@aegis-scan/skills 0.5.0 → 0.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ATTRIBUTION.md +93 -0
- package/package.json +1 -1
- package/sbom.cdx.json +1 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +878 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/README.md +9 -3
- package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +93 -14
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +60 -5
- package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +745 -11
- package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +106 -30
- package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +247 -2
- package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +75 -2
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +55 -8
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +4 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +3 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +3 -2
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +71 -3
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +115 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +190 -48
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
- package/skills/defensive/permoon-fork/README.md +40 -0
- package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
- package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
- package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
- package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
- package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +1 -1
- package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
- package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
- package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
- package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
- package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
- package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
- package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
- package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
- package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
- package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
- package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
- package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
- package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
- package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
- package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
- package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
- package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
- package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
- package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
- package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
- package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
- package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
- package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
- package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
- package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
- package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
- package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
- package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
- package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
- package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
- package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
- package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
- package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
- package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
- package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
- package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
- package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
- package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
- package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
- package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
- package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
- package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
- package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
- package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
- package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
- package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
- package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
- package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
- package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
- package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
- package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
- package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
- package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
- package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
- package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
- package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
- package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
- package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
- package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
- package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
- package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
- package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
- package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
- package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
- package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
- package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
- package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
- package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
- package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
- package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
- package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
- package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
- package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
- package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
- package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
- package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
- package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
- package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
- package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
- package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
- package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
- package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
- package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
- package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
- package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
- package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
- package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
- package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
- package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
- package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
- package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
- package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
- package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md
CHANGED
|
@@ -46,6 +46,33 @@ sources: BayLDA-Hinweise zur DSFA + DSK-Whitelist 2018
|
|
|
46
46
|
| Profiling | `<...>` | `<...>` |
|
|
47
47
|
| Verlust Kontrolle ueber Daten | `<...>` | `<...>` |
|
|
48
48
|
|
|
49
|
+
### 4.1 Schadensersatz-Erwartungswert (post-EuGH C-300/21)
|
|
50
|
+
|
|
51
|
+
| Schaden-Klasse | Realistische Hoehe pro Betroffener | Begruendung |
|
|
52
|
+
|---|---|---|
|
|
53
|
+
| Bagatell-Verletzung | 0-100 EUR | C-456/22 Gemeinde Ummendorf — keine Erheblichkeitsschwelle, aber kurzfristiger Kontrollverlust niedrig bewertet |
|
|
54
|
+
| Befuerchtungs-Schaden (Datenleck) | 100-500 EUR | C-340/21 Natsionalna agentsia — bei Cyber-Angriff ausreichend; pro Betroffener |
|
|
55
|
+
| Massendaten-Verarbeitung ohne Rechtsgrundlage | 500-2.000 EUR | C-446/21 Schrems vs Meta — Datenminimierungs-Verstoss bei Profiling-Aggregation |
|
|
56
|
+
| Sensible Daten Art. 9 DSGVO | 1.000-5.000 EUR | C-21/23 Lindenapotheke — Gesundheits-/Religiose/Biometrie-Daten erhoehter Schutz |
|
|
57
|
+
| Identitaetsdiebstahl tatsaechlich erfolgt | bis Vollausgleich materieller Schaden | C-182/22 + C-189/22 Scalable — voller Ausgleich |
|
|
58
|
+
|
|
59
|
+
**Wichtig (C-590/22 PS GbR)**: Schadensersatz hat **reine Kompensationsfunktion** — NICHT mit Bussgeld-Hoehen argumentieren. Bemessung orientiert sich an konkreten Auswirkungen fuer Betroffene (Aerger-Dauer, Daten-Sensitivitaet, Wiederholbarkeit). Cross-Reference: `references/eu-eugh-dsgvo-schadensersatz.md` Tier-1.
|
|
60
|
+
|
|
61
|
+
### 4.2 Doku-Pflicht nach § 35 BDSG (Beschaeftigtendaten-Spezifika)
|
|
62
|
+
|
|
63
|
+
Bei Beschaeftigtendaten-Verarbeitung zusaetzlich zur DSGVO-DSFA pruefen:
|
|
64
|
+
- **§ 35 Abs. 1 BDSG**: Recht auf Berichtigung — Verfahren ueberhaupt vorgesehen?
|
|
65
|
+
- **§ 35 Abs. 2 BDSG**: Loeschungs-Anspruch enger als Art. 17 DSGVO bei behoerdlichen Aufbewahrungspflichten
|
|
66
|
+
- **§ 35 Abs. 3 BDSG**: Statt Loeschung Einschraenkung der Verarbeitung bei Pflicht-Aufbewahrung
|
|
67
|
+
- **EuGH C-65/23 MK gg K GmbH (19.12.2024)**: Beschaeftigten-Betriebsvereinbarung muss kumulativ Art. 88 Abs. 2 DSGVO **UND** Art. 5/6/9 DSGVO erfuellen — BV kein Schutzschild fuer DSGVO-Nicht-Konformitaet (Cross-Reference: `references/eu-eugh-dsgvo-schadensersatz.md` Tier-1 #10)
|
|
68
|
+
|
|
69
|
+
**Pflicht-Pruefung bei HR-Tools (Workday, HRIS, Workforce-Analytics, KI-Hiring)**:
|
|
70
|
+
1. Rechtsgrundlage Art. 88 + Art. 6 + ggf. Art. 9 DSGVO
|
|
71
|
+
2. § 26 BDSG-Verhaeltnismaessigkeit
|
|
72
|
+
3. BetrVG § 87 Abs. 1 Nr. 6 (Mitbestimmung KI-Tools)
|
|
73
|
+
4. AGG § 7 + § 22 (Diskriminierungs-Beweislast bei KI-Bewerbungstools)
|
|
74
|
+
5. § 35 BDSG-Berichtigungs-/Loeschungs-Verfahren
|
|
75
|
+
|
|
49
76
|
## 5. Abhilfemassnahmen (Art. 35 Abs. 7 lit. d)
|
|
50
77
|
|
|
51
78
|
| Massnahme | Implementierungsstatus | Verify-Command |
|
|
@@ -69,6 +96,59 @@ sources: BayLDA-Hinweise zur DSFA + DSK-Whitelist 2018
|
|
|
69
96
|
DSFA mindestens jaehrlich oder bei wesentlicher Aenderung der Verarbeitung
|
|
70
97
|
ueberpruefen. Naechstes Review: `<YYYY-MM-DD>`.
|
|
71
98
|
|
|
99
|
+
## 8. Spezifika fuer Art-9-Verarbeitungen (V4-Pattern, post-Art-9-Workflow-Audit 2026-05-03)
|
|
100
|
+
|
|
101
|
+
Bei besonderen Kategorien Art. 9 DSGVO (Gesundheitsdaten, biometrisch, Gewerkschaft,
|
|
102
|
+
Religion, politische Meinung) gelten **verschaerfte Anforderungen** (Art. 35 Abs. 3
|
|
103
|
+
lit. b — DSFA Pflicht; KMU-Privileg gilt nicht).
|
|
104
|
+
|
|
105
|
+
### 8.1 Rechtsgrundlage-Pruefung
|
|
106
|
+
|
|
107
|
+
- Hauptpfad: Art. 9 Abs. 2 lit. a DSGVO (ausdrueckliche Einwilligung)
|
|
108
|
+
- Alternativen pruefen + ausschliessen:
|
|
109
|
+
- lit. b (Arbeitsrecht / Sozialschutz) — nur HR-Kontexte
|
|
110
|
+
- lit. c (lebenswichtige Interessen) — nur Notfall
|
|
111
|
+
- lit. f (Rechtsanspruechen) — nur prozessual
|
|
112
|
+
- lit. h (Gesundheitsvorsorge durch Berufsgeheimnistraeger) — nur Heilberuf
|
|
113
|
+
- § 22 BDSG: Detail-Erlaubnis-Norm, NUR wenn lit. h greift
|
|
114
|
+
- **Verbotener Verweis**: Art. 6 Abs. 1 lit. f (berechtigtes Interesse) — bei Art-9 nicht zulaessig
|
|
115
|
+
|
|
116
|
+
### 8.2 Beweis-Pflicht-Mechanismus (Art. 7 Abs. 1)
|
|
117
|
+
|
|
118
|
+
| Modus | Implementierung |
|
|
119
|
+
|-------|-----------------|
|
|
120
|
+
| Tablet-eES | SignaturePad-PNG verschluesselt im DB-Record (eIDAS Art. 3 Nr. 10) |
|
|
121
|
+
| Papier eigenhaendig + Scan | Original im Tresor + SHA-256-Hash in DB |
|
|
122
|
+
| Mitarbeiter-Abtipp + Scan + Mitarbeiter-Co-Signatur | Pflicht-Upload + Mitarbeiter-Bestaetigungs-Signatur |
|
|
123
|
+
|
|
124
|
+
### 8.3 Crypto-at-Rest-TOMs
|
|
125
|
+
|
|
126
|
+
- [ ] AES-256-GCM (oder ChaCha20-Poly1305) mit AAD-Bindung an Row-ID
|
|
127
|
+
- [ ] Key-Versioning im Ciphertext-Format
|
|
128
|
+
- [ ] Decrypt-Fail-Audit-Log (Tampering- + Key-Loss-Detection)
|
|
129
|
+
- [ ] Recovery-Procedure dokumentiert (`docs/security/encryption-recovery.md`)
|
|
130
|
+
- [ ] Mind. 3 unabhaengige Key-Backup-Standorte (Production-ENV + Vault + Offline)
|
|
131
|
+
|
|
132
|
+
### 8.4 Aufbewahrungs-Differenzierung
|
|
133
|
+
|
|
134
|
+
| Setup | Frist | Norm |
|
|
135
|
+
|-------|-------|------|
|
|
136
|
+
| Wellness/Kosmetik | 3 Jahre | BGB § 195 |
|
|
137
|
+
| Heilpraktiker | 10 Jahre | BGB § 630f Abs. 3 |
|
|
138
|
+
| Personenschaden-Sondercase | bis 30 Jahre | BGB § 199 Abs. 2 |
|
|
139
|
+
|
|
140
|
+
### 8.5 Audit-Log-Pflicht-Events
|
|
141
|
+
|
|
142
|
+
- create / view / export / revoke / delete (Metadaten-only beim DELETE!)
|
|
143
|
+
- decrypt_failure mit reason + version + keyId
|
|
144
|
+
- scan_hash_mismatch (Tampering-Indikator)
|
|
145
|
+
|
|
146
|
+
### 8.6 Public-Form-Validierung
|
|
147
|
+
|
|
148
|
+
Wenn Patienten via Public-Tablet/Self-Service Anamnese ausfuellen koennen — Pflicht-Signatur-Block muss UI-seitig vor Submit erzwingen werden. DB-CHECK-Constraint allein → schlechte UX (500-Error statt Submit-Block).
|
|
149
|
+
|
|
150
|
+
> Audit-Pattern fuer Art-9: siehe `references/audit-patterns.md` Phase 5h (Art-9-Beweis-Workflow-Audit).
|
|
151
|
+
|
|
72
152
|
---
|
|
73
153
|
|
|
74
154
|
*Disclaimer: Diese Vorlage ist eine technisch-indikative Hilfe, keine Rechtsberatung
|
|
@@ -0,0 +1,98 @@
|
|
|
1
|
+
# VVT-Template — Direct-File-Upload-Verarbeitung
|
|
2
|
+
> Vorlage fuer Verarbeitungstaetigkeit „Datei-Upload via Web-Form".
|
|
3
|
+
> Lege im internen Compliance-Vault als `vvt-direct-file-upload.md` ab.
|
|
4
|
+
> Aktualisiere bei jeder Erweiterung (neue Datei-Typen, neue Storage-Pfade, neue Auftragsverarbeiter).
|
|
5
|
+
>
|
|
6
|
+
> Disclaimer: Technisch-indikative Vorlage, keine Rechtsberatung i.S.d. § 2 RDG.
|
|
7
|
+
> Vor produktivem Einsatz von einem Fachanwalt fuer Datenschutzrecht oder
|
|
8
|
+
> einem zertifizierten Datenschutzbeauftragten pruefen lassen.
|
|
9
|
+
|
|
10
|
+
## Bezeichnung
|
|
11
|
+
Direct-File-Upload via [Form-Name, z.B. „Konfigurator", „Onboarding-Wizard"]
|
|
12
|
+
|
|
13
|
+
## Verantwortlicher
|
|
14
|
+
[Vor- und Nachname, Adresse, Email]
|
|
15
|
+
[ggf. interner Datenschutzbeauftragter — falls Pflicht]
|
|
16
|
+
|
|
17
|
+
## Zweck der Verarbeitung
|
|
18
|
+
[Konkret z.B.: Erfassung von Brand-Assets (Logos, Bilder) fuer Webdesign-
|
|
19
|
+
Briefing-Erstellung im Rahmen der Vertragsanbahnung]
|
|
20
|
+
|
|
21
|
+
## Datenkategorien
|
|
22
|
+
- Datei-Bytes (Bilder, Logos, PDFs)
|
|
23
|
+
- Metadata: Dateiname, Groesse, MIME-Type
|
|
24
|
+
- Indirekte PII: ggf. in Bild-Inhalten (Personenfotos, Unterschriften, Logos mit
|
|
25
|
+
Personenbezug) — siehe Art. 9-Bewertung unten
|
|
26
|
+
|
|
27
|
+
## Art. 9 DSGVO Spezial-Kategorien Bewertung
|
|
28
|
+
- [ ] Personenfotos potentiell biometrische Daten?
|
|
29
|
+
- Wenn nicht zur **eindeutigen Identifikation** verarbeitet → KEINE Art. 9
|
|
30
|
+
- Wenn ja (z.B. Gesichtserkennung, Vergleichs-Hash) → Art. 9-Pflichten
|
|
31
|
+
- [ ] Unterschriften = biometrische Daten? → ja, falls zur Identifikation; ansonsten
|
|
32
|
+
regulaere PII
|
|
33
|
+
|
|
34
|
+
## Empfaenger / Kategorien von Empfaengern
|
|
35
|
+
- Operator selbst (intern)
|
|
36
|
+
- SMTP-Auftragsverarbeiter (z.B. All-Inkl, Mailgun, Postmark) — siehe AVV-Liste
|
|
37
|
+
- ggf. Object-Storage-Anbieter (z.B. Hetzner Object Storage) — siehe AVV-Liste
|
|
38
|
+
- ggf. Mail-Forwarding-Empfaenger (z.B. externe Berater) — siehe interne Empfaenger-Liste
|
|
39
|
+
|
|
40
|
+
## Drittland-Status
|
|
41
|
+
- [ ] Auftragsverarbeiter alle in EU/EWR? → JA / NEIN
|
|
42
|
+
- Wenn NEIN: SCCs + TIA pro Drittland-Empfaenger
|
|
43
|
+
|
|
44
|
+
## Speicherdauer
|
|
45
|
+
- [Konkret z.B.: 180 Tage ab Submit, danach automatische rekursive Loeschung
|
|
46
|
+
via Cron-Job <Pfad-zur-API-oder-Skript>]
|
|
47
|
+
- Bei Vertragsschluss: Aufbewahrungsfristen § 257 HGB (6 J Geschaeftsbriefe) +
|
|
48
|
+
§ 147 AO (10 J Buchungsbelege) gelten
|
|
49
|
+
|
|
50
|
+
## Rechtsgrundlage
|
|
51
|
+
- [Konkret z.B.: Art. 6 Abs. 1 lit. b DSGVO (Vertragsanbahnung) + lit. f
|
|
52
|
+
(berechtigtes Interesse — Briefing-Vollstaendigkeit)]
|
|
53
|
+
- Wenn KI-Auswertung der Bilder: zusaetzlich Art. 22 DSGVO pruefen
|
|
54
|
+
|
|
55
|
+
## TOMs (Technische und organisatorische Massnahmen) — Art. 32 DSGVO
|
|
56
|
+
|
|
57
|
+
### Eingangs-Filter (Server-side)
|
|
58
|
+
- [ ] MIME-Whitelist [konkret listen z.B.: image/png, image/jpeg, image/webp,
|
|
59
|
+
image/svg+xml, application/pdf]
|
|
60
|
+
- [ ] Magic-Bytes-Check zusaetzlich
|
|
61
|
+
- [ ] Size-Cap pro Datei [konkret z.B.: 10 MB]
|
|
62
|
+
- [ ] Total-Cap pro Submission [konkret z.B.: 15 MB]
|
|
63
|
+
- [ ] Path-Traversal-Schutz (basename + char-whitelist + UUID-Praefix)
|
|
64
|
+
|
|
65
|
+
### Speicherung
|
|
66
|
+
- [ ] Storage-Pfad: [konkret z.B.: /var/data/inquiries/<id>/uploads/]
|
|
67
|
+
- [ ] Container/VPS-Setup: [konkret z.B.: Hetzner-VPS Falkenstein, Disk-
|
|
68
|
+
Verschluesselung gem. Server-Setup]
|
|
69
|
+
- [ ] Bucket-side AES-256 (fuer Object Storage)
|
|
70
|
+
- [ ] LUKS at-rest (fuer VPS-Disk) — falls aktiv
|
|
71
|
+
|
|
72
|
+
### Uebertragung
|
|
73
|
+
- [ ] TLS 1.3 in transit (HTTPS)
|
|
74
|
+
- [ ] STARTTLS fuer SMTP-Versand (Port 587 + secure=false)
|
|
75
|
+
- [ ] MTA-STS-Empfaenger-Check (falls aktiviert)
|
|
76
|
+
|
|
77
|
+
### Loeschung
|
|
78
|
+
- [ ] Automatisierter Cleanup-Cron [konkret: Pfad-zur-API + Cron-Schedule]
|
|
79
|
+
- [ ] Recursive-Delete inkl. uploads/-Subfolder
|
|
80
|
+
- [ ] Manueller Loeschpfad: [konkret z.B.: Email an datenschutz@... → manuell
|
|
81
|
+
aus Inquiries-Folder entfernen]
|
|
82
|
+
|
|
83
|
+
### Logging
|
|
84
|
+
- [ ] Filename in Logs als SHA-256-Hash (nicht raw)
|
|
85
|
+
- [ ] Log-Retention max [konkret: 30 Tage]
|
|
86
|
+
- [ ] Datei-Bytes NIE in Logs
|
|
87
|
+
|
|
88
|
+
### Disk-Resilienz
|
|
89
|
+
- [ ] `fs.statfs`-Check vor write
|
|
90
|
+
- [ ] Per-IP-Tagesbudget (falls aktiviert)
|
|
91
|
+
- [ ] Disk-Monitoring + Operator-Alert bei < 1 GB free
|
|
92
|
+
|
|
93
|
+
## Bezug zu anderen VVT-Eintraegen
|
|
94
|
+
- [Verweis auf VVT fuer Briefing-Daten allgemein]
|
|
95
|
+
- [Verweis auf VVT fuer Email-Versand]
|
|
96
|
+
|
|
97
|
+
## Letzte Aktualisierung
|
|
98
|
+
[Datum, Editor, Anlass]
|
|
@@ -0,0 +1,267 @@
|
|
|
1
|
+
# Data Processing Agreement (DPA) — International / EN
|
|
2
|
+
|
|
3
|
+
**Version**: v1.0 (2026-05-05)
|
|
4
|
+
**Template type**: Article 28 GDPR Data Processing Agreement, designed for cross-border vendor onboarding (US-based SaaS vendors: Cloudflare, AWS, Vercel, Supabase, Stripe, major-LLM-providers, etc.)
|
|
5
|
+
**Disclaimer**: This template does not constitute legal advice within the meaning of § 2 RDG (German Legal Services Act) or equivalent statutes. Individual legal review is required prior to production use, in particular for the third-country transfer constellation, sub-processor chain and sector-specific requirements.
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## Parties
|
|
10
|
+
|
|
11
|
+
**Data Controller** (hereinafter: "Controller"):
|
|
12
|
+
|
|
13
|
+
> <Company / Name>
|
|
14
|
+
> <Address>
|
|
15
|
+
> <Authorized representative: name, function>
|
|
16
|
+
> <VAT-ID / Commercial register>
|
|
17
|
+
> Data Protection Officer: <name + contact> (where appointed under Art. 37 GDPR)
|
|
18
|
+
|
|
19
|
+
**Data Processor** (hereinafter: "Processor"):
|
|
20
|
+
|
|
21
|
+
> <Company / Name>
|
|
22
|
+
> <Address>
|
|
23
|
+
> <Authorized representative: name, function>
|
|
24
|
+
> <VAT-ID / Commercial register>
|
|
25
|
+
> Data Protection Officer: <name + contact>
|
|
26
|
+
> EU Representative under Art. 27 GDPR: <name + contact> (where Processor is established outside EU/EEA)
|
|
27
|
+
|
|
28
|
+
— hereinafter jointly: "the Parties" —
|
|
29
|
+
|
|
30
|
+
---
|
|
31
|
+
|
|
32
|
+
## Recitals
|
|
33
|
+
|
|
34
|
+
(A) The Parties have entered into a master agreement on <date> regarding <description of services — e.g., "the provision of cloud hosting services", "SaaS analytics platform", "AI inference API"> ("Main Agreement").
|
|
35
|
+
|
|
36
|
+
(B) In the course of performing the Main Agreement, the Processor processes personal data on behalf of the Controller within the meaning of Art. 4(8) GDPR.
|
|
37
|
+
|
|
38
|
+
(C) This Data Processing Agreement ("DPA") sets out the obligations of the Parties pursuant to Art. 28(3) GDPR. Where the Controller is subject to UK GDPR, Swiss revFADP or other adequate-equivalent regimes, the corresponding annexes apply (see § 10).
|
|
39
|
+
|
|
40
|
+
(D) In the event of a conflict between the Main Agreement and this DPA, this DPA prevails to the extent that data-protection obligations are concerned.
|
|
41
|
+
|
|
42
|
+
---
|
|
43
|
+
|
|
44
|
+
## § 1 Subject Matter and Duration (Art. 28(3)(a) GDPR)
|
|
45
|
+
|
|
46
|
+
**1.1 Subject matter**: The Processor processes personal data on behalf of the Controller for the purpose of providing the services agreed upon in the Main Agreement and described in **Annex I**.
|
|
47
|
+
|
|
48
|
+
**1.2 Duration**: This DPA enters into force on <effective date> and remains in effect for the term of the Main Agreement, ending no later than upon completion of return or deletion obligations under § 9.
|
|
49
|
+
|
|
50
|
+
---
|
|
51
|
+
|
|
52
|
+
## § 2 Nature and Purpose of Processing
|
|
53
|
+
|
|
54
|
+
**2.1**: Nature, scope, and purpose of processing are detailed in **Annex I**.
|
|
55
|
+
|
|
56
|
+
**2.2**: The Processor shall not process personal data for its own purposes, in particular for marketing, profiling, or analytics outside the scope of the Main Agreement, unless explicitly described in **Annex I** and lawful under Art. 6 GDPR.
|
|
57
|
+
|
|
58
|
+
**2.3 AI/ML training data prohibition** (where applicable): The Processor shall not use the Controller's personal data to train, retrain, or fine-tune machine-learning models without the Controller's explicit prior written consent, irrespective of whether such use would otherwise be lawful.
|
|
59
|
+
|
|
60
|
+
---
|
|
61
|
+
|
|
62
|
+
## § 3 Categories of Personal Data and Data Subjects
|
|
63
|
+
|
|
64
|
+
**3.1**: The categories of personal data processed and categories of data subjects are listed in **Annex I**.
|
|
65
|
+
|
|
66
|
+
**3.2 Special categories**: Processing of special categories of personal data under Art. 9 GDPR or criminal-conviction data under Art. 10 GDPR shall occur **<only as expressly listed in Annex I / not at all>**. Where applicable, enhanced TOMs under **Annex II** apply.
|
|
67
|
+
|
|
68
|
+
---
|
|
69
|
+
|
|
70
|
+
## § 4 Obligations of the Processor (Art. 28(3)(b)–(h) GDPR)
|
|
71
|
+
|
|
72
|
+
**4.1 Documented instructions (Art. 28(3)(a), Art. 29 GDPR)**: The Processor shall process personal data only on documented instructions from the Controller, including with regard to international transfers, unless required to do so by Union or Member State law. The Processor shall inform the Controller of such legal requirement before processing, unless prohibited by that law on important grounds of public interest. If the Processor considers an instruction to infringe applicable data-protection law, it shall inform the Controller without undue delay.
|
|
73
|
+
|
|
74
|
+
**4.2 Confidentiality (Art. 28(3)(b))**: The Processor ensures that persons authorised to process personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. The obligation survives termination of employment.
|
|
75
|
+
|
|
76
|
+
**4.3 Security of processing (Art. 28(3)(c), Art. 32)**: The Processor implements the technical and organisational measures set out in **Annex II**.
|
|
77
|
+
|
|
78
|
+
**4.4 Sub-processors (Art. 28(2), (4))**: As governed by § 6.
|
|
79
|
+
|
|
80
|
+
**4.5 Assistance with data-subject rights (Art. 28(3)(e))**: The Processor shall, taking into account the nature of the processing, assist the Controller by appropriate technical and organisational measures, insofar as possible, in fulfilling the Controller's obligation to respond to data-subject requests under Chapter III GDPR. The Processor shall forward any data-subject request received directly to the Controller within **<72 hours / 5 business days>** without responding itself, unless instructed otherwise.
|
|
81
|
+
|
|
82
|
+
**4.6 Assistance with Controller obligations (Art. 28(3)(f))**: The Processor shall assist the Controller in ensuring compliance with Art. 32–36 GDPR, in particular with security of processing, breach notification, breach communication, DPIA, and prior consultation.
|
|
83
|
+
|
|
84
|
+
**4.7 Personal-data-breach notification (Art. 33(2))**: The Processor shall notify the Controller of any personal-data breach without undue delay, no later than **24 hours** after becoming aware of the breach. The notification shall contain at minimum:
|
|
85
|
+
|
|
86
|
+
a) description of the nature of the breach (categories and approximate number of data subjects + records),
|
|
87
|
+
b) name and contact details of the DPO or other contact point,
|
|
88
|
+
c) likely consequences of the breach,
|
|
89
|
+
d) measures taken or proposed to address the breach.
|
|
90
|
+
|
|
91
|
+
**4.8 Return / deletion (Art. 28(3)(g))**: As governed by § 9.
|
|
92
|
+
|
|
93
|
+
**4.9 Audits (Art. 28(3)(h))**: As governed by § 8.
|
|
94
|
+
|
|
95
|
+
**4.10 Records of processing (Art. 30(2))**: The Processor maintains records of all categories of processing activities carried out on behalf of the Controller and makes them available to the Controller and the supervisory authority upon request.
|
|
96
|
+
|
|
97
|
+
**4.11 EU Representative (Art. 27)**: Where the Processor has no establishment in the EU/EEA, it shall designate in writing a representative in the Union and provide contact details to the Controller.
|
|
98
|
+
|
|
99
|
+
---
|
|
100
|
+
|
|
101
|
+
## § 5 Technical and Organisational Measures (Art. 32 GDPR)
|
|
102
|
+
|
|
103
|
+
**5.1**: The Processor implements at the time of contract conclusion the technical and organisational measures described in **Annex II**, ensuring a level of security appropriate to the risk.
|
|
104
|
+
|
|
105
|
+
**5.2**: The TOMs are reviewed at least **annually** and adapted to the state of the art and changing risk landscape. Material changes shall be communicated to the Controller in writing prior to implementation.
|
|
106
|
+
|
|
107
|
+
**5.3 Encryption**: Data in transit shall be encrypted using TLS ≥ 1.2 (preferably 1.3); data at rest shall be encrypted using AES-256 or equivalent.
|
|
108
|
+
|
|
109
|
+
**5.4 Resilience and recovery**: RPO/RTO targets and backup strategy are documented in **Annex II**.
|
|
110
|
+
|
|
111
|
+
---
|
|
112
|
+
|
|
113
|
+
## § 6 Sub-Processors (Art. 28(2), (4) GDPR)
|
|
114
|
+
|
|
115
|
+
**6.1 General authorisation**: The Controller grants **<general / specific>** prior authorisation for the engagement of sub-processors. The sub-processors engaged at the time of contract conclusion are listed exhaustively in **Annex III**.
|
|
116
|
+
|
|
117
|
+
**6.2 Notification of changes**: The Processor shall notify the Controller at least **30 calendar days** in advance of any intended addition or replacement of sub-processors, providing name, address, processing activity and location.
|
|
118
|
+
|
|
119
|
+
**6.3 Right to object**: The Controller may object to such changes within **14 calendar days** for legitimate data-protection reasons. If no agreement is reached, the Controller may terminate the affected services for cause.
|
|
120
|
+
|
|
121
|
+
**6.4 Flow-down**: The Processor shall impose on each sub-processor, by way of a written contract, the same data-protection obligations as set out in this DPA, in particular providing sufficient guarantees to implement appropriate TOMs.
|
|
122
|
+
|
|
123
|
+
**6.5 Liability**: Where a sub-processor fails to fulfil its data-protection obligations, the Processor remains fully liable to the Controller for the performance of the sub-processor's obligations.
|
|
124
|
+
|
|
125
|
+
**6.6 Third-country sub-processors**: Where a sub-processor is located in a third country without an adequacy decision under Art. 45 GDPR, the Processor shall conclude appropriate safeguards under Art. 46 GDPR (in particular SCC Module 3 — see **Annex IV**) and conduct a Transfer Impact Assessment.
|
|
126
|
+
|
|
127
|
+
---
|
|
128
|
+
|
|
129
|
+
## § 7 Cooperation with Data Subjects and Authorities
|
|
130
|
+
|
|
131
|
+
**7.1**: The Parties shall cooperate in good faith and provide each other with relevant documentation in the event of data-subject claims under Art. 82 GDPR or supervisory-authority inquiries under Art. 58 GDPR.
|
|
132
|
+
|
|
133
|
+
**7.2 Costs**: Cost of assistance shall be governed by the Main Agreement; first-line measures necessary to safeguard data-subject rights are not separately chargeable where caused by Processor's breach.
|
|
134
|
+
|
|
135
|
+
---
|
|
136
|
+
|
|
137
|
+
## § 8 Audits (Art. 28(3)(h) GDPR)
|
|
138
|
+
|
|
139
|
+
**8.1**: The Processor shall make available to the Controller all information necessary to demonstrate compliance with the obligations laid down in this DPA, including ISO 27001 certificates, SOC 2 Type II reports, BSI-Grundschutz attestations, or equivalent.
|
|
140
|
+
|
|
141
|
+
**8.2**: The Controller (or a qualified third-party auditor mandated by the Controller) shall be entitled to audit the Processor's compliance, in accordance with one of the audit variants set out in **Annex V (Audit Variants)**:
|
|
142
|
+
|
|
143
|
+
- **Variant A**: On-site audit
|
|
144
|
+
- **Variant B**: Remote audit (document and system review)
|
|
145
|
+
- **Variant C**: SOC 2 / ISO 27001 surrogate audit (acceptance of third-party-auditor report)
|
|
146
|
+
|
|
147
|
+
**8.3 Frequency**: Audits occur **<annually / on a risk-based cadence>**, plus additional audits triggered by reasonable suspicion or following a personal-data breach.
|
|
148
|
+
|
|
149
|
+
**8.4 Notice and confidentiality**: Audits require at least **14 calendar days** prior notice (except in cause-driven cases), shall preserve confidentiality, and shall not unreasonably disrupt business operations.
|
|
150
|
+
|
|
151
|
+
**8.5 Costs**: Each Party bears its own costs. If material non-compliance is identified, the Processor bears the reasonable auditor costs.
|
|
152
|
+
|
|
153
|
+
---
|
|
154
|
+
|
|
155
|
+
## § 9 Return and Deletion of Data (Art. 28(3)(g) GDPR)
|
|
156
|
+
|
|
157
|
+
**9.1**: Upon termination of the services — at the latest **<30 / 60 / 90> calendar days** after termination — the Processor shall, at the Controller's option:
|
|
158
|
+
|
|
159
|
+
a) **return** all personal data in a machine-readable, structured format (JSON, CSV, XML, etc.), or
|
|
160
|
+
b) **delete** all personal data and confirm deletion in writing.
|
|
161
|
+
|
|
162
|
+
**9.2 Backup deletion**: Personal data in backup systems shall be deleted within **<90 / 180> calendar days** or, until deletion, isolated from access.
|
|
163
|
+
|
|
164
|
+
**9.3 Statutory retention**: Where Union or Member State law requires retention (e.g., German Commercial Code §§ 257, 147 AO), processing shall be restricted under Art. 18 GDPR; data shall be deleted upon expiry of retention obligations.
|
|
165
|
+
|
|
166
|
+
**9.4 Deletion certificate**: Upon request, the Processor provides a deletion certificate covering all copies including those at sub-processors.
|
|
167
|
+
|
|
168
|
+
---
|
|
169
|
+
|
|
170
|
+
## § 10 International Transfers (Chapter V GDPR)
|
|
171
|
+
|
|
172
|
+
**10.1**: Transfers to third countries occur only on documented instructions from the Controller or where required by law.
|
|
173
|
+
|
|
174
|
+
**10.2 Safeguards**: Where no adequacy decision exists, the Parties rely on the following safeguards (as applicable):
|
|
175
|
+
|
|
176
|
+
- **EU/EEA / adequacy**: no additional safeguards required.
|
|
177
|
+
- **EU-US Data Privacy Framework**: active certification of recipient must be verified at https://www.dataprivacyframework.gov.
|
|
178
|
+
- **Other third country**: SCC 2021/914 Module 2 (Controller→Processor) or Module 3 (Processor→Sub-processor) — see **`AVV-anhang-SCC-module2-controller-processor.md`** / **`AVV-anhang-SCC-module3-processor-subprocessor.md`**.
|
|
179
|
+
- **United Kingdom**: UK International Data Transfer Addendum — see **`AVV-anhang-UK-IDTA.md`**.
|
|
180
|
+
- **Switzerland**: Swiss revFADP addendum — see **`AVV-anhang-CH-revDSG.md`**.
|
|
181
|
+
|
|
182
|
+
**10.3 Transfer Impact Assessment (TIA)**: The Processor, in coordination with the Controller, shall conduct a TIA per EDPB Recommendations 01/2020 prior to any transfer relying on Art. 46 safeguards, and document the result.
|
|
183
|
+
|
|
184
|
+
**10.4 Government access requests**: If the Processor receives a legally binding request from a third-country authority for disclosure of personal data, it shall notify the Controller without undue delay (where legally permissible) and challenge the request through all available legal means.
|
|
185
|
+
|
|
186
|
+
**10.5 SCC incorporation by reference**: The Standard Contractual Clauses 2021/914 Module 2 (Controller→Processor) are hereby incorporated by reference and govern the transfer with respect to non-adequacy third countries. The annexes to the SCCs are populated as set out in **`AVV-anhang-SCC-module2-controller-processor.md`**.
|
|
187
|
+
|
|
188
|
+
---
|
|
189
|
+
|
|
190
|
+
## § 11 Liability
|
|
191
|
+
|
|
192
|
+
**11.1**: The Parties are jointly and severally liable to data subjects under Art. 82 GDPR.
|
|
193
|
+
|
|
194
|
+
**11.2 Internal allocation**: As between the Parties, each bears the share of damage corresponding to its responsibility. Sub-processor breaches are attributed to the Processor under § 6.5.
|
|
195
|
+
|
|
196
|
+
**11.3 Administrative fines**: Fines under Art. 83 GDPR are borne by the Party to which the breach is attributable.
|
|
197
|
+
|
|
198
|
+
**11.4 Liability caps**: Liability caps in the Main Agreement do not apply to GDPR-mandated liabilities to the extent statutory law prohibits limitation.
|
|
199
|
+
|
|
200
|
+
---
|
|
201
|
+
|
|
202
|
+
## § 12 Final Provisions
|
|
203
|
+
|
|
204
|
+
**12.1 Form**: Amendments require text form; Art. 28(9) GDPR permits electronic form.
|
|
205
|
+
|
|
206
|
+
**12.2 Severability**: If any provision of this DPA is held invalid, the remaining provisions remain in effect.
|
|
207
|
+
|
|
208
|
+
**12.3 Governing law**: This DPA is governed by the laws of **<Germany / Member State of Controller's establishment>**, without prejudice to mandatory provisions of the GDPR.
|
|
209
|
+
|
|
210
|
+
**12.4 Jurisdiction**: Exclusive jurisdiction lies with the courts of **<Controller's seat>**, where both Parties are commercial entities.
|
|
211
|
+
|
|
212
|
+
**12.5 Precedence**: This DPA prevails over conflicting provisions of the Main Agreement on matters of data protection.
|
|
213
|
+
|
|
214
|
+
---
|
|
215
|
+
|
|
216
|
+
## Annexes
|
|
217
|
+
|
|
218
|
+
| Annex | Title | Reference |
|
|
219
|
+
|-------|-------|-----------|
|
|
220
|
+
| I | Description of processing | (embedded — analogous to SCC Annex I) |
|
|
221
|
+
| II | Technical and organisational measures (Art. 32 GDPR) | `AVV-anhang-TOMs.md` |
|
|
222
|
+
| III | List of sub-processors | `AVV-anhang-Sub-Processor-List.md` |
|
|
223
|
+
| IV | International-transfer modules | `AVV-anhang-SCC-module2-controller-processor.md` / `…-module3-processor-subprocessor.md` / `…-UK-IDTA.md` / `…-CH-revDSG.md` |
|
|
224
|
+
| V | Audit-clause variants | `AVV-anhang-Audit-Klausel-Varianten.md` |
|
|
225
|
+
|
|
226
|
+
---
|
|
227
|
+
|
|
228
|
+
## Annex I — Description of Processing
|
|
229
|
+
|
|
230
|
+
**I.1 Nature and purpose**:
|
|
231
|
+
> <e.g., "Hosting and provision of the SaaS analytics platform XYZ including database, backup and support services, for the purpose of fulfilling the Main Agreement.">
|
|
232
|
+
|
|
233
|
+
**I.2 Categories of personal data**:
|
|
234
|
+
> <e.g., master data (name, address, email), contract data, usage data (login timestamps, IP), communication data, payment data via external PSP per Annex III.>
|
|
235
|
+
|
|
236
|
+
**I.3 Special categories (Art. 9/10 GDPR)**:
|
|
237
|
+
> <none / description with enhanced TOMs per Annex II>
|
|
238
|
+
|
|
239
|
+
**I.4 Categories of data subjects**:
|
|
240
|
+
> <Customers, employees, suppliers, app end-users, website visitors, …>
|
|
241
|
+
|
|
242
|
+
**I.5 Frequency of transfer**:
|
|
243
|
+
> <continuous / one-off / periodic>
|
|
244
|
+
|
|
245
|
+
**I.6 Retention period**:
|
|
246
|
+
> <duration of contract + 30 days / per statutory retention period>
|
|
247
|
+
|
|
248
|
+
**I.7 Processing locations**:
|
|
249
|
+
> <data-centre regions; sub-processor locations per Annex III>
|
|
250
|
+
|
|
251
|
+
**I.8 Recipients / categories of recipients**:
|
|
252
|
+
> <internal staff of Processor; sub-processors per Annex III>
|
|
253
|
+
|
|
254
|
+
**I.9 Third-country transfers**:
|
|
255
|
+
> <yes / no; safeguard mechanism per Annex IV>
|
|
256
|
+
|
|
257
|
+
---
|
|
258
|
+
|
|
259
|
+
**Place, date, signatures**:
|
|
260
|
+
|
|
261
|
+
> _______________________________
|
|
262
|
+
> Controller: <name, function>
|
|
263
|
+
> Place, date
|
|
264
|
+
|
|
265
|
+
> _______________________________
|
|
266
|
+
> Processor: <name, function>
|
|
267
|
+
> Place, date
|
|
@@ -0,0 +1,148 @@
|
|
|
1
|
+
# Anhang D — Audit-Klausel-Varianten
|
|
2
|
+
|
|
3
|
+
**Version**: v1.0 (2026-05-05)
|
|
4
|
+
**Rechtsgrundlage**: Art. 28 Abs. 3 lit. h DSGVO; § 8 AVV (siehe `AVV-standard-DE.md`).
|
|
5
|
+
**Anwendungsfall**: Anhang D des AVV; eine der drei Varianten ist zu wählen — abhängig von Risiko, Vendor-Maturität und Verantwortlichen-Ressourcen.
|
|
6
|
+
**Disclaimer**: Keine Rechtsberatung im Sinne § 2 RDG. Audit-Rechte sind unabdingbarer DSGVO-Pflichtbestandteil; Verzicht oder pauschale Verweigerung durch den Auftragsverarbeiter ist unwirksam.
|
|
7
|
+
|
|
8
|
+
---
|
|
9
|
+
|
|
10
|
+
## Übersicht — Wann welche Variante?
|
|
11
|
+
|
|
12
|
+
| Variante | Geeignet für | Risiko-Profil | Aufwand Verantwortlicher |
|
|
13
|
+
|----------|--------------|---------------|--------------------------|
|
|
14
|
+
| **A. Vor-Ort-Audit** | Hochrisiko-Verarbeitung; sensible Daten Art. 9/10; Großmengen-Verarbeitung; spezifische Bedenken | hoch | hoch (Reise + Auditor + Zeit) |
|
|
15
|
+
| **B. Remote-Audit** | Standard-SaaS; mittleres Risiko; etablierte Vendoren ohne aktive Vorfälle | mittel | mittel |
|
|
16
|
+
| **C. SOC-2- / ISO-27001-Stellvertreter-Audit** | Cloud-Hyperscaler (AWS, GCP, Azure); zertifizierte Großvendoren mit gut etabliertem Trust-Center | niedrig–mittel | niedrig |
|
|
17
|
+
|
|
18
|
+
**Praxis-Empfehlung**: Hybrid — Variante C als Default, Variante B bei begründetem Verdacht, Variante A nur bei Vorfall oder substanziellem Risiko.
|
|
19
|
+
|
|
20
|
+
---
|
|
21
|
+
|
|
22
|
+
## Variante A — Vor-Ort-Audit
|
|
23
|
+
|
|
24
|
+
**Klausel-Wortlaut**:
|
|
25
|
+
|
|
26
|
+
> Der Verantwortliche hat das Recht, durch von ihm selbst oder durch einen von ihm beauftragten qualifizierten Dritten (z. B. Wirtschaftsprüfer, IT-Sicherheits-Auditor, akkreditierter Datenschutz-Auditor) **Vor-Ort-Audits** an den Verarbeitungs-Standorten des Auftragsverarbeiters durchzuführen.
|
|
27
|
+
>
|
|
28
|
+
> 1. **Häufigkeit**: einmal jährlich; anlassbezogen darüber hinaus bei (a) begründetem Verdacht eines DSGVO-Verstoßes, (b) Datenschutzvorfall mit Bezug zur Verarbeitung, (c) Aufsichtsbehörden-Anordnung.
|
|
29
|
+
> 2. **Vorlauffrist**: mindestens **14 Kalendertage** in Textform; bei Anlassfällen mindestens **48 Stunden**.
|
|
30
|
+
> 3. **Umfang**: Einsicht in TOMs-Implementierung, Audit-Logs, Sub-Auftragsverarbeiter-Verträge, Datenschutz-Schulungs-Nachweise, Backup-Restore-Tests, Berechtigungs-Reviews — soweit für die im Auftrag erfolgende Verarbeitung relevant.
|
|
31
|
+
> 4. **Auditor-Qualifikation**: Auditor verpflichtet sich auf Vertraulichkeit (NDA); fachliche Qualifikation durch Zertifizierung (CISA, CIPP/E, Datenschutzbeauftragten-Zertifikat o. ä.) nachgewiesen.
|
|
32
|
+
> 5. **Mitwirkungspflicht**: Auftragsverarbeiter stellt zumutbare Räumlichkeiten + Zugang zu Mitarbeitern + Systemen bereit.
|
|
33
|
+
> 6. **Beschränkungen**: Audit darf den Geschäftsbetrieb nicht unverhältnismäßig beeinträchtigen; Einsicht in fremde Mandanten-Daten wird durch geeignete Maßnahmen ausgeschlossen (Mandanten-Trennung, anonymisierte Test-Daten).
|
|
34
|
+
> 7. **Kosten**: Jede Partei trägt eigene Kosten. Bei Feststellung wesentlicher Mängel trägt der Auftragsverarbeiter die angemessenen Auditor-Kosten zusätzlich.
|
|
35
|
+
> 8. **Bericht**: Auditor erstellt Bericht; Auftragsverarbeiter erhält Mängel-Liste mit Frist zur Behebung (i. d. R. 30 Kalendertage; bei kritischen Mängeln 7 Tage).
|
|
36
|
+
|
|
37
|
+
**Pros**:
|
|
38
|
+
- Tiefste Einsicht; nichts versteckt
|
|
39
|
+
- Direkte Kommunikation mit Operations-/Security-Team
|
|
40
|
+
- Höchste Glaubwürdigkeit für eigene Compliance-Dokumentation
|
|
41
|
+
|
|
42
|
+
**Cons**:
|
|
43
|
+
- Hoher logistischer Aufwand (Reise, Termin-Koordination, Auditor-Honorar)
|
|
44
|
+
- Operatives Risiko für Auftragsverarbeiter (Geschäftsstörung)
|
|
45
|
+
- Bei Cloud-Hyperscalern unrealistisch (RZ-Zugang nicht für Einzelkunden)
|
|
46
|
+
|
|
47
|
+
---
|
|
48
|
+
|
|
49
|
+
## Variante B — Remote-Audit
|
|
50
|
+
|
|
51
|
+
**Klausel-Wortlaut**:
|
|
52
|
+
|
|
53
|
+
> Der Verantwortliche hat das Recht, durch von ihm selbst oder durch einen von ihm beauftragten qualifizierten Dritten **Remote-Audits** durchzuführen — bestehend aus:
|
|
54
|
+
>
|
|
55
|
+
> a) Dokumentenprüfung (TOM-Beschreibung, Verfahrensverzeichnis Auftragsverarbeiter, Sub-Auftragsverarbeiter-Verträge, Audit-Log-Auszüge, Pen-Test-Berichte, Sicherheits-Zertifikate);
|
|
56
|
+
> b) System-Review per Screen-Sharing oder Remote-Inspection (Konfigurations-Walkthrough, Audit-Log-Demo, Berechtigungs-Matrix-Demo);
|
|
57
|
+
> c) Schriftlichem Fragenkatalog mit dokumentierter Beantwortung (z. B. CAIQ — Consensus Assessment Initiative Questionnaire der Cloud Security Alliance).
|
|
58
|
+
>
|
|
59
|
+
> 1. **Häufigkeit**: einmal jährlich + anlassbezogen.
|
|
60
|
+
> 2. **Vorlauffrist**: mindestens **10 Kalendertage** in Textform.
|
|
61
|
+
> 3. **Beantwortungsfrist** für Fragenkatalog: **30 Kalendertage**.
|
|
62
|
+
> 4. **Sample-Auditing**: Auditor wählt Stichproben (z. B. zufällige Berechtigungs-Reviews, Audit-Log-Auszüge eines Zeitfensters, Backup-Restore-Demo).
|
|
63
|
+
> 5. **Vertraulichkeit**: NDA für Auditor; geheime Geschäftsinformationen werden geschützt (Schwärzung, sample-only).
|
|
64
|
+
> 6. **Kosten** + **Bericht**: wie Variante A.
|
|
65
|
+
> 7. **Eskalations-Recht**: Bei begründetem Zweifel an der Belastbarkeit der Remote-Antworten kann der Verantwortliche auf Variante A (Vor-Ort) eskalieren.
|
|
66
|
+
|
|
67
|
+
**Pros**:
|
|
68
|
+
- Wesentlich geringerer logistischer Aufwand
|
|
69
|
+
- Weltweit durchführbar
|
|
70
|
+
- Geschäftsbetrieb beim Auftragsverarbeiter weniger gestört
|
|
71
|
+
|
|
72
|
+
**Cons**:
|
|
73
|
+
- Weniger Tiefe als Vor-Ort-Audit
|
|
74
|
+
- Manipulation von Demo-Antworten theoretisch möglich (durch Stichproben + Eskalations-Recht abgemildert)
|
|
75
|
+
- Erfordert mature Dokumentations-Lage beim Auftragsverarbeiter
|
|
76
|
+
|
|
77
|
+
---
|
|
78
|
+
|
|
79
|
+
## Variante C — SOC-2- / ISO-27001-Stellvertreter-Audit
|
|
80
|
+
|
|
81
|
+
**Klausel-Wortlaut**:
|
|
82
|
+
|
|
83
|
+
> Der Verantwortliche akzeptiert als Nachweis der Einhaltung der TOMs den **aktuellen, durch unabhängigen Drittprüfer erstellten Audit-Bericht** des Auftragsverarbeiters, sofern folgende Voraussetzungen erfüllt sind:
|
|
84
|
+
>
|
|
85
|
+
> 1. **Akzeptierte Standards**:
|
|
86
|
+
> - SOC 2 Type II (AICPA, mindestens "Security" Trust Service Criterion; idealerweise zusätzlich "Confidentiality" + "Privacy"),
|
|
87
|
+
> - ISO/IEC 27001:2022 (durch akkreditierte Zertifizierungsstelle),
|
|
88
|
+
> - BSI IT-Grundschutz (für DE-Verantwortliche),
|
|
89
|
+
> - branchenspezifische Standards (TISAX für Automotive, KRITIS-Audit für kritische Infrastrukturen, PCI-DSS Level 1 für Zahlungsdaten).
|
|
90
|
+
> 2. **Aktualität**: Bericht nicht älter als **12 Monate**.
|
|
91
|
+
> 3. **Scope-Match**: Audit-Scope umfasst die im Auftrag durchgeführten Verarbeitungs-Tätigkeiten + Standorte.
|
|
92
|
+
> 4. **Bridge-Letter**: bei Ablauf der Re-Zertifizierung schriftliche Bestätigung des Auftragsverarbeiters, dass keine wesentlichen Änderungen seit dem letzten Audit bestehen.
|
|
93
|
+
> 5. **Zugang**: Auftragsverarbeiter stellt Bericht (oder zumindest "Public Bericht" + auf Anforderung "Customer Bericht" unter NDA) binnen **5 Werktagen** bereit.
|
|
94
|
+
> 6. **Komplementäre Maßnahmen**: Bei Gap zwischen Audit-Scope und tatsächlicher Verarbeitung unterzieht sich Auftragsverarbeiter einer ergänzenden Variante-A- oder B-Prüfung für die Lücken.
|
|
95
|
+
> 7. **Eskalations-Recht**: Bei substantiellen Findings im Drittprüfer-Bericht oder bei Datenschutzvorfall kann Verantwortlicher auf Variante A oder B eskalieren — Drittprüfer-Bericht ersetzt dann nicht das Anlass-Audit.
|
|
96
|
+
|
|
97
|
+
**Pros**:
|
|
98
|
+
- Skalierbar — selbst Cloud-Hyperscaler akzeptierbar (AWS / GCP / Azure publizieren SOC 2 Type II)
|
|
99
|
+
- Geringster Aufwand für Verantwortlichen
|
|
100
|
+
- Drittprüfer-Glaubwürdigkeit höher als Selbst-Auskunft des Auftragsverarbeiters
|
|
101
|
+
- Industrie-Standard für SaaS-Vendor-Onboarding
|
|
102
|
+
|
|
103
|
+
**Cons**:
|
|
104
|
+
- Scope-Match nicht immer gegeben (Bericht oft generisch, nicht auftragsspezifisch)
|
|
105
|
+
- Keine direkte Tiefen-Einsicht in operatives Verhalten
|
|
106
|
+
- Bridge-Letter zwischen Re-Audits hat Vertrauens-Charakter
|
|
107
|
+
- Bei Datenschutzvorfall reicht ein zertifizierter Status nicht — Anlass-Audit (Variante A/B) bleibt erforderlich
|
|
108
|
+
|
|
109
|
+
---
|
|
110
|
+
|
|
111
|
+
## Hybrid-Modell — Empfehlung
|
|
112
|
+
|
|
113
|
+
**Empfohlene Default-Klausel** für Multi-Vendor-Setups:
|
|
114
|
+
|
|
115
|
+
> 1. **Standardfall**: Variante C — Drittprüfer-Bericht (jährlich aktualisiert).
|
|
116
|
+
> 2. **Bei begründetem Verdacht oder Datenschutzvorfall**: Eskalation auf Variante B (Remote-Audit) binnen 30 Tagen ab Anlass.
|
|
117
|
+
> 3. **Bei substanzieller Fortdauer der Bedenken oder bei kritischen Findings**: Eskalation auf Variante A (Vor-Ort-Audit).
|
|
118
|
+
> 4. **Bei sensiblen Daten Art. 9/10 DSGVO oder Großmengen-Verarbeitung**: jährliches Variante-B-Audit zusätzlich zum Drittprüfer-Bericht.
|
|
119
|
+
|
|
120
|
+
---
|
|
121
|
+
|
|
122
|
+
## Audit-Rechte gegenüber Sub-Auftragsverarbeitern
|
|
123
|
+
|
|
124
|
+
Der Auftragsverarbeiter hat **eigene Audit-Rechte** gegenüber seinen Sub-Auftragsverarbeitern (Art. 28 Abs. 4 DSGVO). Bei begründetem Audit-Anliegen des Verantwortlichen gegen einen Sub-Auftragsverarbeiter:
|
|
125
|
+
|
|
126
|
+
1. **Erstweg**: Auftragsverarbeiter führt Audit selbst durch + leitet Ergebnis weiter.
|
|
127
|
+
2. **Zweitweg (Step-In-Right)**: Verantwortlicher kann bei begründeter Eskalation eine direkte Audit-Vereinbarung mit Sub-Auftragsverarbeiter verlangen — entweder über Auftragsverarbeiter delegiert oder durch zusätzliche Vereinbarung.
|
|
128
|
+
|
|
129
|
+
---
|
|
130
|
+
|
|
131
|
+
## Audit-Dokumentation — Pflicht-Inhalte
|
|
132
|
+
|
|
133
|
+
Jedes Audit (egal welche Variante) endet mit einem schriftlichen Bericht mit Mindest-Inhalten:
|
|
134
|
+
|
|
135
|
+
- ☐ Audit-Datum + Auditor-Identität + Qualifikation
|
|
136
|
+
- ☐ Audit-Scope (welche Verarbeitungs-Tätigkeiten, welche Standorte)
|
|
137
|
+
- ☐ Audit-Methode (Vor-Ort / Remote / Drittprüfer-Bericht-Review)
|
|
138
|
+
- ☐ Stichproben + Ergebnisse
|
|
139
|
+
- ☐ Identifizierte Mängel mit Severity-Einstufung (Critical / High / Medium / Low)
|
|
140
|
+
- ☐ Frist zur Behebung pro Mangel
|
|
141
|
+
- ☐ Status-Updates bis Abschluss aller Maßnahmen
|
|
142
|
+
- ☐ Re-Audit-Datum (bei kritischen Mängeln nach Behebung)
|
|
143
|
+
|
|
144
|
+
---
|
|
145
|
+
|
|
146
|
+
## Versionierungs-Hinweis
|
|
147
|
+
|
|
148
|
+
> Audit-Klausel-Varianten werden im AVV durch ankreuzen / verweisen verbindlich gewählt. Wechsel der Variante während der Vertragslaufzeit erfordert beidseitige Zustimmung in Textform (Vertragsanpassung).
|