1. Definitions

This Data Processing Addendum ("DPA") forms part of the Terms of Service between FirstAidLog Pty Ltd ("Processor", "we", "us") and the organisation subscribing to FirstAidLog ("Controller", "you", "Customer").

2. Scope of Processing

2.1 Subject Matter

The Processor processes Personal Data solely to provide the FirstAidLog service as described in the Terms of Service, including storage, retrieval, display, and transmission of workplace health and safety records.

2.2 Categories of Data Subjects

2.3 Types of Personal Data

CategoryData TypesProtection
Account dataName, email, role, organisationRLS, TLS, bcrypt
Health informationPatient details, injury nature, treatment, psychological harmAES-256-GCM field-level encryption
WHS recordsFirst aider details, witness statements, incident locationsAES-256-GCM field-level encryption
Operational dataKit inventories, inspections, training recordsRLS, TLS
Financial dataStripe customer ID (no card numbers stored)PCI-DSS (Stripe)

3. Processor Obligations

The Processor shall:

  1. Process Personal Data only on documented instructions from the Controller, unless required by Australian law
  2. Ensure that persons authorised to process Personal Data have committed to confidentiality
  3. Implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including:
    • AES-256-GCM field-level encryption for health information
    • AES-256-GCM encryption for OAuth tokens at rest
    • TLS 1.2+ for all data in transit (enforced via HSTS)
    • Row-Level Security policies on all database tables
    • Role-based access control with principle of least privilege
    • Comprehensive audit logging (including read events)
  4. Not engage another processor without prior written authorisation from the Controller (see Section 5)
  5. Assist the Controller in responding to requests from data subjects exercising their rights under APPs 12 and 13
  6. Assist the Controller in ensuring compliance with their obligations regarding data security, breach notification, and privacy impact assessments
  7. At the choice of the Controller, delete or return all Personal Data after the end of the provision of services, subject to legal retention requirements (WHS Act 2011 s274(d))
  8. Make available to the Controller all information necessary to demonstrate compliance with this DPA

4. Controller Obligations

The Controller shall:

  1. Ensure that it has a lawful basis for providing Personal Data to the Processor
  2. Obtain any required consents from data subjects before entering Personal Data (particularly health information) into the Service
  3. Provide the Processor with written instructions regarding the processing of Personal Data
  4. Comply with Australian Privacy Principles when collecting, using, and disclosing personal information via the Service

5. Sub-processors

The Controller authorises the Processor to engage the following sub-processors:

Sub-processorPurposeLocation
Supabase Inc.Database, authentication, file storageSydney, Australia
Vercel Inc.Application hosting, API, CDNSydney, AU (primary); global edge
Functional Software Inc. (Sentry)Error monitoring (no PII)United States
Zoho CorporationTransactional email deliveryAustralia
Stripe Inc.Payment processingUnited States / Australia
Xero LimitedAccounting integration (if enabled)Australia / New Zealand
Intuit Inc. (QuickBooks, coming soon)Planned accounting integration if enabled in futureUnited States / Australia

The Processor will notify the Controller at least 14 days before adding or replacing a sub-processor. If the Controller objects, they may terminate the affected service component.

6. Data Breach Notification

In the event of a Personal Data breach, the Processor shall:

  1. Notify the Controller within 24 hours of becoming aware of the breach
  2. Provide sufficient information for the Controller to meet their obligations under the Notifiable Data Breaches (NDB) scheme of the Privacy Act 1988
  3. Cooperate with the Controller and take reasonable steps to contain, investigate, and remediate the breach
  4. Not notify affected individuals or the OAIC directly without prior consultation with the Controller, unless required by law

The notification shall include: the nature of the breach, categories and approximate number of data subjects affected, likely consequences, and measures taken or proposed to address the breach.

7. Data Retention & Deletion

Upon termination of the Service agreement:

8. International Transfers

Where Personal Data is transferred to a sub-processor outside Australia (see Section 5), the Processor ensures that:

Primary data storage remains in Australia (Supabase Sydney region, ap-southeast-2).

9. Audits

The Processor shall make available to the Controller, on reasonable request, information necessary to demonstrate compliance with this DPA. The Controller may conduct or commission an audit (at their own cost) with reasonable notice, during business hours, and subject to confidentiality obligations.

10. Governing Law

This DPA is governed by the laws of Queensland, Australia. The parties submit to the exclusive jurisdiction of the courts of Queensland.

11. Contact

For DPA-related enquiries:

Privacy Officer
FirstAidLog Pty Ltd
Email: support@firstaidlog.com
Queensland, Australia