GDPR Data Processing Addendum (DPA)

Last updated: November 30, 2025

This Data Processing Addendum ("DPA") forms part of the HackHunters Terms of Service ("Agreement") between:

  • HackHunters ("Processor")
  • The customer using HackHunters Services ("Controller")

This DPA applies where the Controller is subject to the EU General Data Protection Regulation (GDPR) or the UK GDPR.

This DPA governs HackHunters' processing of Personal Data on behalf of the Controller.

1. Definitions

  • "Personal Data" means any information relating to an identified or identifiable natural person as defined in GDPR Art. 4(1).
  • "Processing" means any operation performed on Personal Data as defined in Art. 4(2).
  • "Controller" means the customer that determines the purpose and means of processing.
  • "Processor" means HackHunters, acting on behalf of the Controller.
  • "Subprocessors" are third parties engaged by HackHunters to process Personal Data.
  • "Services" means digital account security analysis, cleanup automation, scanning, reporting, and related services offered by HackHunters.

2. Scope and Roles

The parties acknowledge that:

  • Controller determines the purposes and means of processing
  • Processor processes Personal Data solely to provide the Services
  • No joint-controller relationship exists
  • HackHunters does not sell or share Personal Data for advertising or profiling

3. Processor Obligations

HackHunters agrees to:

3.1 Process only on documented instructions

Processor will process Personal Data only:

  • to provide and improve the Services
  • as documented by the Controller
  • as required by law

Processor will never:

  • use Personal Data for advertising
  • combine Personal Data with third-party data
  • use Google, Microsoft, or social media data to train AI or ML models
  • transfer data to third parties except as permitted in this DPA

3.2 Maintain confidentiality

All personnel with access to Personal Data are bound by confidentiality obligations.

3.3 Implement appropriate security measures

Processor maintains security measures appropriate for the risk, including:

  • encryption in transit and at rest
  • restricted token access
  • network and platform isolation
  • role-based access controls
  • audit logging
  • secure OAuth token storage
  • incident response procedures

3.4 Assist with data subject rights

Processor will assist Controller in fulfilling requests under GDPR, including:

  • access
  • correction
  • deletion
  • portability
  • restriction of processing
  • objection

3.5 Notification of data breaches

Processor will notify Controller without undue delay of any Personal Data breach.

4. Subprocessors

Processor uses trusted third-party Subprocessors necessary to provide the Services. Current subprocessors include:

  • Supabase (database + authentication)
  • Vercel (hosting)
  • Stripe (payments + invoices)
  • Resend (email delivery)
  • Google LLC (OAuth identity verification)
  • Microsoft Corporation (OAuth identity verification)
  • Meta Platforms (OAuth identity verification)
  • Cloudflare (network security)

Processor will:

  • maintain an updated list of Subprocessors
  • provide notice of significant changes
  • ensure Subprocessors are bound by equivalent obligations

5. Cross-Border Data Transfers

Personal Data may be processed in the United States or other jurisdictions. Processor ensures lawful transfers under GDPR Chapters V, including use of:

  • Standard Contractual Clauses (SCCs), or
  • An adequacy decision, or
  • Other appropriate safeguards

By using the Services, Controller authorizes such transfers.

6. Data Retention and Deletion

Processor stores Personal Data only as long as necessary to provide the Services, unless otherwise required by law.

Upon termination:

  • Processor will delete or return all Personal Data upon Controller's request
  • Processor will delete all OAuth tokens, scan results, findings, contact identities, and identity mapping data
  • Processor may retain anonymized analytics and financial records that do not identify a natural person
  • Backups delete on a rolling schedule within 30 days

Processor's deletion operations are documented at: https://www.hackhunters.ai/data-deletion

7. Data Subject Requests

If Processor receives a direct request from an individual, it will:

  • Redirect the request to the Controller
  • Assist with fulfilling the request as required
  • Not respond independently unless required by law

8. Audit and Compliance

Processor will make available appropriate documentation to demonstrate compliance and will reasonably support:

  • compliance audits
  • data protection assessments
  • security reviews
  • GDPR Article 28 obligations

Audits must:

  • be performed with reasonable notice
  • not disrupt Processor operations
  • not require access to confidential system infrastructure

9. Liability

Processor's liability under this DPA is governed by the liability limitations in the Agreement.

10. Termination

This DPA terminates with the Agreement.

Controller's deletion instructions survive termination.

11. Governing Law

This DPA is governed by Delaware law, unless GDPR requires otherwise.

12. Entire Agreement

This DPA supersedes any conflicting terms in the Agreement with respect to GDPR-required processing.

Contact Us

For questions about this DPA or data protection matters, contact:

HackHunters Support
Email: support@email.hackhunters.ai
Website: https://www.hackhunters.ai