Data Processing Addendum

Last Updated: February 17, 2026

1. Definitions

"Client" means the entity that has executed a services agreement with Booko, including enterprise organizations using Booko's dynamic pricing integration.

"Personal Data" means any information relating to an identified or identifiable natural person processed by Booko on behalf of Client.

"Protected Health Information" ("PHI") has the meaning given under HIPAA and includes individually identifiable health information transmitted or maintained in any form.

"Services" means the Booko platform services, including scheduling, dynamic pricing, demand forecasting, incentive management, and related analytics tools.

2. Roles and Scope

Booko acts as a data processor for Client-controlled data and as an independent data controller for platform operations including fraud prevention, security, billing, and aggregated analytics. Where Booko processes PHI on behalf of a Covered Entity or Business Associate, Booko acts as a Business Associate under HIPAA and the terms of a separately executed Business Associate Agreement ("BAA") shall apply.

3. Data Processing Details

3.1 Purpose of Processing

To provide the Services, including: class and appointment scheduling; dynamic pricing computation and incentive assignment; demand forecasting and occupancy prediction; payment processing; credit fulfillment and redemption tracking; promo code generation and sync; team and access management; webhook delivery; analytics and reporting; and integration with Client's existing booking platforms.

3.2 Categories of Personal Data

  • Identity data: name, email address, phone number, profile images
  • Authentication data: OAuth tokens, session tokens, API keys (hashed and encrypted)
  • Booking and scheduling data: appointment times, service selections, class enrollments, attendance records, cancellation reasons, waitlist status
  • Payment and financial data: transaction amounts, payment status, refund records, tip amounts, platform fees, Stripe payment identifiers (Booko does not store raw card numbers)
  • Enterprise integration data: class schedules, instructor names, occupancy counts, booking inventories, and raw payloads ingested from connected booking platforms (MindBody, Mariana Tek, DrChrono)
  • Forecasting and ML data: historical occupancy rates, demand patterns, feature vectors, model training datasets, predicted occupancy, incentive recommendations, and model performance metrics
  • Incentive and redemption data: member IDs, member email/name/phone from external systems, incentive values, credit assignments, redemption records, attendance verification data
  • Promo code data: generated codes, discount values, usage counts, pricing factors, sync status with external systems
  • Device and usage data: IP addresses, user agent strings, browser type, analytics events
  • Communication data: SMS messages, email notifications, SMS consent records
  • Review data: ratings, review text, reviewer identifiers

3.3 Data Subjects

End users (consumers booking classes or appointments), Client personnel (business owners, team members, enterprise administrators), instructors, and service providers.

3.4 Duration of Processing

For the term of the Services agreement and thereafter in accordance with the data retention schedule described in Section 10.

4. Security Measures

Booko implements technical and organizational measures appropriate to the risk presented by the processing, including:

  • Encryption in transit: TLS 1.2+ for all data in transit between clients, servers, and third-party services
  • Encryption at rest: AES-256 encryption for data at rest in cloud databases and storage services
  • Credential encryption: AES-256-GCM encryption for stored integration credentials (API keys, OAuth tokens) with key material managed separately from ciphertext
  • API key security: API keys stored as irreversible hashes; encrypted copies available only for authorized display; keys include scoped permissions and expiration dates
  • Access controls: Role-based access control (Owner, Admin, Member, Viewer) enforced at application and database layers; row-level security policies on sensitive tables; least-privilege access for all staff
  • Authentication: OAuth 2.0 for web sessions; JWT-based authentication for mobile and API access; multi-tenancy isolation with organization-scoped data access
  • Webhook security: HMAC signature verification on inbound webhooks (e.g., Stripe, MindBody); HMAC signing on outbound webhook deliveries
  • Secret management: Integration credentials stored in Google Cloud Secret Manager; application secrets managed via environment-level configuration
  • Audit logging: Immutable audit logs for data modifications including before/after snapshots; ingestion batch lineage tracking; incentive change logs with override justification
  • Vulnerability management: Dependency scanning, error monitoring via Sentry, and logging appropriate to the platform
  • Network security: Rate limiting on API endpoints; request throttling on external API integrations

5. HIPAA Compliance

Where Client is a Covered Entity or Business Associate under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and its implementing regulations, the following additional terms apply:

  • Business Associate Agreement: Client and Booko shall execute a BAA prior to Booko receiving or processing any PHI. The BAA incorporates the requirements of 45 CFR Part 160 and Subparts A and E of Part 164. The terms of the BAA shall supersede any conflicting terms in this DPA with respect to PHI.
  • Permitted uses and disclosures: Booko will use and disclose PHI only as permitted by the BAA, the minimum necessary standard, and applicable law. Booko will not use or disclose PHI for marketing or sell PHI without express written authorization from Client.
  • Safeguards: Booko implements administrative, physical, and technical safeguards consistent with the HIPAA Security Rule (45 CFR Part 164, Subpart C), including access controls, audit controls, integrity controls, transmission security, and workforce training.
  • Breach notification: Booko will report to Client any Breach of Unsecured PHI (as defined in 45 CFR 164.402) without unreasonable delay and no later than thirty (30) calendar days after discovery, including the information required under 45 CFR 164.410(c) to the extent reasonably available.
  • Subcontractors: Booko will ensure that any subcontractor or sub-processor that creates, receives, maintains, or transmits PHI on behalf of Booko agrees to substantially the same restrictions and conditions that apply to Booko under the BAA.
  • Individual rights: Booko will make PHI available to Client as necessary for Client to respond to individuals exercising their rights under HIPAA, including rights of access, amendment, and accounting of disclosures.
  • Applicability: The HIPAA provisions in this section apply to Clients whose use of Booko involves processing PHI, such as healthcare, wellness, and medical spa businesses using integrated electronic health record (EHR) systems (e.g., DrChrono). Clients who do not process PHI through Booko are not required to execute a BAA.

6. SOC 2 Compliance

Booko maintains controls aligned with the AICPA Trust Services Criteria:

  • Security: Logical and physical access controls, encryption, vulnerability management, and incident response procedures as described in Section 4.
  • Availability: Cloud-hosted infrastructure with monitoring, health checks, and alerting; pricing engine deployed on Google Cloud Run with automated health validation during deployment.
  • Processing integrity: Audit logs capturing data state before and after modifications; ingestion pipeline lineage tracking with batch-level error and warning reporting; incentive change logs with model version provenance; ML model runs tracked with training configuration, validation metrics, and artifact checksums.
  • Confidentiality: Encryption of sensitive credentials, role-based access control, multi-tenancy data isolation, and row-level security policies restricting cross-tenant data access.
  • Privacy: Data collection limited to what is necessary for the Services; consent management for SMS communications; data subject access and deletion capabilities; sub-processor transparency.

Upon request, Booko will provide Client with reasonable documentation of its security controls, subject to mutual confidentiality obligations.

7. Sub-Processors

Booko engages the following categories of sub-processors. Booko will notify Client of material changes to this list via the Booko website or email at least fourteen (14) days before engaging a new sub-processor. Client may object to a new sub-processor by contacting Booko in writing within that notice period.

Sub-ProcessorPurposeData ProcessedLocation
SupabasePrimary database hosting (PostgreSQL)All application data including user records, bookings, enterprise data, and audit logsUS (AWS)
StripePayment processing (Connect marketplace)Payment amounts, customer identifiers, connected account dataUS
Google Cloud PlatformPricing engine hosting (Cloud Run), credential storage (Secret Manager), ML model artifact storage (Cloud Storage)Class schedules, occupancy data, forecasting models, integration credentialsUS (us-central1)
Google (OAuth/Calendar)Authentication and calendar synchronizationEmail, profile information, calendar eventsUS
VercelApplication hosting and blob storageApplication requests, uploaded images and assetsUS
ResendTransactional email deliveryRecipient email addresses, email content (booking confirmations, notifications)US
TwilioSMS notificationsPhone numbers, SMS message contentUS
PostHogProduct analytics and feature flagsAnonymized usage events, feature flag evaluationsUS
SentryError monitoring and performance trackingError logs, stack traces, anonymized user identifiersUS
GeoapifyAddress autocompleteAddress search queriesEU/US

Client-directed integrations: Where Client configures an integration with a third-party booking platform (e.g., MindBody, Mariana Tek, DrChrono), that platform acts as a separate controller or processor under Client's own agreement with that platform. Booko processes data received from these platforms solely to perform the Services.

Specific sub-processors engaged depend on the Services used by Client. Enterprise customers may request a current list of sub-processors applicable to their engagement at any time.

8. Enterprise Integration Data Processing

For enterprise Clients using Booko's dynamic pricing integration, Booko additionally processes data from connected booking platforms. This includes:

  • Schedule ingestion: Class and appointment schedules, instructor assignments, location data, and capacity information pulled from Client's booking platform via authenticated API connections
  • Inventory tracking: Real-time and point-in-time booking counts, waitlist sizes, fill rates, and occupancy snapshots at regular intervals
  • Attendance and redemption: Member identifiers, attendance records, credit redemptions, and fulfillment status received via webhooks or API polling
  • Demand forecasting: Historical occupancy aggregates, no-show rates, and late cancellation patterns used to train machine learning models for demand prediction
  • Incentive computation: Predicted occupancy, pricing factors, and contextual features used to compute dynamic incentive values and generate promo codes

Integration credentials (API keys, OAuth tokens) are encrypted using AES-256-GCM and stored separately from application data. Raw payloads from external platforms are retained for data integrity verification and are subject to the retention schedule in Section 10.

9. Machine Learning and Automated Decision-Making

Booko uses machine learning models to provide demand forecasting and dynamic pricing recommendations. The following applies to this processing:

  • Training data: Models are trained on historical class occupancy data, booking patterns, and temporal features. Training datasets are derived from Client data and are scoped to the Client's organization.
  • Model artifacts: Trained model files are stored in Google Cloud Storage with version tracking, checksums, and performance metrics (MAE, RMSE, R-squared).
  • Outputs: Model outputs (predicted occupancy, incentive recommendations) are used to inform pricing decisions. Clients retain the ability to override automated incentive values with manual adjustments, which are logged in the incentive change audit trail.
  • Model training scope: Model training scope and data isolation are governed by the applicable services agreement between Booko and the Client.
  • Human oversight: Enterprise administrators can review, override, and configure all automated pricing decisions through the Booko dashboard. Control group support is available for A/B testing incentive effectiveness.

10. Data Retention

Booko retains Personal Data for the duration of the Services agreement and applies the following retention schedule after termination or deletion request:

  • Active account data: Retained for the duration of the Services agreement.
  • Granular inventory snapshots: Point-in-time snapshots are aggregated into daily summaries after 90 days; granular records are deleted after aggregation.
  • Historical aggregates and training data: Retained for up to 3 years to support model accuracy, then anonymized or deleted.
  • Audit logs: Retained for 7 years to satisfy regulatory and compliance obligations.
  • Model artifacts: Superseded model versions are deleted 12 months after replacement.
  • Payment records: Retained as required by applicable tax and financial regulations (typically 7 years).
  • Post-termination deletion: Upon termination or written request, Booko will delete or return Personal Data within thirty (30) days, except where retention is required by law or the schedules above. Backups are purged on standard rotation cycles not to exceed 90 days.

11. International Transfers

Booko processes data primarily in the United States. Where Personal Data is transferred from the European Economic Area, United Kingdom, or Switzerland to the United States, Booko relies on the EU-U.S. Data Privacy Framework (and the UK and Swiss extensions) as applicable, and Standard Contractual Clauses (SCCs) with the UK International Data Transfer Addendum as a supplementary transfer mechanism.

12. Assistance, DPIAs, and Audits

Booko will assist Client with reasonable data subject access, rectification, erasure, and portability requests. Booko will provide reasonable assistance with data protection impact assessments ("DPIAs") and prior consultations with supervisory authorities where required by law. Client may conduct or commission reasonable audits of Booko's data processing practices, subject to confidentiality, reasonable scheduling, and scope limitations. Booko may satisfy audit requests by providing its security controls documentation or equivalent third-party attestation.

13. Incident Response

Booko will notify Client without undue delay, and in any event within seventy-two (72) hours, upon becoming aware of a confirmed personal data breach affecting Client data. Notification will include, to the extent reasonably available: the nature of the breach, categories and approximate number of affected data subjects, likely consequences, and measures taken or proposed to mitigate the breach. Where the breach involves PHI subject to a BAA, Booko will comply with the breach notification requirements specified in the BAA and HIPAA (45 CFR 164.410).

14. Return and Deletion

Upon termination of the Services or upon Client's written request, Booko will delete or return all Personal Data within thirty (30) days, subject to the retention exceptions in Section 10 and any applicable legal obligations. Booko will provide written confirmation of deletion upon request. For enterprise Clients, deletion includes removal of organization data, integration credentials, ingestion records, model artifacts, and audit logs (except where retention is required by law).

15. Order of Precedence

If there is a conflict between this DPA and the Terms of Service or Privacy Policy, this DPA controls for the processing of Client Personal Data. If there is a conflict between this DPA and a BAA with respect to PHI, the BAA controls.

16. Contact

For questions about this DPA or to exercise data protection rights, contact Booko at founders@bookoapp.com.