LetsBeBiz-Redesign/docs/legal/LetsBe_Biz_Data_Processing_...

36 KiB
Raw Permalink Blame History

LetsBe Biz — Data Processing Agreement (DPA)

Version: 1.0 Date: February 26, 2026 Authors: Matt (Founder), Claude (Drafting) Status: Draft — Requires Legal Review Before Publication Companion docs: Terms of Service v1.0, Privacy Policy v1.0, Security & GDPR Framework v1.1

Important: This Data Processing Agreement is a comprehensive draft based on GDPR Article 28 requirements and LetsBe's platform architecture. It must be reviewed by qualified legal counsel before being made available to customers. It is not legal advice.


1. Parties and Background

1.1 Parties

This Data Processing Agreement ("DPA") is entered into between:

  • The Customer ("Controller," "you," "your") — the individual or entity that subscribes to the LetsBe Biz service; and
  • LetsBe Solutions LLC ("Processor," "LetsBe," "we," "us," "our") — the provider of the LetsBe Biz platform.

1.2 Background

This DPA forms part of the Terms of Service ("Agreement") between the Controller and the Processor and supplements the Agreement with respect to the processing of personal data.

The Controller uses the LetsBe Biz platform, which includes a dedicated virtual private server (VPS), open-source business tools, and AI agents. In providing the Service, the Processor processes personal data on behalf of the Controller. This DPA sets out the parties' obligations and rights regarding that processing.

1.3 Precedence

In the event of any conflict between this DPA and the Agreement, this DPA shall prevail with respect to data protection matters. In the event of any conflict between this DPA and the Standard Contractual Clauses (Annex IV), the Standard Contractual Clauses shall prevail.


2. Definitions

In this DPA:

  • "Data Protection Laws" means all applicable legislation relating to data protection and privacy, including GDPR (Regulation (EU) 2016/679), the UK GDPR, the Swiss Federal Act on Data Protection (FADP), CCPA/CPRA, PIPEDA, and any applicable US state privacy laws, in each case as amended from time to time.
  • "GDPR" means Regulation (EU) 2016/679 of the European Parliament and of the Council (General Data Protection Regulation).
  • "Personal Data" means any information relating to an identified or identifiable natural person that the Processor processes on behalf of the Controller in connection with the Service, as further described in Annex I.
  • "Processing" has the meaning given in GDPR Article 4(2) — any operation performed on personal data, including collection, recording, organization, storage, adaptation, retrieval, consultation, use, disclosure, restriction, erasure, or destruction.
  • "Subprocessor" means any third party engaged by the Processor to process Personal Data on behalf of the Controller.
  • "Data Subject" means an identified or identifiable natural person to whom the Personal Data relates.
  • "Personal Data Breach" means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Personal Data.
  • "SCCs" means the Standard Contractual Clauses approved by European Commission Implementing Decision (EU) 2021/914, as may be amended or replaced.
  • "Hub" means LetsBe's centralized platform for account management, billing, and monitoring, hosted in the EU (Germany).
  • "VPS" means the dedicated virtual private server provisioned for the Controller, running containerized business tools and AI agents.
  • "Safety Wrapper" means the LetsBe security extension that redacts credentials and (optionally) PII from data before transmission to LLM providers.

3. Scope and Duration of Processing

3.1 Scope

This DPA applies to all Personal Data that the Processor processes on behalf of the Controller in the course of providing the LetsBe Biz service. The subject matter, nature, purpose, duration, types of Personal Data, and categories of Data Subjects are described in Annex I.

3.2 Duration

The Processor shall process Personal Data for the duration of the Agreement (the Controller's active subscription), plus the post-termination data retention periods described in Section 11 of this DPA.


4. Controller Obligations

The Controller:

4.1. Is responsible for ensuring that its use of the Service complies with Data Protection Laws, including having a valid legal basis for processing Personal Data.

4.2. Determines what Personal Data enters the platform, which tools are activated, what data is imported, and how AI agents are configured (including autonomy levels, data access scope, and PII scrubbing settings).

4.3. Is responsible for the lawfulness of the instructions it gives to the Processor. If the Processor reasonably believes an instruction infringes Data Protection Laws, it will notify the Controller without undue delay.

4.4. Shall ensure that Data Subjects have been informed about the processing of their Personal Data by the Processor, to the extent required by Data Protection Laws (e.g., GDPR Articles 13 and 14).

4.5. Is responsible for responding to Data Subject requests. The Processor will assist the Controller in fulfilling these requests as described in Section 8.


5. Processor Obligations

The Processor shall:

5.1 Processing on Instructions

Process Personal Data only on the documented instructions of the Controller, unless required to do so by EU or Member State law to which the Processor is subject — in which case, the Processor shall inform the Controller of that legal requirement before processing (unless prohibited by law from doing so).

The Controller's documented instructions include: (a) processing in accordance with the Agreement and this DPA; (b) processing initiated by the Controller through use of the Service (including AI agent configuration and tool operation); and (c) processing to comply with other reasonable instructions provided by the Controller where consistent with the terms of this DPA.

5.2 Confidentiality

Ensure that persons authorized to process Personal Data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. The Processor shall limit access to Personal Data to those employees, contractors, and agents who need access to perform their duties.

5.3 Security (GDPR Art. 32)

Implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, as described in Annex II. These measures include:

  • Encryption of Personal Data at rest and in transit
  • The ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems
  • The ability to restore the availability and access to Personal Data in a timely manner in the event of a physical or technical incident
  • A process for regularly testing, assessing, and evaluating the effectiveness of security measures

5.4 Subprocessing

Not engage any Subprocessor without the prior written authorization of the Controller, subject to the general authorization procedure described in Section 7.

5.5 Assistance with Data Subject Rights

Assist the Controller, by appropriate technical and organizational measures, in fulfilling the Controller's obligation to respond to Data Subject requests, as described in Section 8.

5.6 Assistance with Controller Obligations

Assist the Controller in ensuring compliance with the obligations under GDPR Articles 3236 (security, breach notification, data protection impact assessments, and prior consultation), taking into account the nature of processing and the information available to the Processor.

5.7 Data Return and Deletion

At the choice of the Controller, return or delete all Personal Data after the end of the provision of the Service, as described in Section 11.

5.8 Audit Rights

Make available to the Controller all information necessary to demonstrate compliance with this DPA and allow for and contribute to audits and inspections, as described in Section 10.


6. Details of Processing

The details of the processing activities are set out in Annex I, which includes:

  • Subject matter and duration of the processing
  • Nature and purpose of the processing
  • Types of Personal Data processed
  • Categories of Data Subjects
  • The Controller's obligations and rights

7. Subprocessors

7.1 General Authorization

The Controller provides general written authorization for the Processor to engage Subprocessors for the purposes described in this DPA. The current list of authorized Subprocessors is set out in Annex III.

7.2 Notification of Changes

The Processor shall notify the Controller of any intended addition or replacement of a Subprocessor at least 30 days before the new Subprocessor begins processing Personal Data. Notification will be provided via email and published on the LetsBe subprocessor changelog page.

7.3 Objection Right

The Controller may object to a new Subprocessor on reasonable data protection grounds within the 30-day notice period. If the Controller objects:

  1. The Processor will make reasonable efforts to address the Controller's objection, including offering an alternative Subprocessor or configuration that avoids data processing by the objected-to Subprocessor.
  2. If the Processor cannot reasonably accommodate the objection, the Controller may terminate the affected subscription without penalty by providing written notice within the objection period.

7.4 Subprocessor Obligations

The Processor shall:

  • Impose data protection obligations on each Subprocessor by way of a written contract that provides at least the same level of protection as this DPA (GDPR Art. 28(4))
  • Verify that each Subprocessor has appropriate technical and organizational measures in place
  • Remain fully liable to the Controller for the performance of its Subprocessors' obligations

7.5 LLM Provider Vetting

Before authorizing a new LLM provider as a Subprocessor, the Processor verifies:

  • Contractual prohibition on training models using Controller data
  • Data retention limited to the inference request (or a short, documented window for abuse monitoring only)
  • Valid international transfer mechanism (adequacy decision, DPF certification, or SCCs)
  • Security certifications (SOC 2, ISO 27001, or equivalent)
  • Commitment to notify the Processor of breaches without undue delay

8. Data Subject Rights

8.1 Assistance

The Processor shall assist the Controller in responding to requests from Data Subjects exercising their rights under Data Protection Laws, including:

  • Right of access (GDPR Art. 15)
  • Right to rectification (Art. 16)
  • Right to erasure (Art. 17)
  • Right to restriction of processing (Art. 18)
  • Right to data portability (Art. 20)
  • Right to object (Art. 21)
  • Rights related to automated decision-making (Art. 22)

8.2 Implementation

The LetsBe Biz platform supports Data Subject rights as follows:

  • Access and Portability: The Controller has full access to all data on their VPS, including SSH access. All tools support standard export formats (CSV, JSON, MBOX, CalDAV, WebDAV). AI conversation history is exportable as JSON/Markdown. Hub account data is accessible via the customer portal.
  • Rectification: The Controller has full administrative access to edit any data in their tools and Hub account.
  • Erasure: The Controller can delete specific data within tools. Full account deletion follows the procedure in Section 11.
  • Restriction: The Controller can disable individual AI agents, restrict tool access, or freeze their account (stopping all AI processing).
  • Objection to AI processing: The Controller can configure the Safety Wrapper to exclude specific data categories from AI context. Individual agents can be disabled.

8.3 Direct Requests

If a Data Subject contacts the Processor directly with a request, the Processor shall promptly redirect the request to the Controller (unless the request relates to the Processor's own controller activities, such as Hub account data).

8.4 Costs

Assistance with Data Subject requests is included in the subscription at no additional charge for a reasonable volume of requests. For requests that are manifestly unfounded, excessive, or require significant manual effort beyond what the platform provides self-service, the Processor may charge a reasonable fee based on administrative costs, with prior notice to the Controller.


9. Personal Data Breach

9.1 Notification to Controller

The Processor shall notify the Controller of a Personal Data Breach without undue delay after becoming aware of it, and in any event within 48 hours of confirmation. The notification shall include:

  • A description of the nature of the breach, including (where possible) the categories and approximate number of Data Subjects and records concerned
  • The name and contact details of the Processor's data protection contact
  • A description of the likely consequences of the breach
  • A description of the measures taken or proposed to address the breach, including measures to mitigate its possible adverse effects

9.2 Notification to Supervisory Authority

The Processor shall assist the Controller in notifying the relevant supervisory authority within 72 hours of the Controller becoming aware of the breach (GDPR Art. 33), by providing all necessary information and cooperation.

9.3 Notification to Data Subjects

Where the breach is likely to result in a high risk to the rights and freedoms of Data Subjects, the Processor shall assist the Controller in communicating the breach to affected Data Subjects (GDPR Art. 34).

9.4 Breach Response

The Processor maintains a documented breach response plan (see Security & GDPR Framework §3.7) that includes:

  1. Contain — Isolate affected VPS, revoke compromised credentials
  2. Assess — Determine scope, data categories affected, number of Data Subjects
  3. Notify — Supervisory authority (72 hours), Controller (without undue delay), Data Subjects (if high risk, as directed by Controller)
  4. Remediate — Patch vulnerability, rotate affected credentials, update security measures
  5. Document — Full incident report with timeline, impact assessment, remediation steps
  6. Review — Post-incident review within 14 days, update security procedures

9.5 Breach Detection

Breach detection mechanisms include:

  • Safety Wrapper audit logs (all tool executions, credential accesses)
  • Hub monitoring (tenant health, connectivity)
  • Anomaly detection (mass data export, credential access spikes, unauthorized API calls)
  • Uptime Kuma monitoring on each VPS
  • Netcup infrastructure-level monitoring

10. Audit Rights

10.1 Information and Evidence

The Processor shall make available to the Controller all information reasonably necessary to demonstrate compliance with this DPA, including:

  • Security & GDPR Framework documentation
  • Technical and organizational measures (Annex II)
  • Current subprocessor list (Annex III)
  • Records of processing activities (ROPA)
  • SOC 2 report (when available)
  • Penetration test results (summary, when available)

10.2 Audits and Inspections

The Controller may conduct an audit or appoint a qualified third-party auditor (subject to reasonable confidentiality obligations) to verify the Processor's compliance with this DPA. Audits are subject to the following conditions:

  • The Controller shall provide at least 30 days' written notice before an audit
  • Audits shall be conducted during normal business hours and shall not unreasonably disrupt the Processor's operations
  • The Controller is entitled to one audit per 12-month period (additional audits may be requested in the event of a breach or regulatory investigation)
  • The Controller bears the cost of audits, unless the audit reveals material non-compliance, in which case the Processor bears the cost
  • The Processor may offer an equivalent assessment (SOC 2 report, third-party certification) in lieu of an on-site audit, provided it is reasonably sufficient to verify compliance

10.3 Cooperation

The Processor shall cooperate with the Controller and any supervisory authority in the performance of audits or investigations, to the extent required by Data Protection Laws.


11. Data Return and Deletion

11.1 During the Subscription

The Controller can export all Personal Data at any time during the subscription period, using:

  • Tool-native export functions (CRM export, file download, email export, calendar export)
  • Direct SSH access to the VPS
  • Hub customer portal (for account data)

All tools on the VPS are open-source with standard export formats, ensuring full data portability consistent with the EU Data Act.

11.2 Upon Termination

Upon termination or expiration of the Agreement:

  1. 48-hour cooling-off period: After the billing period ends, the Controller's account is marked for deletion and a confirmation email is sent. The Controller has 48 hours to reverse the cancellation.
  2. 30-day export window: After the cooling-off period, the Controller has 30 days to export all data from the VPS. During this period, the VPS remains accessible (tools may be in read-only mode).
  3. Secure deletion: After the 30-day export window, the Processor securely deprovisions the VPS: disk overwrite via hosting provider API, VPS instance deletion, all snapshots deleted.
  4. Hub data: Account record is soft-deleted. Billing records are retained for 7 years per German tax law (HGB §257). All other data is purged. Soft-deleted records are hard-deleted after backup rotation (90 days).

11.3 Certification of Deletion

Upon request, the Processor shall provide written confirmation that Personal Data has been deleted in accordance with this Section, except for data retained under legal obligations (which will be specified in the confirmation).


12. International Data Transfers

12.1 Controller's VPS Region

The Controller selects a data center region at signup:

  • EU region: Netcup data centers in Nuremberg, Germany / Vienna, Austria. Personal Data does not leave the EU.
  • NA region: Netcup data center in Manassas, Virginia, USA. Personal Data is stored in the US.

12.2 Hub Data

The Hub always operates in the EU (Germany), regardless of the Controller's VPS region. Account and billing data is processed within the EU.

12.3 LLM Inference Transfers

Redacted AI prompts are transferred to third-party LLM providers for inference. Before transfer, the Safety Wrapper strips all credentials and (if enabled) PII. Transfer mechanisms:

Provider Location Transfer Mechanism
Anthropic US EU-US Data Privacy Framework + SCCs
Google EU + US EU-US Data Privacy Framework + SCCs
DeepSeek China SCCs + supplementary measures + mandatory enhanced redaction
OpenRouter US EU-US Data Privacy Framework + SCCs

12.4 Standard Contractual Clauses

Where Personal Data is transferred from the EU/EEA to a country without an adequacy decision, the parties agree to the Standard Contractual Clauses (2021 version) as set out in Annex IV. The SCCs are incorporated into this DPA by reference.

For transfers where the Controller is established in the EU/EEA and the Processor processes data outside the EU/EEA:

  • Module Two (Controller to Processor) of the SCCs applies
  • The governing law is that of the EU Member State where the Controller is established, or Germany if the Controller is not established in the EU/EEA
  • Disputes shall be resolved before the courts of the same jurisdiction

12.5 Supplementary Measures

For transfers to jurisdictions where the legal framework may not provide equivalent protection (e.g., China for DeepSeek), the Processor implements supplementary technical measures:

  • Mandatory maximum PII scrubbing before transmission
  • Credential redaction (always on, non-bypassable)
  • Customer opt-in required (not enabled by default)
  • Transparent disclosure of hosting jurisdiction in the UI
  • Ability for the Controller to block specific providers entirely

13. Data Protection Impact Assessment

The Processor shall provide reasonable assistance to the Controller in conducting Data Protection Impact Assessments (DPIAs) required under GDPR Article 35, and in any subsequent consultations with supervisory authorities under Article 36, to the extent that the Controller does not otherwise have the information and the assistance is required due to the nature of the processing.


14. Liability

The liability of each party under this DPA is subject to the limitations and exclusions of liability set out in the Agreement (Terms of Service §8), except that:

  • The limitations of liability do not apply to either party's obligations under this DPA with respect to Personal Data Breaches (Section 9)
  • Each party is liable for damages caused by processing that infringes Data Protection Laws, to the extent required by those laws (GDPR Art. 82)

15. Term and Termination

15.1 Term

This DPA takes effect on the date the Controller accepts the Agreement and remains in effect for as long as the Processor processes Personal Data on behalf of the Controller.

15.2 Survival

Sections 9 (Breach Notification), 10 (Audit Rights), 11 (Data Return and Deletion), 12 (International Transfers), and 14 (Liability) survive termination of this DPA to the extent necessary.


16. Miscellaneous

16.1 Amendments

This DPA may be amended by the Processor with at least 30 days' written notice to the Controller. If the Controller does not object within the notice period, the amendments are deemed accepted. If the Controller objects, the existing DPA remains in force, and the Controller may terminate the Agreement if the amendments are material and the parties cannot reach agreement.

16.2 Governing Law

This DPA is governed by the law that governs the Agreement, except that the SCCs (Annex IV) are governed as specified therein.

16.3 Entire DPA

This DPA (including its Annexes) constitutes the complete agreement between the parties regarding data processing and supersedes all prior agreements on this subject.


Annex I — Details of Processing

A. List of Parties

Controller (Data Exporter):

  • Name: [Customer name — populated at signup]
  • Address: [Customer address — populated at signup]
  • Contact: [Customer email — populated at signup]
  • Role: Data controller for all personal data stored in their LetsBe Biz VPS tools

Processor (Data Importer):

  • Name: LetsBe Solutions LLC
  • Address: 221 North Broad Street, Suite 3A, Middletown, DE 19709, USA
  • Contact: privacy@letsbe.solutions
  • Role: Data processor providing managed VPS, tool deployment, and AI agent services

B. Description of Processing

Element Description
Subject matter Processing of personal data through AI-powered management of open-source business tools deployed on a dedicated VPS
Duration For the duration of the Controller's subscription, plus post-termination retention periods (Section 11)
Nature of processing Storage, retrieval, organization, structuring, consultation, use (including AI-assisted analysis and automation), disclosure by transmission (redacted prompts to LLM providers), restriction, erasure
Purpose of processing To provide the LetsBe Biz service: hosting and managing business tools on the Controller's VPS, enabling AI agents to operate those tools on the Controller's behalf, maintaining platform security, and facilitating data portability

C. Types of Personal Data

The specific types of personal data processed depend on the Controller's tool selection and use. They may include:

  • Contact data: Names, email addresses, phone numbers, postal addresses, job titles, company names
  • Communication data: Email content (subject, body, attachments), chat messages, calendar event details
  • Financial data: Invoice details, payment amounts, client billing records, expense data
  • Project data: Task descriptions, project notes, team assignments, comments, time tracking entries
  • File data: Documents, images, spreadsheets, and other files uploaded to file storage tools
  • Website analytics data: Visitor IP addresses, page views, referral sources (if website analytics tools are used)
  • AI interaction data: Conversation transcripts between the Controller's users and AI agents, agent action logs
  • Authentication data: Usernames and hashed passwords for tool access (managed via Keycloak SSO)

D. Categories of Data Subjects

The categories of Data Subjects depend on the Controller's use of the platform and may include:

  • The Controller's employees and team members
  • The Controller's clients and customers
  • The Controller's business contacts, leads, and prospects
  • Website visitors (if analytics tools are used)
  • Email correspondents
  • Any other individuals whose data the Controller imports into or creates within the platform tools

E. Special Categories of Data

The Service is not designed to process special categories of data (GDPR Art. 9) or criminal conviction data (Art. 10). If the Controller stores such data in their tools, the Controller is solely responsible for ensuring a valid legal basis and appropriate safeguards.

F. Frequency and Retention

  • Frequency: Processing is continuous for the duration of the subscription (tools and AI agents operate on an ongoing basis)
  • Retention: Personal data is retained on the Controller's VPS for the duration of the subscription. Upon termination, the data retention schedule in Section 11 applies.

Annex II — Technical and Organizational Measures (TOMs)

The Processor implements the following measures pursuant to GDPR Article 32. These measures apply to all Personal Data processed under this DPA.

1. Encryption

Scope Measure
Data at rest (VPS disk) Netcup full-disk encryption (provider-managed)
Secrets registry AES-256-CBC with scrypt key derivation; key stored on VPS filesystem, never in AI context
Data in transit (user ↔ Hub) TLS 1.3 (HTTPS); Let's Encrypt certificates, auto-renewed
Data in transit (user ↔ VPS) TLS 1.3 via nginx reverse proxy; Let's Encrypt certificates, auto-renewed
Data in transit (Safety Wrapper ↔ LLM) TLS 1.3 (HTTPS via OpenRouter)
Backups (Netcup snapshots) Provider-encrypted snapshots
SSH access ED25519 keys, port 22022; key-only authentication, no password login

2. Access Control

Scope Measure
Customer access to VPS tools Keycloak SSO — single sign-on across all deployed tools
Customer access to Hub Email + password, session-based authentication
Admin access to Hub Role-based access control (Prisma + middleware)
SSH access to VPS Key-only authentication, non-standard port (22022), fail2ban (5 attempts → 300s ban)
AI agent access to tools Per-agent tool allow/deny lists (OpenClaw configuration)
AI agent operational scope Three-tier autonomy levels with command gating (Safety Wrapper)
Inter-tenant isolation Separate VPS per customer — no shared infrastructure beyond the Hub
Tool container isolation Per-tool Docker networks with fixed subnets (172.20.X.0/28)

3. Secrets Management and AI Data Protection

Scope Measure
Credential generation 50+ unique credentials per tenant generated at provisioning
Credential storage Encrypted SQLite registry on VPS — never transmitted to LLM providers
Outbound redaction Four-layer redaction of all LLM-bound data: (1) registry match, (2) placeholder substitution, (3) regex safety net, (4) heuristic detection
Transcript redaction Hooks strip secrets from stored session transcripts before persistence
Side-channel credential exchange User-provided secrets exchanged via direct Safety Wrapper API, never entering AI conversation
Configurable PII scrubbing Optional scrubbing of email addresses, phone numbers, addresses, financial data, and names before LLM transmission
External Communications Gate All AI-initiated outbound external communications require human approval

4. Network Security

Scope Measure
Firewall UFW — only ports 80, 443, 22022 open
OpenClaw binding Localhost only — not accessible from outside VPS
Safety Wrapper binding Localhost only — only OpenClaw and Hub (via nginx) can reach it
Container networking Per-tool isolated Docker networks (172.20.X.0/28), exposed via 127.0.0.1:30XX
SSRF protection Browser tool has configurable domain allowlists
Rate limiting OpenClaw: 10 attempts/60s with 300s lockout; Hub API rate-limited
DDoS protection Netcup infrastructure-level protection + nginx rate limiting

5. Monitoring and Audit

Scope Measure
Audit log Append-only log of all AI agent actions on tenant VPS
Token metering Per-agent, per-model token counts reported to Hub
Backup monitoring Automated backup status monitoring with alerting
Uptime monitoring Uptime Kuma on each VPS + Hub-level health checks
Hub telemetry Aggregated metrics (no PII) — uptime, error rates, usage patterns

6. Physical Security

Delegated to hosting provider (Netcup GmbH):

  • ISO 27001 certified data centers in Germany, Austria, and Manassas, Virginia (US)
  • TÜV Rheinland annual security audits
  • Controlled physical access, CCTV, security personnel
  • Redundant power supply, climate control, fire suppression
  • Multiple redundant network connections

7. Organizational Measures

Scope Measure
Confidentiality All personnel with access to Personal Data are bound by confidentiality obligations
Incident response Documented breach response plan with detection, containment, notification, remediation, review phases
Vendor assessment All Subprocessors vetted for data protection compliance with DPAs in place
Privacy by design Architecture decisions (isolated VPS, secrets redaction, local storage) embedded from inception
Data minimization Hub stores only account management data; all business data remains on tenant VPS

Annex III — Authorized Subprocessors

The following Subprocessors are authorized as of the date of this DPA:

Subprocessor Purpose Data Processed Location DPA Status
Netcup GmbH VPS hosting All tenant data (encrypted at rest) Germany, Austria (EU region); Manassas, Virginia (NA region) DPA via Netcup CCP
OpenRouter LLM API aggregation Redacted AI prompts (transit only) US DPA required — DPF certified
Anthropic LLM inference (Claude models) Redacted AI prompts (transit only) US No-training API terms; DPA available
Google LLM inference (Gemini models) Redacted AI prompts (transit only) EU + US No-training API terms (paid tier); DPA available
DeepSeek LLM inference (DeepSeek models) Redacted AI prompts (transit only, max redaction, opt-in only) China DPA + SCCs + supplementary measures
Stripe Payment processing Customer name, email, payment method EU (for EU customers), US (for NA customers) DPA included in Stripe Terms
Poste Pro (self-hosted) System emails from Hub Customer email address, email content Self-hosted on LetsBe infrastructure (Hub server) N/A — no third-party subprocessor. If a third-party relay service is adopted in the future, it will be added here with 30 days' advance notice per §9.

Subprocessor changelog: Changes to this list are published at https://letsbe.biz/legal/subprocessors and notified to the Controller via email at least 30 days in advance.


Annex IV — Standard Contractual Clauses (SCCs)

The parties agree that, for international data transfers subject to GDPR where the receiving country does not have an adequacy decision, the Standard Contractual Clauses adopted by European Commission Implementing Decision (EU) 2021/914 of June 4, 2021 shall apply.

Module Two (Controller to Processor) applies to transfers from the Controller to the Processor (or its Subprocessors) where the Processor processes data outside the EU/EEA.

The SCCs are incorporated into this DPA by reference. The completed SCC annexes correspond to the Annexes of this DPA:

SCC Annex DPA Annex
Annex I (Details of transfer) This DPA, Annex I
Annex II (Technical and organizational measures) This DPA, Annex II
Annex III (List of subprocessors) This DPA, Annex III

SCC-specific selections:

  • Clause 7 (Docking clause): Included — additional parties may accede to the SCCs
  • Clause 9(a) (Subprocessor authorization): Option 2 — General written authorization (with 30-day notice)
  • Clause 11 (Redress): The optional clause on independent dispute resolution is not included
  • Clause 13 (Supervision): The competent supervisory authority is determined by the Controller's establishment. For Controllers established in Germany, the BfDI (Bundesbeauftragte für den Datenschutz und die Informationsfreiheit) applies. For Controllers established in other EU member states, the supervisory authority of their establishment applies. Where the Controller is not established in the EU, the German supervisory authority (BfDI) applies as the Processor's Hub infrastructure is located in Germany.
  • Clause 17 (Governing law): Option 1 — the law of the State of Delaware, USA (consistent with the Agreement/ToS). For EU data subjects, the mandatory provisions of GDPR and applicable member state law continue to apply.
  • Clause 18 (Choice of forum): The courts of Delaware, USA (consistent with the Agreement/ToS). EU data subjects retain their right to lodge complaints with their local supervisory authority.

Note for legal counsel: The full text of the SCCs should be appended to this DPA as a separate document. The 2021 SCCs are available from the European Commission. This Annex documents the module selection and variable choices; the full SCC text is not reproduced here but is incorporated by reference.


17. Open Questions (Internal — Remove Before Publication)

# Question Status Notes
1 LetsBe registered address Resolved 221 North Broad Street, Suite 3A, Middletown, DE 19709, USA
2 Privacy/DPO contact email Resolved privacy@letsbe.solutions
3 Lead supervisory authority Resolved Determined by Controller's establishment; default BfDI (Germany) given Hub location. See SCC Clause 13 selections.
4 Governing law and forum selection Resolved Delaware, USA (matches ToS). EU data subjects retain GDPR rights.
5 Full SCC text appendix Open 2021 SCCs should be appended as a separate document; consider providing as a downloadable PDF alongside this DPA
6 Email service provider Resolved Poste Pro (self-hosted). Not a third-party subprocessor — no Annex III entry needed. If a relay service is adopted, add to Annex III with 30-day notice per §9.
7 Subprocessor changelog URL Open Needs a page on the website before launch
8 Enterprise DPA negotiation process Open Standard DPA is self-service via dashboard; enterprise customers may request custom terms. Define process and contact.
9 UK Addendum Open If serving UK customers post-Brexit, an International Data Transfer Addendum (UK IDTA) may be needed alongside or instead of SCCs

18. Changelog

Version Date Changes
1.0 2026-02-26 Initial draft. Full GDPR Art. 28 DPA with four annexes: processing details (Annex I), TOMs (Annex II), subprocessor list (Annex III), SCC framework (Annex IV). Covers: processor obligations, subprocessor management with 30-day notice, data subject rights assistance, breach notification (48h to controller, 72h to authority), audit rights, data return/deletion with 48h cooling-off + 30-day export window, international transfers, DPIA assistance. Aligned with Security & GDPR Framework v1.1, Terms of Service v1.0, and Privacy Policy v1.0.

This document is a draft requiring legal review. The Standard Contractual Clauses referenced in Annex IV should be appended in full before this DPA is made available to customers. Qualified legal counsel should review this DPA before publication.