Data Processing Agreement

Effective: March 2026 · Last updated: March 2026

Between Tru-Digital Services Ltd (Processor) and the Customer (Controller)

Agreement Summary

The Customer is the Controller and agrees to appoint Tru-Digital Services Ltd (trading as Tru-Digital Protection), 3rd Floor, 86-90 Paul Street, London, EC2A 4NE as the Processor to process Personal Data on the terms set out in this Agreement.

The Processor agrees to process the Personal Data within the UK on the terms set out in this Agreement, in accordance with the Controller's documented instructions.


1. Interpretation

The following definitions apply in this Agreement:

Agreed Purpose: The purposes for which Personal Data is processed, as set out in Clause 4.

The Agreement: This Data Processing Agreement, which forms part of the Services Agreement between the parties.

Business Day: A day other than Saturday, Sunday, or UK bank holiday when banks in London are open for business.

Data Protection Authority: The Information Commissioner's Office (ICO), established under section 114 of the Data Protection Act 2018.

Data Security Breach: A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data.

Personal Data: Has the meaning given in the UK GDPR and includes all personal data processed by the Processor on behalf of the Controller as detailed in Schedule 1.

Privacy and Data Protection Legislation: The UK GDPR (as retained under the European Union (Withdrawal) Act 2018), the Data Protection Act 2018, the Privacy and Electronic Communications (EC Directive) Regulations 2003, and all applicable laws relating to processing of personal data and privacy.

Services Agreement: The contract between the parties for the provision of DPO services, including the Quote, Terms and Conditions, and this Data Processing Agreement.

Term: The duration of the Services Agreement as set out in the Quote.

Terms Controller, Processor, Data Subject, Personal Data, Special Category Data and Processing have the meanings given in the UK GDPR.


2. Compliance with Data Protection Legislation

2.1 Mutual Compliance

Both parties shall comply with all applicable requirements of Privacy and Data Protection Legislation during the Term.

2.2 Controller Responsibilities

The Controller:

2.3 Processor Responsibilities

The Processor shall:


3. Processing Instructions

3.1 Scope of Processing

The Processor shall process Personal Data only:

3.2 Instruction Changes

The Controller may issue additional written instructions regarding processing. The Processor shall:


4. Purpose of Processing

4.1 Framework

This Agreement sets out the framework for sharing Personal Data between the Controller and Processor to enable the Processor to deliver DPO services.

4.2 Agreed Purposes

The Processor processes Personal Data for the following purposes (the Agreed Purpose):

DPO Services

Data Subject Rights Management

Breach Management

Policy and Documentation

Training and Advisory

4.3 No Incompatible Processing

The Processor shall not process Personal Data in a manner incompatible with the Agreed Purpose without prior written authorisation from the Controller.

4.4 Single Points of Contact

Each party appoints a Single Point of Contact (SPoC):

Controller's SPoC: The authorised signatory identified in the Quote, or their designated representative as notified to the Processor in writing.

Processor's SPoC: Gareth Eynon, DPO


5. Personal Data Categories

5.1 Data Subjects

The Personal Data processed under this Agreement relates to:

Pupils and Students

Parents and Guardians

Staff and Governors

Third Parties

5.2 Categories of Personal Data

The Personal Data processed may include:

Identifiers and Contact Details

Education and Training Data

Employment Data

Safeguarding Data

Financial Data

Digital and Technical Data

5.3 Special Category Data

Processing may include Special Category Data concerning:

5.4 Criminal Offence Data

Where the Controller is processing data relating to criminal convictions and offences (e.g., DBS checks, safeguarding concerns), the Processor may process such data in accordance with the Agreed Purpose.

5.5 Volume and Relevance

The volume of Personal Data processed depends on:

The Processor shall only process Personal Data that is adequate, relevant, and not excessive in relation to the Agreed Purpose.


6. Fair and Lawful Processing

6.1 Lawful Basis

The Controller warrants that:

6.2 Fair Processing

The Controller shall ensure that data subjects are informed:

The Processor shall include appropriate privacy information in all customer-facing communications.


7. Data Subject Rights

7.1 Rights Under UK GDPR

Data subjects have the following rights:

7.2 Notification of Requests

The Processor shall notify the Controller within 48 hours of receiving:

The Processor shall not respond directly to such requests without the Controller's written authorisation.

7.3 Assistance with Requests

The Processor shall provide reasonable assistance to the Controller in responding to data subject rights requests, including:

Such assistance is included in Comprehensive and All Inclusive service tiers. Additional charges may apply for Advice tier customers.

7.4 Record Keeping

The Processor's SPoC shall maintain records of:


8. Data Retention and Deletion

8.1 Retention Periods

The Processor shall retain Personal Data only for as long as necessary for the Agreed Purpose:

During Active Service Delivery:

Advisory and Support Materials

SAR Working Files

Breach Management

ROPA, Policies, and Documentation

Single Central Register

Post-Termination:

8.2 Deletion on Instruction

The Controller may instruct the Processor to delete Personal Data at any time. The Processor shall:

8.3 Deletion Method

Deletion shall be permanent and irreversible using secure deletion methods appropriate to the storage medium:

8.4 Return of Data

If the Controller requests return of Personal Data instead of deletion:


9. Sub-Processors and Third Parties

9.1 Authorised Sub-Processors

The Controller authorises the Processor to engage the following sub-processors:

Infrastructure and Hosting

Communication and Support

Analytics and Monitoring (processes only pseudonymised/aggregated data)

9.2 Sub-Processor Obligations

The Processor warrants that:

9.3 Changes to Sub-Processors

If the Processor intends to engage a new sub-processor or replace an existing one:

9.4 International Transfers

The Processor shall not transfer Personal Data outside the UK without:

For sub-processors listed in 9.1 with international elements, the Processor warrants that appropriate safeguards are in place via:


10. Security and Confidentiality

10.1 Security Obligations

The Processor shall implement appropriate technical and organisational measures to:

10.2 Security Measures

The specific measures implemented by the Processor are detailed in Schedule 3.

Key measures include:

10.3 Confidentiality

The Processor shall ensure that all personnel authorised to process Personal Data:

10.4 Changes to Security Measures

The Processor shall notify the Controller of any material changes to security measures within 14 days.


11. Data Security Breaches

11.1 Immediate Notification

The Processor shall notify the Controller immediately and in any event within 12 hours of becoming aware of a Data Security Breach affecting the Controller's Personal Data.

Notification shall be by telephone (followed by email) to the Controller's SPoC and shall include:

11.2 Investigation and Assistance

The Processor shall:

11.3 Remediation

The Processor shall:

11.4 Breach Records

The Processor shall maintain a register of all Data Security Breaches, documenting:


12. Audits and Inspections

12.1 Audit Rights

The Controller (or its authorised auditor) may audit or inspect the Processor's compliance with this Agreement:

12.2 Information and Access

The Processor shall:

12.3 Audit Costs

The Controller shall bear its own costs of audit. If an audit reveals material non-compliance by the Processor, the Processor shall reimburse reasonable audit costs.

12.4 ICO Audits

The Processor shall notify the Controller immediately if the ICO requests to audit the Processor's handling of the Controller's Personal Data.


13. Data Protection Impact Assessments

Where the Controller is required to conduct a Data Protection Impact Assessment (DPIA), the Processor shall:

DPIA support is included in Comprehensive and All Inclusive tiers. Additional charges may apply for Advice tier customers.


14. Termination

14.1 Effect of Termination

On termination or expiry of the Services Agreement:

14.2 Retention Post-Termination

The Processor may retain Personal Data only where:

Any retained data remains subject to confidentiality obligations and this Agreement.

14.3 Handover

The Processor shall cooperate with any successor DPO or the Controller to ensure orderly transition, including:


15. Liability and Indemnity

15.1 Processor Liability

The Processor shall indemnify the Controller against:

15.2 Limitations

The indemnity at 15.1 does not apply where the loss arises from:

15.3 Liability Cap

Notwithstanding Clause 15.1, the Processor's total aggregate liability under this Agreement is subject to the limitation of liability provisions in the Services Agreement Terms and Conditions.

This cap does not apply to:


16. General Provisions

16.1 Relationship to Services Agreement

This Data Processing Agreement forms part of and is incorporated into the Services Agreement. In the event of conflict between this DPA and the Terms and Conditions, this DPA shall prevail in relation to data processing matters.

16.2 Changes to Law

If changes to Privacy and Data Protection Legislation require amendments to this Agreement:

16.3 Severability

If any provision is held invalid or unenforceable, it shall be modified to the minimum extent necessary to make it valid and enforceable. The remainder of the Agreement shall remain in full force.

16.4 Entire Agreement

This Agreement (together with the Services Agreement) constitutes the entire agreement between the parties relating to processing of Personal Data.

16.5 Governing Law and Jurisdiction

This Agreement is governed by the law of England and Wales. The parties submit to the exclusive jurisdiction of the courts of England and Wales.


Signatures

This Agreement is executed on the date of the Services Agreement.

Signed on behalf of Tru-Digital Services Ltd (Processor):

Signature: ________________________________

Name: Gareth Eynon

Position: Director and Data Protection Officer

Date: ______________________

Signed on behalf of [Customer Name] (Controller):

Signature: ________________________________

Name: ________________________________

Position: ________________________________

Organisation: ________________________________

Date: ______________________


Schedule 1: Data Processing Details

Controller

An educational establishment (school, academy, or multi-academy trust) subject to UK GDPR and the Data Protection Act 2018, using Tru-Digital Protection's DPO services.

Processor

Tru-Digital Services Ltd (trading as Tru-Digital Protection)

A specialist data protection consultancy providing DPO services to UK educational institutions.

Data Subjects

As detailed in Clause 5.1:

Categories of Personal Data

As detailed in Clause 5.2:

Special Category Data

As detailed in Clause 5.3:

Criminal Offence Data

As detailed in Clause 5.4:

Processing Operations

As detailed in Clause 4.2 and Schedule 2:

Collection and Receipt

Storage and Organisation

Use and Analysis

Disclosure and Sharing

Updating and Correction

Protection and Restriction

Deletion and Destruction

Duration of Processing

For the Term of the Services Agreement, plus retention periods as specified in Clause 8.


Schedule 2: The Services and Data Handling

This schedule describes how Personal Data is processed to deliver each service tier.

All Service Tiers: Common Processing

Advisory and Compliance Support

ICO Liaison

Knowledge Base Access

DPIA Lite Support

Comprehensive and All Inclusive Tiers: Additional Processing

Subject Access Request Redaction

Breach Management and Documentation

Policy Development and Management

Record of Processing Activities (ROPA)

Training Delivery

All Inclusive Tier: Additional Processing

Single Central Register Maintenance

On-Site Training

Data Transfer Methods

Secure Channels:

Prohibited Methods:

Sub-Processor Use for Services

As detailed in Clause 9, authorised sub-processors are used as follows:


Schedule 3: Technical and Organisational Security Measures

The Processor implements the following measures to protect Personal Data:

1. Access Control

User Authentication

Access Management

Device Management

2. Data Encryption

Encryption in Transit

Encryption at Rest

Key Management

3. Network Security

Perimeter Security

Monitoring and Detection

Wi-Fi Security

4. Physical Security

Office Premises

Workstation Security

Data Centre Security (Sub-Processors)

5. Backup and Disaster Recovery

Backup Procedures

Disaster Recovery

Incident Response

6. Secure Disposal

Electronic Data

Physical Documents

7. Personnel Security

Recruitment and Vetting

Training and Awareness

Confidentiality

Supervision and Monitoring

8. Vendor Management

Sub-Processor Due Diligence

Vendor Contracts

9. Software and Patch Management

Software Updates

Application Security

Anti-Malware

10. Audit and Compliance

Internal Audits

Logging and Monitoring

Documentation

11. Testing and Assurance

Security Reviews

Vulnerability Management

Security Certifications

12. Changes and Notifications

The Processor shall notify the Controller within 14 days of:

The Processor shall consult with the Controller before materially weakening any security measure.


END OF DATA PROCESSING AGREEMENT

Document Reference: TDP-DPA-v1.0

Effective Date: January 2026

Next Review: January 2027