{"version":3,"sources":["webpack:///./src/pages/data-processing.tsx","webpack:///./node_modules/@babel/runtime/helpers/esm/objectDestructuringEmpty.js"],"names":["DataProcessingDoc","className","name","content","href","id","target","Privacy","Fragment","_objectDestructuringEmpty","obj","TypeError"],"mappings":"kOAQMA,EAAoB,kBACxB,sBAAKC,UAAU,wCAAf,UACE,eAAC,SAAD,WACE,sBAAMC,KAAK,SAASC,QAAQ,QAC5B,+DACA,sBAAMD,KAAK,cAAcC,QAAQ,QAEnC,0DACA,qSAMA,uBACA,mDACA,+BACE,6BACE,mBAAGC,KAAK,eAAR,2BAEF,6BACE,mBAAGA,KAAK,8BAAR,0CAEF,6BACE,mBAAGA,KAAK,2BAAR,uCAEF,6BACE,mBAAGA,KAAK,YAAR,wBAEF,6BACE,mBAAGA,KAAK,iBAAR,6BAEF,6BACE,mBAAGA,KAAK,uBAAR,mCAEF,6BACE,mBAAGA,KAAK,kBAAR,8BAEF,6BACE,mBAAGA,KAAK,4BAAR,wCAEF,6BACE,mBAAGA,KAAK,gBAAR,4BAEF,6BACE,mBAAGA,KAAK,8BAAR,0CAEF,6BACE,mBAAGA,KAAK,aAAR,yBAEF,6BACE,mBAAGA,KAAK,wBAAR,uCAGJ,uBAEA,sBAAKC,GAAG,cAAcJ,UAAU,uBAAhC,UACE,6CACA,+BACE,uLAKA,mJAIA,2IAIA,+GAIA,8MAKA,0ZAQA,mIAIA,uUAOA,iKAIA,okBAYJ,uBACA,sBAAKI,GAAG,6BAA6BJ,UAAU,uBAA/C,UACE,4DACA,+BACE,mfASA,uYAQA,wVAOA,8UAOA,8pBAcJ,uBACA,sBAAKI,GAAG,0BAA0BJ,UAAU,uBAA5C,UACE,yDACA,+BACE,kQAMA,oTAOA,kWAOA,+OAKA,iVASJ,uBACA,sBAAKI,GAAG,WAAWJ,UAAU,uBAA7B,UACE,0CACA,+BACE,mpBAWE,qBAAIA,UAAU,OAAd,UACE,kFACA,2JAIA,qKAIA,uMAOJ,ibASA,mVAOA,yMAOJ,uBACA,sBAAKI,GAAG,gBAAgBJ,UAAU,uBAAlC,UACE,+CACA,+BACE,kRAKE,mBACEG,KAAK,mFACLE,OAAO,SAFT,yBALF,OAaA,mgBAUA,qZAQA,mSAQJ,uBACA,sBAAKD,GAAG,sBAAsBJ,UAAU,uBAAxC,UACE,qDACA,+BACE,sWAOA,wKAGE,qBAAIA,UAAU,OAAd,UACE,2GAIA,wEAGJ,0SAMA,oUAOA,oQAMA,+PAQJ,uBACA,sBAAKI,GAAG,iBAAiBJ,UAAU,uBAAnC,UACE,gDACA,+BACE,4OAKA,wfAUA,wbAQA,4ZAUJ,uBACA,qBAAKI,GAAG,2BAA2BJ,UAAU,uBAA7C,SACE,4DAEF,qdAUA,uBACA,4KAIA,+BACE,2DACA,6CACA,6CACA,0CACA,2DAEF,uBACA,uMAKA,uBACA,uNAKA,uBACA,8OAKA,+BACE,4EACA,uEACA,mFACA,uIAKF,uBACA,+OAKA,wTAMA,uBACA,qBAAKI,GAAG,eAAeJ,UAAU,uBAAjC,SACE,gDAEF,8bAQA,uBACA,yXAOA,uBACA,oXAOA,uBACA,+SAMA,uBACA,sBAAKI,GAAG,6BAA6BJ,UAAU,uBAA/C,UACE,4DACA,mBAAGA,UAAU,YAAb,0QAMA,+BACE,4UAOA,2NAKA,iWAOA,wVAOA,2NAOJ,uBACA,iLAIA,uBACA,sBAAKI,GAAG,YAAYJ,UAAU,uBAA9B,UACE,2CACA,+BACE,mYAQA,6QAMA,wLAOJ,uBACA,sBAAKI,GAAG,uBAAuBJ,UAAU,uBAAzC,UACE,sDACA,+BACE,sPAMA,2YAQA,sVAOA,2QAMA,0SAuBOM,UAZC,SAAC,GACf,OADsB,eAEpB,eAAC,IAAMC,SAAP,WACE,cAAC,IAAD,IACA,cAAC,IAAD,UACE,cAACR,EAAD,MAEF,cAAC,IAAD,S,oCCzmBS,SAASS,EAA0BC,GAChD,GAAW,MAAPA,EAAa,MAAM,IAAIC,UAAU,gCADvC","file":"component---src-pages-data-processing-tsx-02503114578975916868.js","sourcesContent":["/* eslint-disable */\nimport React from \"react\"\nimport { Helmet } from \"react-helmet\"\n\nimport Header from \"src/componentsV2/sections/Header\"\nimport { Footer } from \"src/sections/landing\"\nimport WidthWrapper from \"src/components/widthWrapper\"\n\nconst DataProcessingDoc = () => (\n
\n This Data Processing Addendum (“Addendum”) is part of the Master Service\n Agreement (\"Agreement\") between AirMason Inc. (\"Processor\") and the\n customer entity that is a party to the Agreement as a Customer\n (\"Controller\") (each a \"Party\"; together \"the Parties\").\n
\n\n In the event of a data breach, AirMason has a thorough internal procedure\n in place to identify, contain, eradicate, recover from, and conduct\n post-incident analysis of the breach. These procedures ensure an immediate\n response and minimize the impact on the affected parties. AirMason\n employees are required to report any unauthorized or suspicious activity\n they notice in relation to production systems or related communication\n systems.\n
\n\n\n Upon the discovery of a data breach, AirMason promptly commences an\n in-depth, five-phase incident response procedure. These phases include:\n
\n\n AirMason's incident response team conducts all stages of this process,\n documenting all measures taken during each phase, including start and end\n times of all efforts.\n
\n\n For significant events, such as the application of critical security\n patches to the operating system or network, AirMason commits to notifying\n clients within seven days of the event.\n
\n\n In the event of a data breach that results in a risk to the rights and\n freedoms of individuals, AirMason will notify affected customers promptly\n via email. This notification will contain details including:\n
\n\n In the aftermath of a data breach, AirMason will assist its customers in\n mitigating potential adverse effects. As part of its support, AirMason\n will provide assistance to users in resetting their passwords.\n
\n\n AirMason is committed to safeguarding your data and will continue to\n enhance and update its data breach procedures to ensure the highest level\n of security. We believe in transparency and will do our best to keep our\n customers informed and supported in the event of a data breach.\n
\n\n AirMason is committed to maintaining the highest level of data protection\n and understands the importance of transparency and accountability in this\n regard. However, due to the nature of our service, the sensitive\n information we handle, and the potential disruption to our operations, we\n currently do not allow customers or their authorized third-party auditors\n to conduct audits of our data processing activities.\n
\n\n We assure our customers that our data handling and processing practices\n are designed to be compliant with the relevant Data Protection Laws. To\n this end, we have rigorous internal policies and procedures in place to\n ensure our compliance, and we regularly review and update these policies\n in line with the best practices and legal requirements.\n
\n\n To provide transparency and demonstrate our compliance, we make available\n relevant documentation such as privacy policies, security practices, and\n data processing addendums. Additionally, we can provide a SOC 2 report\n upon request, which is conducted by an independent auditor and provides a\n thorough review of our data handling practices.\n
\n\n We understand the importance of verifying compliance with data protection\n laws and regulations. Therefore, if a customer has specific compliance\n requirements or queries, they should communicate these to us, and we will\n strive to address them in the best possible manner.\n
\n\n Upon termination of the Services or upon a written request by the\n Customer, AirMason shall return or delete Customer Personal Data in its\n possession. AirMason undertakes the following steps to ensure the secure\n handling of the Customer's Personal Data:\n
\n\n This Return or Deletion of Data policy ensures AirMason's commitment to\n respect the privacy and confidentiality of the Customer's Personal Data.\n
\n