Data Processing Agreement & Data Retention
App Name: Jane’s Medical Journal
Defining Roles, Scope, and Managing Sub-processors
When relying on managed infrastructure to host services, we assume a high level of legal responsibility under global data protection laws. The infrastructure hosting this application resides on hardware owned by third-party cloud infrastructure providers. Under the GDPR, these entities act as sub-processors. We guarantee that these sub-processors are bound by equivalent data protection obligations.
If the infrastructure involves transferring data outside of the European Economic Area (EEA), we strictly incorporate Standard Contractual Clauses (SCCs). SCCs act as the primary legal mechanism to ensure that personal data transferred internationally continues to benefit from an essentially equivalent level of protection.
Technical and Organizational Measures (TOMs)
We implement measures ensuring a level of security appropriate to the calculated risk of the data processing.
- Infrastructure-Level Security: Underlying environments are secured against unauthorized access using physical datacenter security, strict network security policies, and storage encryption for all data at rest.
- Application-Level Security and Access Controls: We enforce the principle of least privilege, mandate role-based access control (RBAC), and ensure that strict encryption protocols (such as TLS 1.2+ minimums) are uniformly applied to secure all data in transit.
- Intrusion Detection and Breach Notification: We actively deploy behavioral analysis and intrusion prevention systems to continuously analyze access logs and block malicious activity. In the event of a confirmed personal data breach affecting the authentication portal or databases, affected users and regulatory authorities are notified without undue delay.
Data Retention Policy
Our data retention policy is intended to ensure that data is stored securely and for only as long as needed to achieve the purposes for processing, in order to comply with laws, regulations, and contractual requirements.
- Deletion Frameworks: Upon receiving a valid, verified deletion request from a user (Right to Erasure under GDPR, or Right to Delete under CCPA), the service will permanently purge user identity credentials, session tokens, and associated tracking telemetry within the legally mandated timeframes (typically 30 to 45 days).
- Security Exemptions: We robustly reserve the legal right to maintain anonymized, aggregated security logs that are strictly necessary for auditing past security incidents, debugging critical infrastructure failures, and detecting malicious network activity, as permitted by security exemptions embedded in privacy frameworks.