Last updated: 1 December 2025
This Neon Platform Services Product Specific Schedule (“Product Specific Schedule”) is entered into as of the Effective Date between Neon, LLC (“Neon” or “we”), an affiliate of Databricks, Inc. (“Databricks”), and Customer (as defined below) (“Customer”, “you,” or “your”) and governs Customer’s use of the Neon proprietary cloud computing platform services (the “Neon Platform Services”). By accessing the Neon Platform Services, Customer agrees to the terms of this Product Specific Schedule. If you are entering into this Product Specific Schedule on behalf of a company (such as your employer) or other legal entity, you represent and warrant that you are authorized to bind that entity to this Product Specific Schedule, in which case “Customer,” “you,” or “your” will refer to that entity (otherwise, such terms refer to you as an individual).
This Product Specific Schedule is subject to the terms of the current Databricks Master Cloud Services Agreement located at https://www.databricks.com/legal/mcsa (the “Agreement”), as supplemented and amended by this Product Specific Schedule, solely with respect to a Customer’s use of the Neon Platform Services. Customer acknowledges that we may make changes to the Agreement, this Product Specific Schedule or pricing from time to time and Customer’s continued use of the Neon Platform Services will constitute consent to such changes.
For clarity, this Product Specific Schedule does not affect the terms of the Agreement as they relate to any non-Neon Platform Services, including the Databricks data processing platform services. Capitalized terms not defined here will have the meanings specified in the Agreement. For purposes of this Product Specific Schedule, all references under the Agreement to the “Platform Services” and the “Databricks Services” will be deemed references to the “Neon Platform Services”, and all references to “Databricks” under the Agreement will be deemed references to “Databricks, together with its Affiliates”. In the event of any conflict or inconsistency between this Product Specific Schedule and the Agreement, solely with respect to Customer’s use of Neon Platform Services, this Product Specific Schedule will control.
- Self-Service Plans. The Neon Platform Services will be provided according to the usage-based pricing plan selected by Customer, as described in the Documentation at https://neon.com/docs/introduction/plans (such plans, together with any legacy plans, a “Self Service Plan”). Customer’s subscription to any Self Service Plan will automatically renew on a month-to-month basis (each, a “Subscription Month”), unless Customer cancels its subscription to such Self Service Plan within fourteen (14) business days prior to the expiration of the then-current Subscription Month.
- Fees. Except as otherwise specified in an Order Form, (a) Fees will be determined based on the Self Service Plan selected by Customer and calculated based on Customer’s usage of the Neon Platform Services during each Subscription Month, and (b) all Fees will be invoiced monthly in arrears with payment invoiced and due on or around the first day of the calendar month following each Subscription Month. Fees will be automatically charged to Customer’s payment card on record.
- Amendments to the Agreement:
- Documentation. All references in the Agreement to the “Documentation” shall be deemed references to the documentation related to the Neon Platform Services located at https://neon.com/docs.
- Subprocessor List. All references in the Agreement (including, for clarity, Section 4 of the DPA) to the “Subprocessor List” shall be deemed references to the subprocessor list specific to the Neon Platform Services located at https://neon.com/subprocessors.
- Security Addendum. All references in the Agreement to the “Security Addendum” or “Security Measures” shall be deemed references to the security addendum and security measures attached hereto as Exhibit A.
- Audit. Section 7 (Audits and Records) of the DPA is hereby deleted in its entirety and replaced with the following: “Databricks, together with its Affiliates, will make information reasonably necessary to demonstrate compliance with this DPA available to Customer and allow for and contribute to audits, including inspections conducted by Customer or Customer’s auditor in order to assess compliance with this DPA, where required by applicable law. Customer acknowledges and agrees that Customer will exercise Customer’s audit rights under this DPA by instructing us to comply with the audit measures described in this provision. Upon request, Databricks, together with its Affiliates, will supply (on a confidential basis) the SOC 2 report for the Neon Platform Services and summary copies of the penetration testing report(s) to Customer so that Customer can verify compliance with this DPA.”
- Service Specific Terms. All references in the Agreement to the Service Specific Terms are hereby deleted.
- Projects. All references in the Agreement to “Workspaces” shall be deemed to include any projects created by Customer within the Neon Platform Services.
- Cardholder Data. Customer acknowledges and agrees it shall not include in Customer Content any cardholder data as defined under PCI-DSS (“Cardholder Data”). All references to Cardholder Data in Section 4.5(b) shall be hereby deleted.
- SLA. Notwithstanding anything to the contrary, the Service Level Agreement located at https://neon.com/neon-business-sla shall be incorporated into this Product Specific Schedule by reference and apply exclusively to Customers who have subscribed to the Scale self-service plan.
Exhibit A – Security Measures
Neon, together with its Affiliate Databricks, shall implement reasonable administrative, physical, and technical safeguards to protect the security of the Neon Platform Services and the Customer Content as set forth in this Exhibit A (“Security Measures”). While Neon may update the Security Measures, it shall not materially diminish the effectiveness of the Security Measures during the Term of an Order. All capitalized terms not otherwise defined herein will have the meanings as set forth in the Agreement.
- Access Control.
- Preventing Unauthorized Product Access
- Outsourced processing. We host the Neon Platform Services on an outsourced cloud infrastructure provider, according to a shared responsibility model.
- Physical and environmental security. We host our product infrastructure with multi-tenant, outsourced infrastructure providers. We do not own or maintain hardware located at the outsourced infrastructure providers’ data centers. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems.
- Authentication. We implement a uniform authentication policy for our customer products. Customers who interact with the products via the user interface must authenticate before accessing Customer Content.
- Authorization. Customer Content is stored in multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of our products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set.
- Application Programming Interface (API) access: Public product APIs can be accessed using an API key or through Oauth authorization.
- Preventing Unauthorized Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products.
- Access controls. Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules.
- Intrusion detection and prevention. We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services.
- Static code analysis. Code stored in our source code repositories is checked for best practices and identifiable software flaws using automated tooling.
- Penetration testing. We maintain relationships with industry-recognized penetration testing service providers for penetration testing of the Neon web application, API, and proximity and authentications flows at least annually. The intent of these penetration tests is to identify security vulnerabilities and mitigate the risk and business impact they pose to the in-scope systems.
- Limitations of Privilege & Authorization Requirements.
- Product access. A subset of our employees have access to the products and to customer data via controlled interfaces. The intent of providing access to a subset of employees is to provide effective customer support, product development and research, to troubleshoot potential problems, to detect and respond to security incidents and implement data security. Access is enabled through “just in time” (JITA) requests for access; all such requests are logged. Employees are granted access by role, and reviews of high risk privilege grants are initiated as needed. Administrative or high risk access permissions are reviewed at least annually.
- Reference checks. Where permitted by applicable law, Databricks and Neon employees undergo reference checks. All Databricks and Neon employees are required to conduct themselves in a manner consistent with company guidelines, non-disclosure requirements, and ethical standards.
- Preventing Unauthorized Product Access
- Transmission Control
- In-transit. We require HTTPS encryption (also referred to as SSL or TLS) on all login interfaces. Our HTTPS implementation uses industry standard algorithms and certificates.
- At-rest. We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.
- Input Control.
- Detection. We designed our infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal systems aggregate log data and alert appropriate employees of malicious, unintended, or anomalous activities. Our personnel, including security, operations, and support personnel, are responsive to known incidents.
- Response and tracking. We maintain a record of known security incidents that includes description, dates and times of relevant activities, and incident disposition. Suspected and confirmed security incidents are investigated by security, operations, or support personnel; and appropriate resolution steps are identified and documented. For any confirmed incidents, we will take appropriate steps to minimize product and Customer damage or unauthorized disclosure. Notification to you will be in accordance with the terms of the Agreement.
- Availability Control.
- Online replicas and backups. Where feasible, production databases are designed to replicate data between no less than 1 primary and 1 secondary database. All databases are backed up and maintained using at least industry standard methods.
- Disaster Recovery Plans. We maintain and regularly test disaster recovery plans to help ensure availability of information following interruption to, or failure of, critical business processes.
- Our products are designed to ensure redundancy and seamless failover. The server instances that support the products are also architected with a goal to prevent single points of failure. This design assists our operations in maintaining and updating the product applications and backend while limiting downtime.