Skip to content

End User License Agreement

Effective Date: April 11, 2026 Last Updated: April 11, 2026 Version: 2.0

Legal Entity: Do Your Bit Ltd Address: Suite 2A, 7th Floor PF, City Reach, 5 Greenwich View Place, London E14 9NN, United Kingdom Contact Email: hq@goldenretriever.ai Website: https://goldenretriever.ai Governing Law: England and Wales Registration Number: 813003 Privacy Contact: privacy@goldenretriever.ai

This Consolidated Legal Agreement (the “Agreement”) constitutes a legally binding contract between you (whether an individual or the legal entity you represent) (the “User”, “you”, or “your”) and Do Your Bit Ltd (the “Company”, “we”, “us”, or “our”). This Agreement governs your access to, downloading, installation, and use of the Golden Retriever macOS desktop application (the “App”), any associated backend cloud services, APIs, and all related documentation, software, and services provided by the Company (collectively, the “Services”).

This Agreement is intentionally comprehensive and consolidates what were previously separate legal documents. By downloading, installing, accessing, or using the App, or by clicking an “I Agree”, “Accept”, or similar button, you acknowledge that you have read, understood, and agree to be bound by all the terms, conditions, policies, and notices contained within this single consolidated document.

This Agreement replaces and supersedes the following previously separate documents in their entirety:

  1. End User License Agreement (EULA)
  2. Privacy Policy
  3. Terms of Service (ToS)
  4. Data Processing Agreement (DPA)
  5. AI Transparency Notice

This End User License Agreement (“EULA” or “Agreement”) is a binding legal agreement between you (either an individual or a single legal entity, hereinafter “User,” “you,” or “your”) and Do Your Bit Ltd (“Company,” “we,” “us,” or “our”) governing your use of the Golden Retriever macOS desktop application, including all associated software components, media, printed materials, and electronic documentation (collectively, the “App”).

By downloading, installing, or using the App, or by clicking “I Agree” or a similar consent button during installation or first run, you agree to be bound by the terms of this EULA. If you do not agree to these terms, do not download, install, or use the App.

This EULA supplements, and should be read in conjunction with, our Terms of Service, Privacy Policy, Data Processing Agreement, and AI Transparency Notice. In the event of a conflict between this EULA and the Terms of Service regarding the use of the App software itself, this EULA shall control.


Subject to your continuous compliance with this EULA and payment of any applicable subscription fees, the Company grants you a limited, personal, non-exclusive, non-transferable, and revocable license to:

  1. Download and install the App on Apple macOS devices (macOS 14.0 or later) that you own or control.
  2. Use the App for your personal or internal business purposes, strictly in accordance with your selected subscription tier (Free, Power User, Business, or Enterprise).

This license does not automatically grant you any rights to obtain future upgrades, updates, or supplements to the App. However, the Company may, at its sole discretion, provide such updates. Any updates provided will be governed by this EULA unless accompanied by a separate license agreement.


You agree not to, and you will not permit others to:

  1. Modify or Reverse Engineer: Copy, modify, translate, adapt, reverse engineer, decompile, disassemble, or create derivative works based on the App, except to the extent expressly permitted by applicable law.
  2. Distribution and Transfer: Sell, rent, lease, sublicense, distribute, broadcast, or otherwise transfer the App or any rights granted under this EULA to any third party.
  3. Circumvention: Bypass, disable, or defeat any technical limitations, digital rights management (DRM), or security features in the App, including subscription tier feature gates, database encryption (SQLCipher), or data limits.
  4. Commercial Exploitation: Use the App to operate a service bureau, time-sharing service, or otherwise use the App to process data for third parties.
  5. Malicious Use: Use the App to develop a competing product, or use the App in any manner that could damage, disable, overburden, or impair our backend infrastructure (including Google Cloud Run and Firestore).
  6. Apple Ecosystem Bypass: While the App is distributed directly and not via the Mac App Store, you agree not to interfere with macOS security mechanisms (such as Gatekeeper or Notarization) required to run the App safely.

1.4. Architecture and Bring Your Own Cloud (BYOC)

Section titled “1.4. Architecture and Bring Your Own Cloud (BYOC)”

The App is designed with a local-first architecture. It indexes your local files and stores the resulting embedding vectors in a local Qdrant vector database running via Docker on your macOS device.

The App utilizes a “Bring Your Own Cloud” (BYOC) model. You must connect your own Google Cloud Platform (GCP) project to use the core embedding and AI features.

By using the App, you acknowledge and agree that:

  1. Third-Party Costs: You are solely responsible for all costs incurred on your GCP account, including charges for Google Vertex AI (Gemini Embedding 2 and Gemini 2.5 Flash APIs) and Google Cloud Storage (GCS).
  2. Configuration: You are responsible for properly configuring and securing your GCP project. The Company is not liable for unauthorized access or unexpected charges resulting from misconfiguration of your GCP account.
  3. Availability: The App’s AI features depend on the availability of your connected GCP services. The Company is not responsible for App downtime caused by GCP outages, quota limits, or suspended billing on your GCP account.

1.5. Artificial Intelligence and Output Limitations

Section titled “1.5. Artificial Intelligence and Output Limitations”

The App utilizes artificial intelligence, specifically Google Vertex AI (Gemini 2.5 Flash and Gemini Embedding 2), to provide semantic search and question-answering (Q&A) capabilities based on your indexed files.

By using these features, you acknowledge:

  1. No Guarantee of Accuracy: AI-generated outputs, including search rankings and Q&A responses, are probabilistic and may contain errors, inaccuracies, or “hallucinations.”
  2. Not Professional Advice: The App’s outputs do not constitute legal, medical, financial, or other professional advice. You should independently verify any critical information generated by the App.
  3. AI Transparency: Your use of these features is subject to our AI Transparency Notice, which details the capabilities and limitations of the AI models used, in compliance with the EU AI Act.

1.6. Third-Party Software and Dependencies

Section titled “1.6. Third-Party Software and Dependencies”

The App incorporates or requires the use of third-party software and services, which are subject to their own licenses and terms:

  1. Docker and Qdrant: The App requires Docker to run a local instance of Qdrant (an open-source vector database). Your use of Qdrant is subject to its open-source license (Apache 2.0 (https://github.com/qdrant/qdrant/blob/master/LICENSE)).
  2. Google Services: The App integrates with Google Cloud Platform, Google OAuth 2.0, and Vertex AI. Your use of these services is governed by the Google Cloud Terms of Service.
  3. Stripe: Subscription billing is processed by Stripe, subject to Stripe’s terms.
  4. Auth0: For Enterprise tier users, Single Sign-On (SSO) may be provided via Auth0, subject to Auth0’s terms.

The Company is not responsible for the performance, security, or availability of these third-party dependencies.


The App operates on a subscription model with specific feature gates and data limits:

  1. Free Tier: Limited to 10 GB of data. Provided “as is” without guaranteed support.
  2. Power User Tier: Limited to 100 GB of data. Billed on a recurring basis.
  3. Business Tier: Limited to 500 GB per seat (minimum 3 seats). Unlocks team features, Database Encryption (SQLCipher), and Data Processing Agreements.
  4. Enterprise Tier: Unlimited data. Unlocks Enterprise SSO (Auth0) and custom configurations.

Failure to pay subscription fees or exceeding data limits may result in the restriction of features or downgrade of your account to the Free tier, subject to a 7-day offline grace period as detailed in the Terms of Service.


The App collects and processes personal data, including account information, usage metrics, and audit logs, in accordance with our Privacy Policy.

We comply with applicable data protection laws. The App includes features to help you manage your privacy, including local audit logs, explicit consent toggles for data processing and telemetry, and a data deletion tool that removes local databases and revokes cloud access.

For Business and Enterprise tier users, processing of personal data on your behalf is governed by our Data Processing Agreement.

By default, embedding vectors are stored locally on your device. The Company does not have access to your local Qdrant database or the original files stored on your Mac.


All rights, title, and interest in and to the App (including but not limited to any source code, design, UI/UX, images, text, and “look and feel”) are owned by the Company or its licensors. The App is licensed, not sold, to you.

You retain all intellectual property rights to the files, documents, and content you index using the App (“Your Content”). The Company claims no ownership over Your Content. You represent and warrant that you have the necessary rights and permissions to process Your Content through the App.


1.10. Disclaimers and Limitation of Liability

Section titled “1.10. Disclaimers and Limitation of Liability”

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE APP IS PROVIDED “AS IS” AND “AS AVAILABLE,” WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. THE COMPANY DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. WE DO NOT WARRANT THAT THE APP WILL MEET YOUR REQUIREMENTS, THAT ITS OPERATION WILL BE UNINTERRUPTED OR ERROR-FREE, OR THAT DEFECTS WILL BE CORRECTED.

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE COMPANY, ITS AFFILIATES, OR ITS LICENSORS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) ARISING OUT OF THE USE OF OR INABILITY TO USE THE APP, EVEN IF THE COMPANY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

IN NO EVENT SHALL THE COMPANY’S TOTAL LIABILITY TO YOU FOR ALL DAMAGES EXCEED THE AMOUNT ACTUALLY PAID BY YOU FOR THE APP SUBSCRIPTION IN THE TWELVE (12) MONTHS PRECEDING THE CLAIM. FOR FREE TIER USERS, LIABILITY IS LIMITED TO $0.


You may terminate this EULA at any time by deleting your account, destroying all copies of the App, and ceasing all use.

This EULA is effective until terminated. Your rights under this EULA will terminate automatically without notice from the Company if you fail to comply with any term(s) of this EULA.

Upon termination, you must cease all use of the App and destroy all copies, full or partial, of the App. Sections 3, 4, 5, 9, 10, 11, and 12 shall survive any termination of this EULA.


This EULA shall be governed by and construed in accordance with the laws of England and Wales, without regard to its conflict of law principles. Any legal action or proceeding arising under this EULA will be brought exclusively in the courts of England and Wales.

If any provision of this EULA is held to be unenforceable or invalid, such provision will be changed and interpreted to accomplish the objectives of such provision to the greatest extent possible under applicable law, and the remaining provisions will continue in full force and effect.

This EULA, together with the Terms of Service, Privacy Policy, Data Processing Agreement, and AI Transparency Notice, constitutes the entire agreement between you and the Company regarding the App.

The Company reserves the right to modify this EULA at any time. We will notify you of material changes via email or an in-app notification. Your continued use of the App after such notification constitutes your acceptance of the updated EULA.


If you have any questions regarding this EULA, please contact us at:

Do Your Bit Ltd Address: Suite 2A, 7th Floor PF, City Reach, 5 Greenwich View Place, London E14 9NN, United Kingdom Email: hq@goldenretriever.ai Website: https://goldenretriever.ai


Last Updated: March 20, 2026


This Privacy Policy describes how Golden Retriever (the “App”), a macOS desktop application, collects, processes, and protects your personal data. Golden Retriever indexes your local files (PDFs, documents, images, audio, and video), generates embedding vectors, and provides AI-powered search and Q&A capabilities.

We are committed to protecting your privacy and ensuring you have a positive experience on our platform. This policy applies to all users, including those in the European Union, European Economic Area (EEA), United Kingdom (UK), United States (US), and California.


ItemDetails
Legal Entity NameDo Your Bit Ltd
Registration Number813003
Registered AddressSuite 2A, 7th Floor PF, City Reach, 5 Greenwich View Place, London E14 9NN, United Kingdom
Contact Emailhq@goldenretriever.ai
Privacy Contactprivacy@goldenretriever.ai
Governing LawEngland and Wales

2.3. Types of Personal Data Collected and Processed

Section titled “2.3. Types of Personal Data Collected and Processed”

Golden Retriever processes the following categories of personal data:

  • Email address
  • Account creation/login timestamp
  • Subscription tier selection
  • Subscription status and billing cycle
  • Source files: PDFs, documents, images, audio, and video files you choose to index
  • File metadata: File names, paths, modification dates, file size
  • File content chunks: Extracted text/data sent to Google Vertex AI for embedding generation
  • Embedding vectors: Numerical representations (vectors) generated from your file content
  • File uploads: Copies of files uploaded to Google Cloud Storage for multimodal embedding
  • Search queries: Text you submit to search your indexed files
  • Q&A interactions: Questions and AI-generated responses via Gemini 2.5 Flash
  • Usage metrics: Frequency of search queries, number of files indexed, active session duration
  • Audit logs: Record of indexing operations, embedding generation events, and system errors (stored locally)
  • Payment method (Stripe-processed; we do not store full card details)
  • Billing address
  • Invoice data
  • Subscription tier and pricing
  • Payment transaction history
  • macOS version and system specifications
  • App version
  • Crash reports and error logs
  • Local Qdrant instance configuration metadata

Under the General Data Protection Regulation (GDPR), UK GDPR, and California Consumer Privacy Act (CCPA), we process personal data on the following legal bases:

Data TypeLegal BasisSpecific Justification
Account data (email)Contract Performance (GDPR Art. 6(1)(b); UK GDPR; CCPA)Necessary to maintain your account and provide subscription services
Source files (local indexing)Contract Performance (GDPR Art. 6(1)(b))You initiate indexing; we process files to deliver the core service
File content chunksConsent (GDPR Art. 6(1)(a)) + Legitimate Interest (Art. 6(1)(f))We process via Google Vertex AI for embedding generation; you consent to send data to third parties
Embedding vectors (Qdrant)Contract Performance (GDPR Art. 6(1)(b))Necessary for search and Q&A functionality
File uploads (Google Cloud Storage)Consent (GDPR Art. 6(1)(a)) + Legitimate Interest (Art. 6(1)(f))Required for multimodal embedding; you consent to cloud storage
Search queriesConsent (GDPR Art. 6(1)(a))You consent to send queries to Google Vertex AI for processing
Q&A conversationsConsent (GDPR Art. 6(1)(a))You consent to processing via Gemini 2.5 Flash
Payment/billing dataContract Performance (GDPR Art. 6(1)(b)) + Legal Obligation (Art. 6(1)(c))Necessary for payment processing and tax compliance
Usage metricsLegitimate Interest (GDPR Art. 6(1)(f))To improve App performance, understand user behavior, and detect abuse
Audit logsLegal Obligation (GDPR Art. 30)GDPR requires we maintain records of processing activities

2.5. Data Processing Locations and Retention

Section titled “2.5. Data Processing Locations and Retention”
Data TypeWhere ProcessedRetention PeriodNotes
Source filesUser’s Mac (local only)Until user deletesFiles never leave your device unless explicitly uploaded for multimodal embedding
File content chunks (embedding)Google Vertex AI (us-central1 or eu region)Transient — not stored by GoogleGoogle does not retain text after embedding generation
Embedding vectorsQdrant (local Docker)Until user deletes or account closedStored entirely on your local machine
File uploads (multimodal embedding)Google Cloud StorageUntil user deletes or erasure request processedUser may trigger deletion in Settings; processed as erasure request
Search queriesGoogle Vertex AITransientNot retained by Google; used only for immediate processing
Q&A conversationsGoogle Vertex AI (Gemini 2.5 Flash)TransientNot retained by Google; conversation context cleared after session
Account data (email)Cloud Run + FirestoreUntil account deletion or per your erasure requestRetained for billing and account management purposes
Payment/billing dataStripePer Stripe’s retention policy (typically 7 years for tax compliance)Subject to Stripe’s Data Processing Addendum and privacy terms
Usage metricsOur backend (Cloud Run + Firestore)2 yearsAggregated and anonymized for analytics
Audit logsUser’s Mac (local SQLite database)Until user deletesMaintained locally for transparency and troubleshooting

2.6. Third-Party Data Processors and Sub-processors

Section titled “2.6. Third-Party Data Processors and Sub-processors”

Golden Retriever uses the following third-party services to process your personal data:

  • Services: Google Vertex AI (Gemini Embedding 2, Gemini 2.5 Flash), Google Cloud Storage
  • Purpose: Embedding vector generation, AI-powered Q&A, file storage for multimodal embedding
  • Data Transferred: File content chunks, search queries, Q&A prompts, file uploads
  • Data Processing Agreement: Google Cloud has executed Standard Contractual Clauses (SCCs) per GDPR Art. 46(2)(c) and UK GDPR Schedule 2, Part 2
  • Adequacy: European Commission decision (Decision (EU) 2023/1250) recognizes SCCs as a valid legal mechanism for EU→US transfers
  • Data Residency: You may configure Google Vertex AI to process data in eu-central1 (Frankfurt) to keep EU data within EU borders
  • Google Privacy: See Google Cloud Privacy Policy
  • Services: Payment processing, billing, subscription management
  • Purpose: To securely process and store payment information
  • Data Transferred: Email, billing address, payment method (tokenized), transaction history
  • Data Processing Agreement: Stripe has executed Standard Contractual Clauses for international transfers
  • Adequacy: Stripe is Privacy Shield certified and committed to GDPR compliance
  • Data Residency: Payment data may be stored globally per Stripe’s architecture
  • Stripe Privacy: See Stripe Privacy Policy

2.6.3 Qdrant (Qdrant Solutions, Lithuania/Russia)

Section titled “2.6.3 Qdrant (Qdrant Solutions, Lithuania/Russia)”
  • Services: Vector database for embedding storage and search
  • Purpose: To provide fast, local vector similarity search
  • Data Transferred: Embedding vectors (not original files)
  • Deployment: Qdrant runs locally via Docker on your macOS device (no cloud transfer)
  • Note: If you later opt into Qdrant Cloud, data would be transferred to Qdrant’s cloud infrastructure; such transfer requires explicit consent

2.6.4 Auth0 (Okta/Auth0, USA) — Potential Future

Section titled “2.6.4 Auth0 (Okta/Auth0, USA) — Potential Future”
  • Services: User authentication and identity management (if implemented)
  • Purpose: To secure login and multi-device authentication
  • Data Transferred: Email, authentication tokens, device IDs
  • Data Processing Agreement: Auth0 has executed Standard Contractual Clauses
  • Adequacy: Auth0 is SOC 2 Type II certified and Privacy Shield participant

Because Golden Retriever uses Google Cloud and Stripe, your personal data is transferred to the United States, which does not have a European Commission adequacy decision.

We rely on the following lawful mechanisms to enable these transfers:

  • Standard Contractual Clauses (SCCs): Google Cloud has executed SCCs per GDPR Article 46(2)(c) and UK GDPR Schedule 2, Part 2
  • European Commission Adequacy Decision: Decision (EU) 2023/1250 addresses supplementary measures for EU→US transfers via SCCs
  • Data Residency Options: Google Vertex AI supports eu-central1 (Frankfurt); you may request we route your embedding requests through EU infrastructure
  • Standard Contractual Clauses (SCCs): Stripe has executed SCCs for international payments processing
  • Privacy Shield: Stripe is Privacy Shield certified (supplemented by SCCs for added assurance)
  • UK International Data Transfer Agreement (IDTA): UK GDPR Schedule 2, Part 2 provides a lawful basis for transfers to adequate countries or via SCCs
  • ICO Guidance: The UK Information Commissioner’s Office recognizes SCCs as appropriate for UK→US transfers, subject to supplementary safeguards

We implement the following safeguards to minimize risks of unauthorized government access:

  1. Data Minimization: Only the minimum necessary data is transferred (file chunks, not entire files; queries, not conversation history)
  2. Encryption in Transit: All data transmitted to Google Cloud and Stripe is encrypted via TLS 1.2+
  3. Transient Processing: Google Vertex AI does not store file content or search queries after processing
  4. Local Processing: Embedding vectors are stored locally in Qdrant on your device, not in the cloud
  5. Audit Trails: You can review what data was sent via local audit logs
  6. Right to Object: You may opt out of cloud processing (see Section 11)

2.7.3 Exercising Your Rights in International Transfers

Section titled “2.7.3 Exercising Your Rights in International Transfers”

If you have concerns about US government access to your data, you may:

  • Request data processing within EU infrastructure (Google Vertex AI eu-central1 option)
  • Disable cloud-based embedding and Q&A features
  • Request deletion of all files and account data
  • Contact our Privacy Team (Section 2.15)

Golden Retriever uses machine learning and artificial intelligence in limited ways. We do not use automated decision-making for decisions that produce legal or similarly significant effects (as per GDPR Article 22).

  • Embedding Vector Generation: AI generates vector representations of your file content to enable semantic search. This is a processing mechanism, not a decision-making algorithm.
  • Search Ranking: Gemini Embedding 2 ranks search results by semantic similarity. You review and select results yourself.
  • Q&A Content Generation: Gemini 2.5 Flash generates responses to your questions. Responses are informational and non-binding; you make final decisions.

We do not use automated decision-making to:

  • Approve or deny subscription requests
  • Flag accounts for fraud or abuse (these are reviewed by humans)
  • Restrict or suspend accounts
  • Make eligibility determinations

All automated ranking and suggestions are reviewed by you (the user) before any action is taken.


2.9.1 Desktop App (Golden Retriever macOS App)

Section titled “2.9.1 Desktop App (Golden Retriever macOS App)”

Golden Retriever is a native macOS desktop application and does not use cookies, web beacons, pixels, or other persistent tracking technologies on your device.

We do not:

  • Store cookies in your browser
  • Use local storage to track behavior
  • Embed trackers or analytics SDKs
  • Use device fingerprinting

If we launch a web-based dashboard (e.g., manage subscriptions online), we will update this policy to disclose:

  • Essential cookies (session management, CSRF protection)
  • Analytics cookies (if used)
  • Your ability to opt out
  • Cookie retention periods

Any cookies on a web dashboard will respect your browser’s “Do Not Track” signal.


Golden Retriever is not directed to or intended for children under 16 years of age. We do not knowingly collect personal data from children under 16.

If you are a parent or guardian and believe a child under 16 has provided personal data, please contact us immediately at hq@goldenretriever.ai so we can delete the data.

Under GDPR Article 8 and UK GDPR, processing children’s data (ages 13–15 in some jurisdictions) requires parental consent; we do not knowingly process such data without verification.


2.11. Your Privacy Rights and How to Exercise Them

Section titled “2.11. Your Privacy Rights and How to Exercise Them”

2.11.1 Rights Under GDPR (EU/EEA Residents)

Section titled “2.11.1 Rights Under GDPR (EU/EEA Residents)”

You have the following rights under GDPR Articles 15–22:

RightWhat It MeansHow to Exercise
Right of Access (Art. 15)Obtain a copy of your personal data and how it is processedEmail us or use in-app Settings → Privacy → Download My Data
Right of Rectification (Art. 16)Correct inaccurate or incomplete dataEmail us; we will update your account or provide a form
Right of Erasure (Art. 17)Delete your data under certain conditions (e.g., no longer necessary, consent withdrawn)Use in-app Settings → Privacy → Delete All Data, or email us
Right to Restrict Processing (Art. 18)Request we limit how we use your data (e.g., for a legal claim)Email us with specific request
Right to Data Portability (Art. 20)Receive your data in a structured, portable formatUse in-app Settings → Privacy → Export Data, or email us
Right to Object (Art. 21)Object to processing based on legitimate interest; opt out of marketingEmail us; we will stop non-essential processing
Right to Withdraw Consent (Art. 7)Withdraw consent to cloud processing (Google Vertex AI, GCS) at any timeUse in-app Settings → Privacy → Manage Consent, or email us
Right to Not Be Subject to Automated Decision-Making (Art. 22)Request human review instead of automated ranking/suggestionsEmail us; we will manually review your queries

How to Exercise GDPR Rights:

  1. In-App: Golden Retriever → Settings → Privacy → [Your Right]
  2. Email: Send a detailed request to privacy@goldenretriever.ai
  3. Response Time: We will respond within 30 calendar days (extendable by 60 days for complex requests)
  4. Verification: We will verify your identity before processing your request
  5. No Discrimination: We will not discriminate against you for exercising your rights

2.11.2 Rights Under UK GDPR (UK Residents)

Section titled “2.11.2 Rights Under UK GDPR (UK Residents)”

You have the same rights as GDPR (Section 11.1) under UK GDPR Articles 15–22, plus:

  • Right to Lodge a Complaint: Contact the Information Commissioner’s Office (ICO)
    • Website: https://ico.org.uk/
    • Email: casework@ico.org.uk
    • Phone: +44 (0) 303 123 1113
    • Address: Information Commissioner’s Office, Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF, United Kingdom

2.11.3 Rights Under CCPA/CPRA (California Residents)

Section titled “2.11.3 Rights Under CCPA/CPRA (California Residents)”

You have the following rights under the California Consumer Privacy Act (CCPA, Cal. Civ. Code §1798.100) and California Privacy Rights Act (CPRA, effective 1 January 2023):

RightWhat It MeansHow to Exercise
Right to Know (§1798.100)Know what personal data we collect, use, and shareEmail us or use in-app Settings → Privacy → Download My Data
Right to Delete (§1798.105)Request deletion of personal data (with exceptions)Use in-app Settings → Privacy → Delete All Data, or email us
Right to Opt-Out of Sale/Sharing (§1798.120)Opt out of selling or sharing personal data for cross-context behavioral advertisingEmail us; we confirm we do not sell data
Right to Correct (§1798.100(e))Correct inaccurate personal dataEmail us
Right to Limit Use (§1798.121)Limit use of sensitive personal dataEmail us; we confirm we do not use sensitive data except as required for service
Right to Non-Discrimination (§1798.125)Not be discriminated against for exercising CCPA rightsConfirmed; we will not deny service or charge different prices

How to Exercise CCPA Rights:

  1. Authorized Agent: You may authorize another person to submit requests on your behalf (requires power of attorney)
  2. Email: Send request to hq@goldenretriever.ai
  3. Response Time: We will respond within 45 calendar days
  4. Verification: We will verify your identity using email and account information
  5. Confirmation: We will confirm deletion within 45 days (some data may be retained per legal obligations)

California Consumer Right to Know:

  • Sale of Personal Information: We do NOT sell personal data as defined by CCPA
  • Sharing for Behavioral Advertising: We do NOT share personal data for cross-context behavioral advertising
  • Sensitive Personal Data: We do not intentionally collect sensitive personal data (SSN, financial account info, biometrics) except for payment processing via Stripe

Golden Retriever complies with emerging state privacy laws (Colorado CPA, Connecticut CTDPA, Utah UCPA, Virginia VCDPA, etc.). You may have additional rights:

  • Right to Know
  • Right to Delete
  • Right to Opt-Out
  • Right to Correct
  • Right to Appeal

Contact us to exercise any of these rights.


If we deny your request:

  1. We will provide a written explanation within the response deadline
  2. You may appeal within 45 days of our denial
  3. We will review the appeal and respond within 45 days
  4. For GDPR/UK GDPR: You may lodge a complaint with your local Data Protection Authority (see Section 11.2)

If we discover a data breach affecting your personal data, we will:

  1. Notify You: We will notify you without undue delay and no later than 72 hours after discovering the breach
  2. Notify Authorities: We will notify the relevant Data Protection Authority (DPA) within 72 hours (if required by law)
  3. Provide Details: Our notification will include:
    • Description of the breach
    • Types and approximate number of affected records
    • Likely consequences
    • Measures we took to mitigate harm
    • Our contact information and DPO contact

We may delay notification or omit details if:

  • Measures were taken to render data unintelligible (e.g., encryption, hashing)
  • We subsequently secured the data
  • Breach poses low risk to your rights and freedoms

While your account is active, we retain:

  • Account data: Email, subscription tier, billing information
  • Files and vectors: Your indexed files and embedding vectors (until you delete them)
  • Usage metrics: Aggregated, anonymized analytics (2 years)
  • Audit logs: Local logs on your device (until you delete them)

When you delete your account (Settings → Account → Delete Account), we will:

  1. Immediately delete:

    • Email and account credentials
    • Subscription and billing data
    • Firestore account record
  2. Within 30 days delete:

    • Local Qdrant instance (vectors)
    • Audit logs from your device
    • Any files still in Google Cloud Storage
  3. Retain (as legally required):

    • Anonymized usage metrics (2 years, for analytics)
    • Payment records (Stripe, per tax law: typically 7 years)
    • Aggregate/anonymized logs for abuse detection

You may request immediate deletion via GDPR Article 17 / CCPA §1798.105:


We may update this Privacy Policy to reflect:

  • Changes in our processing practices
  • New legal requirements (GDPR, CCPA, emerging state laws)
  • Feedback from users
  • Technical improvements
  1. In-App Notification: Golden Retriever will display a banner when you next launch the App after a significant change
  2. Email: For material changes, we will email you at the address on file
  3. Website: The latest version will be posted to https://goldenretriever.ai/legal

By continuing to use Golden Retriever after an update, you accept the new Privacy Policy. If you do not agree, you may delete your account and stop using the App.

VersionLast UpdatedKey Changes
1.0March 20, 2026Initial Privacy Policy

2.15. Contact Information and Privacy Team

Section titled “2.15. Contact Information and Privacy Team”

If you have questions about this Privacy Policy, your data, or how we process it:

General Contact:

Privacy Contact:

  • Email: privacy@goldenretriever.ai
  • Title: Privacy Team
  • Availability: Monday–Friday, 9 AM–5 PM GMT
  • Response Time: We aim to respond within 5 business days

If you believe your privacy rights have been violated, you may lodge a complaint with your local Data Protection Authority:

European Union / EEA:

United Kingdom:

United States (California):


This Privacy Policy should be read alongside:

  1. Terms of Service: #3-terms-of-service

    • Covers subscription terms, acceptable use, limitation of liability
  2. Data Processing Addendum (DPA): #4-data-processing-agreement-dpa

    • Detailed technical and organizational security measures
    • Sub-processor list
    • Data subject rights procedures
  3. Cookie Policy (if applicable): N/A (not applicable for desktop app)

    • Describes cookies and tracking on any future web dashboard
  4. Security Policy: N/A (not applicable for desktop app)

    • Encryption standards, vulnerability disclosure, incident response

JurisdictionKey RightsHow to Exercise
EU/EEA (GDPR)Access, Rectify, Erase, Restrict, Portability, Object, Withdraw ConsentIn-app Settings → Privacy or email DPO
UK (UK GDPR)Same as EU + ICO complaint rightIn-app Settings → Privacy or email DPO; lodge ICO complaint online
California (CCPA/CPRA)Know, Delete, Opt-Out of Sale, Correct, Limit Use, Non-DiscriminationIn-app Settings → Privacy or email; no discrimination
Other US StatesKnow, Delete, Opt-Out, Correct, AppealEmail or in-app; right to appeal within 45 days

By using Golden Retriever, you acknowledge that you have read and understood this Privacy Policy. If you do not agree with our privacy practices, please do not use the App.

For the latest version of this Privacy Policy, visit: https://goldenretriever.ai


  • Personal Data: Any information relating to an identified or identifiable natural person (GDPR Art. 4)
  • Processing: Any operation on personal data (collection, storage, use, deletion, etc.)
  • Data Controller: The entity that determines how and why personal data is processed (we are the controller; Google Cloud and Stripe are processors)
  • Data Subject: You, the user
  • Data Processor: A third party that processes data on our behalf (Google Cloud, Stripe, Qdrant)
  • Embedding Vector: A numerical representation of file content generated by machine learning; not human-readable
  • Consent: Your affirmative agreement to processing; you can withdraw at any time
  • Legitimate Interest: Our business interest in using your data (e.g., fraud detection, service improvement)
  • Adequacy Decision: An official determination that a non-EU country has adequate data protection

© 2026 Do Your Bit Ltd. All rights reserved.

This Privacy Policy is provided in English. If there is a conflict between the English version and any translation, the English version shall prevail.


Last Updated: April 11, 2026


By downloading, installing, or using Golden Retriever (the “App”), or by clicking “I Agree” or similar consent button on first run, you (“User,” “you,” or “your”) agree to be bound by these Terms of Service (“Terms”). If you do not agree to these Terms, do not use the App.

These Terms apply to all users, whether you are accessing the App under a Free, Power User, Business, or Enterprise subscription tier.


Golden Retriever is a macOS desktop application that provides the following functionality:

  • Local File Indexing: The App indexes your local files, including PDFs, documents, images, audio files, and video files stored on your macOS device.
  • Embedding Generation: The App generates embedding vectors from your indexed files using Google Vertex AI APIs, converting unstructured content into machine-readable representations.
  • Local Vector Storage: Embedding vectors are stored locally in a Qdrant instance running in Docker on your device.
  • Cloud Storage: Original files and associated metadata may be uploaded to Google Cloud Storage (GCS) as specified in our Privacy Policy.
  • AI-Powered Semantic Search & Q&A: The App provides semantic search and question-answering capabilities powered by Google Gemini 2.5 Flash, enabling you to query your indexed files using natural language.
  • Backend Infrastructure: Processing, authentication, and subscription management are handled by backend services running on Google Cloud Run and Firestore.

The App operates under a subscription model with four tiers: Free, Power User, Business, and Enterprise, each with different feature sets and usage limits as described in Section 4.


To use most features of the App beyond the basic Free tier, you must create an account by providing:

  • A valid email address
  • A secure password (minimum 12 characters, recommended strong password)
  • Optional: your name, company name, or other profile information

You agree to provide accurate, current, and complete information during registration and to update this information promptly if it changes.

You are responsible for:

  • Maintaining the confidentiality of your account credentials, including your password
  • All activities that occur under your account, whether authorized by you or not
  • Promptly notifying us of any unauthorized access or breach you discover

You agree not to:

  • Share your account credentials with anyone else
  • Use another person’s account without permission
  • Attempt to gain unauthorized access to the App or its infrastructure

If we have reason to believe your account has been compromised, we may suspend your account pending investigation and may require you to reset your password.

You grant us the right to verify your identity and billing information as necessary to prevent fraud and maintain compliance with applicable laws.


3.4. Subscription Tiers, Billing, and Payment

Section titled “3.4. Subscription Tiers, Billing, and Payment”

The App is offered under four subscription tiers:

  • Cost: No charge
  • Features: Basic local search and limited AI Q&A
  • Limitations: See Section 5
  • Billing Cycle: N/A
  • Cost: $9.99 per [month/year]
  • Features: Up to 100 GB of indexed data, advanced search features, priority support
  • Renewal: Automatically renews unless cancelled
  • Billing Cycle: Monthly or Annual (17% discount)
  • Cost: $19.00 per [month/year]
  • Features: Up to 500 GB per seat, team sharing, SQLCipher database encryption at rest, DPA available
  • Renewal: Automatically renews unless cancelled
  • Billing Cycle: Monthly or Annual (17% discount)
  • Support: Priority support included
  • Cost: Custom pricing (contact sales at hq@goldenretriever.ai)
  • Features: Unlimited data, Enterprise SSO (Auth0/Okta), custom configurations, dedicated support, SLA, EU data residency option
  • Renewal: Per negotiated contract
  • Billing Cycle: Per negotiated contract
  • Support: Dedicated support and SLA guaranteed (see Section 8)

All payments are processed through Stripe, a third-party payment processor. By providing payment information, you authorize us to charge your account according to your chosen subscription tier.

Payment Method:

  • We accept all major credit cards and other payment methods supported by Stripe
  • Your payment method must remain valid for the duration of your subscription

Billing Dates:

  • Billing occurs on the same date each month (or year, depending on your cycle)
  • If your billing date falls on a day that doesn’t exist in a month (e.g., the 31st), billing occurs on the last day of that month

Recurring Billing:

  • By subscribing to a paid tier, you authorize recurring charges on your payment method
  • We will attempt to charge your account at the beginning of each billing period
  • If a charge fails, we will retry using the payment method on file and may suspend your account if payment ultimately fails

Free Trial (if applicable):

  • No free trial is currently offered. The Free Tier provides perpetual limited access.

We may change subscription prices with at least 30 days’ written notice. Changes take effect at the start of your next billing cycle. If you do not agree to a price increase, you may cancel your subscription before the new price takes effect (see Section 4.5).

You are responsible for any applicable taxes, duties, or government fees on your purchases. We will add applicable taxes at checkout based on your billing address.

Free Tier: No cancellation needed; you may simply stop using the App.

Paid Tiers: You may cancel your subscription at any time through your account settings or by contacting us at hq@goldenretriever.ai. Cancellation takes effect at the end of your current billing period, and you will retain access to paid features through the end of that period.

No Refunds: Subscription fees are non-refundable except where required by law. If you cancel mid-cycle, you will not receive a pro-rata refund for unused time.

If a payment fails:

  1. We will attempt to contact you to resolve the payment issue
  2. We may retry the charge 3 times over 14 days
  3. If payment remains unpaid for 30 days, we may suspend your account

Suspended accounts may be reactivated upon payment of outstanding fees.


The Free Tier is provided “as available” and subject to the following limitations:

  • Query Limit: Standard queries per month
  • Storage Limit: 10 GB of indexed file storage
  • File Indexing: Up to 10 GB of files indexed
  • No Service Level Agreement: We do not guarantee uptime, availability, or support for Free Tier users
  • Feature Restrictions: No DPA, no team features, no SQLCipher encryption, no EU data residency option
  • Data Retention: Free accounts may be subject to automatic data deletion after 365 days of inactivity

Free Tier access may be terminated at any time without notice if you violate these Terms or if we discontinue the Free Tier offering.


You agree not to use the App to:

  • Violate any applicable law, regulation, or court order
  • Engage in fraud, forgery, or misrepresentation
  • Facilitate money laundering, sanctions evasion, or other financial crimes
  • Index, upload, or transmit any Child Sexual Abuse Material (CSAM) or content depicting the sexual exploitation of minors
  • Engage in any activity that sexualizes, grooms, or harms children
  • Violate any law protecting child safety, including 18 U.S.C. § 2252 and similar international laws
  • Upload, transmit, or distribute malware, viruses, worms, ransomware, or other malicious code
  • Conduct denial-of-service (DoS) attacks, distributed attacks, or unauthorized access attempts
  • Disrupt, interfere with, or attempt to circumvent security controls
  • Upload, index, or transmit content that infringes copyrights, trademarks, patents, or trade secrets
  • Violate the publicity, privacy, or personality rights of third parties
  • Distribute content obtained through unauthorized means (e.g., pirated software, stolen data)
  • Harass, threaten, defame, or incite violence against any person or group
  • Transmit content that promotes hate, discrimination, or violence based on protected characteristics
  • Engage in cyberstalking or targeted harassment
  • Reverse-engineer, decompile, or attempt to derive the source code of the App
  • Use the App for high-volume automated queries designed to overload our infrastructure
  • Sell, resell, lease, or transfer access to the App without authorization
  • Use the App to develop competing products or services
  • Upload personal data of third parties without consent (except as authorized by applicable privacy laws)
  • Use the App to dox, identify, or locate individuals without consent
  • Collect or aggregate personal data in violation of GDPR, CCPA, or similar regulations
  • Use the App to distribute spam, phishing emails, or fraudulent communications
  • Impersonate another person or entity
  • Engage in deceptive or misleading practices

We may investigate violations of this Acceptable Use Policy and may, in our sole discretion:

  • Suspend or terminate your account
  • Delete or restrict access to your indexed content
  • Report illegal activity to law enforcement
  • Pursue legal action

Ownership: You retain all intellectual property rights to the files, documents, and other content you index, upload, or process through the App (“Your Content”). We claim no ownership interest in Your Content.

License to Us: By using the App, you grant us a worldwide, non-exclusive, royalty-free license to:

  • Process and analyze Your Content to provide the App’s services
  • Store Your Content in accordance with our Privacy Policy
  • Use aggregated, anonymized insights derived from Your Content to improve the App (provided such use does not disclose Your Content to third parties)
  • Comply with legal obligations, including law enforcement requests

Your Responsibility: You represent and warrant that:

  • You own or have permission to index and process all Your Content
  • Your Content does not infringe third-party intellectual property rights
  • Your Content complies with all applicable laws and these Terms

Ownership: Golden Retriever, including all software, code, design, documentation, branding, and features, is owned by Do Your Bit Ltd (“Company”) and is protected by copyright, trademark, and other intellectual property laws.

Permitted Uses: We grant you a limited, non-exclusive, non-transferable, revocable license to:

  • Download and install the App on your personal macOS device
  • Use the App in accordance with these Terms and for lawful purposes only
  • Access and use features according to your subscription tier

Restrictions: You may not:

  • Copy, modify, or create derivative works of the App
  • Reverse-engineer, decompile, or disassemble the App
  • Rent, lease, or sublicense the App
  • Transfer the App to another device without authorization
  • Use the App to develop competing products

The App uses third-party services and libraries, including:

  • Google Vertex AI: For embedding generation (governed by Google Cloud Terms of Service)
  • Google Gemini 2.5 Flash: For AI-powered Q&A (governed by Google Cloud Terms of Service)
  • Qdrant: For local vector storage (open-source, license: Apache 2.0 (https://github.com/qdrant/qdrant/blob/master/LICENSE))
  • Google Cloud Storage & Cloud Run: For backend infrastructure (governed by Google Cloud Terms of Service)
  • Stripe: For payment processing (governed by Stripe’s Terms of Service)
  • Firestore: For data storage (governed by Google Cloud Terms of Service)

Use of these third-party services is subject to their respective terms and privacy policies. We are not responsible for any claims arising from third-party services.


3.8.1 No Guarantee for Free and Standard Tiers

Section titled “3.8.1 No Guarantee for Free and Standard Tiers”

The App is provided on an “as available” basis for Free, Power User, and Business tiers. We do not guarantee:

  • Continuous availability or uptime
  • Absence of service interruptions or errors
  • Specific performance or response times

Maintenance windows may occur without advance notice.

3.8.2 Service Level Agreement (Enterprise Tier Only)

Section titled “3.8.2 Service Level Agreement (Enterprise Tier Only)”

For Enterprise Tier subscribers, we provide:

Uptime Guarantee: 99.9% monthly uptime for backend services (Cloud Run and Firestore).

SLA Exclusions: Uptime guarantees exclude:

  • Scheduled maintenance (with 48 hours’ notice)
  • Issues caused by your network, device, or software
  • Force majeure events (natural disasters, pandemics, etc.)
  • DDoS attacks and other malicious third-party interference

Credits: If we fail to meet the uptime guarantee:

  • 10% of monthly fees for each 0.1% below the target
  • Maximum credit: 30% of monthly fees
  • Credits are your sole remedy for SLA breaches

SLA Request: To claim an SLA credit, contact hq@goldenretriever.ai within 30 days of the outage.

Except for Enterprise SLA credits, we are not liable for:

  • Service interruptions, downtime, or data loss
  • Business losses or costs incurred due to unavailability
  • Loss of access to Your Content

The App processes Your Content “as is” without modification unless you request specific transformations. While we employ industry-standard security and processing practices, we:

  • Do not guarantee the accuracy or reliability of embedding generation
  • Do not guarantee the accuracy of AI-generated answers from Gemini 2.5 Flash
  • May not detect all errors, inaccuracies, or harmful content in Your Content
  • Are not responsible for decisions or actions taken based on App output

TO THE MAXIMUM EXTENT PERMITTED BY LAW, IN NO EVENT SHALL Do Your Bit Ltd BE LIABLE FOR:

Indirect Damages:

  • Loss of profits, revenue, or business opportunity
  • Loss of use, data, or goodwill
  • Business interruption
  • Reputational harm
  • Consequential, incidental, special, or punitive damages

Direct Damages Cap:

  • Except where prohibited by law, our total liability for direct damages arising from these Terms or the App shall not exceed the total amount you paid us in the 12 months preceding the claim
  • For Free Tier users (who pay nothing), our liability is limited to $0

This limitation does not apply to:

  • Death or personal injury caused by our gross negligence or willful misconduct
  • Liability that cannot be waived under applicable law
  • Indemnification obligations under Section 10

THE APP IS PROVIDED “AS IS” AND “AS AVAILABLE” WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING:

  • Fitness for a Particular Purpose: The App may not meet your specific needs
  • Merchantability: The App may not be suitable for commercial use
  • Non-Infringement: The App may infringe third-party intellectual property rights
  • Accuracy: Search results, embeddings, and AI answers may be incorrect or incomplete
  • Uninterrupted Service: The App may experience downtime, errors, or data loss
  • Security: Despite our efforts, Your Content may be accessed by unauthorized parties

We make no warranty regarding third-party services (Google Vertex AI, Gemini 2.5 Flash, Qdrant, Google Cloud Storage, Stripe, etc.) or their reliability.

We are not responsible for:

  • Content you index or upload
  • Accuracy or legality of Your Content
  • Infringement caused by Your Content
  • Third-party claims arising from Your Content

You agree to indemnify, defend, and hold harmless Do Your Bit Ltd and its officers, directors, employees, agents, and successors from any claims, damages, liabilities, costs, or expenses (including reasonable attorneys’ fees) arising from:

  • Your use of the App in violation of these Terms
  • Your Content, including claims that Your Content infringes third-party rights
  • Your breach of any representation or warranty in these Terms
  • Your violation of applicable law
  • Your violation of third-party rights
  • Claims by third parties arising from your actions using the App

This obligation applies whether or not we have been advised of the possibility of such claims.


Free Tier: Simply stop using the App. Your account may be deleted after 365 days of inactivity.

Paid Tiers: See Section 4.5 (Cancellation).

We may terminate or suspend your account immediately, without notice, if:

  • You breach these Terms, our Acceptable Use Policy, or our Privacy Policy
  • Your account is used for illegal activities or activities that harm others
  • Your account poses a security risk to our infrastructure or other users
  • You engage in harassment, threats, or abusive behavior
  • We are required to do so by law

We may also terminate your account with 30 days’ notice if:

  • We discontinue the App or your subscription tier
  • You have not logged in for 365 days
  • Payment processing fails and is unresolved for 30 days

3.12.3 Your Right to Challenge Termination

Section titled “3.12.3 Your Right to Challenge Termination”

If we terminate your account, we will provide notice and reason, except where legally prohibited. You may appeal the termination within 30 days by contacting hq@goldenretriever.ai.


Upon termination:

  • Your access to the App ceases immediately
  • We will delete or deactivate your account credentials
  • Your subscription will be cancelled, and no further charges will occur

Timing: We will delete Your Content, indexed files, embeddings, and associated metadata according to our Privacy Policy schedule:

  • Within 30 days of account deletion, as described in Section 2 (Privacy Policy)

Exceptions:

  • Backups may persist for 90 days after deletion
  • We may retain aggregate, anonymized data for analytics and legal compliance
  • We may retain Your Content if required by law or legal process

Permanent Deletion: Deletion is permanent and irrevocable. We recommend you download and backup Your Content before cancellation.

If you owe fees at the time of termination, you remain liable for:

  • All accrued and unpaid charges
  • Any costs incurred in collecting overdue payments
  • Interest at the rate of 4% per annum

These Terms shall be governed by and construed in accordance with the laws of England and Wales, without regard to its conflict of law principles.

You agree that any legal proceeding arising from these Terms or your use of the App shall be brought exclusively in the state or federal courts of England and Wales, and you hereby consent to the jurisdiction of such courts.

3.14.3 Restrictions for International Users

Section titled “3.14.3 Restrictions for International Users”

If you access the App from outside England and Wales, you are responsible for complying with all local laws and regulations. We may restrict access to the App from jurisdictions where it is illegal or prohibited.


Before initiating formal proceedings, you agree to attempt to resolve disputes informally by contacting us at hq@goldenretriever.ai. We will work with you in good faith to resolve the matter within 30 days.

Not applicable. Disputes shall be resolved in the courts of England and Wales.

If arbitration applies:

  • Disputes shall be resolved by binding arbitration under the Civil Procedure Rules of England and Wales
  • The arbitrator shall be a single neutral arbitrator selected via mutual agreement
  • Arbitration shall occur in London, England
  • Costs are split according to the court’s determination
  • Class Action Waiver: You agree not to pursue claims on a class or collective basis

Notwithstanding the above, you or we may pursue injunctive relief in court to prevent irreparable harm (e.g., breach of confidentiality, infringement of intellectual property).


If any provision of these Terms is found to be invalid, unenforceable, or illegal by a court of competent jurisdiction, that provision shall be modified to the minimum extent necessary to make it enforceable, or if not possible, severed from these Terms.

The remaining provisions shall remain in full force and effect. However, if a severance materially alters the bargain between you and us, either party may terminate these Terms.


These Terms, together with our Privacy Policy (located at #2-privacy-policy) and Data Processing Agreement (located at #4-data-processing-agreement-dpa), constitute the entire agreement between you and Do Your Bit Ltd regarding the App and supersede all prior negotiations, discussions, and agreements, whether written or oral.

If there is any conflict between these Terms and the Privacy Policy or DPA, the Privacy Policy and DPA shall apply to data handling and privacy matters.

No employee, representative, or agent is authorized to modify these Terms or make any binding statement contrary to these Terms.


We may modify these Terms at any time. We will provide notice of material changes:

  • By email to the address associated with your account, or
  • By posting a notice in the App, or
  • By updating the “Last Updated” date at the top of these Terms

Material changes take effect 30 days after notice. Your continued use of the App following the effective date constitutes acceptance of the modified Terms.

If you do not agree with modifications, you may cancel your subscription before the effective date (for paid tiers) or stop using the App (for Free tier).


For questions, complaints, or notices regarding these Terms, contact us at:

Do Your Bit Ltd Address: Suite 2A, 7th Floor PF, City Reach, 5 Greenwich View Place, London E14 9NN, United Kingdom Email: hq@goldenretriever.ai Phone: N/A (email support only) Website: https://goldenretriever.ai

Privacy Contact: Email: privacy@goldenretriever.ai

Dispute Resolution: hq@goldenretriever.ai


If you are located in the European Union or the European Economic Area, your use of the App is subject to the EU General Data Protection Regulation (GDPR). Please review our Privacy Policy and Data Processing Agreement for details on:

  • How we collect, process, and protect personal data
  • Your rights as a data subject (access, rectification, erasure, portability, etc.)
  • Data transfer mechanisms and safeguards
  • Lawful bases for processing

If you are a California resident, your use of the App is subject to the California Consumer Privacy Act (CCPA). Please review our Privacy Policy for details on:

  • Information we collect and how it is used
  • Your rights as a California consumer (access, deletion, opt-out, etc.)
  • Our privacy practices and data retention policies

For Business and Enterprise tier subscribers, a Data Processing Agreement (DPA) is available at #4-data-processing-agreement-dpa. The DPA incorporates Standard Contractual Clauses for international data transfers and details our obligations as a data processor.


BY DOWNLOADING, INSTALLING, OR USING GOLDEN RETRIEVER, YOU ACKNOWLEDGE THAT:

  1. You have read and understand these Terms of Service
  2. You agree to be bound by these Terms
  3. You have reviewed the Privacy Policy at #2-privacy-policy
  4. You are at least 18 years old (or the age of majority in your jurisdiction)
  5. You have the authority to enter into these Terms
  6. You understand the limitations of liability and disclaimers of warranty
  7. You will not use the App for illegal or prohibited purposes
  8. You accept that AI-generated answers may be inaccurate and should be verified

End of Terms of Service

Last Updated: April 11, 2026 Version: 1.0


ItemValue
Document TitleTerms of Service for Golden Retriever
AudienceAll Users (Free, Power User, Business, Enterprise)
Effective DateApril 11, 2026
Jurisdiction(s)England and Wales
Related DocumentsPrivacy Policy, Data Processing Agreement, Acceptable Use Policy
Review FrequencyAnnually or upon significant service changes

Golden Retriever - macOS Desktop Application for Intelligent File Indexing and Semantic Search


This Data Processing Agreement (“Agreement”) is entered into between:

CONTROLLER: The entity or individual subscribing to the Service (“Controller” or “you”)

PROCESSOR: Do Your Bit Ltd (“Processor” or “we”) Registration Number: 813003 Address: Suite 2A, 7th Floor PF, City Reach, 5 Greenwich View Place, London E14 9NN, United Kingdom Privacy Contact: privacy@goldenretriever.ai Governing Law: England and Wales

This Agreement is concluded pursuant to:

  • GDPR Article 28 (Processor obligations)
  • Data protection legislation in the controller’s jurisdiction
  • The Terms of Service between the parties
  • This Section 4 of the Consolidated Legal Agreement

Effective Date: April 11, 2026 Last Updated: April 11, 2026


This Agreement applies to the processing of personal data by the Processor on behalf of the Controller when the Controller uses Golden Retriever (“Service”) under Business and Enterprise subscription tiers.

Personal data processed includes but is not limited to:

  • Document content indexed by the Service
  • File metadata (names, timestamps, sizes)
  • Account registration and authentication data
  • Usage analytics and interaction logs
  • Billing and payment information
  • Employee/contractor contact details (Enterprise SSO)

Golden Retriever is a macOS desktop application that enables controllers to:

  • Index local files on user machines
  • Generate semantic embeddings via Google Vertex AI
  • Store vector representations in Qdrant
  • Perform semantic search and AI-powered question-answering
  • Manage user accounts and billing
  • Maintain audit logs and compliance records

The Processor processes data solely on documented instructions from the Controller. The legal basis for such processing remains the Controller’s responsibility under GDPR Article 6.


Processing shall occur for the duration of the Service subscription agreement between the parties, plus any applicable data retention periods outlined in Section 2.2.

Data CategoryRetention PeriodJustification
Active indexed files & embeddingsDuration of subscriptionRequired for Service functionality
User account dataDuration of subscriptionRequired for Service access and billing
Usage metrics & analytics24 monthsLegitimate business and security purposes
Audit logs (local)24 monthsCompliance and forensic purposes
Payment records7 yearsTax/legal compliance (varies by jurisdiction)
Support communication12 monthsCustomer service purposes
Breach notification logs7 yearsLegal hold and regulatory compliance

Upon termination or expiration of the subscription:

  • The Processor shall immediately cease processing
  • The Controller retains the right to request return or secure deletion of all personal data within 30 days (see Section 6.4)
  • After deletion, the Processor certifies in writing that all personal data has been securely removed

The Processor processes personal data for the following purposes:

  • Purpose: Enable full-text and semantic search across user documents
  • Data processed: Document content, file metadata, extracted text chunks
  • Frequency: Real-time as user uploads/modifies files
  • Justification: Core Service functionality
  • Purpose: Convert document text into vector representations for semantic understanding
  • Data processed: Text chunks (transient), extracted semantic features
  • Method: Google Vertex AI API (see Section 8)
  • Storage: Vectors stored locally in Qdrant; text not retained in embedding pipeline
  • Justification: Enables AI-powered search and Q&A
  • Purpose: Answer natural language queries using indexed documents
  • Data processed: Query text, search results, conversation context
  • Method: Gemini 2.5 Flash API via Google Cloud
  • Frequency: On-demand, user-initiated
  • Justification: Primary Service feature
  • Purpose: Authenticate users, manage subscriptions, enforce access controls
  • Data processed: Email, password hash, SSO identity, account settings
  • Storage: Cloud Run backend + Firestore database
  • Frequency: Continuous during active sessions
  • Justification: Service delivery and security
  • Purpose: Charge subscription fees, manage invoicing, tax compliance
  • Data processed: Name, email, billing address, payment method details
  • Method: Stripe payment processor (see Section 8)
  • Frequency: Monthly/annually per subscription cycle
  • Justification: Business operations and legal compliance
  • Purpose: Understand Service usage, detect anomalies, improve performance
  • Data processed: Query logs, feature usage, API call counts, error events
  • Storage: Backend analytics database (retained 24 months)
  • Frequency: Continuous during active use
  • Justification: Service improvement and security monitoring
  • Purpose: Maintain compliance records and forensic evidence
  • Data processed: User actions, API calls, file operations, access attempts
  • Storage: Local SQLite database on user’s Mac (Business/Enterprise tier)
  • Frequency: All significant events logged automatically
  • Justification: Regulatory compliance and incident investigation
  • Purpose: Enable centralized identity management for Enterprise customers
  • Data processed: User identity, SSO tokens, group memberships
  • Method: Auth0 integration with customer’s identity provider
  • Frequency: Authentication events only
  • Justification: Enterprise security requirement

The Processor processes the following categories of personal data on the Controller’s behalf:

CategoryExamplesSensitivityProcessor Storage
Identification DataEmail address, user ID, display nameMediumCloud Run / Firestore
Authentication DataPassword hash, SSO tokens, MFA codesHighCloud Run (encrypted)
Document ContentFile text, email excerpts, code snippetsVariesGCS (encrypted), Qdrant (vectors)
File MetadataFilenames, paths, timestamps, file sizeLow-MediumGCS, Firestore
Usage DataQueries, search frequency, feature usageLowBackend analytics (24mo)
Billing DataName, address, payment card last-4HighStripe (PCI-DSS compliant)
Contact DataBusiness email, phone (Enterprise SSO)MediumCloud Run / Firestore / Auth0
Audit LogsUser actions, API calls, access recordsMediumLocal SQLite (user’s Mac)
Derived DataEmbeddings, semantic features, inferencesMediumQdrant (local or cloud)
Communication DataSupport emails, support chat transcriptsLow-MediumSupport platform (12mo)

The Processor does not intentionally process special categories of data (GDPR Article 9: race, ethnicity, political opinion, religion, union membership, genetics, biometrics, health, sex life data).

However: If special category data appears incidentally within user documents (e.g., a health-related file uploaded by mistake), the Processor applies the same technical and organizational controls as general data, and the Controller remains solely responsible for lawful processing of such data.


The Processor processes personal data of the following data subjects on behalf of the Controller:

  • Definition: Employees or contractors of the Controller who use Golden Retriever
  • Data: Account details, usage patterns, documents they upload
  • Scale: Typically hundreds to thousands per Enterprise customer
  • Definition: Employees/contractors whose documents are indexed, even if they don’t directly use the Service
  • Data: Document content, file metadata, inferred insights
  • Scale: Potentially larger than direct users
  • Note: Controller is responsible for informing these individuals about processing
  • Definition: Contacts linked to the Controller’s identity provider
  • Data: Email addresses, organizational roles, department information
  • Scale: Enterprise-dependent
  • Note: Auth0 may process via SCCS (see Section 10)
  • Definition: Individuals authorized to receive invoices or manage billing
  • Data: Name, email, billing address
  • Scale: Typically 1-3 per customer

The Processor shall process personal data only on documented written instructions from the Controller, including:

  • Service configuration and usage parameters
  • Data retention policies set within the application
  • Request for data export or deletion
  • Requests to enable/disable sub-processors

Ad hoc instructions: The Controller may provide verbal or email instructions, which the Processor shall confirm in writing before execution.

  • All Processor employees and contractors with access to personal data are bound by confidentiality agreements
  • Confidentiality obligations survive termination of employment
  • The Processor trains staff on data protection principles annually
  • Access to personal data is restricted to personnel with a legitimate need-to-know
  • Categories of personnel with access:
    • Engineering: Incident response, bug fixes, security audits
    • Customer Success: Support tickets (with Controller permission)
    • Security: Intrusion detection, forensic investigation
    • Finance: Billing and revenue verification
  • All access is logged and audited quarterly
4.6.2.3 No Sub-Processing Without Authorization
Section titled “4.6.2.3 No Sub-Processing Without Authorization”
  • The Processor shall not engage sub-processors without prior written authorization from the Controller
  • The Processor shall provide notice of new sub-processors at least 30 days in advance (see Section 9)
  • The Controller has the right to object to sub-processors on reasonable grounds

The Processor shall implement and maintain technical and organizational measures (TOMs) as detailed in Section 11. These measures provide a level of security appropriate to the sensitivity of the personal data, as specified in the Controller’s subscription tier.

Within 30 days of subscription termination, the Processor shall:

  1. Option A (Return): Return all personal data in a structured, commonly-used, machine-readable format (CSV, JSON, or equivalent)
  2. Option B (Deletion): Securely delete all personal data according to the destruction procedure in Section 6.4.2
  3. Provide certification: Issue a written attestation that return/deletion is complete and certified by the Processor’s authorized representative
  • All personal data shall be deleted using cryptographic erasure, overwriting (DoD 5220.22-M standard for sensitive data), or physical destruction of storage media
  • Deleted data shall be unrecoverable
  • Backups containing personal data shall be deleted within 90 days of deletion request or subscription termination (unless legal hold applies)
  • The Processor shall document deletion with timestamp, method, and confirmation

The following may be retained after deletion requests, as necessary:

  • Legal holds: Data subject to litigation or regulatory investigation
  • Tax records: Payment/invoice data (7 years, per GDPR Article 17(3)(e))
  • Security logs: Anonymized audit logs for infrastructure integrity (retained 24 months)

In the event of a confirmed or reasonably suspected breach of personal data (GDPR Article 33), the Processor shall notify the Controller without undue delay, and no later than 72 hours after becoming aware of the breach.

Notification shall include:

  • Factual description: What data was affected, how many data subjects, what happened
  • Likely consequences: Risk to rights and freedoms of affected individuals
  • Measures taken: Immediate actions to contain and investigate
  • Timeline: When breach was discovered, when it occurred (if known)
  • Contact details: Processor representative for ongoing communication
  • Recommendation: Actions the Controller should take (notification to DPA, notification to data subjects)
  • The Processor shall investigate the breach and provide a full forensic report within 14 days
  • The Processor shall cooperate with the Controller’s incident response
  • The Processor shall preserve evidence and provide access to logs/systems for audit
  • The Processor shall not make public statements without Controller consent
  • The Controller remains responsible for notifying the supervising data protection authority if required under GDPR Article 33
  • The Processor shall provide all necessary information to enable this notification
  • If the breach poses high risk to data subjects, the Controller may be required to notify affected individuals directly

The Controller may audit the Processor’s compliance with this Agreement:

  • Annual audit: Right to conduct one comprehensive audit per calendar year
  • Reasonable notice: At least 14 days’ written notice (except in response to a suspected breach)
  • Scope: Security measures, sub-processor compliance, data handling procedures
  • Access: The Processor shall provide documentation, system access, and staff interviews as necessary
  • Costs: The Controller bears costs of audits; the Processor bears costs of remediation
  • The Controller may engage a qualified independent auditor (accountant, ISO 27001 auditor, law firm)
  • The auditor shall sign a confidentiality agreement with the Processor
  • The Processor may require advance review of audit scope to protect trade secrets and security (white-hat review only)

The Processor shall maintain and provide evidence of:

  • ISO 27001 certification (if obtained)
  • SOC 2 Type II audit (if obtained)
  • Penetration testing results (annual, summary provided)
  • Vulnerability assessments (quarterly, summary provided)
  • Code review logs for security-critical changes

The Processor shall cooperate with any investigation by the Controller’s national data protection authority (“DPA”):

  • Respond to DPA requests within the timeframe specified (typically 10-20 days)
  • Provide documentation, system access, and statements as required
  • Not charge additional fees for DPA cooperation

Upon the Controller’s documented request, the Processor shall:

  • Correct inaccurate personal data
  • Complete incomplete personal data
  • Execute changes within 10 business days (or sooner if practicable)

Upon the Controller’s documented request, the Processor shall:

  • Erase personal data where the legal basis no longer applies
  • Erase data not necessary for the original purpose
  • Execute deletion within 10 business days (see Section 6.4.2 for deletion procedure)
  • Exception: Data retained under legal hold or as required by law
4.6.7.3 Restriction of Processing (GDPR Article 18)
Section titled “4.6.7.3 Restriction of Processing (GDPR Article 18)”

Upon the Controller’s documented request, the Processor shall:

  • Stop active processing of specified personal data
  • Maintain data in restricted storage
  • Resume processing only upon Controller instruction
  • Duration: As specified by Controller (typically pending dispute resolution)
4.6.7.4 Data Portability (GDPR Article 20)
Section titled “4.6.7.4 Data Portability (GDPR Article 20)”

Upon the Controller’s documented request, the Processor shall:

  • Provide all personal data in a structured, commonly-used, machine-readable format (CSV, JSON)
  • Transmit data directly to another processor if technically feasible
  • Execute within 30 days
  • Cost: No charge if request is reasonable; reasonable fee may apply if requests are manifestly unfounded or excessive
4.6.7.5 Objection to Processing (GDPR Article 21)
Section titled “4.6.7.5 Objection to Processing (GDPR Article 21)”

The Processor shall support the Controller’s implementation of data subject objections:

  • For direct marketing: Immediately cease processing
  • For other purposes: Evaluate objection with Controller; cease processing unless compelling legitimate interests apply

The Processor shall assist the Controller in meeting its own GDPR obligations:

4.6.8.1 Data Protection Impact Assessment (DPIA)
Section titled “4.6.8.1 Data Protection Impact Assessment (DPIA)”
  • Processor provides documentation on processing, security, and sub-processors
  • Processor assists in completing any DPIA the Controller must conduct
  • Processor documents any identified risks and mitigation measures
  • Processor implements Privacy by Design principles in data handling
  • Processor minimizes personal data collection and processing
  • Processor implements pseudonymization where feasible
  • Processor maintains records of processing activities per GDPR Article 5(2)
  • Processor provides summaries of processing, retention, and security upon request

The Controller shall be solely responsible for:

  • Determining the legal basis for processing personal data (consent, contract, legal obligation, vital interests, public task, legitimate interest)
  • Ensuring lawfulness: Compliance with applicable data protection laws before providing data to the Processor
  • Compliance with sector rules: Industry-specific regulations (HIPAA for health data, PCI-DSS for payment data, etc.)

The Controller shall:

  • Provide clear, transparent information to data subjects about the processing (per GDPR Articles 13-14)
  • Explain the role of the Processor (Golden Retriever) and the processing activities
  • Inform data subjects of their rights (access, rectification, erasure, portability, objection)
  • Publish and maintain an up-to-date Privacy Policy (linked in Section 14)

The Controller shall:

  • Respond to data subject requests for access, rectification, erasure, portability, and objection
  • Forward such requests to the Processor if the Processor holds the data
  • Provide the Processor reasonable assistance in responding (see Section 6.7)
  • Cooperate with the Processor in investigating complex requests

4.7.4 Data Security (Controller’s Responsibility)

Section titled “4.7.4 Data Security (Controller’s Responsibility)”

The Controller shall:

  • Ensure local Golden Retriever installation is configured securely per documentation
  • Maintain physical and network security of the Mac on which Golden Retriever runs
  • Apply OS security patches promptly
  • Prevent unauthorized access to the Golden Retriever application
  • Report suspected security incidents to the Processor promptly

The Controller warrants that:

  • All data uploaded to Golden Retriever is lawfully obtained
  • The Controller has the right to process such data (e.g., owns data or has obtained valid consent)
  • For documents containing data of third parties, the Controller has obtained necessary permissions/consent
  • The Controller will not upload data containing sensitive categories (health, biometric, etc.) unless explicitly authorized

The Controller shall:

  • Ensure it has the right to process third-party data included in documents
  • Obtain appropriate consent or legal basis for third-party data processing
  • Respond to third-party data subject requests
  • Indemnify the Processor against third-party claims related to unlawful uploads

4.7.7 Cooperation with Audits & Investigations

Section titled “4.7.7 Cooperation with Audits & Investigations”

The Controller shall:

  • Cooperate with the Processor during security incidents or data breaches
  • Provide information necessary for forensic investigation
  • Assist in meeting DPA or regulatory requests
  • Allow the Processor reasonable access for security testing and audits

The Processor engages the following sub-processors to provide the Service. The Controller authorizes processing by these sub-processors:

ServicePurposeData ProcessedJurisdictionSCCsNotes
Vertex AIEmbedding generationText chunks (transient)us-central1 (Iowa)YesDocuments sent for embedding only; not stored in GCP
Google Cloud Storage (GCS)File storageEncrypted document filesConfigurable by userYesUser’s responsibility to select region; default us-central1
Cloud RunBackend APIAccount data, usage logs, API requestsus-central1YesStateless service; data persisted in Firestore
FirestoreDatabaseAccount data, user settings, billing recordsus-central1YesNoSQL document store; encrypted at rest
Gemini 2.5 FlashAI question-answeringQuery text, search results, conversation contextRegional (us-central1)YesText is logged for abuse prevention; see privacy policy for retention

GCP Data Processing Agreement: Google’s DPA is available at: https://cloud.google.com/terms/cloud-privacy-notice

Data Transfers: GCP is certified under the EU-US Data Adequacy Decision (as of 10 July 2023). For other jurisdictions, Standard Contractual Clauses (SCCs) apply (see Section 10).

ServicePurposeData ProcessedJurisdictionDPA
Payment ProcessingBilling and subscription managementName, email, billing address, card last-4Variable (US-based)Yes
InvoicingInvoice generation and deliveryContact data, billing historyUSIncluded in main DPA

Stripe Data Processor Agreement: Available at: https://stripe.com/en-us/privacy

PCI DSS Compliance: Stripe maintains PCI DSS Level 1 compliance. Card numbers are never transmitted to or stored by Golden Retriever.

ServicePurposeData ProcessedJurisdictionWhen Used
Vector StorageRemote embedding storage (optional)Embedding vectors, file metadataEU (Frankfurt) or variableOnly if user opts into cloud mode
Search IndexSemantic search backendVector similarity queriesMatches storageOptional; default is local Docker

Note: Golden Retriever’s default mode stores vectors locally on the user’s Mac in a Docker container. Qdrant Cloud is optional for Enterprise customers who prefer remote storage and cross-device access.

Qdrant Data Processing Agreement: Available at: https://qdrant.tech/privacy/

Data Transfers: If Qdrant Cloud (EU) is selected, EU-based data remains in EU. If Qdrant Cloud (US region) is selected, SCCs apply.

ServicePurposeData ProcessedJurisdictionWhen Used
Identity Provider IntegrationSSO/federated authenticationUser identity, SSO tokens, group claimsVariable (customer-managed)Enterprise tier only

Auth0 Data Processing Agreement: Available at: https://auth0.com/security

Controller’s Identity Provider: Enterprise customers integrate Auth0 with their own identity provider (e.g., Okta, Azure AD, Google Workspace). Auth0 acts as a bridge; the Controller’s identity provider controls identity data.


The Processor shall notify the Controller of any change to sub-processors (addition, replacement, or removal) at least 30 days in advance of the change taking effect.

Notification shall include:

  • Name and contact information of the new sub-processor
  • Scope of processing (which data, which services)
  • Location of processing
  • Data Processing Agreement or equivalent (or notice that SCCs apply)
  • Justification for the change (if replacing an existing sub-processor)

Upon receiving notice of a new sub-processor, the Controller may object on reasonable grounds (e.g., data protection concerns, conflicts of interest) within 14 days.

If the Controller objects:

  1. The Processor and Controller shall meet to discuss the objection
  2. If unresolved, the Controller may:
    • Opt out of the feature requiring the new sub-processor (if feasible)
    • Terminate the subscription without penalty, with 30 days’ notice
  3. The Processor shall not implement the change if the Controller terminates

Material changes to sub-processor security, location, or scope require the same 30-day notice. Minor changes (e.g., sub-processor name change, internal reorganization) require prompt notification only.

If a sub-processor becomes unavailable due to a critical security incident or legal requirement, the Processor may implement an immediate emergency replacement and notify the Controller within 48 hours.


The Processor shall:

  • Ensure all sub-processors are bound by data protection obligations at least as stringent as this Agreement
  • Remain liable to the Controller for sub-processor compliance
  • Require sub-processors to maintain the same security standards as the Processor
  • Obtain Data Processing Agreements from all sub-processors before engagement

4.9. SUB-PROCESSOR CHANGE NOTIFICATION PROCEDURE

Section titled “4.9. SUB-PROCESSOR CHANGE NOTIFICATION PROCEDURE”

Sub-processor changes are communicated via:

  1. Email notification to the Controller’s designated contact email
  2. In-app notification (if available) within the Golden Retriever application
  3. Website notice on the Processor’s website and this Agreement (updated version)

Step 1: Receipt of Notice (Day 0)

  • Controller receives 30-day advance notice of sub-processor change

Step 2: Review Period (Days 1-14)

  • Controller reviews the proposed sub-processor
  • Controller assesses impact on data protection and business operations
  • Controller may request additional information from the Processor

Step 3: Objection (Days 1-14)

  • Controller may submit a written objection on “reasonable grounds” (e.g., sub-processor’s security posture, location, conflicts of interest)
  • Objection must be submitted to: privacy@goldenretriever.ai
  • Processor confirms receipt within 2 business days

Step 4: Good Faith Discussion (Days 15-25)

  • Processor and Controller meet (phone, video, or written) to discuss objection
  • Processor explains why the change is necessary
  • Controller explains why they believe grounds are reasonable
  • Parties attempt to reach agreement (e.g., sub-processor provides additional assurance, alternative identified)

Step 5: Resolution (Day 26-30)

  • Option A: Processor accommodates objection (alternative sub-processor found, change withdrawn)
  • Option B: Processor and Controller agree on additional safeguards
  • Option C: Controller exercises right to terminate (see Section 9.3)

If the Controller objects to a sub-processor change and the parties cannot reach agreement:

  • Controller may terminate the subscription without penalty
  • Notice period: 30 days from end of objection resolution
  • Data handling: Section 6.4 applies (return or deletion of data)
  • Subscription refund: Refunds calculated on pro-rata basis for current period

4.10. INTERNATIONAL TRANSFERS & MECHANISMS

Section titled “4.10. INTERNATIONAL TRANSFERS & MECHANISMS”

Personal data is transferred from the EU/EEA to the United States and other jurisdictions. The Processor uses the following legal mechanisms:

  • EU-US Data Privacy Framework (DPF): For Google Cloud and Stripe (both are DPF-certified). Provides adequate protection under GDPR Article 45
  • EU-US Adequacy Decision: Applicable to US recipients as of 10 July 2023
4.10.1.2 Standard Contractual Clauses (SCCs)
Section titled “4.10.1.2 Standard Contractual Clauses (SCCs)”

For sub-processors and destinations not covered by adequacy decisions, the Processor uses Standard Contractual Clauses (Module Two: Controller-to-Processor) approved by the EU Commission:

  • Decision (EU) 2021/915 (June 2021)
  • Incorporated by reference into Google Cloud DPA and sub-processor agreements

For customers who require data to remain in the EU:

  • Golden Retriever supports Qdrant Cloud with EU (Frankfurt) storage
  • All vector data and file metadata remain in the EU
  • Account data is still processed in the US via GCP; contact Processor if EU-only requirement is mandatory

4.10.2 Supplementary Measures (Binding Data Transfer Agreements)

Section titled “4.10.2 Supplementary Measures (Binding Data Transfer Agreements)”

The Processor implements supplementary technical and organizational measures to mitigate risks arising from US government access laws:

4.10.2.1 Government Access Risk Assessment
Section titled “4.10.2.1 Government Access Risk Assessment”
  • Risk: Under US laws (FISA, CLOUD Act), government agencies may request data without Controller’s knowledge
  • Mitigation:
    • Encryption in transit (TLS 1.3) and at rest (AES-256)
    • Encryption key management: Processor has limited access to keys (see Section 11.1.2)
    • Local-first architecture: Vectors stored locally on user’s Mac by default
    • Pseudonymization: Embedding vectors alone do not identify individuals
    • Access logging: All government requests logged and disclosed to Controller
  • The Processor commits to challenging any government request to disclose personal data that may lack legal basis
  • The Processor shall notify the Controller of government requests unless legally prohibited (in which case notification occurs as soon as legally permissible)
  • The Processor publishes transparency reports of government requests
4.10.2.3 Customer Options for Risk Mitigation
Section titled “4.10.2.3 Customer Options for Risk Mitigation”
  • Option 1: Store vectors locally only (default); no synchronization to cloud
  • Option 2: Use Qdrant Cloud (EU) for on-demand access to vectors
  • Option 3: Ensure documents do not contain sensitive EU personal data
  • Option 4: Implement additional Controller-side encryption (e.g., documents encrypted before upload to Golden Retriever)

Under GDPR Article 32(3)(c), the Processor has conducted a transfer impact assessment:

Conclusion: The combination of adequacy decisions, SCCs, supplementary measures, and local-first architecture provides an adequate level of protection such that personal data is not exposed to unlawful or arbitrary processing.

Affected Controllers: All EU/EEA-based customers

Reassessment: The Processor shall reassess this determination annually or if legal circumstances change (e.g., new court rulings, loss of adequacy decision).

The Controller remains responsible for:

  • Assessing whether transfers to the US are lawful under its own legal basis
  • Notifying data subjects about transfers (Privacy Policy)
  • Implementing additional safeguards if required by local law (e.g., specific requirement to encrypt data before transfer)

4.11. TECHNICAL AND ORGANIZATIONAL MEASURES (TOMs)

Section titled “4.11. TECHNICAL AND ORGANIZATIONAL MEASURES (TOMs)”
4.11.1.1 Encryption in Transit (Network Layer)
Section titled “4.11.1.1 Encryption in Transit (Network Layer)”
  • Standard: TLS 1.3 (or higher)
  • Scope: All communication between Golden Retriever (user’s Mac), GCP, Stripe, and other services
  • Certificate pinning: Implemented to prevent man-in-the-middle attacks
  • Perfect forward secrecy: TLS 1.3 ensures session keys are not compromised if long-term keys are exposed
  • Ciphers: Only AEAD ciphers (ChaCha20-Poly1305, AES-256-GCM) are supported; weak ciphers disabled
4.11.1.2 Encryption at Rest (Storage Layer)
Section titled “4.11.1.2 Encryption at Rest (Storage Layer)”
  • Firestore: Customer-managed encryption (CMK) or Google-managed keys (data encrypted automatically)
  • Google Cloud Storage (GCS): Object-level encryption using AES-256
  • Qdrant (Local): SQLCipher encryption for Business/Enterprise tiers (see 11.1.3)
  • Qdrant Cloud (Optional): Provider-managed encryption at rest (AES-256)
  • Local Audit Logs: SQLCipher encryption for Business/Enterprise tiers

Key Management:

  • Encryption keys are generated and managed by Google Cloud KMS or equivalent
  • Processor does not have access to keys without Controller’s consent
  • Key rotation: Automatic, every 90 days (Google Cloud standard)
  • Key deletion: Keys are destroyed when data is deleted per Section 6.4.2
4.11.1.3 SQLCipher Encryption (Local Storage - Business/Enterprise)
Section titled “4.11.1.3 SQLCipher Encryption (Local Storage - Business/Enterprise)”
  • Database encryption: SQLite databases (audit logs, Qdrant local) use SQLCipher (AES-256 encryption)
  • Activation: Default for Business and Enterprise tiers; optional for Free/Starter tiers
  • Passphrase: Derived from controller’s authentication credentials; not stored in plaintext
  • Performance impact: Minimal (< 5% CPU overhead)
  • Rollback: Available for Free/Starter tier if performance is a concern; Business/Enterprise cannot disable
  • Local application: User must authenticate via email/password or SSO to access Golden Retriever
  • Password policy: Minimum 12 characters recommended; no imposed maximum
  • Multi-factor authentication (MFA): Supported for Enterprise tier; recommended for Business tier
  • Session management: Sessions expire after 30 minutes of inactivity; automatic logout
  • API authentication: Processor backend uses OAuth 2.0 + JWT tokens; tokens expire within 1 hour
4.11.2.2 Role-Based Access Control (RBAC - Enterprise Only)
Section titled “4.11.2.2 Role-Based Access Control (RBAC - Enterprise Only)”
  • Roles: Admin, Editor, Viewer (Enterprise customers can define custom roles)
  • Permissions:
    • Admin: Full access (add/remove users, configure settings, delete data)
    • Editor: Upload files, manage queries, edit documents (within allowed folders)
    • Viewer: Read-only access to search and Q&A
  • Enforcement: Permissions checked on every API call by backend; local application cannot override
  • Multi-tenancy: Golden Retriever uses tenant isolation (each customer’s data is logically separated)
  • No data mixing: Queries from one customer cannot retrieve results from another customer
  • Database isolation: Firestore and GCS use tenant identifiers in all queries/keys
  • Network isolation: Each Cloud Run instance serves one tenant only (stateless; scale independently)
  • Processor employees: Only security and support staff have access to customer data
  • Circumstances: For incident response, bug investigation, or customer-requested support
  • Logging: All admin access is logged with timestamp, user, action, duration
  • Approval: Access requests require documented justification and approval by Processor’s Security Officer
  • Review: Admin access logs are reviewed quarterly; unauthorized access triggers incident response
  • Perimeter firewall: Golden Retriever services are behind Google Cloud load balancer and firewall
  • Inbound rules: Only necessary ports are open (HTTPS 443, no SSH or RDP exposed)
  • Outbound rules: Restricted to necessary services (Google Vertex AI, GCS, Stripe, etc.)
  • VPC isolation: Processor isolates customer data networks using Google Cloud VPC networking
  • DDoS protection: Google Cloud DDoS protection is enabled for all services
  • Rate limiting: API requests are rate-limited per customer (e.g., 1,000 req/min) to prevent abuse
  • Input validation: All API inputs are validated and sanitized; SQL injection/code injection prevented
  • CORS policy: Cross-Origin Resource Sharing restricted to Golden Retriever application domain only
  • API versioning: Deprecated API versions disabled after 12-month sunset period; no breaking changes to active versions
  • Cloud Run to Firestore: Private service connection (no internet routing)
  • Cloud Run to GCS: Private service connection
  • Cloud Run to Vertex AI: Google Cloud internal routing
  • Processor to Stripe: TLS 1.3 with certificate pinning

4.11.4 Data Minimization & Pseudonymization

Section titled “4.11.4 Data Minimization & Pseudonymization”
  • Collection: Only data necessary for the Service is collected (email, documents, usage logs)
  • No IP logging: User IP addresses are not logged or stored
  • No tracking: No cookies or third-party analytics (except usage metrics within Golden Retriever)
  • Metadata reduction: Filenames are stored; file content hashes are stored; full file paths are not retained
  • User identifiers: Internal user IDs (UUIDs) are pseudonymous; email is used only for authentication and billing
  • Embedding vectors: Vectors do not contain personally identifying information; semantic features only
  • Query logs: Queries are associated with user ID, not email or name (logs are pseudonymous)
  • Audit logs: Local audit logs contain user ID, action, timestamp; minimal personal data
  • Scope: All significant events are logged:
    • User authentication (login, logout, failed attempts)
    • Data uploads/deletions
    • Access to shared documents
    • API calls to backend
    • Admin access to customer data
    • Configuration changes
  • Format: Structured logs (JSON) with timestamp, user ID, action, result, IP address (user’s Mac only)
  • Retention: 24 months for usage logs; 12 months for authentication logs; per Section 2.2 for audit logs
  • Encryption: Audit logs are encrypted in transit and at rest (SQLCipher for local)
  • Immutability: Logs cannot be modified or deleted by users; tamper detection alerts configured
  • Mechanism: Processor monitors API endpoints for suspicious patterns:
    • Brute force authentication attempts (> 5 failed logins in 15 min)
    • Unusual API usage (e.g., 10,000 queries in 1 minute)
    • Data exfiltration patterns (bulk downloads)
  • Alerting: Processor’s security team is alerted in real-time; automated response may pause account temporarily
  • Notification: If suspicious activity is confirmed as attack, Processor notifies Controller within 24 hours
  • Security Operations Center (SOC): Processor operates a SOC monitoring cloud infrastructure 24/7
  • Tools: Endpoint detection, network IDS/IPS, log aggregation (SIEM)
  • Threat intelligence: Processor subscribes to threat feeds; integrates findings into monitoring
  • Incident response: Documented incident response plan (Section 12) executed by Security Officer
  • Code review: All code changes require peer review before deployment; security-sensitive changes reviewed by Security Officer
  • Static Analysis (SAST): Automated scanning of source code for common vulnerabilities (injection, crypto, hardcoded secrets)
  • Dependency scanning: Automated scanning of third-party dependencies for known CVEs; patches applied within 30 days
  • Penetration testing: Annual external penetration test by qualified firm; results reviewed by Security Officer
  • Dynamic analysis (DAST): Quarterly automated scanning of running services for vulnerabilities
  • Remediation: Critical and high-severity findings are patched within 30 days; medium/low within 90 days
  • Infrastructure: Google Cloud patches are applied automatically (managed services)
  • Operating system: Security patches for Cloud Run instances applied within 7 days of release
  • Dependencies: Third-party library updates applied within 30 days; emergency patches (critical CVEs) within 24 hours
  • Golden Retriever app: Users are notified of updates; auto-update available or manual download option
  • Firestore: Automatic daily backups; point-in-time recovery available (7 days)
  • GCS: Object versioning enabled; previous versions retained for 90 days
  • Qdrant (Cloud): Provider-managed backups; point-in-time recovery available
  • Qdrant (Local): User is responsible for local backups; Processor documents backup procedures
  • RTO (Recovery Time Objective): Service restored within 4 hours of confirmed outage
  • RPO (Recovery Point Objective): Data loss limited to last 1 hour (from last Firestore backup)
  • Failover: Services are geographically distributed; failure of single region does not impact service
  • Testing: Disaster recovery procedures tested quarterly; results documented
  • Backup retention: Backups are deleted within 90 days of user deletion request
  • Legal hold: Backups may be retained if litigation or investigation is ongoing
  • Certification: Processor certifies deletion per Section 6.4.2

4.11.8 Local-First Architecture (Security Benefit)

Section titled “4.11.8 Local-First Architecture (Security Benefit)”
  • Vectors stored locally: By default, embedding vectors are stored in a local Qdrant Docker container on the user’s Mac (not in the cloud)
  • Benefit: Vectors never leave the user’s machine unless explicitly opted into cloud mode
  • Audit logs stored locally: Audit logs are stored in SQLCipher-encrypted SQLite on the user’s Mac
  • Account data in cloud: Account/authentication data is stored in GCP (necessary for multi-device access and billing)
  • Qdrant Cloud: Enterprise customers may opt into Qdrant Cloud for:
    • Cross-device vector access
    • Reduced local storage burden
    • Professional managed hosting
  • Trade-off: Vectors are transferred to Qdrant Cloud (EU or US region per customer choice)
  • Encrypted transfers: Vectors are encrypted in transit (TLS 1.3); Qdrant encrypts at rest
  • Minimizes cloud processing: Most sensitive data (embeddings, audit logs) remains on user’s hardware
  • Reduces third-party exposure: Local data is not processed by Google Vertex AI or other third parties (only at initial embedding)
  • User control: User retains full control over vectors; can delete local Qdrant container anytime
  • Regulatory compliance: Helps meet data residency requirements (e.g., data must stay in country of origin)

A “data breach” or “security incident” is any confirmed or reasonably suspected unauthorized access, acquisition, disclosure, or destruction of personal data that poses a risk to the rights and freedoms of data subjects.

Examples of breaches:

  • Unauthorized access to Firestore or GCS due to compromised credentials
  • Accidental public exposure of encryption keys
  • Compromise of Golden Retriever application (malware injection, code manipulation)
  • Loss of backups containing personal data
  • Ransomware attack affecting data availability

Non-breaches (no notification required):

  • Attempted access that was blocked by security controls
  • Authorized access by Processor staff for legitimate purposes (logged under Section 11.5)
  • Accidental upload of data by user (user error, not Processor security failure)
4.12.2.1 Discovery to Notification (72 Hours)
Section titled “4.12.2.1 Discovery to Notification (72 Hours)”

Upon discovery or reasonable suspicion of a breach:

TimelineActionPerformer
T + 0 hoursSecurity team confirms breach; escalates to Security OfficerProcessor
T + 1 hourInitial investigation underway (containment, scope assessment)Processor Security
T + 4 hoursPreliminary notification sent to Controller (facts known so far)Security Officer
T + 24 hoursFollow-up notification with more detail (ongoing investigation)Security Officer
T + 72 hoursFinal notification with complete details (per Section 12.3)Security Officer

Special case: If the breach poses an immediate, severe risk (e.g., data publicly exposed on internet), Controller is notified immediately (within 1 hour) without waiting for full investigation.

All breach notifications shall include:

  1. Executive Summary

    • What happened (unauthorized access, theft, accidental exposure)
    • When it happened (discovery date, estimated date of breach)
    • Current status (ongoing, contained, resolved)
  2. Data Details

    • Personal data affected: Which categories (account data, documents, audit logs, etc.)
    • Records affected: Approximate number of records, number of data subjects
    • Sensitivity: Level of risk to rights/freedoms (high/medium/low)
    • Example: “Approximately 500 user records were exposed, including names and email addresses (no passwords)”
  3. Breach Analysis

    • Root cause: How the breach occurred (e.g., “SSH key compromised; attacker accessed Cloud Run instance”)
    • Attack vector: How attacker gained access (e.g., “Phishing email, credential compromise”)
    • Time window: When breach likely occurred (e.g., “Between 2026-03-15 14:00 UTC and 2026-03-16 09:00 UTC”)
    • Detection: How breach was discovered (automated alert, customer report, security audit)
  4. Immediate Measures Taken

    • Containment: Actions to stop ongoing breach (e.g., “Revoked compromised credentials, isolated affected instance”)
    • Forensics: Evidence preservation (logs, system snapshots)
    • Communication: Who has been informed (internal teams, law enforcement if applicable)
  5. Risk Assessment

    • Likelihood of misuse: Based on nature of data and attacker sophistication
    • Consequences to data subjects: “Email addresses and names could be used for phishing or spam”
    • Systemic impact: “Breach does not expose encryption keys; vectors remain protected”
  6. Recommended Actions for Controller

    • Notify affected individuals: If required under GDPR Article 34 (high risk to rights/freedoms)
    • Notify DPA: If breach affects significant number of individuals or is systemic
    • Monitor credit: If payment data was exposed
    • Change passwords: If account credentials were exposed
    • Example: “We recommend notifying all affected users within 3 days and your DPA within 1 week”
  7. Processor Actions & Remediation

    • Root cause fix: Technical changes to prevent recurrence (e.g., “Enabled multi-factor authentication for all Cloud Run access”)
    • Broader improvements: Security enhancements resulting from breach (e.g., “Implemented network segmentation”)
    • Timeline: When fixes will be deployed
    • Verification: How fix will be tested and verified
  8. Contact & Follow-Up

    • Processor contact: Name, email, phone of Security Officer or designated representative
    • Investigation updates: “We will provide a full forensic report within 14 days”
    • Questions: How Controller can ask clarifying questions or request additional investigation

Following a breach notification, the Processor shall conduct a thorough investigation and provide a Forensic Report within 14 days.

Forensic Report shall include:

  • Timeline: Detailed timeline of breach (when attacker gained access, what they accessed, when they exited)
  • Evidence: Screenshots, log excerpts, forensic artifacts
  • Affected data scope: Complete inventory of records accessed (with confidence level)
  • Attribution: Indicators of compromise (IOCs), attacker profile (if known)
  • Lessons learned: Findings on how to prevent similar breaches
  • Recommendations: Specific actions for Controller and Processor

Example excerpt:

“Our forensic team recovered logs from Cloud Run instance xyz showing unauthorized SSH login at 2026-03-15 14:23:17 UTC from IP address 203.0.113.45. The attacker accessed Firestore directly, executing query: SELECT * FROM users WHERE org_id = ‘customer-123’. Based on query logs, approximately 450 user records were accessed. The attacker exited at 2026-03-16 09:14:02 UTC. Recommended action: Rotate all service account credentials, enable VPC Service Controls, and implement SSH key rotation policy.”

Exception: If a law enforcement agency (FBI, police, secret service) orders the Processor not to notify the Controller of a breach, the Processor shall:

  1. Comply with the legal order (cannot disclose to Controller without legal authority)
  2. Notify the Controller as soon as the legal constraint is lifted
  3. In the notification, explain that notification was delayed due to legal constraint
  4. Provide Controller with documentation (redacted if necessary) of legal constraint

The Processor shall:

  • Preserve all evidence (logs, backups, system snapshots) for at least 6 months
  • Provide access to forensic evidence for independent auditors (if Controller requests)
  • Cooperate with law enforcement if breach is reported to authorities
  • Not make public statements about breach without Controller consent (except required regulatory filings)
  • Processor sends confirmation when breach fix is fully deployed
  • Processor undergoes external security audit to verify fix (within 60 days)
  • Audit report (summary) is shared with Controller
  • Processor publishes annual transparency report disclosing all breaches in the prior year
  • Report does not identify customers by name
  • Report includes breach statistics, root causes, and improvements made
  • Published on Processor’s website

The Controller (or the Controller’s authorized representative) may audit the Processor’s compliance with this Agreement.

Audit scope includes:

  • Security measures (encryption, access controls, network security)
  • Sub-processor management (agreements, compliance)
  • Data handling procedures (collection, storage, deletion)
  • Breach response and incident management
  • Staff confidentiality and training
  • Operational procedures and documentation

Audit scope EXCLUDES:

  • Processor’s trade secrets or proprietary algorithms
  • Other customers’ data (confidential information)
  • Source code that reveals security vulnerabilities (white-hat review only)

Annual audit:

  • The Controller has the right to conduct one comprehensive audit per calendar year
  • Notice period: Minimum 14 days’ written notice (email to Processor’s DPO)
  • Duration: Audit may span 1-5 days on-site or remote, depending on scope
  • Timing: Processor and Controller coordinate schedule; reasonable notice includes auditor availability

Emergency audit (upon suspected breach):

  • Notice period reduced to 24 hours if Controller suspects a data breach
  • Processor shall provide immediate access to logs and systems
  • Audit may proceed without advance scheduling
  1. Audit scope document: Controller defines audit scope (which systems, which controls)
  2. Confidentiality agreement: Auditor signs NDA with Processor (if auditor is third party)
  3. Conflict review: Processor discloses any conflicts of interest (e.g., common investors, related parties)
  4. Scheduling: Processor and Controller coordinate dates, locations, personnel
  1. Kickoff meeting: Processor’s Security Officer meets auditor; explains system architecture
  2. Documentation review: Auditor reviews security policies, procedures, training records
  3. System testing: Auditor tests security controls (e.g., attempts to access Firestore without credentials)
  4. Interviews: Auditor interviews engineering, security, and operations staff
  5. On-site access: If remote not feasible, auditor may visit Processor’s offices; Processor provides secure access to systems
  6. Data sampling: Auditor may sample personal data to verify encryption, access controls, retention policies
  7. Log review: Auditor reviews audit logs, authentication logs, breach logs
  1. Draft report: Auditor provides draft report (within 5 days of audit)
  2. Processor response: Processor provides written response to any findings (within 10 days)
  3. Final report: Auditor incorporates Processor’s response; provides final report (within 15 days of audit)
  4. Remediation plan: If findings identify gaps, Processor proposes remediation timeline
  5. Follow-up: Controller may conduct follow-up audit to verify remediation (6 months post-audit)

The Controller may engage a qualified independent auditor (Big Four accounting firm, ISO 27001 auditor, cybersecurity firm, law firm).

Auditor qualifications:

  • Certified by CREST, (ISC)², CISSP, or equivalent
  • No conflict of interest with Processor
  • Bound by confidentiality agreement

Processor right to review audit scope:

  • Processor may request advance review of audit scope and methodology
  • Processor may request redaction of trade secret information or competitors’ data from audit scope
  • Processor’s request for scope modification must be reasonable (not used to avoid accountability)
  • If audit scope conflicts are unresolvable, parties escalate to executive level
PartyCosts
ControllerCosts of auditor (external audit firm fees)
ProcessorCosts of cooperation (staff time, system access, documentation)
RemediationProcessor bears costs of fixing identified compliance gaps

Example cost split:

  • Big Four audit firm: $15,000-$25,000 (Controller pays)
  • Processor staff time (40 hours @ $150/hr): $6,000 (Processor absorbs)
  • Security enhancement to remediate finding: $30,000 (Processor pays)

The Processor shall:

  • Make all personnel available for interview (within reasonable working hours)
  • Provide documentation in a timely manner (within 3 business days of request)
  • Grant system access necessary for audit (e.g., read-only access to logs, Firestore)
  • Not withdraw audit rights or deny audit requests without legal basis
  • Not charge additional fees for audit cooperation (except extraordinary circumstances, e.g., 24/7 emergency access)
  • Audit results are confidential between Processor and Controller
  • Controller may disclose audit results to its own DPA or law enforcement (if subpoenaed)
  • Controller may share audit results with parent company or board of directors (under NDA)
  • Processor’s consent required for Controller to disclose audit results to third parties (e.g., publish online)

4.13.8 Certification & Compliance Standards

Section titled “4.13.8 Certification & Compliance Standards”

In lieu of an annual audit, the Controller may accept:

  • ISO 27001 certification: Processor provides copy of current certificate and audit scope
  • SOC 2 Type II report: Processor provides copy of report (trust report on controls)
  • Annual penetration test report (summary): Results of external penetration testing

Acceptance is discretionary: Controller may still request a full audit even if certifications are provided.


Subject to Section 14.1.3 (exclusions), the liability of the Processor for breach of this Agreement shall be limited to:

  • For data breaches caused by Processor negligence: Direct damages, not to exceed the fees paid by the Controller in the 12 months preceding the breach
  • For other breaches: Direct damages, not to exceed the fees paid in the 12 months preceding the breach
  • For subprocessor breaches: Liability is the same as above; Processor is liable but not for amounts beyond Processor’s insurance coverage

Example:

  • Controller pays $1,000/month for a 24-month contract
  • Processor experiences a data breach due to unpatched server
  • Processor’s liability is capped at $24,000 (total fees for 24-month period) OR actual damages to Controller, whichever is lower
  • If actual damage is $100,000 (cost of notification + remediation), Controller recovers $24,000

The Processor shall have no liability for:

  • Consequential damages: Lost profits, lost revenue, lost business opportunity
  • Indirect damages: Loss of goodwill, reputational harm
  • Punitive damages: Even if breach is intentional or grossly negligent
  • Breach by subprocessor: Beyond the extent that Processor is liable; subprocessor’s liability is separate

Rationale: These exclusions reflect market standard terms; Processor obtains insurance for covered losses (Section 14.1.4).

4.14.1.3 EXCLUSION: Data Not Caused by Processor
Section titled “4.14.1.3 EXCLUSION: Data Not Caused by Processor”

The Processor has no liability if personal data is processed without Processor’s knowledge or instruction:

  • Example: Controller uploads plaintext files containing health data; Processor did not require encryption, but Controller was responsible for lawfulness
  • Processor’s defense: Processor was following lawful instructions; lack of additional safeguards is not Processor’s breach

The Processor maintains:

  • Professional liability insurance: Minimum €[AMOUNT] coverage for data protection breaches
  • Cyber insurance: Minimum €[AMOUNT] coverage for data breaches and ransomware
  • Errors and omissions insurance: Minimum €[AMOUNT] coverage for service failures

Insurance is reviewed annually; limits updated if risk profile increases.

The Processor shall indemnify, defend, and hold harmless the Controller from:

  • Third-party claims: Any claim by a data subject or other third party alleging Processor breached data protection laws or this Agreement
  • Regulatory fines: GDPR fines imposed on Controller due to Processor’s breach (e.g., Article 32 violation)
  • Notification costs: Costs of notifying data subjects about Processor-caused breaches
  • Remediation costs: Costs of remediating harm caused by Processor (e.g., credit monitoring for affected individuals)

Indemnification process:

  1. Controller notifies Processor of claim within 30 days of becoming aware
  2. Processor takes over defense (Processor hires legal counsel; Controller approves counsel)
  3. Processor settles claim with third party (subject to Controller approval for settlements > $[AMOUNT])
  4. Processor pays all costs (legal, settlement, damages)
  5. Controller cooperates by providing information, documents, testimony

Limitation: Processor has no indemnification obligation if:

  • Controller fails to notify Processor promptly (within 30 days)
  • Controller settles claim without Processor consent
  • Claim arises from Controller’s breach of this Agreement

The Controller shall indemnify the Processor from:

  • Claims arising from unlawful uploads: If Controller uploads data it doesn’t have the right to process, and a third party sues Processor
  • GDPR fines on Processor: If Controller fails to lawfully instruct Processor, and regulators fine Processor

Example: Controller uploads an employee’s health records without consent. Employee sues Processor for GDPR Article 9 violation. Processor is not responsible for Controller’s lack of consent, so Controller indemnifies Processor.

Indemnification process: Same as Section 14.2.1

If Processor breaches material terms of this Agreement, Controller has the following remedies (in order of escalation):

  1. Cure notice (7 days): Controller sends written notice describing breach; Processor has 7 days to cure
  2. Continued breach (30 days): If breach continues, Controller sends notice of continued breach; Processor has 30 days to remedy
  3. Termination (60 days): If breach continues beyond 30 days, Controller may terminate subscription effective immediately
  4. Damages: Controller may claim damages per Section 14.1

Material breaches (no cure period):

  • Unauthorized disclosure of personal data
  • Failure to implement encryption (if contracted)
  • Deliberate non-compliance with audit rights
  • Failure to notify breach within 72 hours (if breach confirmed)

Failure to exercise a right (e.g., failure to audit, delay in claiming damages) does not waive that right. Rights survive termination of this Agreement.

This Agreement shall be governed by the law of England and Wales, without regard to choice of law principles.

Rationale: England and Wales is selected for consistency with Processor’s Terms of Service.

Step 1: Good Faith Negotiation (30 days)

  • Processor and Controller attempt to resolve dispute through good faith negotiation
  • Designate senior representatives (VP of Customer Success, General Counsel)
  • Meet at least once (phone or in-person) to discuss resolution

Step 2: Mediation (60 days)

  • If negotiation fails, parties agree to mediation
  • Mediator selected jointly by parties
  • Mediation location: England and Wales (or virtual if parties agree)
  • Each party bears own costs; mediator costs are split equally
  • Mediation is non-binding; either party may proceed to arbitration/litigation

Step 3: Arbitration or Litigation

  • If mediation is unsuccessful, either party may:
    • Arbitration: Submit dispute to binding arbitration per [ARBITRATION RULES] (e.g., ICC Arbitration, LCIA)
    • Litigation: File lawsuit in court of competent jurisdiction (England and Wales)
  • Either party may seek injunctive relief in court to prevent irreparable harm (e.g., data breach, unauthorized access)

Both parties waive the right to pursue class action, class arbitration, or representative action. Each dispute must be brought individually.


This Agreement is effective as of the Effective Date and continues for the duration of the Service subscription agreement between Processor and Controller.

Renewal: This Agreement is renewed automatically for each subscription renewal period, unless either party provides notice of non-renewal (30 days before subscription expiration).

  • Controller materially breaches this Agreement and does not cure within 30 days of notice
  • Controller uploads data in violation of applicable law (e.g., unlawfully obtained data, GDPR Article 9 data without consent)
  • Controller fails to pay subscription fees and does not remediate within 15 days of notice
  • Controller’s use of the Service materially interferes with other customers’ service (e.g., DoS attack)
  • Processor materially breaches this Agreement and does not cure within 30 days (or immediately if material breach like breach notification non-compliance)
  • Processor experiences a data breach and does not adequately remediate within 60 days
  • Processor engages unauthorized sub-processor and does not comply with Section 9 (objection process)

Either party may terminate this Agreement for convenience (without cause) by providing 30 days’ written notice to the other party.

Prorated refund: If Controller terminates early in a monthly subscription, Controller receives prorated refund for unused days.

Upon termination of this Agreement (for any reason):

4.15.4.1 Controller’s Choice: Return or Delete
Section titled “4.15.4.1 Controller’s Choice: Return or Delete”

Within 10 days of termination, Controller shall notify Processor of choice:

  • Option A: Return Data - Processor returns all personal data in a structured, machine-readable format within 30 days
  • Option B: Delete Data - Processor securely deletes all personal data within 30 days
  1. Execution: Processor executes the chosen option (return or delete)
  2. Certification: Processor provides written certification that return/deletion is complete (signed by authorized representative)
  3. Verification: Upon request, Processor provides evidence of deletion (deletion logs, hash verification)
  4. Backup deletion: Backups containing personal data are deleted within 90 days (unless legal hold applies)

The following may be retained:

  • Legal hold data: Subject to litigation or investigation
  • Tax/billing records: Payment and invoice data (7 years)
  • Anonymized audit logs: Logs with all personally identifying information removed (24 months)
  • Security data: Incident response logs (12 months)

The Processor shall:

  • Cease all processing of personal data (except data retained per Section 15.4.3)
  • Cease access to deleted data
  • Redirect customers to retrieve data (if applicable) within the 30-day window
  • Provide final bill/reconciliation within 30 days of termination
  • Not use Controller’s data for any purpose after termination (except legal/regulatory compliance)

  • GDPR: Regulation (EU) 2016/679 (General Data Protection Regulation)
    • Article 28: Processor obligations
    • Article 32: Security of processing
    • Article 33: Breach notification
    • Article 34: Communication to data subjects
    • Article 44-49: International transfers
    • Recital 58: Plain language requirement
    • Recital 83: International adequacy
  • Standard Contractual Clauses (SCCs): EU Commission Decisions
    • 2021/915 (June 2021)
    • 2010/87/EU (superseded, but referenced in older contracts)
  • EU-US Data Privacy Framework: Adequacy decision (10 July 2023)
  • Data protection legislation in jurisdiction: [JURISDICTION-SPECIFIC ACTS]
TermDefinition
BreachUnauthorized access, acquisition, disclosure, or destruction of personal data
ControllerLegal entity that determines purposes and means of processing (the customer)
Data subjectIndividual to whom personal data relates
Personal dataAny information relating to an identified or identifiable natural person
ProcessingAny operation on personal data (collection, storage, use, transfer, deletion)
ProcessorLegal entity that processes data on behalf of Controller (Golden Retriever company)
Sub-processorProcessor that processes on behalf of another Processor (e.g., Google Cloud, Stripe)
Sensitive dataData subject to special protections (health, biometric, racial/ethnic origin, etc.)
TOM (Technical and Organizational Measure)Security control or procedure (encryption, access control, training, audit)
SCC (Standard Contractual Clause)Legal mechanism for safe international data transfer
DPO (Data Protection Officer)Designated individual responsible for data protection in an organization

This Agreement is provided in English. If translated into other languages, the English version prevails in case of conflict (per GDPR Recital 58 on plain language).

Plural/singular: “Data” is used in singular and plural (data = personal data).

Headings: Section headings are for convenience only and do not affect interpretation.

Entire agreement: This Agreement, together with the Privacy Policy, Terms of Service, and any executed sub-processor agreements, constitutes the entire agreement on data processing.


The Processor may modify this Agreement:

  • Non-material changes: Minor clarifications, updates to contact information, or changes that do not reduce Controller’s rights → effective immediately
  • Material changes: Changes that increase Processor’s rights or reduce Controller’s rights (e.g., reduce security commitments, add new sub-processors without objection rights) → require 30 days’ notice and Controller approval

Approval is deemed: If Controller does not terminate the subscription within 30 days of material change notice, the change is accepted.

The Controller may request modifications to this Agreement (e.g., additional security measures, different sub-processor restrictions). Processor will consider requests in good faith; acceptance is at Processor’s discretion.

Negotiation: Processor may agree to modifications in exchange for:

  • Higher subscription fee (if modifications increase operational costs)
  • Extended contract term (for custom commitments)
  • Acceptance of alternative safeguards (e.g., instead of enhanced encryption, Processor increases audit frequency)

Current version: 1.0 Effective date: April 11, 2026 Last updated: April 11, 2026

Previous versions are available upon request.


By executing this Agreement or continuing to use the Service after the Effective Date, the Controller acknowledges:

  • Authority to bind the organization
  • Agreement to all terms and conditions
  • Understanding of the data processing described
  • Authorization of the Processor to process personal data as outlined

CONTROLLER AUTHORIZED REPRESENTATIVE:

Name: _____________________________
Title: _____________________________
Organization: _____________________________
Date: _____________________________
Signature: _____________________________

By executing this Agreement, the Processor acknowledges:

  • Authority to bind the organization
  • Commitment to process personal data only on documented instructions
  • Implementation of security and organizational measures described
  • Compliance with GDPR Article 28 and this Agreement

PROCESSOR AUTHORIZED REPRESENTATIVE:

Name: _____________________________
Title: _____________________________
Organization: _____________________________
Date: _____________________________
Signature: _____________________________

4.APPENDIX A: DATA PROCESSING SUMMARY (Informational)

Section titled “4.APPENDIX A: DATA PROCESSING SUMMARY (Informational)”
ActivityDataDurationSub-processorsSecurity
File indexingDocument content, metadataSubscription durationGoogle Vertex AI (transient)TLS 1.3, SCC
Embedding generationText chunksReal-timeGoogle Vertex AI, GCSTLS 1.3, vectors stored locally
Vector storageEmbeddingsSubscription durationQdrant (local or cloud)SQLCipher (local), AES-256 (cloud)
Semantic searchQuery, resultsOn-demandGemini API, QdrantTLS 1.3
Account managementEmail, password hash, SSO tokenSubscription durationCloud Run, Firestore, Auth0Cloud encryption, access controls
BillingName, email, address, card last-4Subscription durationStripePCI-DSS, TLS 1.3
Usage analyticsQuery logs, feature usage24 monthsBackend databasePseudonymized, encrypted at rest
Audit loggingUser actions, API calls24 months (local)Local SQLiteSQLCipher encryption

4.APPENDIX B: CONTROLLER RESPONSIBILITIES CHECKLIST

Section titled “4.APPENDIX B: CONTROLLER RESPONSIBILITIES CHECKLIST”

The Controller shall:

  • Obtain legal basis for processing (consent, contract, legal obligation, vital interest, public task, or legitimate interest)
  • Notify data subjects about processing via Privacy Policy
  • Ensure Golden Retriever configuration aligns with Controller’s privacy obligations
  • Obtain appropriate consent/permissions for third-party data in documents
  • Maintain secure access to Golden Retriever (password management, MFA for Enterprise)
  • Apply OS and security updates to Mac running Golden Retriever
  • Report suspected security incidents to Processor immediately
  • Respond to data subject requests for access, rectification, erasure, portability, objection
  • Forward data subject requests to Processor if Processor holds data
  • Audit Processor annually (or accept equivalent certifications)
  • Comply with DPA or law enforcement requests (in jurisdiction where Controller operates)

4.APPENDIX C: PROCESSOR COMMITMENTS (AT A GLANCE)

Section titled “4.APPENDIX C: PROCESSOR COMMITMENTS (AT A GLANCE)”

The Processor commits to:

  • Processing data only on documented Controller instructions
  • Implementing TLS 1.3 encryption in transit and AES-256 at rest
  • Encrypting local audit logs and vectors (SQLCipher for Business/Enterprise)
  • Storing vectors locally on user’s Mac by default (not in cloud)
  • Notifying Controller of breaches within 72 hours
  • Providing forensic report within 14 days of breach
  • Allowing Controller to audit annually
  • Managing sub-processors with 30-day advance notice and objection rights
  • Returning or deleting data within 30 days of termination
  • Supporting data subject rights (access, rectification, erasure, portability, objection)
  • Maintaining confidentiality of data and staff
  • Cooperating with DPA investigations
  • Maintaining security certifications (ISO 27001, SOC 2 Type II, or equivalent)

END OF DATA PROCESSING AGREEMENT


Document Control:

PropertyValue
File name04_Data_Processing_Agreement.md
Version1.0
Last updatedApril 11, 2026
Next review[DATE + 12 MONTHS]
Owner[Processor Legal/Compliance]
StatusDraft / Final (as applicable)

Questions or feedback?

Contact the Processor’s Privacy Team: Email: privacy@goldenretriever.ai Address: Suite 2A, 7th Floor PF, City Reach, 5 Greenwich View Place, London E14 9NN, United Kingdom


Golden Retriever — macOS Desktop Application

Last Updated: March 20, 2026


This AI Transparency Notice explains how Golden Retriever uses artificial intelligence (AI) to process your files and provide search and question-answering functionality. This notice is provided in compliance with the EU AI Act (Regulation (EU) 2024/1689) and the General Data Protection Regulation (GDPR).

For our complete data protection practices, please see our Privacy Policy.


Golden Retriever uses AI in three primary ways:

What it does: When you index local files (documents, images, videos), the app converts the content into mathematical vectors (embeddings) that represent the semantic meaning of your files. This enables the semantic search feature.

AI Model Used: Google Vertex AI Gemini Embedding 2

  • Provider: Google Cloud (enterprise deployment)
  • How it works: Your files are sent to Google’s servers to generate embedding vectors. These vectors are numerical representations of your content’s meaning.
  • Where vectors are stored: Vectors are stored locally in your Qdrant database (running in Docker on your Mac). They remain on your device.

What it does: When you search, the app uses AI to rank results by semantic relevance (meaning-based similarity) rather than keyword matching alone.

AI Model Used: Qdrant semantic search engine (local processing)

  • How it works: Your search query is converted to an embedding using Gemini Embedding 2, then compared against stored embeddings to find semantically similar files.
  • No decisions made: Search results are ranked by similarity score only; the app does not make automated decisions about file relevance beyond mathematical similarity ranking.

What it does: When you ask a question about your indexed files, the app retrieves the most relevant files and sends them as context to an AI model, which generates answers based on that context.

AI Model Used: Google Vertex AI Gemini 2.5 Flash

  • Provider: Google Cloud (enterprise deployment)
  • How it works:
    1. Your question is sent to Google’s servers.
    2. Relevant files (determined via semantic search) are retrieved from your local Qdrant database.
    3. Your question and the retrieved file content are sent to Gemini 2.5 Flash.
    4. The model generates an answer based on the context provided.
    5. The answer is returned to the app and displayed to you.

5.3. Data Processing and Google Cloud Storage

Section titled “5.3. Data Processing and Google Cloud Storage”
  • Embedding Vector Generation: Your file content is sent to Google Vertex AI Embedding 2 API to generate embeddings.
  • Multimodal Processing: Files uploaded to Google Cloud Storage for multimodal embedding operations (when applicable to document/image/video types).
  • Q&A Processing: Retrieved file content and your question are sent to Google Vertex AI Gemini 2.5 Flash API.

5.3.2 Google’s Data Protection Commitments

Section titled “5.3.2 Google’s Data Protection Commitments”
  • Enterprise Service Terms: Google processes your data under Google Cloud’s standard enterprise service agreement.
  • No Training Use: Your data is not used to train Google’s AI models or for any purpose beyond providing the requested service.
  • Data Residency: Data is processed within Google Cloud’s infrastructure according to your Google Cloud project configuration.
  • Retention: Data inputs (your files and questions) are not retained by Google after processing is complete. Google does not store the inputs on its systems as part of the enterprise service.

For Google’s full data protection practices, see Google Cloud Data Processing Amendment and Google Cloud Privacy Notice.


  • Not factual assertions: Search results are rankings by semantic similarity, not endorsements of accuracy or relevance.
  • Your responsibility: You should review search results and verify their accuracy against the original files.
  • Limitations: The AI may return results that are semantically similar but not actually relevant to your needs. It may also miss results that are relevant but expressed differently.
  • Generated, not retrieved: Answers are generated by AI based on retrieved file content. They are not direct quotations from your files.
  • May contain errors: AI models can make mistakes, including:
    • Hallucinations (generating plausible-sounding but false information)
    • Misinterpretations of context
    • Outdated information (based on training data cutoff)
    • Logical errors
  • Not legal/medical/financial advice: Do not rely on Q&A answers as authoritative for legal, medical, or financial decisions without independent verification.
  • Your responsibility: You should always verify AI-generated answers against the original source material and apply your own judgment.

Golden Retriever’s AI systems are classified as Limited Risk under the EU AI Act, based on:

  • No high-risk uses: The app does not make automated decisions with significant legal or material effects on individuals.
  • User control: You initiate all AI processing; there is no autonomous decision-making.
  • Transparency: This notice, and the app’s interface, clearly indicate when AI is being used.

Golden Retriever complies with the transparency obligations under:

  • EU AI Act Article 50 (Transparency and provision of information to the user)
  • EU AI Act Article 52 (Transparency obligations for certain uses of AI)

These requirements mandate:

  • ✓ Clear disclosure of AI use (this notice)
  • ✓ Information about AI model capabilities and limitations (Sections 2–4)
  • ✓ User rights and consent mechanisms (Section 6)
  • ✓ Contact for AI-related queries (Section 9)

You have the right to opt out of AI processing at any time:

To disable AI features:

  1. Open Golden Retriever
  2. Navigate to Settings → Privacy
  3. Under “AI Processing,” toggle off:
    • ☐ Enable Semantic Search
    • ☐ Enable AI Q&A
  4. Changes take effect immediately.

Effect of opting out:

  • No new embedding vectors will be generated.
  • Semantic search will fall back to keyword search.
  • AI Q&A feature will be disabled.
  • Previously generated embeddings stored locally remain on your device (you can delete them in Settings → Data Management).

5.6.2 Other Rights Under GDPR and the EU AI Act

Section titled “5.6.2 Other Rights Under GDPR and the EU AI Act”

You have the right to:

  • Access: Request information about what personal data is processed (subject access request)
  • Deletion: Request deletion of your data (right to be forgotten) — see Privacy Policy
  • Portability: Request your data in a portable format
  • Non-discrimination: Not be discriminated against for exercising these rights

See our Privacy Policy for detailed instructions on exercising these rights.


5.7. Human Oversight and Automated Decision-Making

Section titled “5.7. Human Oversight and Automated Decision-Making”
Section titled “5.7.1 No Automated Decisions with Legal Effects”

Golden Retriever does not use AI to make automated decisions that produce legal or similarly significant effects on you. Specifically:

  • Search results are provided for your review; you decide whether to act on them.
  • Q&A answers are advisory only; you decide whether to rely on them.
  • No automated eligibility/rejection decisions.
  • No profiling or discrimination.
  • You initiate all processing: Every use of AI features is triggered by your explicit action (pressing search, asking a question).
  • You review outputs: All AI outputs are presented to you for review before any action is taken.
  • You retain final authority: You make all consequential decisions based on AI outputs.

This means Golden Retriever complies with GDPR Article 22 (rights related to automated decision-making), as no fully automated, legally or materially significant decisions are made without human intervention.


Golden Retriever minimizes data exposure:

  • Local-first architecture: Embedding vectors are stored locally in Qdrant (on your Mac), not in the cloud.
  • Transient API calls: File content is sent to Google only when you actively use embedding or Q&A features.
  • No unnecessary retention: Google does not retain inputs after processing under the enterprise service agreement.
  • Encryption in transit: All data sent to Google Vertex AI APIs is encrypted using TLS 1.3+.
  • Docker isolation: Local Qdrant database runs in an isolated Docker container.
  • No telemetry: Golden Retriever does not collect telemetry about your searches or questions.
  • No third-party sharing: Your data is not shared with third parties (other than Google for the APIs described above).

For complete security and privacy details, see our Privacy Policy.


AspectDetails
PurposeGenerate embedding vectors from text, images, and video
InputYour file content (documents, images, videos)
OutputMathematical vectors (~768 dimensions)
ProviderGoogle Cloud (Vertex AI)
Training DataGoogle’s standard training data; your data not used for further training
Version/UpdateLatest stable version via Vertex AI API
LimitationsMay not perfectly capture nuanced semantics; language-dependent; limited by training data cutoff
AspectDetails
PurposeGenerate natural language answers to questions about retrieved file content
InputYour question + retrieved file excerpts (context)
OutputNatural language response
ProviderGoogle Cloud (Vertex AI)
Training DataGoogle’s standard training data; your data not used for further training
Version/UpdateLatest stable version via Vertex AI API
LimitationsMay hallucinate; may misinterpret context; may be outdated; cannot access real-time information
AspectDetails
PurposeLocal storage and semantic search of embedding vectors
InputEmbedding vectors from Gemini Embedding 2
OutputRanked list of semantically similar files
ProviderOpen-source (self-hosted in Docker on your device)
Data LocationYour local Mac (Docker container)
LimitationsVector search returns similarity scores, not factual validation

Golden Retriever’s AI systems are designed with the following responsible AI principles:

  • Transparency: This notice clearly explains how AI is used.
  • User Control: Users can enable/disable AI features and understand what happens with their data.
  • Fairness: AI systems do not discriminate based on protected characteristics.
  • Accountability: This notice provides contact information for AI-related questions.
  • Safety: No fully automated decisions with significant effects.

For AI-specific inquiries, please contact:

Do Your Bit Ltd Email: hq@goldenretriever.ai Privacy Contact: privacy@goldenretriever.ai Website: https://goldenretriever.ai

Please include “Golden Retriever — AI Inquiry” in your subject line.

If you have concerns about how Golden Retriever’s AI complies with the EU AI Act or GDPR, you have the right to lodge a complaint with your national data protection authority. The relevant authority depends on your location; for EU residents, this is typically:

  • Your member state’s Data Protection Authority (for GDPR matters)
  • The competent authority for AI supervision in your member state (for EU AI Act matters)

Example: For Ireland, contact the Data Protection Commission.


This notice is provided under the following regulations:

  • EU AI Act (Regulation (EU) 2024/1689), Articles 50 and 52
  • General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679), Articles 13–14, 22
  • GDPR Recital 58 (Plain and intelligible language)

Embedding Vector: A mathematical representation of data (text, image, video) in a high-dimensional space, where semantically similar content is positioned close together. Used for semantic search.

Semantic Search: Search based on meaning rather than keyword matching. Results are ranked by similarity of meaning to your query.

Large Language Model (LLM): An AI model trained on vast amounts of text to understand and generate human language. Gemini 2.5 Flash is an LLM.

Automated Decision-Making: Decisions made by AI systems without human intervention. Golden Retriever does not use automated decision-making for consequential decisions.

Limited Risk: An EU AI Act category for AI systems that do not fall into the “high-risk” or “prohibited” categories. Limited Risk systems must comply with transparency obligations but not technical or governance requirements for high-risk systems.


VersionDateChanges
1.0March 20, 2026Initial release for Golden Retriever v1.0

This notice will be updated if:

  • New AI features are added
  • AI models or providers change
  • Regulatory requirements change
  • Golden Retriever’s architecture changes materially

You will be notified of material updates via email and within the app.


5.14. Appendix: Privacy Policy Cross-Reference

Section titled “5.14. Appendix: Privacy Policy Cross-Reference”

For information on the following topics, please see our Privacy Policy:

TopicPrivacy Policy Section
What personal data we collectSection 2: Data Collection
How we use your dataSection 3: Data Use
Your rights (access, deletion, etc.)Section 4: Your Rights
How we handle data breachesSection 5: Security and Breach Notification
Cookie and tracking policiesSection 6: Cookies and Tracking
Contact and complaintsSection 7: Contact and Complaints

End of AI Transparency Notice


In plain language:

  • Golden Retriever uses Google’s AI models to search your files and answer questions about them.
  • Your file content is sent to Google’s servers for AI processing, but Google doesn’t keep or use it to train its models.
  • Search results and AI answers are not guaranteed to be accurate — you should verify them.
  • You can turn off AI features anytime in Settings.
  • AI does not make decisions that affect you; you do.
  • If you have concerns, contact us or your data protection authority.

6. DISCLAIMERS AND LIMITATION OF LIABILITY

Section titled “6. DISCLAIMERS AND LIMITATION OF LIABILITY”

The provisions regarding disclaimers of warranties, limitation of liability, and indemnification as set forth in Section 3 (Terms of Service) apply to all aspects of the App and Services, including AI outputs, data processing, and third-party dependencies.


Golden Retriever operates on a “Bring Your Own Cloud” (BYOC) model. To use the core embedding and AI features, you must connect your own Google Cloud Platform (GCP) project. This ensures that your data remains under your control and is processed within your own cloud environment.

By using the BYOC model, you acknowledge and agree that:

  • Third-Party Costs: You are solely responsible for all costs incurred on your GCP account, including charges for Google Vertex AI (Gemini Embedding 2 and Gemini 2.5 Flash APIs) and Google Cloud Storage (GCS).
  • Configuration and Security: You are responsible for properly configuring and securing your GCP project. The Company is not liable for unauthorized access, data breaches, or unexpected charges resulting from misconfiguration of your GCP account.
  • Availability: The App’s AI features depend on the availability of your connected GCP services. The Company is not responsible for App downtime caused by GCP outages, quota limits, or suspended billing on your GCP account.
  • Cost Estimation Disclaimer: The App includes a CloudCostEstimator feature to help estimate potential GCP costs. These are estimates only, and actual costs may vary. The Company is not responsible for any discrepancies between estimated and actual costs.

The App relies on several third-party services and software components. Your use of the App is subject to the terms and policies of these third parties. By using the App, you agree to review and comply with the following:


If any provision of this Agreement is found to be invalid, unenforceable, or illegal by a court of competent jurisdiction, that provision shall be modified to the minimum extent necessary to make it enforceable, or if not possible, severed from this Agreement. The remaining provisions shall remain in full force and effect.

This Agreement constitutes the entire agreement between you and Do Your Bit Ltd regarding the App and supersedes all prior negotiations, discussions, and agreements, whether written or oral. No employee, representative, or agent is authorized to modify this Agreement or make any binding statement contrary to this Agreement.

You may not assign or transfer this Agreement, or any rights or obligations herein, without our prior written consent. We may freely assign this Agreement in connection with a merger, acquisition, corporate reorganization, or sale of all or substantially all of our assets.

The failure of either party to enforce any right or provision of this Agreement will not constitute a waiver of future enforcement of that right or provision.

We may modify this Agreement at any time. We will provide notice of material changes by email or in-app notification at least 30 days before the changes take effect. Your continued use of the App following the effective date constitutes acceptance of the modified Agreement. If you do not agree with modifications, you may cancel your subscription or stop using the App.

Before initiating formal proceedings, you agree to attempt to resolve disputes informally by contacting us at hq@goldenretriever.ai. We will work with you in good faith to resolve the matter within 30 days.

This Agreement shall be governed by and construed in accordance with the laws of England and Wales. You agree that any legal proceeding arising from this Agreement or your use of the App shall be brought exclusively in the courts of England and Wales.

You agree not to pursue claims against Do Your Bit Ltd on a class, collective, or representative basis.

VersionDateDescription
1.0April 11, 2026Initial release of separate legal documents.
2.0April 11, 2026Consolidation into a single comprehensive legal agreement.
ItemDetails
Document TitleGolden Retriever Consolidated Legal Agreement
Effective DateApril 11, 2026
Review FrequencyAnnually or upon significant service changes
Contacthq@goldenretriever.ai

END OF CONSOLIDATED LEGAL AGREEMENT