T TeamFeePay Trust

ISO/IEC 27018:2019

Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors.

ISO/IEC 27018:2019
Matrice dei controlli

Estensioni PII / responsabile cloud

8 controlli
27018-9 Access control for PII

Access to PII is restricted to authorised personnel, individually attributable, and reviewed at intervals appropriate to the sensitivity of the data.

Come lo implementiamo

Access to customer PII requires JIT elevation through an approved workflow; no shared accounts touch PII; access is reviewed quarterly.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-10 Cryptography of PII

PII transmitted over public networks is protected by cryptography. Keys used to protect PII are managed under documented procedures.

Come lo implementiamo

All customer PII in transit uses TLS 1.2+; at rest uses AES-256 with keys held in a managed KMS with documented rotation and access logging.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-11 Physical and environmental security for PII

Physical access to facilities processing PII is restricted to authorised personnel and is audited.

Come lo implementiamo

Production PII is processed only in tier-1 cloud facilities (UK/EU regions) whose physical controls are independently audited under ISO 27001 / SOC 2.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-12 Operations security and PII

Logs of activities affecting PII are maintained, protected and reviewable on request.

Come lo implementiamo

All access to customer PII generates an audit event captured by our SIEM. Logs are tamper-evident and retained for at least 1 year.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-13 Communications security for PII

Transfers of PII between systems and to PII controllers are encrypted and authenticated.

Come lo implementiamo

PII transfers to or from customers occur via authenticated, encrypted APIs. PII is never transferred to a third party except an approved sub-processor under DPA.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-15 Supplier relationships involving PII

Sub-processors that process PII are bound by equivalent or stricter PII-protection obligations and are disclosed to the PII controller.

Come lo implementiamo

Sub-processors are listed on this Trust Centre. New or replaced sub-processors are announced with 30 days notice to allow controllers to object.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-16 Incident management involving PII

Incidents affecting PII are reported to the PII controller within agreed timescales and include sufficient information for the controller to fulfil its own obligations.

Come lo implementiamo

Confirmed PII incidents are reported to affected customers within 72 hours, in line with UK GDPR Article 33, with the information required for them to notify their data subjects.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-18 Compliance and PII

The processor identifies the legal and regulatory obligations applicable to PII it processes and demonstrates compliance.

Come lo implementiamo

We maintain a compliance register covering UK GDPR, DPA 2018, ICO codes of practice, and customer DPAs. Compliance is reviewed annually and on regulatory change.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato

Principi di protezione dei PII

11 controlli
27018-A.1 Consent and choice

The PII processor processes PII only on documented instructions from the PII controller; the processor does not use PII for any other purpose without controller authorisation.

Come lo implementiamo

We act on documented controller instructions only. We do not use customer PII for marketing, profiling, training models or any purpose outside the contracted service.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-A.2 Purpose legitimacy and specification

PII is processed only for the purposes specified by the PII controller.

Come lo implementiamo

Our DPA enumerates the purposes for which we process PII. Any new purpose requires written controller instruction.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-A.3 Collection limitation

The processor does not collect PII beyond what is necessary for the processing instructed by the controller.

Come lo implementiamo

We collect only what the customer's use of the platform requires. Optional fields are clearly marked as optional in the product and the API.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-A.4 Data minimisation

Temporary files and outputs that include PII are minimised and the PII is erased as soon as it is no longer needed.

Come lo implementiamo

Temporary files containing PII are written to ephemeral, encrypted volumes and erased on job completion. Diagnostic dumps are scrubbed of PII.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-A.5 Use, retention and disclosure limitation

PII is retained no longer than necessary for the agreed purpose and is not disclosed except as instructed by the controller or required by law.

Come lo implementiamo

Retention defaults are documented per data type and overrideable by the controller. Disclosure to authorities is permitted only with legal compulsion and, where lawful, with prior notice to the controller.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-A.6 Accuracy and quality

Tools exist for the controller to keep PII accurate, complete and up to date.

Come lo implementiamo

Admin tooling lets controllers (club administrators) correct PII directly. API endpoints provide the same capability programmatically.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-A.7 Openness, transparency and notice

The processor provides clear information about its PII handling practices, including sub-processors.

Come lo implementiamo

This Trust Centre and our DPA describe how we handle PII, the sub-processors we use, the regions in which we process, and our retention defaults.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-A.8 Individual participation and access

The processor supports the controller in fulfilling data subject rights, including access, correction and erasure.

Come lo implementiamo

Controllers can fulfil access, correction and erasure requests directly via the admin console. Where they need our help, we respond within 30 days of a written request.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-A.9 Accountability

The processor demonstrates accountability for its PII obligations through evidence, audits and breach notification.

Come lo implementiamo

Accountability is demonstrated through ISO/IEC 27001 + 27018 certification, independent pen-testing, audit logs, and our published incident-response SLAs.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-A.10 Information security

The processor implements appropriate technical and organisational measures to protect PII against unauthorised access, alteration, disclosure or destruction.

Come lo implementiamo

Our ISO 27001-aligned ISMS, encryption-in-transit-and-at-rest, key management, JIT access, EDR, SIEM monitoring and quarterly DR testing all serve this control.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato
27018-A.11 Privacy compliance

The processor demonstrates compliance with applicable PII protection legislation and regulation in the jurisdictions where PII is processed.

Come lo implementiamo

PII is processed only in UK and EU regions. Where transfers occur outside the UK/EEA, we rely on UK and EU SCCs and supplementary measures, documented per transfer.

Responsabile: DPO Revisionato il 11 aprile 2026
Implementato