Skip to Content

Data Processing Addendum

Annex A: Technical and organizational security measures

This Data Processing Addendum (Annex A) forms part of your broader Agreement with us.  For details of all the parts of our Agreement and how they are read together, see Dataweavers Legal | Terms of Service.

 

Latest Version | January 2026 

Technical And Organizational Measures

Dataweavers maintains technical and organizational measures designed to protect Customer Data against accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Customer Data, taking into account the nature of the Services and the processing carried out by Dataweavers.

Dataweavers maintains an information security management system aligned to ISO/IEC 27001, and applies documented security, operational, and risk management policies, procedures, and review processes. These measures are subject to periodic review and update, provided that such updates do not materially reduce the overall level of security.

These measures include the following:

Technical and Organizational Security Measure

Implementation

1. Governance and Security

Dataweavers maintains a formal information security governance framework, including:

  • Documented information security policies, standards, and procedures aligned to ISO/IEC 27001

  • Defined security roles and responsibilities, including executive oversight of security and risk

  • Periodic risk assessments to identify and mitigate security risks

  • Internal review and audit processes to assess the effectiveness of security controls

  • Ongoing security awareness and training programs for personnel

2. Service Architecture and Tenancy Model

The Arc platform is deployed within the Customer’s Microsoft Azure tenant, or a Microsoft Azure tenant nominated and controlled by the Customer.

  • Customer Data, including production data, remains within the Customer-controlled Azure environment

  • Dataweavers does not operate Arc as a shared multi-tenant service for customer production data

  • Customer Data is not commingled with data from other customers

  • The Arc control plane processes and stores only limited operational metadata required for monitoring, deployment management, and support, and does not store Customer application or production data

3. Access Control and Identity Management

Access to Customer environments is restricted as follows:

  • Access is granted only to authorized Dataweavers personnel on a least privilege and need-to-know basis

  • Access is provisioned through the Customer’s Microsoft Entra ID tenant using mechanisms such as guest access or Azure Lighthouse delegation, subject to Customer approval

  • Administrative access requires multi-factor authentication (MFA)

  • Where enabled by the Customer, privileged access is subject to just-in-time (JIT) or time-bound activation through Privileged Identity Management (PIM)

  • Access is limited to the specific subscriptions and resources required for service delivery

  • Access rights are periodically reviewed and revoked promptly when no longer required

4. Application and Service Authentication

Dataweavers implements secure application and service authentication mechanisms, including:

  • Application components access Azure resources using managed identities where supported

  • Persistent credentials are minimized and not exposed in application code or configuration

  • Service-to-service interactions use restricted permissions aligned to operational requirements

  • Secrets and credentials are stored and managed using secure mechanisms (e.g. Azure Key Vault or equivalent)

  • Direct access to Customer Data by support personnel is not enabled by default

5. Encryption and Transmission Security

Dataweavers applies encryption and transmission security controls, including:

  • Customer Data is encrypted in transit using industry standard protocols (including TLS 1.2 or higher)

  • Encryption at rest is implemented using Azure-native encryption capabilities (including AES-256 where supported)

  • Encryption keys are managed in accordance with industry best practices, including secure storage and restricted access

  • Where supported, Customer-managed key (CMK) configurations may be used within the Customer environment

6. Network and Infrastructure Security

Dataweavers applies defense-in-depth security principles, including:

  • Network isolation and segmentation within the Customer Azure environment

  • Use of firewalls, private endpoints, and restricted service access

  • Web application and edge protection controls where applicable

  • Secure configuration and hardening of infrastructure components

  • Logical separation between production and non-production environments

7. Logging, Monitoring and Auditability

Dataweavers maintains logging, monitoring, and auditability capabilities, including:

  • Administrative access and operational activities are logged using Azure-native logging capabilities

  • Platform activity, telemetry, and security-relevant events are monitored for alerting, triage, and incident response

  • Where applicable, logs can be also integrated with centralized monitoring or customer SIEM tooling

  • Logs are protected against unauthorized modification and retained in accordance with defined retention policies

8. Vulnerability Management and Patching

Dataweavers maintains a vulnerability management program that includes:

  • Regular security posture assessments and vulnerability scanning using industry-standard tools

  • Identification, prioritization, and remediation of vulnerabilities based on severity

  • Application of security patches and updates in accordance with defined timelines

  • Critical vulnerabilities are addressed on an expedited basis appropriate to risk

  • Periodic penetration testing may be conducted on platform components

9. Change Management and Secure Operations

Dataweavers applies controlled change management and secure operational practices, including:

  • Production changes are subject to documented change control processes

  • Changes are reviewed, risk-assessed, and approved prior to implementation

  • Segregation of duties is applied where appropriate

  • Emergency changes follow defined procedures and are retrospectively reviewed

  • Operational activities are performed by authorized personnel in accordance with internal and Customer governance controls

10. Business Continuity and Disaster Recovery

Dataweavers maintains business continuity and disaster recovery measures, including:

  • The Arc platform leverages Azure-native resilience, redundancy, and availability capabilities within the Customer Environment

  • Backup and recovery processes are implemented where applicable to the deployed architecture

  • Business continuity and disaster recovery measures are designed to support restoration of service within reasonable timeframes

  • Recovery objectives (including RTO and RPO) are aligned to the Customer’s Azure configuration and service design

11. Personnel Security and Confidentiality

Dataweavers implements personnel security and confidentiality measures, including:

  • Personnel with access to Customer Data are subject to confidentiality obligations

  • All Personnel receive security and privacy training relevant to their roles

  • Dataweavers takes reasonable steps to ensure the reliability of personnel, agents, contractors, and subprocessors

  • Background checks may be conducted where permitted by applicable law

12. Incident Response

Dataweavers maintains incident detection and response capabilities, including:

  • Detection, triage, escalation, investigation, containment, and remediation of security incidents

  • Defined severity classification and response procedures

  • Internal coordination of incident response activities

  • Where a confirmed personal data breach affecting Customer Data occurs, notification is provided without undue delay and no later than 48 hours after becoming aware of the incident

13. Data Location, Retention and Deletion

Dataweavers applies the following data controls, including:

  • Customer Data remains within the Customer’s Microsoft Azure tenant or a tenant nominated by the Customer

  • Dataweavers systems retain only limited operational metadata, support records, and audit logs as required

  • Retention is governed by documented policies and applicable legal requirements

  • Upon termination or expiry of the agreement, Customer Data held outside the Customer environment (if any) is returned or securely deleted

  • Secure deletion methods are applied to prevent data reconstruction

14. Data Minimization and Segregation

Dataweavers applies data minimization and segregation principles, including:

  • Dataweavers processes only the minimum Customer Data necessary to deliver the Services

  • Customer Data is logically and physically segregated within the Customer-controlled environment

  • Access to Customer Data is restricted and not enabled by default

15. Secure Development Practices

Dataweavers applies secure development practices to its platform components, including:

  • Dataweavers applies secure software development practices to platform components

  • Code is subject to review and testing prior to release

  • Security vulnerabilities are identified and remediated as part of the development lifecycle

  • Industry standards (such as OWASP guidance) are considered in development practices

16. Physical Security

Dataweavers relies on secure physical infrastructure controls, including:

  • Customer Data is hosted within Microsoft Azure data centers

  • Physical security controls (including access control, surveillance, and environmental protections) are implemented and managed by Microsoft Azure

  • Azure data centers maintain industry-recognized certifications (including ISO 27001 and SOC 2)

17. Subprocessor Controls

Dataweavers applies subprocessor governance and risk management controls, including:

  • Dataweavers conducts due diligence on authorized subprocessors

  • Subprocessors are contractually required to implement appropriate technical and organizational measures

  • Subprocessors are subject to ongoing assessment under Dataweavers’ supplier risk management processes

18. Accountability and Continuous Improvement

Dataweavers maintain accountability and continuous improvement practices, including:

  • Dataweavers maintains accountability for data protection through its ISO/IEC 27001 based ISMS framework

  • Security controls and processes are continuously reviewed and improved

  • Dataweavers monitors regulatory developments and adapts its practices where required

19. Data Portability and Erasure

Dataweavers supports data portability and erasure requirements, including:

  • Dataweavers supports the return or deletion of Customer Data in accordance with contractual obligations

  • Customer Data can be exported or removed from Dataweavers-controlled systems where applicable

  • Requests are fulfilled within reasonable timeframes consistent with legal and contractual requirements