Logotype of Dune Security
  • Platform
  • Solutions
    By Use Case
    Phishing & Social Engineering Defense
    Simulate smishing, vishing, and spear phishing with adaptive testing and training — to build resilient, attack-ready users.
    Insider Threat Prevention
    Detect, score, and neutralize high-risk users before they trigger incidents — with behavioral analytics.
    User Risk Scoring
    Quantify individual user risk with role context, behavioral analytics, and anomaly detection — continuously.
    Red Team Attack Simulations
    Prepare for real-world threats with advanced simulations and measurable user responses.
    Security Awareness Replacement
    Replace ineffective training by delivering just-in-time, personalized learning based on real user risk — automatically.
    Compliance Training Automation
    Auto-deliver policy-aligned training and track completion to maintain audit readiness — no LMS bloat, no wasted time.
    User Adaptive Security
    Use real-time user risk scores to dynamically adjust access and identity controls.
    Continuous User Monitoring
    Gain 24/7 visibility into user actions, behavioral drift, and policy violations across your stack.
    By Industry
    Financial Services
    Healthcare
    Technology & SaaS
    Higher Education
    Business Process Outsourcing
    Legal & Professional Services
    State & Local Governments
  • Resources
    Featured
    2025 Global Insider Risk Intelligence Report
    Securing Financial Services Webinar
    Resource Library
    Case Studies
    Blog
    Events
    Content Library
  • Partners
  • About
    About usCareers
Book a Demo
Book a Demo
Log in

SCHEDULE 1

Last updated:

ANNEX I

A. LIST OF PARTIES

Data exporter(s):

Name: Customer (as defined in the Agreement)
Address: As set forth in the relevant Order Form.
Contact person’s name, position and contact details: As set forth in the relevant Order Form.
Activities relevant to the data transferred under these Clauses: Recipient of the Services provided by Dune Security in accordance with the Agreement.
Signature and date: Signature and date are set out in the Agreement.
Role (controller/processor): Controller

Data importer(s):

Name: Madeira Security, Inc. DBA “Dune Security”
Address: New York City.
Contact person’s name, position and contact details: Daniel Redfern, privacy@dune.security
Activities relevant to the data transferred under these Clauses: Provision of the Services to the Customer in accordance with the Agreement.
Signature and date: Signature and date are set out in the Agreement.
Role (controller/processor): Processor.

‍

B. DESCRIPTION OF TRANSFER

Categories of data subjects whose personal data is transferred

Customer’s authorized users of the Services.

Categories of personal data transferred

Name, Address, Date of Birth, Age, Education, Email, Gender, Image, Job, Language, Phone, Related person, Related URL, User ID, Username.

Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialized training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.

No sensitive data collected.

The frequency of the transfer (e.g., whether the data is transferred on a one-off or continuous basis).

Continuous basis

Nature of the processing

The nature of the processing is more fully described in the Agreement and accompanying order forms but will include the following basic processing activities: The provision of Services to Customer. In order to provide people data, Dune Security receives identifying Customer Personal Data to permit Dune Security to query, cleanse, standardize, enrich, (when required) send to additional data to feed providers, and to store the query information.

The purpose of the transfer is to facilitate the performance of the Services more fully described in the Agreement and accompanying order forms.

Purpose(s) of the data transfer and further processing

The purpose of the transfer is to facilitate the performance of the Services more fully described in the Agreement and accompanying order forms.

The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period

The period for which the Customer Personal Data will be retained is more fully described in the Agreement, Addendum, and accompanying order forms.

For transfers to (sub-) processors, also specify subject matter, nature, and duration of the processing

The subject matter, nature, and duration of the Processing more fully described in the Agreement, Addendum, and accompanying order forms.

C. COMPETENT SUPERVISORY AUTHORITY

Data exporter is established in an EEA country.

The competent supervisory authority is as determined by application of Clause 13 of the EU SCCs.

ANNEX II

TECHNICAL AND ORGANIZATIONAL MEASURES INCLUDING TECHNICAL AND ORGANIZATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA

Description of the technical and organizational security measures implemented by Dune Security as the data processor/data importer to ensure an appropriate level of security, taking into account the nature, scope, context, and purpose of the processing, and the risks for the rights and freedoms of natural persons.

  • Security
    • Security Management System.
      • Organization. Dune Security designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program.
      • Policies. Management reviews and supports all security related policies to ensure the security, availability, integrity and confidentiality of Customer Personal Data. These policies are updated at least once annually.
      • Assessments. Dune Security engages a reputable independent third-party to perform risk assessments of all systems containing Customer Personal Data at least once annually.
      • Risk Treatment. Dune Security maintains a formal and effective risk treatment program that includes penetration testing, vulnerability management and patch management to identify and protect against potential threats to the security, integrity or confidentiality of Customer Personal Data.
      • Vendor Management. Dune Security maintains an effective vendor management program
      • Incident Management. Dune Security reviews security incidents regularly, including effective determination of root cause and corrective action.
      • Standards. Dune Security operates an information security management system that complies with the requirements of ISO 27001:2022 standard.
    • Personnel Security.
      • Dune Security personnel are required to conduct themselves in a manner consistent with the company’s guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. Dune Security conducts reasonably appropriate background checks on any employees who will have access to client data under this Agreement, including in relation to employment history and criminal records, to the extent legally permissible and in accordance with applicable local labor law, customary practice and statutory regulations.
      • Personnel are required to execute a confidentiality agreement in writing at the time of hire and to protect Customer Personal Data at all times. Personnel must acknowledge receipt of, and compliance with, Dune Security’s confidentiality, privacy and security policies. Personnel are provided with privacy and security training on how to implement and comply with the Information Security Program. Personnel handling Customer Personal Data are required to complete additional requirements appropriate to their role (e.g., certifications). Dune Security’s personnel will not process Customer Personal Data without authorization.
    • Access Controls
      • Access Management. Dune Security maintains a formal access management process for the request, review, approval and provisioning of all personnel with access to Customer Personal Data to limit access to Customer Personal Data and systems storing, accessing or transmitting Customer Personal Data to properly authorized persons having a need for such access. Access reviews are conducted periodically to ensure that only those personnel with access to Customer Personal Data still require it.
      • Infrastructure Security Personnel. Dune Security has, and maintains, a security policy for its personnel, and requires security training as part of the training package for its personnel. Dune Security’s infrastructure security personnel are responsible for the ongoing monitoring of Dune Security’s security infrastructure, the review of the Services, and for responding to security incidents.
      • Access Control and Privilege Management. Dune Security’s and Customer’s administrators and end users must authenticate themselves via a Multi-Factor authentication system or via a single sign on system in order to use the Services
      • Internal Data Access Processes and Policies – Access Policy. Dune Security’s internal data access processes and policies are designed to protect against unauthorized access, use, disclosure, alteration or destruction of Customer Personal Data. Dune Security designs its systems to only allow authorized persons to access data they are authorized to access based on principles of “least privileged” and “need to know”, and to prevent others who should not have access from obtaining access. Dune Security requires the use of unique user IDs, strong passwords, two factor authentication and carefully monitored access lists to minimize the potential for unauthorized account use. The granting or modification of access rights is based on: the authorized personnel’s job responsibilities; job duty requirements necessary to perform authorized tasks; a need to know basis; and must be in accordance with Dune Security’s internal data access policies and training. Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for accountability. Where passwords are employed for authentication (e.g., login to workstations), password policies follow industry standard practices. These standards include password complexity, password expiry, password lockout, restrictions on password reuse and re-prompt for password after a period of inactivity
    • Data Center and Network Security
      • Data Centers.
        • Infrastructure. Dune Security has AWS as its data center.
        • Resiliency. Multi Availability Zones are enabled on AWS and Dune conducts Backup Restoration Testing on regular basis to ensure resiliency.
        • Server Operating Systems. Dune Security’s servers are customized for the application environment and the servers have been hardened for the security of the Services. Dune Security employs a code review process to increase the security of the code used to provide the Services and enhance the security products in production environments.
        • Disaster Recovery. Dune Security replicates data over multiple systems to help to protect against accidental destruction or loss. Dune Security has designed and regularly plans and tests its disaster recovery programs.
        • Security Logs. Dune Security’s systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into, Dune Security’s systems.
        • Vulnerability Management. Dune Security performs regular vulnerability scans on all infrastructure components of its production and development environment. Vulnerabilities are remediated on a risk basis, with Critical, High and Medium security patches for all components installed as soon as commercially possible.
    • Networks and Transmission.
      • Data Transmission. Transmissions on production environment are transmitted via Internet standard protocols.
      • External Attack Surface. AWS Security Group which is equivalent to virtual firewall is in place for Production environment on AWS.
      • Incident Response. Dune Security maintains incident management policies and procedures, including detailed security incident escalation procedures. Dune Security monitors a variety of communication channels for security incidents, and Dune Security’s security personnel will react promptly to suspected or known incidents, mitigate harmful effects of such security incidents, and document such security incidents and their outcomes.
      • Encryption Technologies. Dune Security makes HTTPS encryption (also referred to as SSL or TLS) available for data in transit.
    • Data Storage, Isolation, Authentication, and Destruction.

Dune Security stores data in a multi-tenant environment on AWS servers. Data, the Services database and file system architecture are replicated between multiple availability zones on AWS. Dune Security logically isolates the data of different customers. A central authentication system is used across all Services to increase uniform security of data. Dune Security ensures secure disposal of Client Data through the use of a series of data destruction processes.

ANNEX III

LIST OF SUB-PROCESSORS

The following sub-processors are engaged by the Data Processor for the processing of Personal Data:

Amazon Web Services, Inc. Running the Production environment including the Application and Databases US East Northern Virginia, USA and Frankfurt, Germany
Logotype of Dune Security
Platform
Partners
Trust Center
Privacy Policy
Fulfillment Policy
Cookie Policy

Follow us

Copyright © 2025 Dune Security