Data Processing Addendum (DPA) / AVV Guidance

Structured guidance for a separate data-processing agreement between Trustec Valley UG (haftungsbeschraenkt) and customers.

Effective date: 2026-04-07

Purpose

This document provides a practical structure for DPA negotiations and contractual implementation in LogiHash projects.

1. Parties and roles

  • Customer: controller
  • Trustec Valley UG (haftungsbeschraenkt): processor where applicable

2. Scope and term

  • Processing related to LogiHash service delivery
  • Term generally aligned with the main commercial agreement

3. Nature and purpose of processing

  • Provision of signature and verification functions
  • API operations, document-metadata processing, and audit logging

4. Data categories and data subjects

  • Customer/user data, contact data, and log data
  • Data subjects: employees, customer contacts, and potentially end users

5. TOM annex (technical and organizational measures)

  • Access management and role-based controls
  • Encryption in transit and at rest
  • Key-management procedures
  • Backup and restore controls
  • Monitoring and incident response

6. Subprocessors

  • Telekom Open Cloud (e.g., API Gateway, KMS)
  • Hetzner (hosting / object storage)
  • Additional subprocessors only with contractually defined notice/approval

7. Data-subject rights support

The processor supports the controller with access, rectification, deletion, portability, and legally required notifications.

8. Security incidents

A documented incident-notification process with timelines, channels, and minimum report content should be contractually defined.

9. Audit and evidence clauses

  • Evidence regarding TOM implementation
  • Audit process with confidentiality and proportionality safeguards

10. Data return and deletion

After contract termination, data return or deletion is handled per instruction and applicable legal retention obligations.

11. AI-assisted processing as a security measure

  • Purpose limitation: anomaly detection, fraud prevention, security reporting
  • Documentation of models, input-data categories, and evaluation criteria
  • Human review for critical classifications

12. Reporting and abuse management

  • Define workflows for reports, triage, verification, and escalation
  • Ensure decision logging and traceability

13. Feedback and evaluation data

  • Define which feedback data is treated as personal data
  • Define retention periods and access controls for feedback/survey datasets

14. AdES-specific provisions

  • In the AdES operating model, LogiHash performs identity proofing itself; certificates are obtained from the certificate chain of an appropriate certificate provider.
  • Where AdES features are used, controller/processor role allocation for signature-relevant verification data should be explicitly defined.
  • Retention, integrity evidence, and access controls for signature-relevant logs should be contractually specified.
  • If signing means or key material is suspected to be compromised, accelerated notification, blocking, and rotation obligations should apply.