Privacy Policy & Terms & DPA & Imprint

Read more

Terms of Use — Pulse

Last updated: 02.12.2025

Terms of Use
Pulse – Focus Timer AppEffective Date: December 20251. Scope, Definitions
1.1 Contracting Parties
These Terms of Use (“Terms” or “Agreement”) govern the use of the mobile application “Pulse – Focus Timer” (“Pulse App”) between you as the user (“You” or “User”) and us,Diyar Dirik, Am alten Bahnhof 20, 63456 Hanau, Germany (“we”, “us”).
1.2 Scope of Application
These Terms apply to:the use of the free basic version (“Free Version”),the use of the paid version (“Pulse Pro”),all associated features including synchronization (“Pulse Cloud”) and AI features (“Pulse AI”).
1.3 Conflicting Terms
Any deviating or conflicting terms and conditions of the User shall not apply unless we have expressly agreed to their validity in writing.
1.4 Current Version of the Terms
The current version of these Terms is available in the Pulse App and on our website. The version valid at the time of contract conclusion or at the time of use shall apply.2. Subject Matter of the Agreement and Conclusion of Contract
2.1 Subject Matter
With Pulse, we provide you with an app that enables you to:start and manage focus timers and sessions,record and visualize tasks and daily plans,use optional AI-based planning features,optionally synchronize your entries across multiple devices.
Pulse is not a long-term archival storage system and does not replace professional advice (e.g., medical, legal, or tax advice).
2.2 Download and Installation
The contract for the use of the app is concluded when you download the Pulse App from an app store (Apple App Store, Google Play Store) and accept these Terms.
2.3 Use Without a Traditional User Account
No traditional user account with email and password is required to use Pulse.Instead, we use a randomly generated anonymous User ID (UUID) to assign and synchronize your data across devices.
This UUID cannot be linked to your identity without the involvement of the app store.
2.4 Contract Language
The contract language is German. Translations (e.g., English) serve solely for convenience.3. Scope of Services, Technical Requirements and Changes
3.1 Scope of Features
The respective current scope of features of Pulse (Free and Pro) results from:the description in the respective app store,our website (https://pulse-timer.com, if available),the information and displays within the app.
We may adapt or further develop the scope of features within reasonable limits.
3.2 Technical Requirements
To use Pulse, you need:a compatible device with a supported operating system (e.g., a recent iOS or Android version),sufficient storage capacity,a stable internet connection for certain features (e.g., cloud synchronization, Pulse AI).
You are responsible for keeping your device in a suitable technical condition.
3.3 Updates and Further Development
3.3.1We provide mandatory updates in accordance with § 327f BGB.
3.3.2In addition, we may, at our discretion, provide optional functional updates, improvements, bug fixes, and security updates.
3.3.3We may modify or remove individual features as long as this is reasonable for you and the core functionality is not significantly impaired (e.g., discontinuation of experimental features or adaptation of AI features due to changed technical circumstances).
3.4 Availability
We strive to offer Pulse with high availability. However, there is no entitlement to specific availability. Temporary restrictions (e.g., maintenance work, updates, or disruptions) may occur.4. Usage Rights (License)
4.1 Granting of Usage Rights
By downloading and installing Pulse, you receive a:simple (non-exclusive),non-transferable,non-sublicensable,revocable
right to use the Pulse App on your own devices to the extent permitted by these Terms.
4.2 Ownership of the Software
The Pulse App (including software, design, content, and documentation) is not a physical object within the meaning of § 90 BGB.No ownership is transferred to you; you only receive usage rights.
4.3 Prohibited Uses
You are particularly prohibited from:reproducing, distributing, or publicly making the app available beyond its intended use,decompiling, disassembling, or otherwise attempting to derive the source code, unless expressly permitted by law,circumventing technical protection measures,making the app available to third parties as an independent service (e.g., rental, hosting, platform operation).5. Fees, Subscriptions, Payment Processing
5.1 Free Version
The basic version of Pulse is provided free of charge. Its feature set may be limited compared to Pulse Pro.
5.2 Pulse Pro and Subscriptions
5.2.1Pulse Pro is a paid version with extended features (e.g., additional planning features, expanded synchronization, extended AI features—depending on the description provided).
5.2.2Pulse Pro is offered as a subscription (e.g., monthly or yearly) or—if indicated—as a one-time purchase (lifetime license) through the respective app store.
5.3 Prices and Price Changes
5.3.1The applicable prices, terms, and billing periods are shown in the app stores.
5.3.2We may adjust prices for future billing periods. Price changes will be displayed in the app store before they take effect. Prices will not be changed retroactively for already paid periods.
5.4 Payment Processing
5.4.1Payments are handled exclusively through the respective app store and its payment service provider.
5.4.2The payment terms (e.g., due dates, payment methods, invoicing) follow the app store’s conditions; we do not process payments directly.
5.5 Automatic Renewal and Cancellation
5.5.1Unless otherwise indicated, subscriptions renew automatically for the originally selected term unless you cancel them in time via the app store.
5.5.2Cancellation is possible only through your app store account settings or the cancellation function within the app store.A cancellation directly with us (e.g., via email) does not replace cancellation in the app store.
5.6 Withdrawal and Refunds
5.6.1If you have a statutory right of withdrawal, you must exercise it with the respective app store through which you purchased Pulse Pro.
5.6.2Refunds for purchases or subscriptions are processed exclusively by the app store. We have no influence over refund decisions and do not provide refunds ourselves.6. AI Features (“Pulse AI”)
6.1 Description of AI Features
Pulse offers AI-supported features that can:automatically generate daily plans,structure tasks,convert text into actionable schedules.
These features rely on models provided by an external AI provider (currently OpenAI).
6.2 Data Processing When Using AI
When using AI features, the text you enter (“prompts”) and optionally contextual information (e.g., task list, daily plan) may be transmitted to the AI provider to generate a response.Details are outlined in our Privacy Policy.
6.3 No Warranty for AI Outputs
AI-generated outputs:are based on statistical models,may be incorrect, incomplete, or outdated,do not replace professional advice.
You are responsible for reviewing AI outputs before applying them.
6.4 User Responsibility
You are fully responsible for the content you submit and must not transmit content that:violates the rights of third parties (e.g., copyrights, trademarks, personality rights),violates applicable law,is defamatory, discriminatory, hateful, or otherwise inappropriate.
6.5 Applicability of Third-Party Terms
The use of AI features may additionally be subject to the terms of use of the AI provider (e.g., OpenAI). Certain features may require acceptance of such terms.7. User Obligations
7.1 Legal Use
You may only use Pulse within the framework of applicable laws and these Terms.You are prohibited from using the app:to plan or conduct illegal activities,to store or transmit unlawful content,to disrupt, overload, or manipulate technical systems.
7.2 Data Backup
If you use Pulse for business or professional purposes, you are responsible for adequate data backups. Pulse is not a substitute for professional backup systems.
7.3 Device and Access Security
You must protect your device from unauthorized access (e.g., via PIN, biometrics) and configure app permissions (e.g., calendar access) appropriately.8. Intellectual Property and User Content
8.1 Rights to the App
All rights to the Pulse App (including software, designs, logos, trademarks, text, graphics) belong to us or our licensors.
8.2 Rights to Your Content
The content you enter into Pulse remains your intellectual property.
8.3 License Grant for Processing Your Content
You grant us a simple, worldwide, royalty-free license to:store,copy,process,transmit your content via technical service providers (processors),
to the extent necessary to operate the app (including synchronization and AI functions).9. Liability
9.1 Intent and Gross Negligence
We are fully liable for damages caused by intentional or grossly negligent conduct on our part or by our legal representatives or agents.
9.2 Simple Negligence
In cases of simple negligence, we are liable only:for damages resulting from injury to life, body, or health,for damages resulting from the breach of an essential contractual obligation (cardinal obligation).
Liability is limited to the foreseeable, contract-typical damage.
9.3 Exclusions Toward Businesses
Toward business users, liability for:lost profits,indirect damages,consequential damages,purely economic losses,
is excluded to the extent permitted by law.
9.4 Data Loss
For loss of data, liability exists only to the extent that the loss could not have been prevented through reasonable data backups by the User.Liability is limited to the effort required to restore the data in the event of proper backup measures.
9.5 Product Liability and Guarantees
Mandatory liability under product liability law or due to guarantees remains unaffected.
10. Data Protection
The processing of personal data is governed by our Privacy Policy, available at:https://pulse-timer.webflow.io/termsprivacy
The Privacy Policy is not part of these Terms but supplements them regarding data protection matters.
11. Term, Termination and Blocking
11.1 Duration of Use
The contract for the Free Version runs for an indefinite period and can be terminated at any time by deleting the app from your device.
11.2 Termination of Pulse Pro
Termination of Pulse Pro subscriptions must be carried out exclusively through the app store in accordance with its terms (see Section 5).
11.3 Extraordinary Termination and Blocking
We may suspend your access to Pulse or terminate the Agreement extraordinarily if:you violate essential provisions of these Terms and do not stop the violation after being notified,you use Pulse abusively or unlawfully,we are legally required to do so.
12. Changes to These Terms
12.1 Right to Modify
We may amend these Terms if there is a valid reason, such as:changes in legal requirements,expansion or limitation of features,adjustments to changed technical conditions.
12.2 Notification and Objection
12.2.1We will notify you in the app about significant changes that affect you more than marginally (e.g., via an in-app notification at launch).
12.2.2You have the right to object to changes within a reasonable period.The notification will include:the content of the amended Terms,the date they take effect,your right to object and the consequences of not objecting.
12.2.3If you do not object, the new Terms are considered accepted.
12.3 Consequences of Objection
If you object, we may terminate the use of Pulse if further provision under the previous terms is not possible or unreasonable.
13. Final Provisions
13.1 Applicable Law
German law applies.The UN Convention on Contracts for the International Sale of Goods (CISG) does not apply.
13.2 Place of Jurisdiction
If you are a merchant, a legal entity under public law, or if you do not have a general place of jurisdiction in Germany, the exclusive place of jurisdiction for all disputes is our registered office (currently Hanau, Germany).
For consumers, the statutory place of jurisdiction applies.
13.3 Severability Clause
If any provision of these Terms is or becomes invalid, the remaining provisions remain unaffected.The invalid provision shall be replaced by a provision that comes closest to its economic purpose.

14. Pricing and Purchases
Downloading and using Pulse may be free or paid through the respective app store. If you make a purchase or in-app purchase, payment processing is handled exclusively by Apple (App Store) or Google (Play Store).

We do not collect or store any payment or personal information.Please review the store policies:

Apple App Store Terms of Service: https://www.apple.com/legal/internet-services/itunes/us/terms.html
Google Play Terms of Service: https://play.google.com/about/play-terms


Privacy Policy — Pulse

Last updated: 02.12.2025

Privacy Policy for the Use of the Pulse App and Pulse Website

We, Diyar Dirik, 63456 Hanau, Germany (hereinafter “We” or “Us”), are the provider of the app “Pulse” (hereinafter “Pulse App”), which you can download onto your device. Pulse simplifies your daily task and time planning and synchronizes your entries across various devices if desired.Protecting your privacy when using Pulse is very important to us. Therefore, we would like to use the following information to inform you about which personal data we process when you use Pulse and how we handle this data. In addition, we inform you about the legal basis for processing your data and—where processing is necessary for the purposes of our legitimate interests—about our legitimate interests as well.You can access this privacy policy at any time in Pulse under the menu item
“Settings → Privacy → Privacy Policy.”

1. Controller
We are the controller within the meaning of the General Data Protection Regulation (“GDPR”). You can find contact details in the imprint of our website and in Pulse under the menu item “Settings → About Us”.Contact for data protection inquiries:
E-mail: info@pulse-timer.com

2. Information on the processing of your dataCertain information is already processed automatically as soon as you use Pulse. Below, we have outlined which personal data is specifically processed:2.1 Data processed when downloading PulseWhen downloading Pulse, certain required information is transmitted to the respective app store, in particular your username, your e-mail address, the customer number of your account, the time of download, payment information, and the unique device identification number (IMEI).
This data is processed exclusively by the respective app store and is beyond our control.

2.2 Data processed during the use of PulseWhen using Pulse, you can enter, manage, and edit various information, notes, tasks, and activities. In particular, your entries may also contain personal data such as names, addresses, e-mail addresses, and telephone numbers, which we then process, including storing them.Locally stored data (does not leave your device):Data typePurposeStorage locationRetentionTimer settingsPersonalization of focus/break timesUserDefaultsUntil deletionDaily plan eventsDisplay of your planned tasksCoreDataUntil deletionSession logsStatistics about completed sessionsCoreDataUntil deletionApp blocker listsConfiguration of blocked appsiOS Keychain (encrypted)Until deletionNotification settingsControl of notificationsUserDefaultsUntil deletionThe legal basis for the above-mentioned data processing is the performance of the contract between you as the data subject and us pursuant to Art. 6(1)(b) GDPR for the use of Pulse.

2.3 Data processed when using Pulse CloudWhen using the AI planning function, we use an anonymous user ID (UUID) to enable synchronization of your entries in Pulse between your devices.Important:
No user account with e-mail or password is created.
The user ID is a randomly generated UUID that cannot be linked to your identity.As part of your use of Pulse Cloud, we process in particular the data you enter into Pulse.
We process this data on your behalf and according to your instructions using the processors specified in Section 3 of the privacy policy. These may include appointment entries, reminders, details in appointments, details in settings, and calendar events.
We have no influence over the type of personal data you enter and the categories of data subjects.Data typePurposeRetentionAnonymous user ID (UUID)Assignment of your plansUntil deletionInput text (prompts)AI planning creationUntil deletionGenerated daily plansDisplay and editingUntil deletionAI-generated eventsStructured task listUntil deletionUser settingsSynchronizationUntil deletionThe legal basis for the aforementioned data processing is the performance of the contract between you and us pursuant to Art. 6(1)(b) GDPR for the use of Pulse Cloud.

2.4 Data processed when using Pulse AIAs part of your use of Pulse AI, we process in particular the data that you enter into Pulse in the context of AI instructions (so-called “AI prompts”).
We process this data on your behalf and according to your instructions. This may involve, for example:new or existing appointment entries,reminders,details in appointments,details in settings,calendar events.We have no influence on which types of personal data and categories of data subjects you enter.We process this data to provide you with Pulse AI in a functional and contractual manner.Legal basis:
Performance of the contract for the use of Pulse AI pursuant to Art. 6(1)(b) GDPR.

2.5 Data processed when using Analytics (Opt-in)If you choose to share anonymous analytics data, we process this data to improve the functions of Pulse.We process:anonymized usage statistics (e.g., which functions are used),no user IDs, no e-mail addresses, no names, no location data,IP addresses are anonymized.Legal basis:
Your explicit consent pursuant to Art. 6(1)(a) GDPR.You may withdraw your consent at any time with effect for the future.
You can withdraw consent by disabling analytics in Pulse under
“Settings → Anonymous Analytics.”
Alternatively, you can withdraw by e-mail to the address specified in Section 1.

3. Disclosure and transfer of data

3.1 General principles
In addition to the cases expressly mentioned in this privacy policy, your personal data will only be disclosed without your prior consent if this is legally permissible or required.

3.2 ProcessorsWe use external companies and service providers (processors) to perform the services defined in Pulse in accordance with the contract. Our processors are strictly bound by our instructions and are contractually obligated accordingly.ProcessorPurpose of processingData protection levelSupabase Inc.Synchronization of user-entered data between devices; forwarding of user requests to OpenAINo adequacy decision; processing outside the EU/EEA; protection ensured through EU Standard Contractual ClausesiCloud, Apple Inc.Optional synchronization of user-entered data between devicesNo adequacy decision; processing outside the EU/EEAOpenAI OpCo LLCCreation of tasks for Pulse via the AI assistantNo adequacy decision; processing outside the EU/EEA; protection ensured through Standard Contractual ClausesFirebase/GoogleAnonymous usage statistics (opt-in only)Adequate protection within EU/EEA; SCCs for third-country transfersThe processors listed above have been carefully selected by us, are regularly reviewed, and are contractually required to process all personal data exclusively in accordance with our instructions.If data is processed outside the EU/EEA (or processed by processors outside these regions), we use the EU Standard Contractual Clauses or other appropriate safeguards under Art. 46 GDPR to ensure the protection of your personal rights.
4. Duration of data storageWe delete or anonymize your personal data as soon as it is no longer required for the purposes for which we collected or used it.Unless otherwise specified, we store your personal data for the duration of the usage or contractual relationship for the app plus a period of 30 days, during which we retain backups, unless the data is required for law enforcement or to establish, exercise, or defend legal claims.

5. Your rights as a data subjectWhen processing your personal data, the GDPR grants you certain rights:Right of access (Art. 15 GDPR)You have the right to request confirmation as to whether personal data concerning you is being processed.
If this is the case, you have the right to access this data and the information listed in Art. 15 GDPR.Right to rectification (Art. 16 GDPR)You have the right to request the immediate correction of inaccurate personal data concerning you and the completion of incomplete data.Right to erasure (Art. 17 GDPR)You have the right to request the immediate deletion of personal data concerning you if one of the reasons listed in Art. 17 GDPR applies.Right to restriction of processing (Art. 18 GDPR)You have the right to request the restriction of processing if one of the conditions listed in Art. 18 GDPR applies, e.g., if you object to processing for the duration of the assessment by the controller.Right to data portability (Art. 20 GDPR)In certain cases listed in Art. 20 GDPR, you have the right to receive the personal data you provided to us in a structured, commonly used, machine-readable format or to request the transfer of this data to another controller.Right to withdraw consent (Art. 7 GDPR)If data processing is based on your consent, you are entitled to withdraw this consent at any time. The withdrawal only applies to future processing; processing carried out prior to the withdrawal remains unaffected.Right to object (Art. 21 GDPR)If data is processed on the basis of Art. 6(1)(f) GDPR (legitimate interests) or Art. 6(1)(e) GDPR (public interest/exercise of official authority), you may object at any time on grounds relating to your particular situation.
We will then no longer process the personal data unless there are compelling legitimate grounds or the processing serves the establishment, exercise, or defense of legal claims.Unless otherwise described above, please contact the address listed in the imprint to exercise your rights.

6. Right to lodge a complaint (Art. 77 GDPR)You have the right to lodge a complaint with a supervisory authority if you believe that the processing of your personal data violates data protection regulations.
You may lodge the complaint particularly with the authority in your:country of residence,place of work, orplace of the alleged infringement.

7. Data securityWe take technical and organizational measures to protect your data from unauthorized access.
We use encryption technology on our websites.
Your data is transmitted between your device and our servers via the internet using TLS encryption.Implemented security measures include:encryption of all data transmissions via HTTPS/TLSrow-level security (RLS) for cloud data in SupabaseiOS Keychain for sensitive local dataanonymous authentication with no password storageregular security reviews

8. Data deletionIn the AppOpen Settings → PrivacyTap “Delete All Data”Confirm by tapping “Delete permanently”This deletes:all cloud data (plans, events, settings)all local data (CoreData, UserDefaults)iCloud Key-Value Store entriesKeychain dataNote:
The AI request limit is not reset when deleting data.
This serves fraud prevention and ensures compliance with usage limitations for AI requests.Via E-MailSend an e-mail to info@pulse-timer.com with the subject “Data Deletion”.
We will delete all data associated with your anonymous user ID within 30 days.

9. Changes to this privacy policyWe reserve the right to update this privacy policy.
The current version can always be found in the app under “Settings → Privacy” and on our website.
10. Data Processed by App Stores
When downloading, installing, or purchasing the app (for example, via the Apple App Store or Google Play Store), certain personal data — such as name, email address, payment details, and device identifiers — may be processed by the respective store.These data are processed solely by the store operators, not by us.For more details, please review:Apple Inc. Privacy Policy: https://www.apple.com/legal/privacy/en-ww/
Google LLC Privacy Policy: https://policies.google.com/privacy


Data Processing Agreement — Pulse

Last updated: 02.12.2025

Section I

Clause 1 - Purpose And Scope of Application
1.1 These standard contractual clauses (hereinafter referred to as "Clauses") are intended to ensure compliance with Article 28 (3) and (4) of Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27, 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation, hereinafter referred to as GDPR).1.2 The Controllers and Processors listed in Annex I have agreed to these Clauses to ensure compliance with Article 28(3) and (4) GDPR.1.3 These Clauses apply to the processing of personal data as specified in Annex II.1.4 Annexes I to IV are an integral part of the Clauses.1.5 These Clauses apply are without prejudice to obligations to which the Controller is subject to the GDPR.1.6 These Clauses do not in themselves ensure compliance with obligations related to international transfers in accordance with Chapter V of the GDPR.

Clause 2 - Unalterability of The Clauses2.1 The Parties undertake not to modify the Clauses except for adding information to the Annexes or updating information in them.2.2 This does not prevent the Parties from including the standard contractual clauses laid down in these Clauses in a broader contract, or from adding other clauses or additional safeguards provided that the do not directly or indirectly contradict the Clauses or detract from the fundamental rights or freedoms of data subjects.

Clause 3 - Interpretation3.1 Where these Clauses use the terms defined in GDPR, those terms shall have the same meaning as in that regulation.3.2 These Clauses must be interpreted in light of the provisions of the GDPR.3.3 These Clauses shall not be interpreted in a way that is contrary to the rights and obligations provided for in the GDPR or in a way that prejudices the fundamental rights or freedoms of the data subjects.

Clause 4 - HierarchyIn the event of a contradiction between these Clauses and the provisions of any related agreements between the Parties existing at the time when these Clauses are agreed or entered into thereafter, these Clauses shall prevail.

SECTION II - OBLIGATIONS OF THE PARTIES

Clause 5 - Description of The Processing
The details of the processing operations, in particular the categories of personal data and the purposes for which the personal data are processed on behalf of the Controller, are specified in Annex II.

Clause 6 - Obligations of The Parties6.1 InstructionsThe Processor shall process personal data only on documented instructions from the Controller, unless required to do so by Union or Member State law to which the Processor is subject. In this case, the Processor shall inform the Controller of that legal requirement before processing, unless the law prohibits this on import and grounds of public interest. Subsequent instructions may also be given by the Controller throughout the duration of the processing of personal data. These instructions shall always be documented. These instructions must always be documented.The Processor shall immediately inform the Controller if, in the Processor's opinion, instructions given by the Controller infringe the GDPR or the applicable Union or Member State data protection provisions.6.2 Purpose LimitationThe Processor shall process the personal data only for the specific purpose(s) set out in Annex II, unless it receives further instructions from the Controller.6.3 Duration of The Processing of Personal DataProcessing shall by the Processor shall only take place for the duration specified in Annex II.6.4 Security of ProcessingThe Processor shall at least implement the technical and organizational measures specified in Annex III to ensure the security of personal data. This includes protecting the data against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure or access to the data (personal data breach). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purposes of processing and the risks involved for the data subjects.The Processor shall grant access to the personal data undergoing processing to members of its personal only to the extent strictly necessary for implementing, managing and monitoring of the contract. The Processor shall ensure that persons authorized to process the personal data received have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality.6.5 Sensitive DataIf the processing involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, containing genetic data or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person's sex life or sexual orientation, or data relating to criminal convictions and offenses (hereinafter "sensitive data"), the Processor shall apply specific restrictions and/or additional safeguards.6.6 Documentation And Compliance With the ClausesThe Parties must be able to demonstrate compliance with these Clauses.The Processor shall deal promptly and adequately with inquiries from the Controller about the processing of date in accordance with these Clauses.The Processor shall make available to the Controller all information necessary to demonstrate compliance with the obligations set out in these Clauses and stem directly from the GDPR. At the request of the Controller, the Processor shall also allow and contribute to an audit of the processing activities covered by these Clauses at reasonable intervals or if there are indications of non-compliance. In deciding on a review or an audit, the Controller may take into account relevant certifications of the Processor.The Controller may choose to conduct the audit by itself or mandate an independent auditor. Audits may also include the inspections of the premises or physical facilities of the Processor and shall, where appropriate, be carried out with reasonable notice.The Parties shall make the information referred to in this Clause, including the results of any audits, available to the competent supervisory authority(ies) upon request.6.7 Use of Sub-ProcessorsThe Processor shall have the general authorization of the Controller to engage Sub-Processors from an agreed list. The Processor shall specifically inform in writing the Controller of any intended changes of that list through the addition or replacement of sub-processors at least 5 days in advance, thereby giving the Controller sufficient time to be able to object to such changes prior to the engagement of the concerned sub-processor(s). The Processor shall provide the Controller with the information necessary to enable the Controller to exercise the right to object.Where the Processor engages a Sub-Processor to carry out specific processing activities (on behalf of the Controller), it shall do so by way of a contract which imposes on the sub-processor, in substance, the same data protection obligations as the ones imposed on the data processor in accordance with these Clauses. The Processor shall ensure that the Sub-Processor complies with the obligations to which the Processor is subject under these Clauses and the GDPR.At the Controller’s request, the Processor shall provide a copy of such a sub-processor agreement and any subsequent amendments to the controller. To the extent necessary to protect business secrets or other confidential information, including personal data, the Processor may redact the wording of the agreement before providing a copy.The Processor shall remain fully responsible to the Controller for the performance of the sub-processor´s obligations in accordance with its contract with the Processor. The Processor shall notify the Controller of any failure by the sub-processor to fulfil its contractual obligations.The Processor shall agree a third party beneficiary clause with the sub-processor whereby - in the event the processor has factually disappeared, ceased to exist in law or has become insolvent - the Controller shall have the right to terminate the sub-processor contract and to instruct the sub-processor to erase or return the personal data.6.8 International Data TransfersAny transfer of data by the Processor to a third country or an international organization be done only on the basis of documented instructions from the Controller or to fulfil with a specific provision under Union or Member State law to which the Processor is subject and shall comply with Chapter V of the GDPR.The Controller agrees that where the Processor engages a Sub-Processor pursuant to Clause 6.7 for carrying out certain processing activities (on behalf of the Controller) and those processing activities involve a transfer of personal data within the meaning of Chapter V of the GDPR, the Processor and the Sub-Processor can ensure compliance with Chapter V of the GDPR by using standard contractual Clauses adopted by the Commission pursuant to Article 46(2) of the GDPR, provided that the conditions for the application of those standard contractual Clauses are met.

Clause 7 - Assistance to the Controller7.1 The Processor shall promptly inform the Controller of any request received from the data subject. It shall not respond to the request itself unless authorized to do so by the Controller.7.2 The Processor shall assist the Controller in fulfilling its obligations to respond to data subjects’ requests to exercise their rights, taking into account the nature of the processing. In fulfilling its obligations in accordance with 7.1 and 7.2. the Processor shall comply with the Controller’s instructions.7.3 In addition to the Processor's obligation to assist the Controller pursuant to Clause 7.2, the Processor shall furthermore assist the Controller in ensuring compliance with the following obligations, taking into account the nature of the data processing and the information available to the Processor:Obligation to carry out an assessment of the impact of the envisaged processing operations on the protection of personal data (a "data protection impact assessment”) where a type of processing is likely to result in a high risk to the rights and freedoms of natural persons;Obligation to consult the competent supervisory authority(ies) prior to processing where a data protection impact assessment indicates that the processing would result in a high risk, in the absence of measures taken by the Controller to mitigate the risk;Obligation to ensure that the personal data is accurate and up to date by informing the Controller without delay if the Processor becomes aware that the personal data processing is inaccurate or outdated;d. The obligations in Art. 32 GDPRThe Parties shall set out in Annex III the appropriate technical and organizational measures by which the Processor is required to assist the Controller in the application of this Clause as well as the scope and the extent of the assistance required.

Clause 8 - Notification of Personal Data BreachesIn the event of a personal data breach, the Processor shall cooperate with and assist the Controller for the Controller to comply with its obligations under Articles 33 and 34 GDPR, where applicable, taking into account the nature of processing and the information available to the Processor.8.1 Data breach concerning data processed by the ControllerIn the event of a personal data breach concerning the data processed by the Controller, the Processor shall assist the Controller:in notifying the personal data breach to the competent supervisory authority(ies) without undue delay after the Controller becomes aware of it, where relevant (unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons);in obtaining the following information, pursuant to Article 33(3) GDPR, shall be stated in the controller’s notification, and must at least include the following information:aa. the nature of the personal data, including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned;bb. the likely consequences of a personal data breach;cc. the measures taken or proposed to be taken by the Controller to address the personal data breach and, where appropriate, measures to mitigate its possible adverse effects.Where, and insofar as, it is not possible to provide all this information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay.dd. in complying with the obligation under Article 34 of the GDPR with the obligation to communicate without undue delay the personal data breach to the data subject, where the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons.8.2 Breach of the Protection of Data Processed by the ProcessorIn the event of a personal data breach in connection with the data processed by the Processor, the Processor shall notify the Controller without undue delay after having become aware of the breach. This notification shall contain, at least:a description of the nature of the breach (including, where possible, the categories and approximate number of data subjects and data records concerned);contact details of a contact point where further information about the personal data breach can be obtained;the likely consequences and the measures taken or proposed to address the personal data breach, including measures to mitigate its possible adverse effects.Where, and insofar as, it is not possible to provide all this information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay.The Parties shall specify in Annex III any other elements to be provided by the Processor when assisting the Controller in the compliance with the Controller’s under Articles 33 and 34 GDPR.

SECTION III - FINAL PROVISIONS

Clause 9 - Non-Compliance with the Clauses and Termination
9.1 Without prejudice to any provisions of the GDPR, in the event that the Processor is in breach of its obligations under these Clauses, the Controller may instruct the Processor to suspend the processing of personal data until the latter complies with these Clauses or the contract is terminated. The Processor shall promptly inform the Controller in case it is unable to comply with these Clauses, for whatever reason.9.2 The Controller is entitled to terminate the contract insofar as it concerns the processing of personal data in accordance with these Clauses if:the processing of personal data by the processor has been suspended by the controller pursuant to point (a), and compliance with these Clauses has not been restored within a reasonable period and in any event within one month following suspension;the Processor is in substantial or persistent breach of these Clauses or its obligations under the GDPR;the Processor fails to comply with a binding decision of a competent court or the competent supervisory authority(ies) relating to its obligations under these Clauses or the GDPR.9.3 The Processor shall be entitled to terminate the contract insofar as it concerns the processing of personal data under these Clauses where, after having informed the Controller that its instructions infringe applicable legal requirements in accordance with Clause 6.1 (b), the Controller insists on compliance with the instructions.9.4 Following the termination of the contract, the Processor shall, at the choice of the Controller, delete all personal data processed on behalf of the Controller and certify to the Controller that this has been done, or return all personal data to the Controller and delete existing copies, unless there is an obligation under Union or Member State law to retain the personal data. Until the data is deleted or returned, the Processor shall continue to ensure compliance with these Clauses.

APPENDIX I

List of Parties
Controller(s): Are you as a user of the Pulse App
Processor: Are we, Diyar Dirik, Am alten Bahnhof 20, 63456 Hanau, Germany.

APPENDIX II

Description of Processing
Categories of Data Subjects Whose Personal Data Are Processed
You as a user of the Pulse App, third Parties created by you as a user of the Pulse App
Categories of Personal Data That Are ProcessedAll personal data that you, as a user of the Pulse App, create during use. This data may also contain sensitive data, in accordance with Art. 9 GDPR.
Type of ProcessingThe personal data you enter will be stored on the terminal device and/or in the iCloud and/or synchronized with other end devices on which Pulse App is installed via an external server of the server provider Supabase Inc. As part of the AI-supported use of the Pulse App, (personal) data provided or named by you will be transmitted to the AI service provider OpenAI OpCo LLC.
Purpose(s) for which the Personal Data are Processed on Behalf of the ControllerThe processing takes place in the context of the creation of appointments by you as a user of the Pulse App.
Duration of ProcessingProcessing will continue until you decide to stop processing.
APPENDIX IIITechnical and Organizational Measures Pursuant to Art. 32 Para. 1 GDPR for Processors (Art. 30 para. 2 lit. d. GDPR)TerminologyThis document uses the terminology and definitions of the GDPR. It also refers to:“Processor” refers to us, Diyar Dirik, as the Processor commissioned by you in accordance with the AVV Annex;"Client" is you as the Controller in accordance with the GDPR, who has agreed a contract with the Processor for commissioned processing;
1. Confidentiality1.1 Access ControlThis includes measures to prevent unauthorized persons from gaining access to the data processing systems on which the client's personal data is processed.Access control by the contractorThe client's personal data is stored on the servers of the server provider Supabase Inc. (hereinafter "Supabase") and/or in the client's iCloud or on the client's end devices.Personal data of the client is not permanently stored or processed on the Processor's premises.Access to the Processor's offices is protected against access by unauthorized third Parties by locking systems. No customer appointments or similar take place in the offices; the Pulse App is only made available digitally. If the Processor's business contacts attend appointments on the Processor's office premises, the Processor keeps an appointment log and ensures that the business contact does not move around the office premises unattended.The Processor's cleaning staff have been carefully selected by the Processor and are obliged to comply with data protection regulations.Access control by the server providerThe server provider Supabase, on whose servers the client's personal data is stored, takes various measures to ensure that unauthorized persons do not gain access to the data processing systems. Further information can be found in Schedule 1 of the Data Processing Agreement (DPA) concluded between the Processor and Supabase, which can be provided by the Processor on request.Access control by the AI service providerThe AI provider OpenAI OpCo LLC (hereinafter "OpenAI") has various measures in place to prevent unauthorized access to OpenAI's facilities in accordance with industry best practice. These measures include in particular:Control through physical barriers, including locked doors and gates;24-hour on-site surveillance by security staff;24-hour video surveillance and alarm systems, including video surveillance of common areas and facility entrances and exits;Access control systems that require biometrics or photo ID and a PIN for OpenAI staff access to all OpenAI facilities;Protocols for the identification, registration and escort of visitors;Protocol of the outputs and inputs of the device.In addition, reference is made to the Data Processing Agreement (DPA) of OpenAI, Exhibit B, Annex II, which can be provided by the Processor on request. Further information is available at https://trust.openai.com/.1.2 Access ControlThis includes measures to prevent unauthorized persons from using data processing systems and data processing procedures.Access control by ProcessorsAccess to Supabase's external servers on which the customer's personal data is stored can only be made via the Processor's workstation computer. These are generally protected with a username and password. The Processor has implemented a password policy that ensures that the passwords for the workstations are changed regularly. The storage drives of the workstations are automatically fully encrypted so that access to the access data to Supabase's external servers is impossible even if a workstation is lost. All workstations have a so-called pause function so that the user has to log on again after a certain period of time. The operating systems of the workstations are updated regularly. Security-relevant software on the workstations is always kept up to date automatically.Access to Supabase's external servers from the Processor's workstation computer is possible via a TLS-encrypted connection. Access is only possible by entering an additional username and password, which are known exclusively to the Processor or the employees commissioned by the Processor.The Processor has implemented a user management system. This ensures that all access is blocked for employees leaving the company. Every user ID in the Processor's company is unique, unambiguous and personal.All workstation computers are provided by the Processor. If employees and / or freelancers use their own devices ("Bring Your Own Device"), they are separately obligated in writing to comply with data protection.1.3 Access control by the server providerThe server provider Supabase has implemented comprehensive security concepts to ensure that unauthorized persons cannot access personal data stored on the servers. Supabase has implemented the following measures in particular:Access management is centralized via an identity provider and, whenever possible, both authentication and authorization are delegated internally to this provider. This ensures that off-boarding and the revocation of privileges can take place promptly.The Supabase infrastructure requires the approval of at least one other authorized person before changes can be made. Authorized persons are appointed on the basis of the relevance of the system in question for their tasks.User authentication for Supabase's internal resources is protected by both a strict password policy and mandatory 2-factor authentication (2FA), which excludes the use of SMS-based 2FA.Supabase does not knowingly store plaintext passwords at any time; if necessary, Supabase will store hashed results of authentication material as appropriate for the particular use case.Audit trails are stored for user actions performed within the Supabase infrastructure. Supabase keeps audit logs of all interactions with its internal services and all interactions with customer projects.The data traffic is logged and, if required, enables a retrospective analysis of all connections to the Supabase infrastructure.Supabase firewalls only allow pre-approved and secure communication channels with Supabase services.All communication - including the transfer of login information - takes place via connections that are protected by TLS with a range of modern encryption methods.Please also refer to the information provided by Supabase in Schedule 1 of the DPA.1.4 Access control by the AI service providerOpenAI uses industry-standard best-practice solutions for authentication and authorization of internal employee access and access to the OpenAI services. These include the following measures in particular:OpenAI uses Single Sign-On (SSO) for authentication to third-party services that are used to provide OpenAI services. Only role-based access controls (RBAC) are used to provide internal access to these services;Mandatory multifactor authentication is used for authentication to the OpenAI identity provider;Unique login identifiers are assigned to each user;Pre-established review and approval procedures for all access requests to OpenAI services that store customer data;Regular access reviews to ensure that access levels are appropriate for the roles performed by each user;Established procedures for the immediate withdrawal of access rights when an employee leaves;Established procedures for reporting and revoking compromised access data (e.g. passwords and API keys);Established procedures for resetting passwords, including procedures for verifying a user's identity before issuing a new, replacement or temporary password.In addition, reference is made to the Data Processing Agreement (DPA) of OpenAI, Exhibit B, Annex II, in particular to the points "System and Workstation Control" and "Cloud Infrastructure and Network Security".1.5 Access ControlThis includes measures to ensure that those authorized to use the data processing procedures can only access the personal data subject to their access authorization.Access control of the ProcessorThe Processor can access the servers of the server provider Supabase, on which the personal data created by the client is stored and processed.The employees of the Processor only have access to the servers to the extent necessary to maintain the databases, further develop the database structures, perform system administration and other corresponding tasks. An authorization concept of the Processor ensures that only authorized employees can access the servers. The Processor documents the authorizations of its employees and adjusts the access options as required.Access control of the server providerAt Supabase, access to the infrastructure and internal resources is managed on the basis of the least privilege principle: Individuals are only granted the privileges they absolutely need to perform their tasks, and these privileges are revoked when they are no longer required. An authorization concept ensures that only authorized employees can access the servers for maintenance or IT security purposes.Please also refer to the information provided by Supabase in Schedule 1 of the DPA.Access control of the AI service providerOpenAI applies proven measures to prevent authorized users from accessing data beyond their authorized access rights and to prevent the unauthorized input, reading, copying, removal, modification or disclosure of data. In particular, OpenAI has implemented the following measures:OpenAI employees' access to OpenAI services is based on the principle of least privilege. Only employees whose role is to directly support the provision of OpenAI services have access to the OpenAI services software environment;Customer data transmitted to the OpenAI Services will only be used in accordance with the provisions of data protection laws, OpenAI's Data Processing Agreement and other applicable contractual agreements with customers.Reference is also made to the Data Processing Agreement (DPA) of OpenAI, Exhibit B, Annex II.1.6 Order ControlThis includes measures that ensure that personal data that is processed on behalf of the client is only processed in accordance with the client's instructions.Order control of the ProcessorIn general, the Processor does not make any changes to the client's personal data. With the Pulse App, the Processor provides the client with software with which the client can independently create, edit, view and delete personal data without instructing the Processor.If, in exceptional cases, the client expressly instructs the Processor to process, change or delete personal data, these instructions must be provided by the client in detail and in text form.Order control of the server providerThe server provider Supabase does not process any of the client's personal data. It merely provides storage space for the (personal) data entered by the client using the Pulse App.Order control of the AI service providerPersonal data is processed by the AI service provider exclusively in accordance with the requirements of the software algorithm as set out in Pulse App. Any further processing of personal data by the AI service provider is contractually excluded (see section 1 of the OpenAI DPA).1.7 Separation controlThis includes all measures that ensure that the client's personal data is processed separately from other customer data.Separation control of the ProcessorThe Pulse App is designed in such a way that only the respective client who uses the Pulse App as an assigned user can create, edit, view and delete personal data in the app and synchronize this data with various end devices. Third Parties cannot view, edit or delete this data unless the client allows a third party to use the Pulse App assigned to them.Separation control by the server providerSuperbase ensures that customer projects and Supabase's internal Control Plane services are deployed on separate networks, with a firewall ensuring that only expected traffic is allowed between the two systems. Logs and metrics used for monitoring and troubleshooting are automatically extracted and sent to systems that are separate from the user's customer projects containing the customer's data.Please also refer to the information provided by Supabase in Schedule 1 of the DPA.Separation control by the AI service providerOpenAI adheres to industry-standard practices for the separate processing of data collected for different purposes. In particular, OpenAI has implemented the following measures:the logical separation of customer data;the restriction of access to such data stored for different purposes according to the roles and responsibilities of OpenAI employees;the separation of functions of the operational information system;the separation of test and production environments of the information system.Reference is also made to the Data Processing Agreement (DPA) of OpenAI, Exhibit B, Annex II.1.8 Pseudonymization and encryption (Art. 32 Abs. 1 lit. a DSGVO, Art. 25 Abs. 1 DSGVO)The transmission of personal data between the Pulse App and the Supabase servers is carried out using a TLS-encrypted connection.OpenAI uses industry best practices solutions to prevent unauthorized access, modification or removal of data during transmission and to secure and log all transmissions. Measures taken by OpenAI include, but are not limited to:the encryption of data in production data storage using strong encryption algorithms;the encryption of data in transit;the creation of audit trails for all data access requests for production data storage;full-disk encryption on all company workstations;the implementation of device management on all company workstations;restrictions on the use of portable or removable media;Reference is also made to the Data Processing Agreement (DPA) of OpenAI, Exhibit B, Annex II.
2. Integrity (Art. 32 Abs. 1 lit. b DSGVO)2.1 Transfer controlThis includes measures to ensure that personal data cannot be read, modified or removed without authorization during electronic transmission or during its transport or storage.Insofar as the Pulse App transmits (personal) data provided by the customer to the customer's iCloud and/or Supabase's servers or retrieves it from the customer's iCloud and/or Supabase's servers, this is done exclusively via SSL- or TLS-secured connections.With regard to the measures taken by OpenAI to ensure transfer control, reference is made to the information under Section 1 lt. f.2.2 Input controlThis includes measures that ensure that it is possible to subsequently check and determine whether and by whom personal data has been entered into, changed or removed from data processing systems.Regular backups of the databases in the iCloud, if activated by the customer, and on Supabase's servers ensure that (personal) data entered, changed or deleted by the customer in the Pulse App can also be traced at a later date.
3. Availability and recoverability (Art. 32 Abs. 1 lit. b DSGVO)3.1 Availability controlThis includes measures to ensure that personal data is protected against accidental destruction or loss.Availability control by ProcessorsThe Client may make backups of the (personal) data created, edited or deleted by the Client through the use of the Pulse App; the backups shall be stored externally (e.g. on iCloud).Availability control by server providerThe server provider Supabase creates daily backups of customer projects as standard and stores these for a period of 7 calendar days. All backups are encrypted during transport and at rest.The backups are stored on a storage system that is independent of the customer's project resources, with a target availability of 99.99%.Reference is also made to the information provided by Supabase in Schedule 1 of the DPA.OpenAI can securely store API inputs and outputs for up to 30 days in order to provide the AI services and detect misuse. After 30 days, API input and output will be removed from OpenAI's systems unless OpenAI is required by law to retain it. When using ChatGPT Workspace, administrators control how long their data is retained, with a minimum retention period of 90 days.Reference is also made to the Data Processing Agreement (DPA) of OpenAI, Exhibit B, Annex II.3.2 RecoverabilityThis includes measures to ensure that personal data can be restored quickly in the event of a physical or technical incident.The Processor itself does not have any data recovery measures in place, as personal data is stored with the server provider Superbase. The server provider Supabase has a Point-In-Case Recovery, through which every version of the databases stored on the server can be restored for a period of 7 days.OpenAI applies industry best practices solutions to maintain the functionality of the services even in the event of accidental or deliberate damage. These include, among others:Ensuring that the systems can be restored in the event of an interruption;Ensuring that systems are working and errors are reported;Anti-malware and intrusion detection/prevention solutions comprehensively implemented throughout our environment.Reference is also made to the Data Processing Agreement (DPA) of OpenAI, Exhibit B, Annex II.3.3 Deletion conceptThis includes measures to ensure that the right personal data is deleted at the right time.The (personal) data created or processed by the client in the Pulse App is generally deleted by the client.The Processor deletes (personal) data of the client if the client issues a corresponding instruction. The Processor is entitled to delete (personal) data of the client after a reasonable period of time, provided that it informs the client of the intended deletion with a notice period of at least 14 days and the client does not object to the deletion in text form. In the event of an objection, the Processor shall make the (personal) data available to the client in JSON format and only then delete it from the Processor's systems.


Imprint

Pulse
Operated by: Diyar Dirik
Address: Am alten Bahnhof 20, 63456 Hanau
Email: info@pulse-timer.com
VAT ID: N/A
Responsible for content according to § 5 TMG / § 55 RStV (Germany): Diyar Dirik© 2025 Pulse. All rights reserved