Skip to main content
GDPR / POPIA Compliance

Data Processing Agreement

GDPR Article 28 compliant Data Processing Agreement for organizations subject to EU, UK, South African, and Ghanaian data protection regulations.

Template Version: 1.0Date: February 23, 2026

Important: This is a template DPA. It must be reviewed by your legal counsel and executed by authorized representatives of both parties. This DPA is designed to satisfy GDPR Article 28, UK GDPR, POPIA, and the Ghana Data Protection Act. Contact [email protected] to initiate execution.

Preamble

This Data Processing Agreement ("DPA") is entered into by and between the organization identified in the applicable Order Form ("Controller") and EvanstonTEC LLC, doing business as LIAM Platform ("Processor"), effective as of the date of the last signature below.

This DPA supplements the Terms of Service and any applicable Order Form between the parties. It sets out the terms under which the Processor processes Personal Data on behalf of the Controller in connection with the LIAM platform services.

1. Definitions

"Applicable Data Protection Law" means all laws and regulations applicable to the processing of Personal Data under this DPA, including: the EU General Data Protection Regulation (Regulation 2016/679) ("GDPR"); the UK General Data Protection Regulation and Data Protection Act 2018 ("UK GDPR"); the South African Protection of Personal Information Act 4 of 2013 ("POPIA"); the Ghana Data Protection Act, 2012 (Act 843); and any other applicable data protection legislation in the jurisdictions where the Controller operates.

"Personal Data" means any information relating to an identified or identifiable natural person that is processed by the Processor on behalf of the Controller in connection with the Services.

"Sub-processor" means any third party engaged by the Processor to process Personal Data on behalf of the Controller.

"Data Subject" means the identified or identifiable natural person to whom the Personal Data relates.

"Standard Contractual Clauses" or "SCCs" means the standard contractual clauses for the transfer of personal data to third countries adopted by the European Commission Decision 2021/914.

2. Scope and Purpose of Processing

2.1 Subject Matter

The Processor processes Personal Data on behalf of the Controller to provide cybersecurity monitoring, threat detection, vulnerability management, compliance assessment, and, where applicable, remote patient monitoring services through the LIAM platform.

2.2 Categories of Data Subjects

Data Subjects may include: employees, contractors, and agents of the Controller; users of the Controller's IT systems and networks; individuals whose data appears in security logs and threat intelligence; and, for healthcare deployments, patients and healthcare providers.

2.3 Types of Personal Data

Personal Data processed may include: names, email addresses, and job titles of platform users; IP addresses, device identifiers, and network metadata from security monitoring; authentication credentials and access logs; compliance assessment responses and documentation; and, for healthcare deployments, health data as defined in GDPR Article 9 (special category data).

2.4 Duration

Processing shall continue for the duration of the service agreement. Upon termination, Personal Data shall be returned or deleted in accordance with Section 9 of this DPA.

3. Obligations of the Processor

The Processor shall: (a) process Personal Data only on documented instructions from the Controller, including with regard to transfers of Personal Data to a third country, unless required to do so by applicable law; (b) ensure that persons authorized to process Personal Data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality; (c) implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, as described in Annex II; (d) respect the conditions for engaging Sub-processors as set out in Section 5; (e) assist the Controller in responding to requests from Data Subjects exercising their rights; (f) assist the Controller in ensuring compliance with obligations related to security, breach notification, data protection impact assessments, and prior consultation; (g) at the choice of the Controller, delete or return all Personal Data upon termination of services; and (h) make available to the Controller all information necessary to demonstrate compliance with this DPA and allow for and contribute to audits.

4. Security Measures

The Processor implements and maintains the following technical and organizational measures:

Encryption: AES-256 encryption at rest for all databases and file storage; TLS 1.2+ for all data in transit; tenant-specific encryption key management.

Access Control: Role-based access control (RBAC) with super_admin, client_admin, and client_user roles; principle of least privilege; multi-factor authentication; SSO/SAML integration for enterprise identity providers.

Audit Logging: Comprehensive logging of all data access, modifications, and administrative actions; tamper-evident log storage; minimum seven (7) year retention for compliance logs.

Data Isolation: Multi-tenant architecture with organization-scoped database queries; Cross-Tenant Isolation Proof system providing cryptographic verification of data boundary integrity; logical separation of all tenant data.

Incident Response: Automated threat detection and response; 24-hour breach notification to Controller; documented incident response procedures; regular security drills.

Business Continuity: Automated database backups; disaster recovery procedures; geographic redundancy for critical services.

Personnel: Background checks for all personnel with access to Personal Data; mandatory security awareness training; confidentiality agreements.

5. Sub-processors

The Controller provides general written authorization for the Processor to engage Sub-processors. The Processor shall: (a) maintain a current list of Sub-processors, available at the LIAM platform's trust page or upon request; (b) notify the Controller of any intended changes to Sub-processors at least thirty (30) days in advance; (c) impose data protection obligations on Sub-processors that are no less protective than those in this DPA; and (d) remain fully liable to the Controller for the performance of Sub-processor obligations.

If the Controller objects to a new Sub-processor on reasonable data protection grounds, the parties shall discuss the concern in good faith. If the concern cannot be resolved, the Controller may terminate the affected services without penalty.

Current Sub-processors

Sub-processorPurposeLocation
Simnet.caCloud hosting and PaaS infrastructureCanada
Amazon Web ServicesS3 object storage for file and document storageUnited States
TiDB CloudManaged database serviceUnited States
SendGrid (Twilio)Transactional email deliveryUnited States
SentryError monitoring and performance trackingUnited States
VirusTotal (Google)Malware and threat intelligence analysisUnited States

6. Data Subject Rights

The Processor shall assist the Controller in fulfilling its obligations to respond to Data Subject requests, including requests for access, rectification, erasure, restriction of processing, data portability, and objection. The Processor shall respond to Controller instructions regarding Data Subject requests within ten (10) business days. If a Data Subject contacts the Processor directly, the Processor shall promptly redirect the request to the Controller.

7. International Data Transfers

Where Personal Data is transferred from the EU/EEA/UK to a country that has not received an adequacy decision from the European Commission, the parties agree that the Standard Contractual Clauses (Module Two: Controller to Processor) shall apply. The SCCs are incorporated by reference into this DPA.

For transfers from South Africa, the Processor ensures compliance with POPIA Section 72 by maintaining adequate safeguards, including binding corporate rules or contractual obligations that provide an adequate level of protection.

For transfers from Ghana, the Processor ensures compliance with the Ghana Data Protection Act by obtaining appropriate consent or ensuring adequate safeguards are in place.

8. Data Protection Impact Assessments

The Processor shall provide reasonable assistance to the Controller in conducting data protection impact assessments and prior consultations with supervisory authorities, where required under Applicable Data Protection Law. Such assistance shall be provided at the Controller's expense, except where the assessment is necessitated by the Processor's actions.

9. Data Return and Deletion

Upon termination of the service agreement, the Processor shall, at the Controller's election: (a) return all Personal Data to the Controller in a structured, commonly used, and machine-readable format (JSON or CSV) within thirty (30) days; or (b) securely delete all Personal Data within ninety (90) days and certify such deletion in writing. The Processor may retain Personal Data to the extent required by applicable law, provided that such retention is limited to the minimum necessary and the Personal Data remains subject to the protections of this DPA.

10. Audit Rights

The Controller has the right to audit the Processor's compliance with this DPA. Audits may be conducted by the Controller or an independent third-party auditor appointed by the Controller, subject to reasonable confidentiality obligations. The Processor shall provide reasonable cooperation and access to relevant facilities, systems, and personnel. Audits shall be conducted during normal business hours with at least thirty (30) days' prior written notice, and no more than once per year unless a Breach has occurred or a supervisory authority requires an audit.

11. Breach Notification

The Processor shall notify the Controller of any Personal Data Breach without undue delay and in any event within twenty-four (24) hours of becoming aware of the Breach. This notification timeline exceeds the requirements of GDPR (72 hours) and POPIA (as soon as reasonably possible) to provide the Controller with maximum response time. The notification shall include: the nature of the Breach, including the categories and approximate number of Data Subjects and records concerned; the likely consequences of the Breach; the measures taken or proposed to address the Breach; and the contact details of the Processor's data protection point of contact.

12. Governing Law

This DPA shall be governed by the laws of the State of Illinois, United States, except where Applicable Data Protection Law requires otherwise. For EU/EEA Data Subjects, the GDPR and applicable member state law shall apply to data protection matters. For UK Data Subjects, the UK GDPR shall apply. For South African Data Subjects, POPIA shall apply. For Ghanaian Data Subjects, the Ghana Data Protection Act shall apply.

13. Contact and Execution

To execute this DPA or for data protection inquiries, please contact:

EvanstonTEC LLC — Data Protection

1452 East 53rd Street, 2nd Floor

Chicago, IL 60615

Email: [email protected]

All subscription plans include DPA execution at no additional cost.