DATA PROCESSING AGREEMENT
Version: 2026.1.2
Document Reference: DPA-UNIHELPER-2025
Last Updated: Jan 13, 2026
ISO 27001 Aligned
PREAMBLE
This Data Processing Agreement (hereinafter referred to as the "DPA" or "Agreement") is entered into as of ___________________ (the "DPA Effective Date") and forms an integral and inseparable part of the Software Access Agreement, License Agreement, Terms of Service, or other written or electronic agreement (the "Principal Agreement") for the provision of services between:
THE DATA CONTROLLER:
Institution/Organization Name: _________________________________
Legal Form: _________________________________
Registration Number: _________________________________
VAT/Tax ID: _________________________________
Registered Address: _________________________________
Country of Establishment: _________________________________
Representative Name: _________________________________
Representative Title: _________________________________
Representative Email: _________________________________
Data Protection Officer (if appointed): _________________________________
(hereinafter referred to as the "Controller", "Customer", "Institution", or "Educational Institution")
THE DATA PROCESSOR:
Company Name: UniHelper ApS
Legal Form: Anpartsselskab (Private Limited Company)
Company Registration Number: CVR 39750007
VAT Number: DK39750007
Registered Office: Slotsgade 17B, 6200 Aabenraa, Denmark
Country of Establishment: Denmark
Representative: [Name of Authorized Signatory]
Title: [Title]
Data Protection Officer: Available at contact@unihelper.io
(hereinafter referred to as the "Processor", "UniHelper", "Service Provider", or "Company")
The Controller and Processor may be referred to individually as a "Party" and collectively as the "Parties".
RECITALS
WHEREAS, the Controller has determined that it requires specialized software services for the optimization and automation of student group formation within its educational programs, and has selected the Processor based on its expertise, technical capabilities, and commitment to data protection;
WHEREAS, the Processor has developed and operates a proprietary cloud-based software-as-a-service platform known as the UniHelper system (the "Services" or "Platform"), which utilizes advanced algorithms and data processing techniques to facilitate optimal group composition based on multiple compatibility factors;
WHEREAS, the performance of the Services necessarily requires the Processor to undertake certain processing operations on personal data relating to students, faculty, and administrative personnel of the Controller, such processing being integral to the delivery of the contracted Services;
WHEREAS, the Parties acknowledge that such processing of personal data must be conducted in strict compliance with applicable data protection legislation, including but not limited to:
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (General Data Protection Regulation or "GDPR")
Directive (EU) 2016/680 (Law Enforcement Directive)
Regulation (EU) 2018/1807 (Free Flow of Non-Personal Data)
National implementing legislation in EU Member States
The UK General Data Protection Regulation and Data Protection Act 2018
Applicable international data protection frameworks and standards
WHEREAS, the Parties recognize their respective obligations under Article 28 of the GDPR and equivalent provisions in other applicable data protection laws, which require that processing by a processor be governed by a contract that is binding on the processor with regard to the controller;
WHEREAS, the Parties wish to set forth their rights, responsibilities, and obligations with respect to the processing of personal data in a manner that ensures compliance with all applicable legal requirements while facilitating the effective delivery of the Services;
WHEREAS, the Parties acknowledge the fundamental rights and freedoms of data subjects and commit to implementing appropriate technical and organizational measures to ensure the protection of personal data;
NOW, THEREFORE, in consideration of the mutual covenants, terms, conditions, and agreements contained herein, and for other good and valuable consideration, the receipt and sufficiency of which is hereby acknowledged, the Parties hereby agree as follows:
ARTICLE 1: DEFINITIONS AND INTERPRETATION
1.1 Definitions
For the purposes of this Agreement, the following terms shall have the meanings ascribed to them below:
1.1.1 "Applicable Data Protection Law" means all laws, regulations, regulatory requirements, regulatory guidance, codes of practice, and industry standards applicable to the processing of personal data under this Agreement, including without limitation:
The GDPR and any successor EU legislation
EU Member State laws supplementing or implementing the GDPR
The UK GDPR and UK Data Protection Act 2018
The Federal Educational Rights and Privacy Act (FERPA), 20 U.S.C. § 1232g, where applicable
The Children's Online Privacy Protection Act (COPPA), 15 U.S.C. §§ 6501-6506, where applicable
The California Consumer Privacy Act (CCPA) as amended by the California Privacy Rights Act (CPRA)
Other U.S. state privacy laws including but not limited to those of Colorado, Connecticut, Utah, and Virginia
Sector-specific regulations applicable to educational institutions
Any binding decisions, opinions, or guidance issued by competent supervisory authorities
1.1.2 "Personal Data" means any information relating to an identified or identifiable natural person ('data subject'); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
1.1.3 "Special Categories of Personal Data" means personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health, or data concerning a natural person's sex life or sexual orientation.
1.1.4 "Processing" means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.
1.1.5 "Data Subject" means the identified or identifiable natural person to whom the Personal Data relates, including but not limited to students, prospective students, alumni, faculty members, administrative staff, and other individuals whose Personal Data is processed under this Agreement.
1.1.6 "Personal Data Breach" means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed, regardless of whether such breach results in risk to the rights and freedoms of natural persons.
1.1.7 "Sub-processor" means any natural or legal person, public authority, agency, or other body engaged by the Processor or its affiliates to process Personal Data on behalf of the Controller in connection with this Agreement. Sub-processors are included in Annex II.
1.1.8 "Supervisory Authority" means an independent public authority established by an EU Member State pursuant to Article 51 of the GDPR or equivalent authority in other jurisdictions.
1.1.9 "Standard Contractual Clauses" or "SCCs" means the standard contractual clauses for the transfer of personal data to processors established in third countries as adopted by the European Commission or equivalent mechanisms.
1.1.10 "Services" means the UniHelper cloud-based software-as-a-service platform for student group optimization and collaboration, including all associated features, functionalities, algorithms, interfaces, and technical infrastructure as more particularly described in the Principal Agreement and its annexes.
1.1.11 "Data Protection Impact Assessment" or "DPIA" means an assessment of the impact of envisaged processing operations on the protection of personal data as required under Article 35 of the GDPR.
1.1.12 "Technical and Organizational Measures" or "TOMs" means the measures aimed at protecting Personal Data against unauthorized or unlawful processing and against accidental loss, destruction, or damage, using appropriate technical or organizational measures.
1.2 Interpretation
1.2.1 References to statutory provisions shall be construed as references to those provisions as amended, consolidated, re-enacted, or replaced from time to time.
1.2.2 Headings are inserted for convenience only and shall not affect the construction or interpretation of this Agreement.
1.2.3 Words importing the singular include the plural and vice versa.
1.2.4 Any reference to "including" or "includes" means "including without limitation" or "includes without limitation."
1.2.5 Terms defined in the GDPR but not explicitly defined herein shall have the meanings given to them in the GDPR.
ARTICLE 2: RELATIONSHIP AND ROLES OF THE PARTIES
2.1 Designation of Roles
2.1.1 The Parties expressly acknowledge and agree that with respect to the Processing of Personal Data pursuant to this Agreement:
The Customer acts as the Data Controller, determining the purposes and means of the Processing
UniHelper acts as the Data Processor, processing Personal Data solely on behalf of and under the instructions of the Controller
2.1.2 This designation of roles reflects the factual allocation of responsibilities between the Parties and is binding for all purposes under Applicable Data Protection Law.
2.2 Purpose Limitation
2.2.1 The Processor acknowledges that it has no rights to process Personal Data for any purpose other than:
The provision of the Services as specified in the Principal Agreement
Compliance with the documented instructions of the Controller
Compliance with legal obligations to which the Processor is directly subject
2.2.2 The Processor shall not process Personal Data for its own commercial purposes, including but not limited to marketing, product development (except as anonymized data), or sale to third parties.
2.3 Controller's Regulatory Compliance
2.3.1 The Controller represents and warrants that:
It has all necessary rights, permissions, and lawful bases to provide Personal Data to the Processor
Its instructions comply with Applicable Data Protection Law
It has provided or will provide all necessary privacy notices to Data Subjects
It has obtained or will obtain all necessary consents where required
It has conducted or will conduct any required DPIAs
2.3.2 The Controller acknowledges sole responsibility for:
The accuracy, integrity, and legality of Personal Data
The means by which the Personal Data was acquired
Determining the legal basis for Processing
Responding to Data Subject requests (with Processor assistance as specified herein)
2.4 Independence of the Parties
2.4.1 Nothing in this Agreement shall be construed as creating a partnership, joint venture, agency, or employment relationship between the Parties.
2.4.2 Neither Party shall have authority to bind the other Party except as expressly provided in this Agreement.
ARTICLE 3: SCOPE AND DETAILS OF PROCESSING
3.1 Subject Matter of Processing
The subject matter of the Processing under this Agreement consists of the processing operations necessary for the Processor to provide the Services, specifically:
Implementation and operation of the group formation platform
Collection and analysis of student preference, availability, demographic, skills, and other relevant group formation data the educational institution requests, and in accordance with the educational institution’s privacy policies.
Algorithmic optimization of group compositions
Facilitation of communication regarding group assignments
Evaluate group working process and performance from a student perspective and collect student peer evaluations and feedback
Generation of analytics and reports (in anonymized form)
Technical support and system maintenance
3.2 Duration of Processing
3.2.1 Commencement: Processing shall commence upon the later of:
The DPA Effective Date
The first upload or transmission of Personal Data to the Services
The activation of Customer's account on the Platform
3.2.2 Active Processing Period: Processing shall continue throughout the term of the Principal Agreement, including any renewal periods.
3.2.3 Post-Termination Processing: Limited processing may continue after termination solely for:
Data return or deletion obligations (maximum 30 days)
Compliance with legal retention requirements
Defense of legal claims
3.3 Nature and Purpose of Processing
3.3.1 Nature of Processing Operations:
Collection: Via secure web questionnaires and API integrations
Recording: In cloud-based databases with encryption
Organization: According to institutional structures and courses
Structuring: For algorithmic analysis and optimization
Storage: In EU-based data centers (primary) with secure backups, and in the US (sub-processing via Typeform) with AWS’ GDPR compliant services
Retrieval: Through authenticated access portals
Consultation: For support and quality assurance purposes
Use: For group formation algorithms and service delivery
Disclosure: Only to authorized users within the Controller's organization
Deletion: According to retention schedules and instructions
3.3.2 Purposes of Processing: The sole purposes are to enable the Controller to:
Automate and optimize student group formation
Improve educational outcomes through compatible group composition
Reduce administrative burden on faculty and staff
Provide data-driven insights into group dynamics
Facilitate communication among group members
3.4 Categories of Personal Data
Details of Personal Data categories are set forth in Annex I, which forms an integral part of this Agreement.
3.5 Categories of Data Subjects
Details of Data Subject categories are set forth in Annex I, which forms an integral part of this Agreement.
ARTICLE 4: PROCESSOR'S OBLIGATIONS
4.1 Processing According to Instructions
4.1.1 The Processor shall process Personal Data only on documented instructions from the Controller, unless required to do so by applicable law to which the Processor is subject, in which case the Processor shall inform the Controller of that legal requirement before processing, unless that law prohibits such information on important grounds of public interest.
4.1.2 The Processor confirms that the Controller's instructions as set out in this Agreement, including its Annexes, constitute the complete and final documented instructions. Any additional or alternate instructions must be agreed upon in writing.
4.1.3 The Processor shall immediately inform the Controller if, in its opinion, an instruction infringes the GDPR or other applicable data protection provisions. The Processor shall be entitled to suspend execution of the relevant instruction until the Controller confirms or modifies it.
4.1.4 The Processor shall maintain comprehensive records of all processing activities carried out on behalf of the Controller, containing at minimum the information required under Article 30 of the GDPR.
4.2 Confidentiality
4.2.1 The Processor shall ensure that all persons authorized to process Personal Data:
Have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality
Receive appropriate training on data protection requirements
Are aware of the sensitive nature of Personal Data
Understand the consequences of unauthorized disclosure
4.2.2 The confidentiality obligations shall survive termination of this Agreement indefinitely or for the maximum period permitted by applicable law.
4.2.3 The Processor shall implement and maintain policies and procedures to ensure ongoing compliance with confidentiality requirements, including but not limited to:
Confidentiality agreements with all employees and contractors
Regular training and awareness programs
Disciplinary measures for breaches of confidentiality
Access controls and monitoring systems
4.3 Security of Processing
4.3.1 Taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the Processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk.
4.3.2 The specific technical and organizational measures implemented by the Processor are detailed in Annex II. The Processor shall maintain and update these measures as necessary to address evolving threats and vulnerabilities.
4.3.3 The Processor shall regularly test, assess, and evaluate the effectiveness of technical and organizational measures for ensuring the security of the processing, including but not limited to:
Annual penetration testing
Quarterly vulnerability assessments
Continuous security monitoring
Security reviews (quarterly, annual)
4.4 Use of Sub-processors
4.4.1 General Authorization with Right to Object: The Controller hereby provides general authorization for the Processor to engage Sub-processors listed in Annex II, subject to the following conditions:
The Processor shall inform the Controller of any intended changes concerning the addition or replacement of Sub-processors
Such notification shall be provided at least thirty (30) calendar days in advance
The Controller may object to such changes on reasonable grounds relating to data protection
If the Parties cannot resolve the objection, either Party may terminate the affected Services
4.4.2 Sub-processor Obligations: The Processor shall:
Enter into written agreements with Sub-processors imposing data protection obligations no less protective than those in this Agreement
Remain fully liable for any Sub-processor's acts or omissions
Conduct due diligence on all Sub-processors before engagement
Monitor Sub-processor compliance through regular audits and assessments
Ensure Sub-processors implement appropriate technical and organizational measures
4.4.3 Information Requirements: For each Sub-processor, the Processor shall maintain and provide:
Full legal name and registration details
Contact information including data protection contacts
Description of processing activities performed
Locations of processing and data storage
Applicable safeguards for international transfers
Copies of data processing agreements upon reasonable request
4.5 International Data Transfers
4.5.1 The Processor shall not transfer Personal Data outside the European Economic Area ("EEA") without:
Prior written authorization from the Controller
Implementation of appropriate safeguards under Chapter V of the GDPR
Compliance with any supplementary measures required following the Schrems II judgment
4.5.2 Where transfers are authorized, the Processor shall:
Execute Standard Contractual Clauses or rely on other valid transfer mechanisms
Conduct transfer impact assessments
Implement supplementary technical measures where necessary
Maintain documentation of all transfers and safeguards
Notify the Controller of any developments affecting transfer legality
4.6 Data Subject Rights
4.6.1 The Processor shall, insofar as possible taking into account the nature of the processing, assist the Controller by implementing appropriate technical and organizational measures for the fulfillment of the Controller's obligations to respond to requests for exercising Data Subject rights under Chapter III of the GDPR.
4.6.2 The Processor shall:
Forward any Data Subject request received directly to the Controller without undue delay
Not respond to Data Subjects directly unless authorized by the Controller
Maintain capabilities to support all Data Subject rights including:
Right of access (Article 15 GDPR)
Right to rectification (Article 16 GDPR)
Right to erasure/right to be forgotten (Article 17 GDPR)
Right to restriction of processing (Article 18 GDPR)
Right to data portability (Article 20 GDPR)
Right to object (Article 21 GDPR)
Rights related to automated decision-making (Article 22 GDPR)
4.6.3 Detailed procedures for assisting with Data Subject rights are set forth in Annex III.
4.7 Personal Data Breach Management
4.7.1 The Processor shall notify the Controller without undue delay and in any event within twenty-four (24) hours after becoming aware of a Personal Data Breach affecting Personal Data processed under this Agreement.
4.7.2 Such notification shall include, at minimum:
Nature of the Personal Data Breach including categories and approximate numbers of Data Subjects and Personal Data records concerned
Name and contact details of the data protection officer or other contact point
Likely consequences of the Personal Data Breach
Measures taken or proposed to address the breach and mitigate its possible adverse effects
4.7.3 The Processor shall:
Cooperate fully with the Controller in investigating and remediating the breach
Document all breaches regardless of risk level
Implement measures to prevent recurrence
Provide regular updates on breach resolution
Preserve evidence for potential regulatory investigations
4.8 Data Protection Impact Assessments and Prior Consultation
4.8.1 The Processor shall provide reasonable assistance to the Controller with:
Data protection impact assessments under Article 35 GDPR
Prior consultation with supervisory authorities under Article 36 GDPR
4.8.2 Such assistance may include:
Providing information about technical and organizational measures
Participating in risk assessments
Suggesting mitigation measures
Reviewing DPIA documentation
4.9 Deletion and Return of Personal Data
4.9.1 Upon termination of the Services or upon the Controller's written request, the Processor shall, at the choice of the Controller:
Delete all Personal Data and existing copies within thirty (30) days
Return all Personal Data in a structured, commonly used, and machine-readable format
4.9.2 The Processor shall:
Provide written certification of deletion signed by an authorized representative
Ensure deletion from all systems including backups (where technically feasible)
Retain Personal Data only to the extent required by applicable law
Ensure Sub-processors also delete or return Personal Data
4.10 Audit and Compliance
4.10.1 The Processor shall make available to the Controller all information necessary to demonstrate compliance with the obligations laid down in this Agreement and allow for and contribute to audits, including inspections, conducted by the Controller or another auditor mandated by the Controller.
4.10.2 The Processor shall:
Respond to reasonable audit questionnaires within thirty (30) days
Provide, if available, third-party audit reports (e.g., ISAE 3000, SOC 2)
Permit remote, document only, audits with sixty (60) days advance notice
Bear its own costs for standard audits (Controller bears costs for additional audits)
4.10.3 The Processor may object to an auditor if:
The auditor is a competitor of the Processor
The auditor is not bound by confidentiality obligations
The audit would violate applicable law or professional standards
ARTICLE 5: CONTROLLER'S OBLIGATIONS
5.1 Lawfulness of Processing
The Controller represents, warrants, and undertakes that:
5.1.1 It has established and will maintain appropriate legal bases for all Processing under Article 6 GDPR (and Article 9 where applicable).
5.1.2 All instructions issued to the Processor comply with Applicable Data Protection Law.
5.1.3 It has fulfilled and will continue to fulfill all transparency obligations under Articles 13 and 14 GDPR.
5.1.4 Where consent is relied upon as a legal basis:
Such consent meets all requirements of Articles 4(11) and 7 GDPR
Appropriate mechanisms exist to record and manage consent
Procedures are in place to honor consent withdrawal
5.2 Data Quality and Accuracy
The Controller shall ensure that:
5.2.1 All Personal Data provided is accurate, current, and complete.
5.2.2 Personal Data is adequate, relevant, and limited to what is necessary for the purposes (data minimization).
5.2.3 Appropriate processes exist to maintain data accuracy throughout the processing lifecycle.
5.2.4 No Special Categories of Personal Data are provided unless specifically agreed in writing.
5.3 Cooperation and Information
The Controller shall:
5.3.1 Provide timely responses to Processor requests for clarification or guidance.
5.3.2 Maintain current contact information for all compliance-related communications.
5.3.3 Promptly notify the Processor of any changes affecting processing obligations.
5.3.4 Cooperate in good faith to resolve any data protection issues that arise.
ARTICLE 6: LIABILITY AND INDEMNIFICATION
6.1 Statutory Liability
6.1.1 Each Party's liability for damages under the GDPR shall be determined in accordance with Article 82 GDPR.
6.1.2 The Processor shall be liable for damages caused by processing only where it has:
Not complied with obligations of the GDPR specifically directed to processors
Acted outside or contrary to lawful instructions of the Controller
6.2 Contractual Liability
6.2.1 Subject to Section 6.1, each Party's total aggregate liability arising out of or related to this Agreement shall be subject to the limitations and exclusions set forth in the Principal Agreement.
6.2.2 Nothing in this Agreement shall limit either Party's liability for:
Death or personal injury caused by negligence
Fraud or fraudulent misrepresentation
Any liability that cannot be excluded or limited under applicable law
6.3 Indemnification
6.3.1 Controller Indemnification: The Controller shall defend, indemnify, and hold harmless the Processor from and against all claims, damages, losses, and expenses (including reasonable attorneys' fees) arising from:
The Controller's breach of Applicable Data Protection Law
The Controller's breach of this Agreement
Claims that the Controller lacked necessary rights or permissions for the Processing
The Controller's unlawful instructions
6.3.2 Processor Indemnification: The Processor shall defend, indemnify, and hold harmless the Controller from and against all claims, damages, losses, and expenses (including reasonable attorneys' fees) arising from:
The Processor's breach of this Agreement
The Processor's processing outside or contrary to lawful instructions
The Processor's breach of Applicable Data Protection Law specifically directed to processors
6.3.3 Indemnification Procedures:
The indemnified Party shall promptly notify the indemnifying Party of any claim
The indemnifying Party shall have the right to control the defense
The indemnified Party shall provide reasonable cooperation
No settlement shall be made without the indemnified Party's consent (not to be unreasonably withheld)
ARTICLE 7: TERM AND TERMINATION
7.1 Term
This Agreement shall:
Commence on the DPA Effective Date
Continue for the duration of the Principal Agreement
Automatically renew with any renewal of the Principal Agreement
Terminate automatically upon termination of the Principal Agreement
7.2 Termination for Cause
Either Party may terminate this Agreement immediately upon written notice if:
The other Party materially breaches this Agreement and fails to cure within thirty (30) days of written notice
The other Party breaches Applicable Data Protection Law in a manner that cannot be cured
Continued performance would violate Applicable Data Protection Law
7.3 Effects of Termination
Upon termination:
The Processor shall cease all Processing except as required for compliance with legal obligations
The provisions of Section 4.9 (Deletion and Return) shall apply
All rights and licenses granted hereunder shall immediately terminate
Provisions that by their nature should survive shall remain in effect
ARTICLE 8: GENERAL PROVISIONS
8.1 Governing Law and Jurisdiction
8.1.1 This Agreement shall be governed by and construed in accordance with the laws of Denmark, without regard to its conflict of law provisions.
8.1.2 Any dispute arising out of or in connection with this Agreement shall be subject to the exclusive jurisdiction of the courts of Copenhagen, Denmark.
8.1.3 Notwithstanding the foregoing, either Party may seek injunctive or other equitable relief in any court of competent jurisdiction.
8.2 Amendment and Modification
8.2.1 This Agreement may only be amended or modified by written agreement executed by authorized representatives of both Parties.
8.2.2 The Processor may update Annexes to reflect:
Changes in Sub-processors (subject to objection rights)
Improvements to technical and organizational measures
Updates required by changes in Applicable Data Protection Law
8.3 Severability
If any provision of this Agreement is held to be invalid, illegal, or unenforceable:
The validity, legality, and enforceability of the remaining provisions shall not be affected
The Parties shall negotiate in good faith to replace the invalid provision with a valid provision that achieves the original intent
8.4 Entire Agreement
8.4.1 This Agreement, including all Annexes, constitutes the entire agreement between the Parties with respect to the processing of Personal Data and supersedes all prior or contemporaneous agreements, understandings, and communications.
8.4.2 In the event of any conflict:
Between this Agreement and the Principal Agreement regarding data protection matters, this Agreement shall prevail
Between the body of this Agreement and the Annexes, the body shall prevail unless explicitly stated otherwise
Between different language versions, the English version shall prevail
8.5 Notices
8.5.1 All notices under this Agreement shall be:
In writing
Delivered to the addresses specified in the preamble (or as subsequently updated)
Sent via email with confirmation of receipt, registered mail, or internationally recognized courier
8.5.2 Notices shall be deemed received:
Email: upon confirmation of receipt
Registered mail: five (5) business days after posting
Courier: upon signed receipt
8.6 Force Majeure
Neither Party shall be liable for any failure or delay in performance caused by circumstances beyond its reasonable control, including but not limited to acts of God, natural disasters, war, terrorism, riots, embargoes, acts of civil or military authorities, fire, floods, accidents, pandemics, strikes, or shortages of transportation, facilities, fuel, energy, labor, or materials.
8.7 Assignment
Neither Party may assign, transfer, or delegate any rights or obligations under this Agreement without the prior written consent of the other Party, except:
The Processor may assign to an affiliate or in connection with a merger, acquisition, or sale of all or substantially all of its assets
Upon assignment, the assignee shall assume all obligations under this Agreement
8.8 Third-Party Beneficiaries
This Agreement is intended solely for the benefit of the Parties and their permitted successors and assigns. Nothing in this Agreement confers any rights or remedies upon any third party.
8.9 Relationship of Parties
The Parties are independent contractors. Nothing in this Agreement creates any agency, partnership, joint venture, or employment relationship.
8.10 Waiver
No waiver of any provision of this Agreement shall be effective unless in writing and signed by the waiving Party. No waiver shall constitute a waiver of any other provision or a continuing waiver.
8.11 Counterparts
This Agreement may be executed in counterparts, each of which shall be deemed an original and all of which together shall constitute one and the same instrument. Electronic signatures shall be deemed valid and binding.
ARTICLE 9: DEFINITIONS FOR U.S. EDUCATIONAL INSTITUTIONS
Where the Controller is a U.S. educational institution, the following additional definitions and modifications apply:
9.1 FERPA Definitions
9.1.1 "Education Records" has the meaning set forth in 20 U.S.C. § 1232g and 34 CFR Part 99.
9.1.2 "School Official" means a party to whom an educational institution has outsourced services or functions it would otherwise use employees to perform.
9.1.3 "Legitimate Educational Interest" means the need to review education records to fulfill professional responsibilities for the educational institution.
9.2 COPPA Definitions
9.2.1 "Child" means an individual under the age of 13.
9.2.2 "Verifiable Parental Consent" means consent that meets the requirements of 16 CFR § 312.5.
SIGNATURES
IN WITNESS WHEREOF, the Parties have executed this Data Processing Agreement as of the date last written below.
FOR THE DATA CONTROLLER:
Signature: _______________________________
Print Name: _____________________________
Title: __________________________________
Date: ___________________________________
FOR THE DATA PROCESSOR:
Signature: _______________________________
Print Name: _____________________________
Title: __________________________________
Date: ___________________________________
ANNEX I
CATEGORIES OF PERSONAL DATA PROCESSED BY UNIHELPER
INTRODUCTION
This Annex I describes the categories of Personal Data that the Processor processes when providing the Services to Controller. Unless otherwise specified, references to “Personal Data” shall have the meaning set forth in the Agreement.
All capitalised terms used in this Annex shall have the same definition set forth in this DPA or as defined in the Agreement. Where definitions differ between this DPA and the Agreement, the definition set forth in the Agreement shall prevail and control.
PERSONAL DATA PROCESSED WHEN PROVIDING SERVICES (PROCESSOR ROLE)
When the Controller engages the Processor to provide the Services, Controller may Process the following categories of Personal Data:
2.1 Identity Information
Data Categories:
Full names
User email addresses (typically associated with or provided by user’s educational institution
Enrollment data (course name, section, academic year)
Team numbers assigned by Controller
Data Subjects: Controller’s students, faculty, and staff, and other users as assigned by the Controller
Processing Purpose: to enable group formation, facilitate communication, manage user accounts, and track participation in group formation exercises, and otherwise make use of the Services.
Lawful Bases for Processing: Processor’s performance of contractual obligations and compliance with Controller’s lawful Processing instructions
Source of Personal Data: Provided by the Controller or by Controller’s users
2.2 Educational Information
Data Categories:
User’s course enrollments and program information
User’s academic levels and classification
User’s subject specializations or disciplines
Data Subjects: Controller’s students, faculty, and staff, and other users as assigned by the Controller
Processing Purpose: To contextualize group formation recommendations and ensure academically aligned grouping and to otherwise provide the Services.
Lawful Basis: Processor’s performance of contractual obligations and compliance with Controller’s lawful Processing instructions
Source: Provided by the Controller or by Controller’s users at Controller’s instruction
Note: To the extent such data Personal Data constitutes Special Categories of Personal Data, such data is treated as sensitive and Processed only as instructed by Controller.
2.3 Collaboration and Preference Data
Data Categories:
User’s stated availability (times/dates when a user is available)
User’s expressed work preferences (e.g., working style preferences, group size preferences)
User’s skills assessments and competencies (self-identified by user or provided by Controller)
User’s expectations for group work and collaboration
User’s communication preferences
User’s expertise areas or knowledge domains relevant to coursework
Data Subjects: Controller’s students, faculty, and staff, and other users as assigned by the Controller
Processing Purpose: To serve as input parameters for the Service to generate optimally balanced student groups
Lawful Bases: Processor’s performance of contractual obligations and compliance with Controller’s lawful Processing instructions
Source: Provided by the Controller or by Controller’s users
Note: This data is Processed is used by the Service to create recommendations only and is not used for purposes other than student group formation.
2.4 Technical Data (Services Access and User Authentication)
Data Categories:
Login credentials and authentication information
Session tokens and temporary identifiers
Device identifiers (linked to Services access only)
Timestamps of access to Services
Data Subjects: Controller’s students, faculty, and staff, and other users as assigned by the Controller
Processing Purpose: To manage user authentication, maintain secure access to the Services, and enable platform functions, to otherwise use the Services.
Lawful Bases: Processor’s performance of contractual obligations and compliance with Controller’s lawful Processing instructions
Source: Generated by the Services during user authentication
2.5 Optional/Customized Institutional Data
Data Categories
Varies; the type of Personal Data collected and Processed may include or Special Categories of Personal Data, depending on Controller’s choices
Demographic information (if Controller chooses to collect this information through the Services)
Disability or accessibility requirements (if Controller chooses to collect this information through the Services)
Any other data the Controller chooses to collect through the Services.
Data Subjects: Controller’s students, faculty, and staff, and other users as assigned by the Controller
Processing Purpose: Controller-specific student group formation and optimization through the Services
Lawful Basis: Processor’s performance of contractual obligations and compliance with Controller’s lawful Processing instructions
Source: Provided by the Controller or by Controller’s users
Approval Required: Controller’s Data Protection Officer or legal counsel must review custom questions before implementation
ANONYMIZED AND AGGREGATED DATA
4.1 Service Improvement Analytics
Data Categories (All data is anonymized)
Aggregated patterns of group formation outcomes
Algorithm performance metrics (how effectively groups were formed)
Feature usage trends (which features are used most frequently)
System reliability metrics (uptime, response times)
Anonymized user experience patterns
Processing Purpose:
Optimizing the Service’s algorithm
Improving platform features and performance
Identifying and resolving technical issues
Developing new Services features
All Personal Data is removed, rendering the data anonymized
Data Subjects: None (anonymized)
Retention Period: Indefinite (retained for Services improvement)
Source: Processor collects usage data through the Services
SPECIAL CATEGORIES OF PERSONAL DATA
4.1 Restrictions on Special Category Processing
The Processor acknowledges the protections afforded to Special Categories of Personal Data. The categories of Personal data listed in this Section 4.1 may only be processed under the specific conditions noted below.
Special Categories of Personal Data and Processing Conditions:
Data revealing racial/ethnic origin: Only at Controller’s request and in compliance with GDPR requirements for Processing such data and in accordance with Section 4.2 of this Annex
Data revealing political opinions: Only at Controller’s request and in compliance with GDPR requirements for Processing such data and in accordance with Section 4.2 of this Annex
Data revealing religious beliefs: Only at Controller’s request and in compliance with GDPR requirements for Processing such data and in accordance with Section 4.2 of this Annex
Health data: Only at Controller’s request and in compliance with GDPR requirements for Processing such data and in accordance with Section 4.2 of this Annex
Data concerning sex life or sexual orientation: Only at Controller’s request and in compliance with GDPR requirements for Processing such data and in accordance with Section 4.2 of this Annex
Data revealing trade union membership, genetic data and biometric data is not collected or Processed.
4.2 Institutional Responsibilities for Special Categories of Personal Data
The Processor has no way of knowing what information the Controller chooses to collect using the Services’ custom fields.
When the Controller chooses to use the Services to collect Personal Information that constitutes Special Categories of Personal Data:
The Controller must ensure it has a lawful bases for Processing
The Controller must notify the Processor in writing before processing begins
The Controller remains responsible for obtaining appropriate consent
DATA RETENTION SCHEDULE
Data Category | Context | Retention Period | Reason for Retention |
Identity information | For the Services to function | Duration of group formation exercise + 8 months after last group formation | For Controller’s reference; creation of audit trial of group decisions |
Student’s educational information; student collaboration preferences | For the Services to function | Duration of group formation exercise + 8 months after last formation | For Controller’s reference; context for group optimization; required for algorithmic optimization and follow-up evaluations |
Technical Data | For the Services to function; troubleshooting; improvement to the Services | Duration of contract + as per Controller’s lawful instructions | Access logging; identity and access management; Services improvement |
Anonymized Services Data | For the Services to function; improvement to the Services | Indefinite | Services improvement, usage data |
Backup data may persist beyond primary retention periods.
THIS ANNEX IS CONSIDERED EXECUTED AS OF THE EFFECTIVE DATE OF THE DPA
ANNEX II
TECHNICAL AND ORGANIZATIONAL MEASURES
This Annex II describes the technical and organizational measures Processor implements to protect Personal Data processed through, or as part of providing, the Services.
All capitalised terms used in this Annex shall have the same definition set forth in this DPA or as defined in the Agreement. Where definitions differ between this DPA and the Agreement, the definition set forth in the Agreement shall prevail and control.
1. TECHNICAL SECURITY MEASURES
1.1 Encryption
All Personal Data encrypted at rest using AES-256 encryption
All data transmissions encrypted using TLS 1.3 protocol
Encryption keys managed through secure key management systems
Secure file transfer protocol (SFTP) for data imports
1.2 Access Controls
Multi-factor authentication and/or Single Sign-On (SSO) integration for Services access (Microsoft Entra Single Sign-On (SSO) for Controller’s instructors)
API integration with Controller's learning management systems (where applicable)
Automated session timeout and credential revocation processes
Logging and monitoring of access attempts and session activity
Role-based access control (RBAC) limiting data access based on job function
Principle of least privilege applied to all system access
Formal documented procedures for granting and revoking access upon employee hiring/termination
1.3 Network Security; Incident Detection; Security Monitoring
Intrusion detection and prevention systems actively monitoring unauthorized access attempts, Continuous monitoring of systems for unauthorized access or anomalous activity
Antivirus software with continuous automated updates (or operating system built-in security for updated systems)
Regular security audits and vulnerability assessments of infrastructure
Logging, detection, and notification of personal data breaches
Implementation of automated alerts and incident response workflows
1.4 Data Integrity and Availability
Comprehensive logging of data access and modifications (where technically feasible)
Redundant backup systems with regular testing
Documented disaster recovery and business continuity plans
Secure storage in encrypted cloud databases
Version control and audit trail maintenance
Data lifecycle management according to retention policies
Archive and retrieval systems
1.5 Development and Testing Safeguards
Pseudonymization or full anonymization of Personal Data used in development, testing and non-production environments
Separation of production and non-production environments
Use of pseudonymized or synthetic data in non-production environments
Controlled access and logging for any processing in staging or QA systems
2. ORGANIZATIONAL SECURITY MEASURES
2.1 Personnel Security
Background checks conducted for all new employees with access to Personal Data
All employees sign confidentiality agreements and Personal Data policy compliance declarations upon hiring
Mandatory annual security awareness training covering IT security and GDPR compliance requirements
Access rights reviewed annually to verify continued business need
2.2 Access Management
Access limited strictly to employees with documented business need-to-know
Management oversight and approval required for access provisioning
Annual review and recertification of all access rights
2.3 Incident Response
Documented incident response plan maintained through GDPR Portal system
Security incidents investigated immediately upon detection
Controller notification without undue delay and in any event within 24 hours of Processor becoming aware of a security breach affecting Personal Data
Incident documentation including timeline, impact assessment, and remediation measures
Breach certificates provided upon request
2.4 Risk Management
Annual risk assessments conducted and documented
Identified risks tracked with documented mitigation measures
Annual compliance audits of sub-processors
Regular review and updates of security measures based on risk assessment findings
3. DATA PROCESSING SAFEGUARDS
3.1 Data Minimization
Personal Data collection limited to information necessary for group formation purposes
Controller responsible for ensuring data provided is relevant and not excessive
3.2 Data Segregation
Strict separation maintained between Services data (processed as Processor) and business/marketing data (processed as Controller)
Services data never used for marketing purposes
Services data never sold or shared with third parties except Controller-authorized sub-processors
3.3 Retention and Deletion
Personal Data retained only during active processing period plus 8 months after last group formation
Secure deletion procedures applied upon instruction or contract termination
Backup data may persist in backup systems but will not be actively restored
3.4 Pseudonymization Where Feasible
Personal identifiers removed from data used for Services improvement analytics
Anonymized data cannot be used to identify natural persons
Pseudonymization of personal data for analytics and reporting
Anonymization or aggregation of data for research, benchmarking, and product improvement
Data minimization practices ensuring only strictly necessary data is collected and processed
Automated deletion of transient identifiers once processing is complete
4. SUB-PROCESSOR MANAGEMENT
4.1 Sub-Processor Agreements
Written data processing agreements in place with all sub-processors
Sub-processors bound by same or more strict data protection obligations as Processor
Primary infrastructure hosted on Amazon Web Services'
4.2 Sub-Processor Oversight
Current sub-processor list maintained at www.unihelper.io/sub-processors
30 days advance notice provided before engaging new sub-processors
Annual risk assessments and compliance audits of sub-processors
Controller objection rights
5. INTERNATIONAL DATA TRANSFERS
5.1 Transfer Mechanisms
Standard Contractual Clauses (SCCs) implemented for all cross-border transfers
AWS Data Processing Agreement and Supplementary Addendum in place addressing Schrems II requirements
Transfer impact assessments conducted and documented
5.2 Data Location
Primary data storage: Amazon Web Services data centers in Sweden
Limited sub-processing in United States (Typeform) with appropriate safeguards
All transfers require Controller authorization and documented legal basis
6. PHYSICAL SECURITY
6.1 Data Center Security (via Amazon Web Services)
Physical access controls including biometric authentication
24/7 security monitoring and surveillance
Environmental controls for equipment protection
Compliance with ISO 27001, SOC 2, and other industry certifications
7. MONITORING AND AUDIT
7.1 Continuous Monitoring
Real-time monitoring of security systems and access logs
Automated alerts for suspicious activity or policy violations
Regular security testing including penetration testing where applicable
7.2 Audit Rights
Controller entitled to audit Processor's compliance with these measures upon reasonable notice
Processor will provide reasonable assistance and access for audit purposes
Third-party audit reports (e.g., SOC 2) available upon request subject to confidentiality obligations
8. UPDATES AND REVIEW
8.1 Continuous Improvement
Technical and organizational measures reviewed annually at minimum
Measures updated in response to identified risks, industry developments, and regulatory changes
Material changes communicated to Controller with 30 days advance notice
8.2 Certification and Compliance
Processor maintains compliance with applicable security standards
Compliance documentation available upon reasonable request
This Annex may be updated by Processor to reflect improvements in security measures, provided such updates do not reduce the overall level of protection and Controller is notified in accordance with Section 8.1.
Sub-Processors
Company | Purpose | Type of Personal Data & Processing | Location | Transfer Mechanism |
Business Network | Professional contact details (name, work email), basic usage data related to professional communication and collaboration | EU | Not applicable (EU processing) | |
Amazon Web Services (AWS) | Cloud Hosting, Data Protection, Log Monitoring | Hosting and storage of personal data submitted by users, including identifiers (name, email), group parameters, and system logs; data is processed solely for infrastructure and security purposes | EU | Not applicable (EU processing) |
Zoho | Customer Relationship Management | Contact details of institutional representatives (name, work email, role), communication history, and contract-related metadata | EU | Not applicable (EU processing) |
Proton Technologies | Customer Communications | Communications Email addresses and message content used for secure customer communication and support | Switzerland | Adequacy decision (Switzerland) |
Typeform | Hosting Questionnaires | Survey responses which may include names, email addresses, role/course information, and questionnaire responses as configured by the Controller | US | Standard Contractual Clauses (EU Commission Implementing Decision (EU) 2021/914) + supplementary measures |
EXECUTED AS OF THE EFFECTIVE DATE OF THE DPA
ANNEX III
DATA SUBJECT ACCESS REQUEST ASSISTANCE PROCEDURES
This Annex III describes the process and procedure the Processor will use to respond to and assist the Controller in responding to Data Subject Access Requests (“DSARs”).
All capitalised terms used in this Annex shall have the same definition set forth in this DPA or as defined in the Agreement. Where definitions differ between this DPA and the Agreement, the definition set forth in the Agreement shall prevail and control.
1. GENERAL PRINCIPLES
1.1 Controller Responsibility Controller remains solely responsible for:
Assessing the validity of DSARs
Verifying the identity of data subjects making requests
Determining what data must be disclosed and any applicable exemptions or limitations
Communicating final responses to data subjects
Meeting GDPR response deadlines (one month, extendable to three months for complex requests) so long as Processor responds to such requests in a timely manner
1.2 Processor Assistance Obligation Processor shall provide assistance to Controller by appropriate technical and organizational measures, insofar as possible given the nature of the Services, to enable Controller to fulfill its obligations to respond to DSARs.
1.3 Scope of Assistance This Annex addresses assistance with the following Data Subject Access Request:
Right of access (Article 15)
Right to rectification (Article 16)
Right to erasure (Article 17)
Right to restriction of processing (Article 18)
Right to data portability (Article 20)
Right to object (Article 21)
2. RECEIPT AND NOTIFICATION OF REQUESTS
2.1 Requests Received by Processor If Processor receives a DSAR or other data subject rights request directly from a data subject (including students, faculty, or staff), Processor shall:
Immediately forward the request to Controller's designated contact (specified in Section 9 of this Annex)
Forward the request within 24 hours of receipt
Not respond directly to the data subject except to acknowledge receipt and inform them that their request has been forwarded to Controller
Provide Controller with the date, time, and method by which the request was received
2.2 Instructions from Controller Upon receiving instructions from Controller to assist with a DSAR or other data subject rights request, Processor shall:
Acknowledge receipt of Controller's instructions within 24 hours
Confirm the scope of assistance required
Advise Controller immediately if unable to comply with instructions or if instructions conflict with GDPR obligations
Provide an estimated timeline for completing the requested assistance
3. DATA SUBJECT ACCESS REQUESTS (ARTICLE 15)
3.1 Data Identification and Location Within 10 business days of receiving Controller's instruction, Processor shall identify and locate all Personal Data relating to the data subject within Processor's systems, including:
Production databases containing Services data
System logs and access records (where technically feasible)
Backup and archived data
Any data held by sub-processors
3.2 Data Extraction and Compilation Processor shall:
Extract all identified Personal Data relating to the data subject
Compile the data in a structured, commonly used, and machine-readable format (CSV or JSON preferred, unless Controller specifies otherwise)
Organize data by category or system if extracted from multiple sources
Ensure extracted data is complete, accurate, and reflects the current state of processing
3.3 Third-Party Data Redaction Before providing data to Controller, Processor shall:
Review compiled data for personal data of other individuals
Redact or remove such third-party personal data to prevent unauthorized disclosure
Document all redactions made and the reasons therefor
Notify Controller of any redactions that may affect the completeness of the response
3.4 Metadata and Processing Information Processor shall provide Controller with the following information regarding the data subject's Personal Data:
Categories of Personal Data processed
Purposes of processing under the Services
Categories of recipients to whom data has been disclosed (identifying specific sub-processors)
Retention period applicable to the data or criteria for determining the retention period
Source of the data (if not collected directly from the data subject)
Existence of automated decision-making, including profiling (if applicable to the Services)
Details of any international data transfers and safeguards applied
3.5 Delivery to Controller Processor shall:
Transmit all compiled data and documentation to Controller via encrypted email or secure file transfer system
Use the secure transmission method specified by Controller in Section 9 of this Annex
Provide transmission within the timeframes specified in Section 8 of this Annex
Maintain a transmission log recording date, time, method, and recipient
4. RIGHT TO RECTIFICATION (ARTICLE 16)
4.1 Data Correction Upon Controller's instruction to rectify inaccurate Personal Data, Processor shall:
Identify all instances of the data to be corrected within Processor's systems
Implement the corrections as specified by Controller
Confirm completion of corrections to Controller within 5 business days
Document the rectification including date, nature of correction, and systems affected
4.2 Notification of Rectification Where Controller instructs Processor to notify recipients of the rectification, Processor shall provide Controller with a list of all recipients (sub-processors or other parties) to whom the data was disclosed, to enable Controller to fulfill notification obligations under Article 19.
5. RIGHT TO ERASURE (ARTICLE 17)
5.1 Data Deletion Upon Controller's instruction to erase Personal Data, Processor shall:
Identify all instances of the data subject's Personal Data within Processor's systems
Permanently delete the data from production systems within 5 business days
Delete the data from backup systems in accordance with Processor's standard backup deletion cycle (maximum 8 months per retention schedule)
Provide Controller with written confirmation of deletion, including:
Date of deletion from production systems
Systems from which data was deleted
Estimated timeline for deletion from backup systems
Any technical limitations preventing immediate deletion from backups
5.2 Sub-Processor Coordination Processor shall:
Instruct all sub-processors to delete the data subject's Personal Data
Obtain confirmation of deletion from sub-processors
Provide Controller with documentation of sub-processor deletions
5.3 Exceptions If Processor is required by law to retain certain data, Processor shall:
Notify Controller immediately of the legal obligation
Specify the data that must be retained and the legal basis
Restrict processing of such data to the minimum necessary to comply with legal obligations
6. RIGHT TO RESTRICTION OF PROCESSING (ARTICLE 18)
6.1 Processing Restriction Upon Controller's instruction to restrict processing, Processor shall:
Implement technical measures to prevent further processing of the data subject's Personal Data (such as flagging records, moving data to separate storage, or temporarily removing data from active processing)
Confirm to Controller the specific restrictions implemented
Ensure restricted data is processed only:
With the data subject's consent
For establishment, exercise, or defense of legal claims
For protection of rights of another person
For reasons of important public interest
Notify Controller before lifting any restriction, per Controller's further instructions
6.2 Duration of Restriction Processor shall maintain restrictions until Controller provides further instructions to:
Lift the restriction
Permanently delete the data
Continue the restriction indefinitely
7. RIGHT TO DATA PORTABILITY (ARTICLE 20)
7.1 Data Export in Machine-Readable Format When Controller requests assistance with data portability, Processor shall:
Extract the data subject's Personal Data that was provided by the data subject to Controller
Provide data in structured, commonly used, and machine-readable format (JSON, CSV, or XML)
Exclude data derived from analysis or generated by Processor's algorithms unless Controller specifically requests such data
Provide data within 10 business days of Controller's instruction
7.2 Direct Transfer (If Technically Feasible) If Controller requests that Processor transmit data directly to another controller specified by the data subject:
Processor shall cooperate to the extent technically feasible
Processor may charge reasonable fees for direct transfer services not contemplated in standard Services functionality
Controller and Processor shall agree on technical specifications and security measures prior to transfer
8. RESPONSE TIMEFRAMES
8.1 Standard Timeframes Unless otherwise agreed in writing, Processor shall provide assistance within the following timeframes after receiving Controller's instructions:
Request Type | Processor Response Time |
Data identification and location | 5 business days |
Data extraction and compilation (DSAR) | 10 business days |
Rectification | 5 business days |
Erasure from production systems | 5 business days |
Restriction of processing | 3 business days |
Data portability export | 10 business days |
8.2 Complex Requests For complex requests involving:
Data relating to multiple individuals
Large volumes of data (exceeding 10,000 records)
Data requiring extensive redaction
Data held by multiple sub-processors
Processor may extend the response time by up to an additional 10 business days, provided Processor:
Notifies Controller within 3 business days of receiving instructions
Explains the reason for the extension
Provides Controller with a specific completion date
8.3 Expedited Requests If Controller requires expedited assistance due to urgent circumstances, Controller shall:
Clearly mark the request as "URGENT"
Explain the circumstances requiring expedited processing
Processor shall use reasonable efforts to accommodate expedited requests but is not obligated to do so if technically infeasible
9. COMMUNICATION AND COORDINATION
9.1 Controller Contact Information Controller designates the following contact for DSAR-related communications:
Primary Contact: [Name/Title]
Email: [Email Address]
Phone: [Phone Number]
Alternate Contact: [Name/Title]
Controller shall notify Processor in writing of any changes to designated contacts within 5 business days.
9.2 Processor Contact Information Processor designates the following contact for DSAR-related communications:
Primary Contact: Data Protection Officer
Email: contact@unihelper.io
Response Time: Acknowledgment within 24 hours
Escalation Contact: Daniel Pratte, Head of Sales, daniel@unihelper.io
9.3 Secure Transmission Methods Parties agree to use the following methods for secure transmission of Personal Data:
Primary Method: Encrypted email (TLS 1.3 minimum)
Alternative Method: Secure file transfer system (to be mutually agreed)
Controller may specify additional security requirements on a case-by-case basis
10. SUB-PROCESSOR COORDINATION
10.1 Sub-Processor Instructions When Processor engages sub-processors in fulfilling Controller's DSAR instructions, Processor shall:
Forward Controller's instructions to relevant sub-processors within 2 business days
Impose the same assistance obligations on sub-processors as set forth in this Annex
Monitor sub-processor compliance with instructions and timeframes
Consolidate responses from multiple sub-processors before providing to Controller
10.2 Sub-Processor Response Times Processor shall ensure sub-processor agreements require response times that enable Processor to meet its obligations under Section 8 of this Annex.
10.3 Liability Processor remains fully liable to Controller for the performance of sub-processors in providing DSAR assistance, per GDPR Article 28(4).
11. DOCUMENTATION AND AUDIT TRAIL
11.1 Records Maintenance Processor shall maintain records of all DSAR assistance provided, including:
Date and time request received from Controller
Scope of data subject's request
Systems searched and data extracted
Any redactions or limitations applied
Date and time response provided to Controller
Any issues, delays, or technical limitations encountered
11.2 Record Retention Processor shall retain DSAR assistance records for 3 years following completion of the request, or for such longer period as required by law.
11.3 Availability for Audit Upon Controller's reasonable request, Processor shall make DSAR assistance records available for audit or inspection to demonstrate compliance with this Annex.
12. FEES AND COSTS
12.1 No Additional Fees Processor shall provide assistance under this Annex without charging additional fees beyond those specified in the Agreement, except as provided in Section 12.2.
12.2 Excessive or Manifestly Unfounded Requests If Controller instructs Processor to assist with a request that Processor reasonably believes is manifestly unfounded or excessive (particularly due to repetitive nature), Processor may:
Notify Controller of the excessive nature of the request
Provide Controller with an estimate of additional costs and resources required
Charge reasonable fees for assistance with such requests, subject to Controller's advance written approval
12.3 Custom Development Fees for custom development or system modifications required to fulfill specific DSAR requests shall be agreed between the parties in writing prior to undertaking such work.
13. LIMITATIONS AND EXCEPTIONS
13.1 Technical Limitations Processor shall notify Controller promptly of any technical limitations that prevent full compliance with Controller's instructions, including:
Data that cannot be extracted due to technical constraints
Data commingled with other data subjects' data that cannot be separated
Backup data that cannot be immediately accessed or deleted
Sub-processor limitations on data access or extraction
13.2 Legal Obligations If Processor determines that Controller's instructions conflict with GDPR or other applicable law, Processor shall:
Immediately inform Controller of the conflict
Refrain from executing the conflicting instruction
Work with Controller to find an alternative approach that complies with law
13.3 Resource Constraints Processor shall maintain sufficient technical and personnel resources to fulfill obligations under this Annex. If unforeseen circumstances prevent timely performance, Processor shall notify Controller immediately and propose alternative timeframes.
14. TRAINING AND CAPABILITY MAINTENANCE
14.1 Personnel Training Processor shall ensure that personnel involved in DSAR assistance are trained on:
GDPR data subject rights requirements
Procedures set forth in this Annex
Technical systems for data identification, extraction, and deletion
Confidentiality obligations
14.2 Technical Capability Processor shall maintain technical and organizational measures enabling efficient DSAR assistance, including:
Searchable and retrievable data systems
Data export functionality in machine-readable formats
Secure transmission capabilities
Documentation and audit trail systems
14.3 Process Review Processor shall review and update DSAR assistance procedures annually and whenever material changes occur to the Services or processing activities.
15. UPDATES TO PROCEDURES
15.1 Amendment Process This Annex may be amended by mutual written agreement of the parties.
15.2 Processor Improvements Processor may update procedures to improve efficiency or security, provided such updates:
Do not reduce the level of assistance provided
Do not extend response timeframes
Are communicated to Controller with 30 days advance notice
15.3 Regulatory Changes If changes to GDPR or other applicable law require modifications to procedures, Processor shall notify Controller and propose necessary amendments within 30 days of such changes taking effect.
16. MISCELLANEOUS
16.1 Cooperation Both parties agree to cooperate in good faith to facilitate efficient handling of data subject rights requests while ensuring GDPR compliance.
16.2 Escalation Either party may escalate issues or disputes regarding DSAR assistance to executive contacts specified in the main Agreement.
16.3 Precedence In the event of conflict between this Annex and the main body of the Agreement, this Annex shall control with respect to DSAR assistance procedures.
EXECUTED AS OF THE EFFECTIVE DATE OF THE DATA PROCESSING AGREEMENT
Previous Versions
Archived – For Reference Only. Valid only for customers who signed an order form or agreement within the active dates listed.
Date Format (DD:MM:YYY)
Document | Active Dates | Archived Date |
|---|---|---|
Data Processing Agreement (Archived January 2026) | 01/11/2025 - 13/01/2026 | 14/01/2026 |
Data Processing Agreement (Archived October 2025) | 01/01/2018 - 31/10/2025 | 31/10/2025 |