Data Processing Addendum
Version: 20 February 2026 (view archived versions)
This Data Processing Addendum (“DPA”) supplements the Agreement between you and D2L. It is entered into between you, as the Controller, and D2L, as the Processor, and forms an integral part of the Agreement governing your use of the Services. Unless expressly defined in Section 13, all capitalized terms have the meanings assigned to them in the Agreement.
This DPA sets out the additional terms under which the Processor will process Personal Data on behalf of the Controller in connection with the Services. It is intended to apply globally, and its safeguards are designed to meet or exceed the requirements of comprehensive Data Protection Laws worldwide. These obligations apply to all Personal Data processed under the Agreement, regardless of where the data originates or is processed.
If the Agreement already contains a data processing addendum or similar data protection terms, those terms will prevail in the event of a conflict.
1Interpretation
2Processing of Data
3Processor’s Obligations
4Authorised Employees
5Sub-Processors
6Security of Personal Data
7Security Incident Notification
8Transfers of Personal Data
9Rights of Data Subjects
10Actions and Access Requests
11Term and Termination
12Data Destruction
13Definitions
All references to specific Data Protection Laws in this DPA shall include any amendments, modifications, re-enactments, or successor legislation to such laws, and any regulations, guidance, codes of practice, or other instruments issued pursuant to such laws, as updated from time to time. The Processor shall remain compliant with all such amendments, updates, and successor legislation throughout the term of this DPA.
- an identified or identifiable person to whom Personal Data relates;
- the meaning as set forth in Data Protection Laws; and
- such similar terms as defined in any Data Protection Laws, including the term “Consumer” or “Individual”.
Exhibit A
Details of Processing
- Prospects, customers, business partners and/or vendors of data exporter (who are natural persons)
- Employees or contact persons of data exporters’ prospects, customers, business partners and/or vendors
- Data exporter’s users authorized by data exporter to use the Services, including employees, administrators and other representatives of such users
- Complainants or enquirers
- First name
- Last name
- Contact information (e.g., email address, phone number, physical address, etc.)
- Log-on/log-off information, including username and passwords
- User records and related information (e.g., courses, programs, grades, etc.)
- Title / position
- Employer / institution
- Connection data, including IP address
- Localization data
- Personal details (e.g., family, lifestyle, social circumstances, financial details, etc.)
Continuous (depending on when the data exporter and/or its users upload its or their respective data).
To provide the Services to data exporter and its authorized users for use and access in accordance with the terms and subject to the conditions set forth in the Agreement.
- Processing in accordance with the terms and subject to the conditions set forth in the Agreement
- Processing initiated by data exporter’s users in the course of their use and access of the Services
- Processing in compliance with other reasonable and lawful documented instructions provided by data exporter in accordance with the terms hereof, provided that such instructions do not conflict with applicable laws
During the term and any renewal term(s) of the Agreement, and for such additional period as required by applicable law or as necessary to fulfil the purposes described herein, after which personal data shall be deleted or returned in accordance with the Agreement.
Sub-processors are used for data hosting, report formatting, incident reporting and other functions that are related or ancillary to or otherwise form a part of the purposes described above.
Exhibit B
Appropriate Technical & Organizational Measures
D2L has implemented security and privacy policies, processes and procedures that align with the following industry acceptable standard-setting organizations: International Organization of Standards (ISO), U.S. National Institute of Standards and Technology (NIST) and Open Web Application Security Project (OWASP) Foundation. Security and privacy controls implemented have been certified through annual external third-party audits to ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, SOC I Type 2 and SOC II Type 2.
D2L only collects and stores minimum information required to deliver and maintain its services. All data stored for this purpose is encrypted using the latest Advanced Encryption Standard (AES) established by NIST. All data transmitted for this purpose is encrypted using the latest Transport Layer Security (TLS) configuration supported by Amazon Web Services (AWS).
D2L uses multiple AWS services to ensure ongoing confidentiality, integrity and availability of the processing system and services. Services are accessed and managed using the AWS management console. Access to this console is configured to follow the best practices principles of least privilege and need-to-know. In particular, employee access to this console is controlled via two-factor authentication.
D2L has a disaster recovery plan in place that is tested annually. D2L takes full monthly and incremental daily backups of all client data residing on the system.
The testing, assessment and evaluation of the effectiveness of D2L’s technical and organizational security and privacy measures are covered under the following:
- Annual internal audits
- Annual external audits
- Annual external third-party penetration tests
- Regular internal vulnerability scans
AWS data centers are secured by AWS, and access is restricted to AWS staff. For more information about the physical security of AWS data centers, please visit aws.amazon.com/compliance/data-center/data-centers/.
With respect to D2L’s higher education institutional clients that utilize the Higher Education Community Vendor Assessment Toolkit (HECVAT), D2L meets the requirements for HLAA-05 (e.g., events logging). Logging is enabled to track actions completed.
Developers are trained on security and privacy fundamentals, including only storing data with a clear purpose and deletion of data after its useful life. The lifecycle of customer data is controlled by the customer using a data purge utility built into the Learning Management System. In addition, D2L has a data purge process that allows for erasure requests to be actioned appropriately according to required regional laws and standards.