Data Protection Policy
Last updated: April 14, 2026
1. Purpose
This policy describes how DNS Watchdog handles personal data and customer data in compliance with the General Data Protection Regulation (GDPR) and other applicable data protection legislation. It covers the lawful basis for processing, data minimisation, retention, and data subject rights.
2. Scope
This policy applies to all personal data processed by DNS Watchdog, whether collected directly from users or derived through platform operations. It covers data processed by the application, stored in AWS services, and held by third-party processors.
3. Data Controller
DNS Watchdog acts as the data controller for personal data collected through the platform. For DNS record data and provider credentials supplied by customers, DNS Watchdog acts as a data processor on behalf of the customer (data controller).
For questions about this policy or to exercise your data protection rights, please contact our Data Protection Officer (DPO) at dpo@dnswatchdog.io, or by post at: DNS Watchdog Ltd., Data Protection Officer, 167-169 Great Portland Street, 5th Floor, London W1W 5PF, United Kingdom.
4. Personal Data Processed
4.1 Data Collected Directly
| Data Category | Data Elements | Source | Purpose |
|---|---|---|---|
| Account identity | User ID, email address, full name | Clerk authentication | Account management, authentication, communication |
| Organisation context | Organisation ID, organisation slug, user role | Clerk JWT claims | Multi-tenant access control, role-based authorisation |
| Subscription data | Subscription ID, plan tier, usage limits | Stripe via Clerk JWT | Service entitlement, billing |
| User preferences | Display settings, notification preferences | User input | Personalisation |
| User notes | Free-text notes on DNS records | User input | Record annotation |
4.2 Data Derived Through Processing
| Data Category | Data Elements | Source | Purpose |
|---|---|---|---|
| DNS records | Domain names, record types, record values, IP addresses | Customer DNS providers (Route53, Cloudflare, CSC, Azure DNS, Google Cloud DNS) | Security analysis, change detection |
| SSL/TLS certificates | Certificate issuer, expiry, SANs, chain details | Public certificate endpoints | Certificate monitoring |
| Port scan results | Open ports, detected services | Network scanning | Security risk assessment |
| Website screenshots | Page captures, AI analysis summaries | HTTP requests to customer domains | Visual monitoring, risk assessment |
| IP intelligence | Geolocation, ASN, hosting provider | IP resolution and enrichment | Context for security analysis |
| Audit trail | User actions, timestamps, change details | Application events | Accountability, compliance |
5. Lawful Basis for Processing
| Processing Activity | Lawful Basis | Justification |
|---|---|---|
| Account creation and authentication | Contract performance (Art. 6(1)(b)) | Necessary to provide the service the customer has subscribed to. |
| DNS record synchronisation and analysis | Contract performance (Art. 6(1)(b)) | Core service functionality requested by the customer. |
| Security scanning (ports, certificates, HTTP) | Legitimate interest (Art. 6(1)(f)) | Necessary for the security monitoring service; balanced against minimal privacy impact as scanning targets customer-owned infrastructure. |
| Screenshot capture and AI analysis | Contract performance (Art. 6(1)(b)) | Feature of the subscribed service for visual monitoring. |
| Billing and subscription management | Contract performance (Art. 6(1)(b)) | Necessary to manage the commercial relationship. |
| Error monitoring and logging | Legitimate interest (Art. 6(1)(f)) | Necessary to maintain service reliability and investigate issues. Logs are minimised and access-controlled. |
| Audit trail | Legitimate interest (Art. 6(1)(f)) | Necessary for security accountability and customer compliance requirements. |
6. Data Minimisation
DNS Watchdog collects and processes only the data necessary for the stated purposes:
- Authentication data is sourced from Clerk JWT claims; the platform does not store passwords or manage authentication credentials directly.
- DNS provider credentials are stored in SSM Parameter Store and accessed only when performing provider operations; they are never logged or included in error reports.
- Structured logging includes user IDs and email addresses for request tracing but excludes request bodies, provider credentials, and other sensitive payloads.
- Sentry error reports are filtered to exclude rate limit errors, expected validation failures, and other non-actionable events.
7. Data Retention
| Data Type | Retention Period | Mechanism |
|---|---|---|
| DNS records (active) | Retained while the provider connection is active | Deleted when provider is removed or record is archived |
| Archived DNS records | Up to 3 years (available for restoration) | Stored in the archive DynamoDB table; can be restored or permanently deleted by the customer |
| Screenshots | 365 days | S3 lifecycle policy: STANDARD → STANDARD_IA (30 days) → GLACIER (90 days) → Deleted (365 days) |
| Changelog / audit trail | Up to 3 years | Retained for compliance and audit purposes |
| Scan history | Up to 2 years | Retained for trend analysis and audit |
| Provider API request logs | Up to 1 year | Retained for debugging and audit; logs are filtered to exclude provider credentials, API tokens, and other sensitive authentication material |
| Application logs | Per CloudWatch retention policy | Configurable per log group |
| Error reports (Sentry) | Per Sentry retention settings | Managed by Sentry's data retention configuration |
| User preferences | Retained while account is active | Deleted upon account closure |
| Subscription/billing data | Retained per legal requirements | Managed through Stripe; local cache in DynamoDB with TTL |
8. Data Security
8.1 Encryption at Rest
- DynamoDB: AWS-managed encryption enabled by default on all tables.
- S3: Server-side encryption with AES-256 (SSE-S3) enabled on the screenshots bucket with bucket key optimisation.
- SSM Parameter Store: SecureString parameters encrypted with AWS KMS.
- CloudFormation parameters: Sensitive values (encryption keys, Sentry DSN) use
NoEchoto prevent exposure in stack outputs or logs.
8.2 Encryption in Transit
- All API communication enforced over TLS 1.2 minimum via API Gateway security policy.
- Frontend-to-API communication over HTTPS with strict CORS policy restricting origins to the application domain.
- Internal AWS service communication uses AWS SDK default TLS configuration.
- CloudFront distributions enforce HTTPS for screenshot delivery.
8.3 Tenant Isolation
Customer data is isolated at multiple levels:
- Application-level isolation via
scope_idpartition keys. - Infrastructure-level isolation via IAM session tags on temporary STS credentials.
- Storage-level isolation via S3 object prefix conditions and SSM parameter path restrictions.
9. Data Subject Rights
DNS Watchdog supports the following data subject rights under GDPR:
| Right | How It Is Fulfilled |
|---|---|
| Right of access (Art. 15) | Customers can view all their data through the application dashboard. Additional requests can be made to the support team. |
| Right to rectification (Art. 16) | Account details are managed through Clerk. DNS data is synced from authoritative providers and can be corrected at source. |
| Right to erasure (Art. 17) | Customers can delete providers, zones, and records through the application. Account deletion requests are processed through the support team. |
| Right to restriction (Art. 18) | Customers can disconnect providers to stop data processing while retaining existing data. |
| Right to data portability (Art. 20) | DNS data and other customer data can be exported through the application dashboard in standard formats such as JSON or CSV. |
| Right to object (Art. 21) | Customers can contact the support team to object to specific processing activities. |
10. Third-Party Processors
| Processor | Data Processed | Purpose | Location |
|---|---|---|---|
| AWS (Amazon Web Services) | All platform data | Cloud infrastructure hosting | EU (eu-west-2, London) |
| Clerk | User identity, authentication data | Identity and authentication provider | US (with EU data processing) |
| Sentry | Error traces, request metadata | Error monitoring and alerting | US/EU |
| Stripe | Subscription and billing data | Payment processing | US (with EU data processing) |
| Vercel | Frontend application code (no customer data at rest) | Frontend hosting and CDN | Global edge network |
Data processing agreements are in place with all third-party processors.
11. International Transfers
Where personal data is transferred outside the EEA (e.g., to US-based processors), transfers are protected by:
- Standard Contractual Clauses (SCCs) incorporated into processor agreements.
- EU-US Data Privacy Framework certification where applicable.
- Supplementary technical measures including encryption in transit and at rest.
12. Data Breach Notification
In the event of a personal data breach, DNS Watchdog will:
- Assess the breach through the incident response team, led by the Data Protection Officer, in accordance with the Incident Response Policy.
- Notify the relevant supervisory authority within 72 hours of becoming aware of the breach, where required.
- Notify affected data subjects without undue delay where the breach is likely to result in a high risk to their rights and freedoms.
- Document all breaches in the incident register regardless of notification requirements.
13. Data Protection Impact Assessments
DNS Watchdog conducts Data Protection Impact Assessments (DPIAs) for processing activities that are likely to result in a high risk to the rights and freedoms of individuals. This includes, but is not limited to, security scanning of customer infrastructure, website screenshot capture with AI-assisted analysis, and any new processing activities involving personal data at scale. DPIAs are reviewed when there are significant changes to the relevant processing activity.
14. Data Protection by Design and Default
DNS Watchdog implements data protection by design and by default (Art. 25 GDPR) throughout the platform. This includes:
- Multi-tenant isolation at the application, infrastructure, and storage levels to ensure customer data is segregated by default.
- Encryption at rest and in transit for all personal data.
- Data minimisation in logging and error reporting, excluding sensitive payloads and credentials.
- Privacy-preserving defaults, such as non-essential cookies being disabled until the user provides consent.
- Regular review of new features and processing activities for data protection implications before deployment.
15. Records of Processing Activities
DNS Watchdog maintains records of processing activities (ROPA) in accordance with Art. 30 GDPR. These records document the purposes of processing, categories of data subjects and personal data, recipients, international transfers, retention periods, and technical and organisational security measures. The ROPA is reviewed and updated when processing activities change and is available to the supervisory authority upon request.
16. Data Classification
Personal data processed by DNS Watchdog is classified in accordance with the Data Classification Policy. Data classification levels determine the security controls, access restrictions, and handling procedures applied to each category of data.
17. Staff Training
All personnel with access to personal data are required to complete data protection training as part of their onboarding, covering this policy, the Data Classification Policy, and platform-specific data handling procedures. Training is refreshed annually or when significant changes are made to data processing activities or applicable legislation.
18. Review
This policy is reviewed annually or when there are significant changes to data processing activities, applicable legislation, or the platform architecture.
