Last Updated: February 2026
Effective Date: February 2026
This Data Processing Agreement ("DPA") forms part of the Terms of Service between Coax ApS ("Processor" or "Coax") and the Customer ("Controller") and governs the processing of personal data by Coax on behalf of the Customer.
This DPA is entered into pursuant to Article 28 of the General Data Protection Regulation (EU) 2016/679 ("GDPR") and the Danish Data Protection Act.
In this DPA:
This DPA governs the processing of Personal Data by the Processor when providing the Coax SaaS management platform ("Service") to the Controller.
This DPA remains in effect for the duration of the Service agreement between the parties, plus any period during which Personal Data is retained.
The Processor processes Personal Data to:
The following categories of Personal Data are processed:
| Category | Data Elements |
|---|---|
| Identity Data | Name, email address, user ID, profile photo |
| Directory Data | Job title, department, phone number, manager relationships |
| Authentication Data | OAuth tokens (encrypted), session identifiers |
| Activity Data | Sign-in timestamps, IP addresses, device information |
| Location Data | Approximate geographic location (city/country from IP) |
| Email Metadata | Sender, recipient, subject line, date (NOT body content) |
| Billing Data | Invoice amounts, billing cycles, vendor names |
Personal Data relates to the following categories of Data Subjects:
The Controller shall:
Ensure it has a valid legal basis under GDPR Article 6 for the processing of Personal Data by the Processor, including:
Inform Data Subjects about the processing of their Personal Data, including:
Provide documented instructions for the processing of Personal Data. The Service agreement and this DPA constitute the Controller's documented instructions.
Ensure that its instructions comply with Data Protection Laws and do not cause the Processor to violate applicable laws.
The Processor shall:
Exception: Processing required by EU or Member State law, in which case the Processor shall inform the Controller before processing (unless prohibited by law).
The Processor shall ensure that persons authorized to process Personal Data:
The Processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including:
See Annex A: Technical and Organizational Measures (TOMs)
The Processor shall:
Authorization: The Controller provides general authorization for the Processor to engage Subprocessors, subject to:
The Processor shall:
The Processor provides the following capabilities:
| Right | Processor Assistance |
|---|---|
| Access | Export of Data Subject's data |
| Rectification | Admin tools to update data |
| Erasure | User deletion functionality |
| Restriction | Account suspension capability |
| Portability | Data export in structured format |
The Processor shall assist the Controller in ensuring compliance with:
At the end of the Service agreement, the Processor shall, at Controller's choice:
The Controller must request return/export within 30 days of termination. After this period, the Processor will delete all Personal Data.
Exceptions: Retention required by EU or Member State law, in which case the Processor shall inform the Controller.
The Processor shall:
Audit Conditions:
The Controller may request:
The Processor shall notify the Controller of any Security Incident without undue delay and no later than 48 hours after becoming aware of the incident.
The notification shall include, to the extent known:
The Processor shall:
Security Incident notifications shall be sent to the Controller's designated contact (as provided during account setup) and to: security@coaxsecurity.com
Where Personal Data is transferred outside the EEA, the Processor ensures appropriate safeguards:
The Processor conducts and maintains Transfer Impact Assessments (TIAs) for international data transfers in accordance with the EDPB Recommendations 01/2020 and the CJEU Schrems II ruling. These assessments evaluate the legal framework in the destination country, the risk to data subjects, and the effectiveness of supplementary measures. TIAs are reviewed annually and upon any change to subprocessors or data flows. The current TIA is available upon request under NDA. See Transfer Impact Assessment.
See Subprocessor List for processing locations.
Each party is liable for its own compliance with Data Protection Laws.
Liability for breaches shall be allocated in accordance with GDPR Article 82 and the liability provisions in the Terms of Service.
The parties' indemnification obligations are set forth in the Terms of Service.
This DPA is effective upon the Controller's acceptance of the Terms of Service.
This DPA remains in effect until all Personal Data is deleted or returned.
Provisions regarding data deletion, confidentiality, and liability survive termination.
This DPA is governed by the laws of Denmark.
This DPA may be amended by Coax with 30 days' notice. Material changes affecting Controller rights require Controller consent.
In case of conflict between this DPA and the Terms of Service, this DPA prevails for matters concerning Personal Data processing.
If any provision is found unenforceable, remaining provisions remain in effect.
Data Protection Contact: Email: privacy@coaxsecurity.com
Legal Inquiries: Email: legal@coaxsecurity.com
Security Incidents: Email: security@coaxsecurity.com
The Processor implements the following security measures pursuant to GDPR Article 32:
| Measure | Implementation |
|---|---|
| Encryption at Rest | AES-256-CBC for sensitive data (tokens, credentials) |
| Encryption in Transit | TLS 1.3 for all network communications |
| Key Management | Encryption keys stored securely, separate from data |
| Measure | Implementation |
|---|---|
| Authentication | Microsoft OAuth 2.0 for user authentication |
| Session Management | Secure, HttpOnly session cookies (24-hour expiry) |
| Authorization | Role-based access control (RBAC) |
| Principle of Least Privilege | Users access only necessary data |
| Administrative Access | Limited to authorized personnel, logged |
| Measure | Implementation |
|---|---|
| Hosting | Google Cloud Platform (EU region) |
| Network Security | Virtual Private Cloud, firewall rules |
| DDoS Protection | Cloud-native DDoS mitigation |
| Container Security | Cloud Run with managed security patches |
| Measure | Implementation |
|---|---|
| Data Minimization | Only necessary data collected and processed |
| Email Content | Processed in-memory only, not stored |
| Pseudonymization | Internal IDs used where possible |
| Data Segregation | Multi-tenant isolation at database level |
| Measure | Implementation |
|---|---|
| Audit Logging | All administrative actions logged |
| Security Monitoring | Real-time alerting for suspicious activity |
| Log Retention | Security logs retained for 30 days |
| Measure | Implementation |
|---|---|
| Incident Detection | Automated monitoring and alerting |
| Response Plan | Documented incident response procedures |
| Notification | 48-hour notification to Controller |
| Post-Incident Review | Root cause analysis and remediation |
| Measure | Implementation |
|---|---|
| Confidentiality | All personnel bound by confidentiality agreements |
| Training | Security awareness training for all staff |
| Access Termination | Prompt access revocation upon termination |
| Measure | Implementation |
|---|---|
| Backups | Daily automated backups |
| Recovery | Documented recovery procedures |
| Availability | Cloud-native high availability architecture |
See Subprocessor List for the current list of approved Subprocessors.
This Data Processing Agreement is also available at: https://coaxsecurity.com/legal/dpa