Effective: March 5, 2026
pursuant to Art. 28 GDPR
This DPA is entered into between the Customer as Controller and Liza GmbH, Aachener-und-Münchener-Allee 1, 52074 Aachen, Germany, as Processor.
It supplements the Terms of Service and governs the processing of personal data carried out by the Processor on behalf of the Controller in connection with the "Liza" platform.
Processing is carried out for the duration of the main agreement and encompasses the provision of the SaaS platform for project communication and management.
Processing includes the storage, organization, retrieval, and erasure of personal data for the purpose of delivering the contractually agreed platform features. Where the Controller uses AI features of the platform, content is transmitted to third-party AI model providers as sub-processors. These providers are contractually prohibited from using data to train their models. The Controller may disable AI features entirely at any time.
Data subjects include employees and agents of the Controller, as well as the Controller's customers and business partners, to the extent their data is processed on the platform.
The following categories are processed: contact data (name, email, phone), communication content (messages, files, comments), project data (tasks, assignments, deadlines), and technical data (IP address, device information, access logs).
The Processor shall process personal data only on documented instructions from the Controller, unless required to do so by EU or Member State law, in which case it shall inform the Controller of such requirement in advance.
The Processor shall ensure that all persons authorized to process personal data are bound by confidentiality obligations, and shall assist the Controller in fulfilling its obligations under Art. 32–36 GDPR (security, data protection impact assessments, breach notifications).
The Processor shall implement appropriate technical and organizational measures pursuant to Art. 32 GDPR, including in particular encryption of personal data in transit (TLS), access and authorization controls, network segmentation and database security, regular security reviews and penetration testing, procedures for regularly testing the effectiveness of measures, and backup and recovery procedures.
TOMs are described in detail in Annex A and updated as necessary.
The Controller grants general authorization for the use of sub-processors. The current list is available at Subprocessor List.
The Processor shall notify the Controller at least 14 days before engaging a new sub-processor. The Controller may object within this period. If the Controller objects and no reasonable alternative can be found, the Controller has the right to terminate the agreement.
The Processor shall ensure that each sub-processor is subject to the same data protection obligations. All sub-processors process data exclusively within the EU/EEA.
The Processor shall assist the Controller through appropriate technical and organizational measures in fulfilling requests from data subjects (Art. 15–22 GDPR).
The Processor shall notify the Controller without undue delay, and no later than 48 hours after becoming aware of a personal data breach, and shall assist with notifications to the supervisory authority.
Upon termination of the main agreement, the Processor shall delete all personal data within 30 days, unless retention is required by law. Upon request, the Processor shall make the data available in a commonly used format prior to deletion.
The Processor shall make available to the Controller all information necessary to demonstrate compliance with the GDPR. The Controller has the right to have an audit conducted no more than once per year by a qualified, independent external auditor, with at least 60 days' prior notice. The auditor must be bound by a confidentiality agreement in advance. The costs of the audit shall be borne by the Controller. The Processor may offer current certifications (e.g., ISO 27001, SOC 2 Type II) as equivalent evidence of compliance.
Measures to prevent unauthorized persons from accessing data processing facilities:
Measures to prevent unauthorized use of data processing systems:
Measures to ensure authorized users only access data assigned to them:
Measures to protect personal data during transmission:
Measures to ensure traceability of data entry, modification, and deletion:
Measures to ensure data is processed only in accordance with instructions:
Measures to protect against data loss:
Measures to ensure data collected for different purposes is processed separately:
Procedures in the event of a data breach:
See: Subprocessor List