Yes, our company has a dedicated Computer Incident or Emergency Response process in place to respond to cyberattacks. In the event of a cyber incident, the RELAYTO Infrastructure/Security Team is responsible for implementing our response plan, which includes the following key components: Immediate Identification and Assessment, Containment and Mitigation, Notification Protocol, Investigation and Analysis, Recovery and Restoration, Post-Incident Review and Improvement How many of your personnel have either onsite or remote access to Customer data? Depends on the support package. On average up to 10 people. Are background checks performed on all of your personnel who have access to Customer data? Yes Are all such personnel required to sign written confidentiality agreements that prohibit disclosure and use of Customers’ data and other confidential information? Yes Does RELAYTO utilize Open Source software in its operation? Yes. The RELAYTO platform utilizes some of the open-source frameworks and libraries, e.g. Angular, Symfony. File the request for the full list separately over email. What is RELAYTO’s architecture? 40 of 53

Terms, Conditions, Policies & Plans - Page 40 Terms, Conditions, Policies & Plans Page 39 Page 41