Skip to content

Data Processing Agreement (DPA)

Pursuant to GDPR Article 28(3)


1. Parties

Data Controller: - Name: [CLIENT COMPANY NAME] - Address: [CLIENT ADDRESS] - Email: [CLIENT CONTACT EMAIL] - Represented by: [AUTHORIZED REPRESENTATIVE]

Data Processor: - BeDefended S.r.l. - Address: Italy - Email: privacy@bedefended.com - Data Protection Officer: privacy@bedefended.com


2. Scope of Processing

2.1 Subject Matter

BeDefended shall process personal data for the purpose of: - Automated web and mobile application security testing - Penetration testing and vulnerability assessment - Security findings documentation and reporting

2.2 Duration

  • Start Date: [ENGAGEMENT START DATE]
  • End Date: [ENGAGEMENT END DATE]
  • Data Retention: 1 year after engagement completion, then deletion

2.3 Nature of Processing

  • Collection: Not by BeDefended (Controller provides scope/targets)
  • Recording: Screenshot capture, evidence collection during testing
  • Organization: Filing and categorization in engagement database
  • Retrieval: Accessed by authorized pentester staff only
  • Disclosure: Included in final report to Controller
  • Alignment: Anonymization/de-identification where applicable
  • Deletion: Per retention schedule (Section 2.2)
  • Destruction: Secure deletion via NIST guidelines

2.4 Type of Personal Data

The engagement may incidentally capture personal data found in: - Error messages (user IDs, email addresses) - HTTP responses (PII in data fields) - Screenshots (UI text containing PII) - Cache/memory dumps (session tokens, credentials)

The Controller is responsible for: - Identifying personal data categories in scope - Providing authorization to process such data - Authorizing disclosure in the final report

2.5 Categories of Data Subjects

  • Web application end-users
  • Administrators
  • Test account users created during engagement
  • (Not employees of BeDefended)

3. Processor Obligations (GDPR Art. 28(3))

3.1 Processing Instructions

BeDefended shall process personal data only on documented instructions from the Controller, including: - Scope of testing (URLs, domains, systems in-scope) - Testing methodology (tools, techniques, depth) - Data handling instructions (anonymization rules) - Restrictions (data not to be modified, deleted, or exfiltrated)

3.2 Confidentiality & Secrecy

BeDefended staff involved in processing shall: - Be subject to confidentiality obligations (contractual) - Not disclose findings except to authorized Controller representatives - Not use personal data for own purposes - Adhere to the Penetration Testing Code of Ethics (PTES)

3.3 Data Security (GDPR Art. 32)

BeDefended implements: - Encryption in transit: TLS 1.3 with certificate pinning (desktop) - Encryption at rest: AES-256-GCM for report storage - Access Control: RBAC + MFA for staff - Audit Logging: All access logged with timestamp, IP, staff ID - Network Security: Firewall, WAF, DDoS mitigation - Physical Security: ISO 27001 compliant data center access controls - Incident Response: 4-hour detection, 24-72 hour notification SLA

Annual Security Audit: BeDefended undergoes independent penetration testing.

3.4 Sub-processors (GDPR Art. 28(2), 28(4))

BeDefended uses the following sub-processors for:

Sub-processor Purpose Data Location Agreement
AWS Backup storage (optional) Reports, logs EU/US DPA signed
GitHub Source control (internal) Code, not PII US DPA signed
Stripe Payment processing Billing only, not engagement data US SAC 2 certified

Changes to sub-processors: - Notified to Controller 15 days in advance - Controller may object on grounds of incompatibility with GDPR

3.5 Data Subject Rights

BeDefended shall: - Assist Controller in fulfilling data subject requests (access, deletion, portability) - Provide requested data within 5 working days - Support DPIA if Controller requests (Section 5) - Not prevent Controller from providing data to data subjects

3.6 Deletion & Return of Data

Upon engagement completion: 1. Option A: Delete all personal data in reports/logs (default) 2. Option B: Return encrypted copies to Controller for archival 3. Option C: Pseudonymize data for continuous monitoring (with explicit consent)

Deletion completed within 30 days of engagement end. Certification: Written confirmation of deletion provided to Controller.


4. Controller Rights & Audit

4.1 Processor Audits

Controller may: - Audit BeDefended: Upon 30 days' written notice, during business hours - Request evidence: Documentation of security measures, compliance certifications - Subcontractor audits: Extend audit rights to BeDefended's sub-processors

Audit Frequency: At least annually, or more often if GDPR breach suspected.

4.2 Records of Processing

BeDefended maintains: - Records of all data access (audit logs) - Staff authorization levels - Sub-processor contacts & agreements - Security incident history

Available to Controller upon request (within 10 working days).

4.3 Incident Notification (GDPR Art. 33)

If a breach occurs: 1. Detection → Notification: Within 24 hours of discovery 2. Information provided: - Nature of breach (unauthorized access, disclosure, deletion) - Categories of personal data affected - Likely consequences - Measures taken/proposed 3. Escalation: If high-risk breach, Controller must notify DPA within 72 hours


5. Data Protection Impact Assessment (DPIA)

5.1 When Required

Controller must conduct DPIA if: - Testing targets high-risk systems (healthcare, financial, government) - Personal data categories are sensitive (health, biometric, genetic) - Scope is large or high-frequency monitoring

5.2 BeDefended Support

BeDefended shall provide: - Description of processing activities - Purpose and legal basis - Known risks and mitigations - Security controls documentation


6. Liability & Indemnification

6.1 Processor Liability

BeDefended is liable for damages if: - Violating GDPR obligations regarding data protection - Mishandling personal data entrusted to it - Failing to follow documented instructions

Liability Limit: Capped at engagement fee (up to €100,000 for large engagements).

6.2 Controller Liability

Controller is liable for: - Determining lawful basis for processing - Providing accurate scope/testing instructions - Obtaining necessary authorizations from data subjects


7. International Transfers

7.1 Adequacy Decision

If data is transferred to non-EEA countries: - US: Standard Contractual Clauses (SCC) in place - Other countries: Assessed under GDPR Chapter V

7.2 Supplementary Safeguards (Schrems II)

For US transfers, additional measures: - Encryption end-to-end - Limited access via access logs - Ability to object to specific transfers - Right to terminate if safeguards inadequate


8. Term & Termination

8.1 Duration

  • Agreement effective upon signature
  • Continues for duration of engagement + 1 year data retention period
  • Either party may terminate with 15 days' written notice

8.2 Post-Termination

Upon termination: - All personal data deleted or returned per Section 3.6 - Staff confidentiality obligations continue indefinitely - Cooperation on audit requests continues 2 years post-termination


9. Governing Law & Disputes

  • Governing Law: Italian law, GDPR, applicable EU/national data protection regulations
  • Jurisdiction: Italian courts (or as specified in main services agreement)
  • Arbitration: Disputes may be escalated to European Data Protection Board

10. Amendments

This DPA may be amended: - By mutual written consent - To comply with GDPR updates or regulatory changes - To reflect new sub-processors or security measures

Changes effective 30 days after written notice unless emergency (data breach, security vulnerability).


Signature

For the Data Controller:

Name (Authorized Representative): _________

Title: _________

Signature: _________

Date: _________

For BeDefended (Data Processor):

Name: _________

Title: _________

Signature: _________

Date: _________


Appendix: Security Measures

Control Implementation
Access Control RBAC, MFA mandatory for admin/pentester
Encryption in Transit TLS 1.3, HSTS preload
Encryption at Rest AES-256-GCM for sensitive data
Audit Logging All access logged (timestamp, IP, user, action)
Incident Response 4-hour detection, 24-72 hour notification
Backup Daily automated backups, tested monthly
Vulnerability Management Quarterly penetration tests, dependency scanning
Staff Training Annual GDPR/data protection training
Subcontractor DPA All sub-processors under DPA
Data Retention Deleted per schedule (Section 3.6)

Document Version: 1.0 | Effective: 2026-03-17