We act as controller for customer/admin data in the app (accounts, billing, support) and as processor for customers’ end-user analytics/events, processing only under their instructions and DPA. (Information Commissioner's Office)
We design and operate to the seven principles: lawfulness/fairness/transparency; purpose limitation; data minimisation; accuracy; storage limitation; integrity & confidentiality; accountability. Engineering and policy controls are mapped to each principle. (Information Commissioner's Office)
We provide workflows to fulfil UK GDPR rights: to be informed, access, rectification, erasure, restriction, portability, objection, and rights related to automated decision-making. SLA: acknowledge within 7 days, complete within 30 days; processors assist controllers. (Information Commissioner's Office)
Our DPA includes Article 28 clauses: process only on documented instructions; confidentiality; security measures; assist with rights/DPIA/breach; sub-processor controls; deletion/return on termination; audits. Sub-processor list is published and kept current. (Information Commissioner's Office, GOV.UK)
Risk-based technical/organisational measures: encryption in transit/at rest, access control/least privilege, logging & monitoring, vulnerability management, backup & DR, regular testing of controls. (Information Commissioner's Office, gdpr-info.eu)
We run a DPIA for any processing likely to pose high risk (e.g., large-scale tracking, new profiling). DPIAs are also good practice for major product changes and are reviewed before launch. (Information Commissioner's Office)
Where UK personal data leaves the UK, we use approved transfer tools: UK IDTA or the UK Addendum to EU SCCs, plus a transfer risk assessment. (Information Commissioner's Office)
We maintain a breach runbook and register. Notifiable breaches are reported to the ICO within 72 hours of awareness; where there’s high risk to individuals, we notify them without undue delay. (Information Commissioner's Office, gdpr-info.eu)
We maintain a ROPA (record of processing activities), link it to lawful bases, retention, security measures, and DPIAs, and review it regularly. (Information Commissioner's Office)
We will appoint a Data Protection Officer if legally triggered (public authority; large-scale regular/systematic monitoring; or large-scale special-category/criminal-offence data). Otherwise we document why a DPO isn’t required and name a privacy lead. (Information Commissioner's Office)
Default retention schedules are documented per data class in line with storage-limitation; data is deleted or anonymised at end of retention or contract, with verified deletion for processor data. (Information Commissioner's Office)