Data Processing Addendum
This DPA is an extension of the main Terms of Service or Master Subscription Agreement between you (the "Customer" or "Controller") and Coding Hub (the "Processor").
Let's Define Our Terms
Just to make sure we're speaking the same language, here is what we mean when we use these terms:
Our Role and Instructions
We will only process your Personal Data based on your documented instructions.
Documented Instructions
The main Terms of Service, along with your use of the Coding Hub platform, count as your complete instructions to us regarding data processing.
Processing Beyond Instructions
If we ever need to process your data for any other reason because a specific law requires us to, we will give you a heads-up before doing it—unless that law strictly forbids us from telling you.
Security and Confidentiality
Keeping your data safe is a core part of what we do.
| Area | Our Commitment |
|---|---|
| Security Measures | We maintain robust technical and organizational security measures to protect your Personal Data against accidental loss, unauthorized access, or illegal destruction. |
| Our Team | Anyone at Coding Hub who has access to your data is bound by strict confidentiality agreements. They only access what is absolutely necessary to do their jobs. |
Sub-processors
We don't build every single piece of our infrastructure from scratch, which means we occasionally use third-party vendors to help provide our service.
General Permission
By accepting this DPA, you give us general permission to use these Sub-processors. We maintain an up-to-date list of them on our website.
New Sub-processors
If we decide to bring a new Sub-processor on board, we will notify you (usually via email or an in-app notice) at least 15 days before they start handling your data.
Our Current Sub-processors
For the full, up-to-date list, please visit our Sub-processor List page.
Data Subject Rights
Helping you help your users exercise their data protection rights.
When Users Come to You
If one of your users (a "Data Subject") reaches out to you wanting to access, correct, or delete their personal data, we will provide you with the tools or assistance you need to fulfill that request.
When Users Come to Us Directly
If a user reaches out to Coding Hub directly with one of these requests, we won't respond to them or take action on the data ourselves. Instead, we'll point them in your direction and notify you immediately.
Rights We Support
- Right of Access: Users can request a copy of their personal data
- Right to Rectification: Users can request correction of inaccurate data
- Right to Erasure: Users can request deletion of their data
- Right to Restrict Processing: Users can request limitation of processing
- Right to Data Portability: Users can request their data in a structured format
What Happens in a Data Breach
Nobody wants to think about a security incident, but if the worst happens and your Personal Data is compromised, we will act quickly.
Our Breach Response Process
Immediate Detection
We will notify you without undue delay and no later than 48 hours after becoming aware of the breach.
Full Disclosure
We'll give you all the details we have: what happened, what data was exposed, and what we are doing to fix it.
Ongoing Cooperation
We will cooperate with you entirely so you can meet your own regulatory reporting obligations.
What We'll Tell You
| Information | Description |
|---|---|
| Nature of the breach | What type of incident occurred (unauthorized access, accidental disclosure, etc.) |
| Data categories affected | What types of personal data were involved |
| Approximate number of subjects | How many individuals may be affected |
| Likely consequences | What risks this breach may pose to data subjects |
| Measures taken | What steps we've taken to contain and remediate the breach |
Deleting or Returning Your Data
When you decide to leave Coding Hub and our contract ends, you get to choose what happens to your data.
Return Data
Ask us to return a complete copy of your data to you in a standard, machine-readable format.
Delete Data
Ask us to permanently delete all your data from our systems with no recovery option.
Legal Retention Exceptions
The only exception to deletion is if local or international laws require us to keep a specific piece of data archived for legal reasons. In such cases:
- We will inform you which data must be retained and why
- The retained data will be subject to additional access restrictions
- It will be deleted as soon as the legal obligation expires
Audits
You have the right to verify that we're actually doing everything we promise in this document.
Option 1: Review Our Audit Reports
Usually, the easiest way to verify our compliance is by requesting our most recent third-party security audit reports (like a SOC 2 or ISO 27001 certification). These are available upon request at no charge.
Option 2: Conduct Your Own Audit
If our reports don't satisfy your regulatory requirements, we will allow you—or an independent auditor you hire—to conduct a reasonable audit of our data processing practices.
How to Request an Audit
- Send a written request to info@codinghub.co.za specifying the scope and purpose of the audit
- We'll acknowledge your request within 5 business days and propose a timeline
- Both parties agree on audit dates, scope, and any confidentiality requirements
- The audit is conducted, and we provide a response to any findings within 30 days
Need to Discuss This DPA?
If you have questions about this addendum or need to request an audit, our team is ready to help.
