{% include '@Application/inc/central_header.html.twig' %}
<style>
/* ── Nordic DPA Page ────────────────────────────────────────────────────────── */
:root {
--pol-amber: #C07D2A;
--pol-dark: #1A1D2E;
--pol-cream: #F7F5F0;
--pol-muted: #6B6E7F;
--pol-border: rgba(26,29,46,.09);
}
body.body-mask { background: var(--pol-cream) !important; }
.pol-outer { max-width: 1100px; margin: 0 auto; padding: 56px 28px 100px; }
.pol-grid { display: grid; grid-template-columns: 220px 1fr; gap: 48px; align-items: start; }
@media (max-width: 768px) { .pol-grid { grid-template-columns: 1fr; } .pol-toc-col { display: none; } }
.pol-hero { margin-bottom: 44px; padding-bottom: 32px; border-bottom: 1px solid var(--pol-border); }
.pol-hero-tag {
display: inline-flex; align-items: center; gap: 8px;
font-size: 11px; font-weight: 700; letter-spacing: .16em; text-transform: uppercase;
color: var(--pol-amber); margin-bottom: 14px;
}
.pol-hero-tag::before { content:''; width:16px; height:1.5px; background:currentColor; border-radius:2px; }
.pol-hero h1 { font-family:'Montserrat',sans-serif; font-size:clamp(1.7rem,3vw,2.3rem); font-weight:900; color:var(--pol-dark); margin:0 0 10px; letter-spacing:-.02em; }
.pol-hero-meta { font-family:'DM Sans',sans-serif; font-size:.875rem; color:var(--pol-muted); }
.pol-hero-meta span { display:inline-block; margin-right:20px; }
.pol-toc-inner {
position: sticky; top: 80px;
background: #fff; border: 1px solid var(--pol-border); border-radius: 12px;
padding: 20px; max-height: calc(100vh - 110px); overflow-y: auto;
scrollbar-width: thin; scrollbar-color: #ddd transparent;
}
.pol-toc-inner::-webkit-scrollbar { width: 3px; }
.pol-toc-inner::-webkit-scrollbar-thumb { background: #ddd; border-radius: 2px; }
.pol-toc-title { font-family:'DM Sans',sans-serif; font-size:.72rem; font-weight:700; letter-spacing:.1em; text-transform:uppercase; color:var(--pol-dark); margin:0 0 14px; }
.pol-toc-list { list-style:none; margin:0; padding:0; }
.pol-toc-list li { margin-bottom:2px; }
.pol-toc-list a {
display: block; padding: 5px 8px; border-radius: 6px;
font-family:'DM Sans',sans-serif; font-size:.82rem; color:var(--pol-muted);
text-decoration:none; line-height:1.4; transition:color .15s, background .15s;
}
.pol-toc-list a:hover { color:var(--pol-amber); background:rgba(192,125,42,.06); }
.pol-toc-list a.toc-active { color:var(--pol-amber); font-weight:600; }
.pol-section { margin-bottom: 40px; scroll-margin-top: 90px; }
.pol-section h2 {
font-family:'DM Sans',sans-serif; font-size:1.05rem; font-weight:700;
color:var(--pol-dark); margin:0 0 14px;
display:flex; align-items:center; gap:10px;
}
.pol-section h2::before {
content:''; display:block; width:3px; height:18px;
background:var(--pol-amber); border-radius:2px; flex-shrink:0;
}
.pol-section h3 {
font-family:'DM Sans',sans-serif; font-size:.95rem; font-weight:700;
color:var(--pol-dark); margin:20px 0 8px; padding-left:13px;
border-left:2px solid rgba(192,125,42,.3);
}
.pol-section p { font-family:'DM Sans',sans-serif; font-size:.925rem; color:var(--pol-muted); line-height:1.78; margin:0 0 10px; text-align:left; }
.pol-section ul { padding-left:20px; margin:6px 0 12px; }
.pol-section li { font-family:'DM Sans',sans-serif; font-size:.925rem; color:var(--pol-muted); line-height:1.78; margin-bottom:5px; text-align:left; }
.pol-divider { border:none; border-top:1px solid var(--pol-border); margin:36px 0; }
.pol-infobox {
background:#fff; border:1px solid var(--pol-border); border-radius:10px;
padding:20px 22px; margin-bottom:16px;
font-family:'DM Sans',sans-serif; font-size:.9rem; color:var(--pol-muted); line-height:1.7;
}
.pol-infobox strong { color:var(--pol-dark); }
.pol-annex-label {
display:inline-block; font-family:monospace; font-size:.72rem; font-weight:700;
letter-spacing:.1em; text-transform:uppercase; color:var(--pol-amber);
background:rgba(192,125,42,.1); border-radius:4px; padding:2px 8px; margin-bottom:14px;
}
.pol-contact { background:#fff; border:1px solid var(--pol-border); border-radius:12px; padding:24px 28px; }
.pol-contact p { font-family:'DM Sans',sans-serif; font-size:.9rem; color:var(--pol-muted); margin:0 0 6px; text-align:left; }
.pol-contact a { color:var(--pol-amber); font-weight:600; text-decoration:none; }
.pol-contact a:hover { text-decoration:underline; }
</style>
<div class="pol-outer">
{# ── Hero ─────────────────────────────────────────────────────────────────── #}
<div class="pol-hero">
<div class="pol-hero-tag">Legal</div>
<h1>Data Processing Addendum</h1>
<p class="pol-hero-meta">
<span>Last updated: April 2026</span>
<span>Applies to: all HoneyBee subscriptions and service agreements</span>
</p>
<p style="font-family:'DM Sans',sans-serif;font-size:.95rem;color:var(--pol-muted);line-height:1.75;max-width:760px;margin-top:14px">
This DPA forms part of the HoneyBee Terms of Service, Order Form, Master Services Agreement, Subscription
Agreement, or other written contract between the parties (the "Agreement"). It is entered into by and between the
Customer identified in the Agreement and <strong style="color:var(--pol-dark)">HONEYBEE IOT (PTE.) LTD.</strong>
("HoneyBee"). Customer and HoneyBee are each a "Party" and together the "Parties".
</p>
</div>
<div class="pol-grid">
{# ── TOC sidebar ──────────────────────────────────────────────────────── #}
<div class="pol-toc-col">
<div class="pol-toc-inner">
<div class="pol-toc-title">Contents</div>
<ul class="pol-toc-list">
<li><a href="#dpa-1">1. Purpose & scope</a></li>
<li><a href="#dpa-2">2. Definitions</a></li>
<li><a href="#dpa-3">3. Roles of the Parties</a></li>
<li><a href="#dpa-4">4. Customer instructions</a></li>
<li><a href="#dpa-5">5. Confidentiality</a></li>
<li><a href="#dpa-6">6. Security of processing</a></li>
<li><a href="#dpa-7">7. Subprocessors</a></li>
<li><a href="#dpa-8">8. Data Subject rights</a></li>
<li><a href="#dpa-9">9. Compliance assistance</a></li>
<li><a href="#dpa-10">10. Security Incidents</a></li>
<li><a href="#dpa-11">11. Return & deletion</a></li>
<li><a href="#dpa-12">12. Audits & inspections</a></li>
<li><a href="#dpa-13">13. International transfers</a></li>
<li><a href="#dpa-14">14. Records & cooperation</a></li>
<li><a href="#dpa-15">15. Liability</a></li>
<li><a href="#dpa-16">16. Order of precedence</a></li>
<li><a href="#dpa-17">17. Governing law</a></li>
<li><a href="#dpa-ann1">Annex 1 – Processing details</a></li>
<li><a href="#dpa-ann2">Annex 2 – Security measures</a></li>
<li><a href="#dpa-ann3">Annex 3 – SCC notes</a></li>
</ul>
</div>
</div>
{# ── Main content ─────────────────────────────────────────────────────── #}
<div class="pol-content">
<div class="pol-section" id="dpa-1">
<h2>1. Purpose and scope</h2>
<p>This DPA applies where HoneyBee processes Personal Data on behalf of Customer in connection with the Services.</p>
<p>This DPA sets out the Parties' rights and obligations with respect to such processing and is intended to
satisfy the contractual requirements that apply when a controller appoints a processor under applicable data
protection law.</p>
<p>If and to the extent HoneyBee processes Personal Data as a controller in its own right, this DPA does not
apply to that processing.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-2">
<h2>2. Definitions</h2>
<p>In this DPA:</p>
<ul>
<li><strong>"Applicable Data Protection Law"</strong> means the GDPR, UK GDPR, Swiss data protection law,
and any other applicable law governing the processing of Personal Data under the Agreement.</li>
<li><strong>"Controller"</strong> means the entity that determines the purposes and means of the processing
of Personal Data.</li>
<li><strong>"Processor"</strong> means the entity that processes Personal Data on behalf of the Controller.</li>
<li><strong>"Data Subject"</strong> means an identified or identifiable natural person to whom Personal Data relates.</li>
<li><strong>"Personal Data"</strong> means any information relating to an identified or identifiable natural
person processed by HoneyBee on behalf of Customer under the Agreement.</li>
<li><strong>"Processing"</strong> or <strong>"process"</strong> means any operation or set of operations
performed on Personal Data, whether or not by automated means.</li>
<li><strong>"Security Incident"</strong> means a breach of security leading to the accidental or unlawful
destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data processed by
HoneyBee on behalf of Customer.</li>
<li><strong>"Subprocessor"</strong> means any third party engaged by HoneyBee to process Personal Data
on behalf of Customer.</li>
<li><strong>"SCCs"</strong> means the Standard Contractual Clauses approved by the European Commission or
other competent authority, as applicable.</li>
</ul>
<p>Capitalised terms not defined here have the meaning given in the Agreement.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-3">
<h2>3. Roles of the Parties</h2>
<p>3.1 Customer acts as Controller of the Personal Data processed under this DPA, except where Customer
itself acts as a processor on behalf of another controller, in which case HoneyBee will act as Customer's
subprocessor.</p>
<p>3.2 HoneyBee acts as Processor and will process Personal Data only on behalf of Customer and in accordance
with this DPA, the Agreement, and Customer's documented instructions, unless required to do otherwise by
applicable law.</p>
<p>3.3 The subject matter, duration, nature, purpose, categories of Personal Data, and categories of Data
Subjects are described in Annex 1 to this DPA.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-4">
<h2>4. Customer instructions</h2>
<p>4.1 HoneyBee will process Personal Data only on documented instructions from Customer, including with
regard to transfers of Personal Data to a third country or international organisation, unless required to
do otherwise by applicable law.</p>
<p>4.2 The Agreement, this DPA, Customer's use and configuration of the Services, and any written
implementation or support instructions issued by Customer constitute Customer's documented instructions.</p>
<p>4.3 If HoneyBee believes an instruction infringes Applicable Data Protection Law, HoneyBee will inform
Customer without undue delay, unless prohibited from doing so by law.</p>
<p>4.4 Customer is responsible for ensuring that its instructions comply with Applicable Data Protection Law.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-5">
<h2>5. Confidentiality</h2>
<p>5.1 HoneyBee will ensure that all persons authorised to process Personal Data are subject to an
appropriate duty of confidentiality, whether contractual or statutory.</p>
<p>5.2 HoneyBee will ensure that access to Personal Data is limited to personnel who need such access to
perform the Services or comply with legal obligations.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-6">
<h2>6. Security of processing</h2>
<p>6.1 HoneyBee will implement and maintain appropriate technical and organisational measures designed to
protect Personal Data against accidental or unlawful destruction, loss, alteration, unauthorised disclosure,
or access.</p>
<p>6.2 Those measures will take into account: the nature, scope, context, and purposes of the processing;
the risks to the rights and freedoms of natural persons; the state of the art; and the costs of implementation.</p>
<p>6.3 HoneyBee's baseline technical and organisational measures are described in Annex 2.</p>
<p>6.4 HoneyBee may update or modify the measures in Annex 2 from time to time, provided that the overall
level of security is not materially reduced.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-7">
<h2>7. Subprocessors</h2>
<p>7.1 Customer grants HoneyBee general written authorisation to engage Subprocessors for the processing of
Personal Data, provided that HoneyBee complies with this Section.</p>
<p>7.2 HoneyBee will impose data protection obligations on each Subprocessor by written contract that are
no less protective than those set out in this DPA, to the extent applicable to the nature of the services
provided by that Subprocessor.</p>
<p>7.3 HoneyBee remains responsible for the performance of each Subprocessor's data protection obligations
to the extent required by Applicable Data Protection Law and the Agreement.</p>
<p>7.4 HoneyBee will make available a current Subprocessor list or a mechanism by which Customer can obtain
information about current Subprocessors.</p>
<p>7.5 Where commercially appropriate, HoneyBee will provide notice of material changes to Subprocessors
and give Customer a reasonable opportunity to raise a substantiated objection on data protection grounds.</p>
<p>7.6 If Customer raises a reasonable objection that cannot be resolved, HoneyBee may, at its option:</p>
<ul>
<li>recommend a commercially reasonable alternative;</li>
<li>stop using the relevant Subprocessor for Customer; or</li>
<li>permit Customer to terminate the affected Services in accordance with the Agreement.</li>
</ul>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-8">
<h2>8. Assistance with Data Subject rights</h2>
<p>8.1 Taking into account the nature of the processing, HoneyBee will provide Customer with reasonable
assistance through appropriate technical and organisational measures to enable Customer to respond to
requests by Data Subjects to exercise their rights under Applicable Data Protection Law.</p>
<p>8.2 If HoneyBee receives a request directly from a Data Subject relating to Personal Data processed on
behalf of Customer, HoneyBee will:</p>
<ul>
<li>not respond directly except as required by law or as authorised by Customer;</li>
<li>promptly inform Customer, where legally permitted;</li>
<li>provide reasonable cooperation so Customer can respond.</li>
</ul>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-9">
<h2>9. Assistance with Customer compliance obligations</h2>
<p>9.1 Taking into account the nature of the processing and the information available to HoneyBee, HoneyBee
will provide reasonable assistance to Customer in relation to:</p>
<ul>
<li>security of processing;</li>
<li>personal data breach notification obligations;</li>
<li>data protection impact assessments;</li>
<li>prior consultation with supervisory authorities;</li>
<li>records and information reasonably needed to demonstrate compliance.</li>
</ul>
<p>9.2 HoneyBee will provide this assistance to the extent required by Applicable Data Protection Law and
proportionate to HoneyBee's role as Processor.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-10">
<h2>10. Security Incidents</h2>
<p>10.1 HoneyBee will notify Customer without undue delay after becoming aware of a Security Incident
affecting Personal Data processed on behalf of Customer.</p>
<p>10.2 To the extent known and reasonably available, HoneyBee's notification will include:</p>
<ul>
<li>a description of the nature of the Security Incident;</li>
<li>the categories and approximate number of affected Data Subjects, where known;</li>
<li>the categories and approximate number of affected records, where known;</li>
<li>the likely consequences of the Security Incident, where known;</li>
<li>measures taken or proposed to address the Security Incident.</li>
</ul>
<p>10.3 HoneyBee will take commercially reasonable steps to investigate, contain, mitigate, and remediate
the Security Incident.</p>
<p>10.4 HoneyBee's notification under this Section does not constitute an admission of fault or liability.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-11">
<h2>11. Return and deletion of Personal Data</h2>
<p>11.1 Upon termination or expiry of the Agreement, and at Customer's choice, HoneyBee will:</p>
<ul>
<li>return Personal Data to Customer; or</li>
<li>delete Personal Data,</li>
</ul>
<p>unless Applicable Data Protection Law requires continued retention.</p>
<p>11.2 Where the Services provide self-service export functionality, Customer may use those tools to
retrieve Personal Data during the applicable export window.</p>
<p>11.3 HoneyBee may retain limited records where required by law, for legitimate security, fraud-prevention,
tax, audit, backup, dispute-resolution, or legal-hold purposes, provided that such retained data remains
protected in accordance with this DPA.</p>
<p>11.4 If Customer does not make an election, HoneyBee may delete Personal Data after expiry of any
applicable retention or export period stated in the Agreement or support documentation.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-12">
<h2>12. Information, audits, and inspections</h2>
<p>12.1 HoneyBee will make available to Customer information reasonably necessary to demonstrate compliance
with this DPA.</p>
<p>12.2 Where such information is insufficient for Customer's legal obligations, HoneyBee will allow and
contribute to reasonable audits or inspections by Customer or an independent auditor mandated by Customer,
subject to the following conditions:</p>
<ul>
<li>reasonable prior written notice;</li>
<li>no more than once annually unless required by law or triggered by a Security Incident or
substantiated compliance concern;</li>
<li>audits must be limited in scope to the processing of Personal Data under the Agreement;</li>
<li>audits must not unreasonably interfere with HoneyBee's business operations, security, or
confidentiality obligations to other customers;</li>
<li>Customer and any auditor must protect HoneyBee's confidential information;</li>
<li>HoneyBee may satisfy audit obligations through provision of current third-party audit reports,
certifications, summaries, or comparable documentation where appropriate.</li>
</ul>
<p>12.3 Customer will bear its own audit costs, unless the audit reveals a material breach of this DPA
by HoneyBee.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-13">
<h2>13. International transfers</h2>
<p>13.1 Where HoneyBee processes Personal Data in a country outside the EEA, the UK, or Switzerland, and
Applicable Data Protection Law requires a transfer mechanism, the Parties will implement an appropriate
lawful transfer mechanism.</p>
<p>13.2 Where applicable, that mechanism may include:</p>
<ul>
<li>the European Commission's Standard Contractual Clauses;</li>
<li>the UK International Data Transfer Addendum or UK-approved SCC version;</li>
<li>Swiss transfer addendum language;</li>
<li>adequacy decisions where available;</li>
<li>any other lawful transfer mechanism recognised under Applicable Data Protection Law.</li>
</ul>
<p>13.3 If the SCCs are required, they are incorporated by reference into this DPA or may be executed as
a separate annex. Where the relevant SCC module already includes the Article 28 requirements, the Parties
may rely on that SCC module rather than duplicating equivalent provisions.</p>
<p>13.4 The Parties will complete any required annexes, appendices, or transfer details using the information
in Annex 1 and Annex 2 of this DPA, as supplemented where necessary.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-14">
<h2>14. Records and cooperation</h2>
<p>14.1 HoneyBee will maintain records of processing activities where required by Applicable Data
Protection Law.</p>
<p>14.2 HoneyBee will cooperate reasonably with supervisory authorities or equivalent regulators to the
extent required by law in relation to processing under this DPA.</p>
<p>14.3 HoneyBee will promptly inform Customer if, in its opinion, an instruction from Customer violates
Applicable Data Protection Law.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-15">
<h2>15. Liability</h2>
<p>15.1 This DPA is subject to the liability limitations, exclusions, and allocation of risk set out in
the Agreement, unless Applicable Data Protection Law requires otherwise.</p>
<p>15.2 Nothing in this DPA excludes or limits either Party's liability to the extent such exclusion or
limitation is prohibited by law.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-16">
<h2>16. Order of precedence</h2>
<p>If there is any conflict between this DPA and the Agreement with respect to the processing of Personal
Data, this DPA will prevail to the extent of that conflict.</p>
<p>If the Parties execute SCCs or another transfer mechanism that conflicts with this DPA, the SCCs or that
transfer mechanism will prevail to the extent legally required for the relevant transfer.</p>
</div>
<hr class="pol-divider">
<div class="pol-section" id="dpa-17">
<h2>17. Governing law and jurisdiction</h2>
<p>This DPA will be governed by the governing law and jurisdiction provisions of the Agreement, unless the
SCCs or another mandatory transfer mechanism require otherwise for a specific claim or interpretation issue.</p>
</div>
<hr class="pol-divider">
{# ── Annex 1 ──────────────────────────────────────────────────────── #}
<div class="pol-section" id="dpa-ann1">
<div class="pol-annex-label">Annex 1</div>
<h2>Details of processing</h2>
<h3>A. Subject matter of the processing</h3>
<p>Provision of the HoneyBee platform and related services, including hosting, storage, workflow execution,
support, implementation, migration, integration, mobile functionality, analytics, AI-assisted features where
enabled, and related operational services.</p>
<h3>B. Duration of the processing</h3>
<p>For the duration of the Agreement and any agreed post-termination retention, export, backup, or
legal-hold period.</p>
<h3>C. Nature of the processing</h3>
<p>Collection, recording, organisation, structuring, storage, adaptation, retrieval, consultation, use,
disclosure by transmission, alignment, combination, restriction, deletion, or destruction of Personal Data
as necessary to provide the Services.</p>
<h3>D. Purpose(s) of the processing</h3>
<p>To provide the Services to Customer, including account administration, hosting, workflow management,
project and finance processing, support, implementation, security, backups, exports, and any agreed
integrations or private deployments.</p>
<h3>E. Categories of Data Subjects</h3>
<p>May include, depending on Customer's use of the Services:</p>
<ul>
<li>Customer personnel and users;</li>
<li>employees, applicants, contractors, and consultants;</li>
<li>clients, customers, and prospects;</li>
<li>suppliers and vendors;</li>
<li>site visitors or authorised third parties included in Customer records;</li>
<li>any other individuals whose Personal Data Customer uploads or generates in the Services.</li>
</ul>
<h3>F. Categories of Personal Data</h3>
<p>May include, depending on Customer's use of the Services:</p>
<ul>
<li>identification and contact data;</li>
<li>user account and profile data;</li>
<li>HR, attendance, and workforce data;</li>
<li>payroll-supporting or finance-related records;</li>
<li>project records and approval records;</li>
<li>operational and service data;</li>
<li>communications and support records;</li>
<li>uploaded files, attachments, receipts, and documents;</li>
<li>technical, log, and usage data;</li>
<li>AI prompts and outputs where enabled and submitted by Customer users.</li>
</ul>
<h3>G. Special categories of Personal Data</h3>
<p>The Services are not intended by default for special category or highly sensitive Personal Data unless
expressly agreed by the Parties and supported by appropriate controls. If Customer chooses to upload such
data, Customer is responsible for ensuring a lawful basis and giving documented instructions.</p>
<h3>H. Frequency of the processing</h3>
<p>Continuous or as initiated by Customer users, systems, integrations, or support interactions during
the term of the Agreement.</p>
<h3>I. Location(s) of processing</h3>
<p>As stated in the Agreement, implementation documents, infrastructure documentation, Subprocessor
documentation, or transfer documentation applicable to the relevant Service deployment.</p>
</div>
<hr class="pol-divider">
{# ── Annex 2 ──────────────────────────────────────────────────────── #}
<div class="pol-section" id="dpa-ann2">
<div class="pol-annex-label">Annex 2</div>
<h2>Technical and organisational measures</h2>
<p>HoneyBee will maintain technical and organisational measures appropriate to the risk, which may include:</p>
<h3>A. Organisational measures</h3>
<ul>
<li>internal access-control policies;</li>
<li>role-based access to customer environments;</li>
<li>confidentiality obligations for staff and contractors;</li>
<li>onboarding and offboarding controls for personnel;</li>
<li>incident response procedures;</li>
<li>vendor and Subprocessor due diligence;</li>
<li>change-management and release-management processes;</li>
<li>documented security responsibilities.</li>
</ul>
<h3>B. Access controls</h3>
<ul>
<li>authentication mechanisms and credential controls;</li>
<li>optional or available MFA where supported;</li>
<li>least-privilege access principles;</li>
<li>restricted administrative access;</li>
<li>logging of privileged or sensitive actions where appropriate.</li>
</ul>
<h3>C. Network and infrastructure security</h3>
<ul>
<li>network segmentation or equivalent controls where appropriate;</li>
<li>firewalling and perimeter protections;</li>
<li>monitoring for suspicious activity;</li>
<li>secure remote administration practices;</li>
<li>patching and vulnerability-management processes.</li>
</ul>
<h3>D. Data protections</h3>
<ul>
<li>encryption in transit using current industry-standard protocols where supported;</li>
<li>encryption at rest where appropriate to the deployment model;</li>
<li>logical isolation of customer environments where relevant;</li>
<li>backup and recovery procedures;</li>
<li>controls around export and deletion.</li>
</ul>
<h3>E. Availability and resilience</h3>
<ul>
<li>backup routines;</li>
<li>disaster recovery or service restoration measures;</li>
<li>monitoring of service availability and core infrastructure health;</li>
<li>continuity planning appropriate to the service tier.</li>
</ul>
<h3>F. Application and development security</h3>
<ul>
<li>change control for production systems;</li>
<li>issue tracking and remediation processes;</li>
<li>testing before major releases where appropriate;</li>
<li>access restrictions for development and support personnel.</li>
</ul>
<h3>G. Incident management</h3>
<ul>
<li>procedures to detect, assess, escalate, contain, and remediate Security Incidents;</li>
<li>communication workflows for incident notification;</li>
<li>post-incident review processes where appropriate.</li>
</ul>
<h3>H. Physical security</h3>
<p>Where HoneyBee relies on third-party data centres or infrastructure providers, physical security
controls are managed by those providers under their own certified or documented controls, as applicable.</p>
<p>HoneyBee may update these measures over time so long as the overall level of protection is not
materially reduced.</p>
</div>
<hr class="pol-divider">
{# ── Annex 3 ──────────────────────────────────────────────────────── #}
<div class="pol-section" id="dpa-ann3">
<div class="pol-annex-label">Annex 3</div>
<h2>Optional SCC implementation notes</h2>
<p>Use this annex only where the Parties need Standard Contractual Clauses for a restricted transfer.
If required, complete a separate SCC attachment with:</p>
<ul>
<li>exporter and importer names and contact details;</li>
<li>relevant SCC module:
<ul style="margin-top:4px">
<li>Module 2 for controller-to-processor;</li>
<li>Module 3 for processor-to-processor;</li>
</ul>
</li>
<li>competent supervisory authority where required;</li>
<li>description of transfer;</li>
<li>technical and organisational measures (cross-reference Annex 2);</li>
<li>list of subprocessors;</li>
<li>supplementary measures if applicable.</li>
</ul>
<p>The modernised 2021 SCCs (Modules 2 and 3) can also cover the Article 28 processor-contract
requirements. Where the relevant SCC module already includes those requirements, the Parties may rely
on that SCC module rather than duplicating equivalent provisions in this DPA.</p>
</div>
<hr class="pol-divider">
<div class="pol-contact">
<p><strong style="color:var(--pol-dark)">Questions about this DPA?</strong></p>
<p>Contact us at <a href="mailto:privacy@ourhoneybee.eu">privacy@ourhoneybee.eu</a> or
<a href="mailto:info@ourhoneybee.eu">info@ourhoneybee.eu</a></p>
<p style="margin-top:10px">Also see: <a href="{{ url('privacy_policy') }}">Privacy Policy</a> ·
<a href="{{ url('honeybee_terms_and_conditions') }}">Terms of Service</a></p>
</div>
</div>{# /pol-content #}
</div>{# /pol-grid #}
</div>{# /pol-outer #}
<script>
(function () {
var sections = document.querySelectorAll('.pol-section[id]');
var links = document.querySelectorAll('.pol-toc-list a');
if (!sections.length || !links.length) return;
var observer = new IntersectionObserver(function (entries) {
entries.forEach(function (entry) {
if (entry.isIntersecting) {
links.forEach(function (a) { a.classList.remove('toc-active'); });
var active = document.querySelector('.pol-toc-list a[href="#' + entry.target.id + '"]');
if (active) active.classList.add('toc-active');
}
});
}, { rootMargin: '-80px 0px -60% 0px', threshold: 0 });
sections.forEach(function (s) { observer.observe(s); });
}());
</script>
{% include '@HoneybeeWeb/footer/central_footer.html.twig' %}