subject arising from (a) any action or omission by Courier in compliance with Customer’s instructions or (b) from Customer’s failure to comply with its obligations under the Data Protection Laws.

13. General Provisions

With regard to the subject matter of this DPA, in the event of inconsistencies between the provisions of this DPA and the Agreement, the provisions of this DPA shall prevail. In the event of inconsistencies between the DPA and the EU or UK SCCs, the EU OR UK SCCs will prevail.

Schedule 1

Details of Processing

  1. Categories of Data Subjects. This DPA applies to Courier’s Processing of Customer Personal Data relating to Customer’s employees, contractors, and end users of the Service (“Data Subjects”).

  2. Types of Personal Data. The extent of Customer Personal Data Processed by Courier is determined and controlled by Customer in its sole discretion and includes names, contact information, employer, title, image, location, language preference, IP address, and any other Personal Data that may be transmitted through the Service by Data Subjects. 

  3. Subject-Matter and Nature of the Processing. Customer Personal Data will be subject to the Processing activities that Courier needs to perform in order to provide the Service pursuant to the Agreement.

  4. Purpose of the Processing. Courier will Process Customer Personal Data for purposes of providing the Service as set out in the Agreement.

  5. Duration of the Processing. Customer Personal Data will be Processed for the duration of the Agreement, subject to Section 9 of the DPA.

Schedule 2

Security Overview

1. Purpose. Courier is committed to maintaining customer trust. The purpose of this Security Overview is to describe the security program for the Courier Services. This Security Overview describes the minimum security standards that Courier maintains in order to protect Customer Personal Data from unauthorized use, access, disclosure, theft, or manipulation. As security threats shift and evolve, Courier continues to update its security program and strategy to help protect Customer Personal Data. Courier reserves the right to update this Security Overview from time to time; provided, however, any update will not materially reduce the overall protections set forth in this Security Overview. Any capitalized term not defined in this Security Overview will have the meaning given in the Agreement or the DPA.

2. Services Covered. This Security Overview describes the architecture, administrative, technical and physical controls as well as third party security audit certifications that are applicable to the Services.

3. Security Organization & Program. Courier maintains a risk-based assessment security program. The framework for Courier’s security program includes administrative, technical, and physical safeguards reasonably designed to protect the confidentiality, integrity, and availability of Customer Personal Data. Courier’s security program is intended to be appropriate to the nature of Courier Services and the size and complexity of Courier’s business operations. Courier’s security framework includes programs covering: Policies and Procedures, Asset Management, Access Management, Cryptography, Physical Security, Operations Security, Communications Security, Business Continuity Security, People Security, Product Security, Cloud and Network Infrastructure Security, Security Compliance, Third-Party Security, Vulnerability Management, as well as Security Monitoring and Incident Response. Information security policies and standards are reviewed and approved by management at least annually and are made available to all Courier employees for their reference.

4. Confidentiality. Courier has controls in place to maintain the confidentiality of Customer Personal Data that Customer makes available to the Services, in accordance with the Agreement. All Courier employees and contract personnel are bound by Courier’s internal policies regarding maintaining confidentiality of Customer Personal Data and contractually commit to these obligations.

5. People Security.

5.1 Employee Background Checks. Courier carries out background checks on individuals joining Courier in accordance with applicable local laws. Courier currently verifies the individual’s education and previous employment, and also carries out reference checks. Where local labor law or statutory regulations permit, and dependent on the role or position of the prospective employee, Courier may also conduct criminal, credit, immigration, and security checks.

5.2 Employee Training. At least once a year, all Courier employees must complete the Courier security and privacy training which covers Courier’s security policies, security best practices, and privacy principles. Employees on a leave of absence may have additional time to complete this annual training. Courier has established an anonymous hotline for employees to report any unethical behavior where anonymous reporting is legally permitted.

6. Third Party Vendor Management.

6.1 Vendor Assessment. Courier may use third party vendors to provide Services. Courier carries out a security risk-based assessment of prospective vendors before working with those vendors to validate that prospective vendors meet Courier’s security requirements. Courier periodically reviews each vendor in light of Courier’s security and business continuity standards, including the type of access and classification of data being accessed (if any), controls necessary to protect data, and legal/regulatory requirements. Courier ensures that Customer Personal Data is returned and/or deleted at the end of a vendor relationship. For the avoidance of doubt, third-party services that Customer chooses to integrate via Courier Services are not considered subcontractors of Courier.

6.2. Vendor Agreements. Courier enters into written agreements with all of its Vendors which include confidentiality, privacy and security obligations that provide an appropriate level of protection for the personal data contained within the Customer Personal Data that these Vendors may process.

7. Security Certificates.

7.1 Courier Certificates. Courier has obtained the following security-related certifications for the Courier Services:

7.2 AWS Certifications. In addition, the Services use and leverage AWS data centers. Courier uses and leverages AWS data centers, with a reputation of being highly scalable, secure, and reliable. Information about AWS audit certifications are available at AWS Security website https://aws.amazon.com/security and AWS Compliance website https://aws.amazon.com/compliance

8. Architecture and Data Segregation. The cloud communication platform for the Courier Services is hosted by Amazon Web Services (“AWS”). The current location of the AWS data center infrastructure used in providing Courier Services is located in the United States. Further information about security provided by AWS is available from the AWS security webpage available at https://aws.amazon.com/security/. In addition, the overview of AWS’s security process is available at https://aws.amazon.com/whitepapers/overview-of-security-processes/. Courier separates Customer Personal Data using logical identifiers tagging all communications data with the associated Customer ID to clearly identify ownership. Courier’s APIs are designed and built to designed and built to identify and allow access only to and from these tags and enforce access controls to ensure the confidentiality and integrity requirements for each Customer are appropriately addressed. These controls are in place so one customer's communications cannot be accessed by another customer.

9. Physical Security. AWS data centers that host Courier Services are strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions. Each data center has redundant electrical power systems that are available twenty-four (24) hours a day, seven (7) days a week. Uninterruptible power supplies and on-site generators are available to provide back-up power in the event of an electrical failure. More details about the physical security of AWS data centers used by

Courier for the Courier Services, are available at https://aws.amazon.com/whitepapers/overview-of-security-processes/. In addition, Courier headquarters and office spaces have a physical security program that manages visitors, building entrances, CCTVs (closed circuit television), and overall office security. All contractors and visitors are required to wear identification badges.

10. Security by Design. The Courier’s Software Development Lifecycle (SDLC) standard defines the process by which Courier creates secure products and the activities that the product teams must perform at different stages of development (requirements, design, implementation, and deployment). Courier engineers perform numerous security activities for the Services including:

11. Access Controls.

11.1 Provisioning Access. To minimize the risk of data exposure, Courier follows the principles of least privilege when provisioning system access. Courier personnel are authorized to access Customer Personal Data based on their job function, role and responsibilities, and such access requires approval of the employee’s manager. Access rights to production environments are reviewed at least semi-annually. An employee’s access to Customer Personal Data is promptly removed upon termination of their employment. Before an engineer is granted access to the production environment, access must be approved by management and the engineer is required to complete internal trainings for such access including trainings on the relevant team’s systems. Courier logs high risk actions and changes in the production environment. Courier leverages automation to identify any deviation from internal technical standards that could indicate anomalous/unauthorized activity to raise an alert within minutes of a configuration change.

11.2 Password Controls. Courier’s current policy for employee password management follows the NIST 800-63B guidance, and as such, our policy is to use longer passwords, with multi-factor authentication but not require special characters or frequent changes. Courier does not store Customer passwords in any form.

12. Change Management. Courier has a formal change management process to manage changes to software, applications and system software that will be deployed within the production environment. Change requests are documented using a formal, auditable, system of record. Prior to a high-risk change being made, an assessment is carried out to consider the impact and risk of a requested change, evidence acknowledging applicable testing for the change, approval of deployment into production by appropriate approvers(s) and roll back procedures. A change is reviewed and tested before being deployed to production. 

13. Encryption. For the Courier Services, Courier’s cloud platform supports TLS 1.2 to encrypt network traffic transmitted between a Customer application and Courier’s cloud infrastructure. When supported by integrations selected by Customer, Courier’s cloud platform will also encrypt network traffic between Courier’s cloud infrastructure and the integration provider. All Customer Personal Data is stored encrypted using 256-bit Advanced Encryption Standard (AES-256).

14. Vulnerability Management. Courier maintains controls and policies to mitigate the risk from security vulnerabilities in a measurable time frame that balances risk and the business/operational requirements. Courier uses a third-party tool to conduct vulnerability scans regularly to assess vulnerabilities in Courier’s cloud infrastructure and corporate systems. Critical software patches are evaluated, tested and applied proactively.

15. Penetration Testing. Courier performs penetration tests and engages independent third-party entities to conduct application-level penetration tests. Results of penetration tests are prioritized, triaged and remediated promptly by Courier’s engineering team.

16. Security Incident Management. Courier maintains security incident management policies and procedures in accordance with NIST SP 800-61. Courier assesses the threat of all relevant vulnerabilities or security incidents and establishes remediation and mitigation actions for all events. Courier utilizes AWS platforms and third-party tools to detect, mitigate, and to help prevent Distributed Denial of Service attacks (DDoS) attacks.

17. Discovery, Investigation and Notification of a Security Incident. Upon discovery or notification of any Security Incident, Courier will:

18. Resilience and Service Continuity. Courier infrastructure for the Courier Services uses a variety of tools and mechanisms to achieve high availability and resiliency. For the Courier Services, Courier’s infrastructure spans multiple fault-independent AWS availability zones. For the Courier Services, there are manual or automatic capabilities to re-route and regenerate hosts within Courier’s infrastructure. Courier leverages specialized tools that monitor server performance, data, and traffic load capacity within each availability zone. If suboptimal server performance or overloaded capacity is detected on a server within an availability zone, then these specialized tools will increase the capacity or shift traffic to relieve any suboptimal server performance or capacity overload. Courier will also be notified immediately and have the ability to take prompt action to correct the cause(s) behind these issues if the specialized tools are unable to do so.

19. Backups and Recovery. Courier performs regular backups of Courier Services account information, message templates, message logs and other critical data using Amazon cloud storage. Backup data are retained redundantly across availability zones and are encrypted in transit and at rest using 256-bit Advanced Encryption Standard (AES-256) server-side encryption.

Build your first notification in minutes

Send up to 10,000 notifications every month, for free.

Get started for free

Email & push notification

Platform

Users

Content

Channels

Sending

Workflows

Preferences

Inbox

Workspaces

Observability

API Status

Changelog

© 2024 Courier. All rights reserved.