The General Data Protection Regulation (“GDPR”) is the European privacy regime that has replaced the EU Data Protection Directive (“Directive 95/46/EC”). The GDPR strengthens the security and protection of personal data in the EU.
The GDPR applies to all organizations operating in the EU and processing “personal identifiable data” of EU residents. Personal data is any information relating to an identified or identifiable natural person.
Secure Code Warrior has made information security and data privacy foundational principles of everything we do, and we recognize the importance of adhering to regulations to advance information security and data privacy for citizens of the EU.
We appreciate that our customers have requirements under the GDPR that are directly impacted by their use of our Services. Below are several GDPR initiatives that have been implemented across our Services:
We appreciate that we are entrusted with valuable and sometimes sensitive user research data, which is why we have built security into every layer of our architecture, pursuing a ‘privacy by design’ approach to the design and development of our Services.
Our application is built on world-class, modern cloud infrastructure designed to ensure the safety of your data. We have carefully selected to work with proven third party cloud providers with a great security track record. We employ best practices including regular backups, data encryption, sanitized logging, and common attack prevention.
Download a copy of our Whitepaper for more information about our security practices.
Secure Code Warrior offers customers a robust international data transfer framework as a part of our Data Processing Agreement (“DPA”). The DPA ensures that our customers can lawfully transfer personal data to our Services outside of the European Economic Area by relying on the Standard Contractual Clauses. Our DPA also contains specific provisions to assist customers in their compliance with the GDPR.
We help customers meet obligations under the GDPR ‘data portability’ and ‘right of rectification’ Below are some support articles that can help you with these requirements.
We help customers meet obligations under the GDPR ‘right to be forgotten’ (or ‘right to erasure’) clause by making it easy to request the deletion of personal data from the SCW Platform.
Below is a support article that customers can use to delete user profiles from the SCW Platform.
Once the above process is done, customers should email our Privacy team - firstname.lastname@example.org to confirm data from the Secure Code Warrior Learning Platform has been removed as well as any other processing systems.
The SCW Platform provides training to developers of the Customer to think and act with a security mindset as they build and verify their skills . The SCW Platform allows developers to solve various security puzzles and tracks developer progress through the puzzles.
A processor is an entity that only processes, or uses, stores, transmits, etc, personal data in accordance with the instructions of a controller. The majority of the time, third-party service providers processing personal data on your behalf are processors. For example, customer relationship management platforms would likely be processors.
A controller, by contrast, is an entity that determines the purposes and the means of the processing. In other words, the controller decides why and how to process personal data. Determining what personal data is to be used for, whether to disclose the data (and, if so, to whom), and how long to retain the data are all decisions that can only be made by a controller.
An organization doesn't have to be just a controller or just a processor though: it can fulfill different roles in respect to different data.
Consider, for example, a cloud hosting provider. It may be a processor of the data it hosts for its customers but will be a controller of data about its own employees and it may be a controller of certain kinds of account data about its customers.
Being a Software as a Service provider, Secure Code Warrior acts as either a processor and a controller, depending on the circumstances. Specifically:
The following resources might prove useful:
If you have any questions, please email us at - email@example.com