← GDPR Documents

Human Oracles logo Human Oracles — Data Breach Response & DPIA

Version 1.0  ·  Issued: 22 February 2026  ·  Next review: 22 February 2027

This document contains two instruments: (1) the Data Breach Response Procedure governing how Human Oracles detects, assesses, notifies, and documents personal data breaches under Arts. 33–34 GDPR; and (2) the Data Protection Impact Assessment (DPIA) conducted under Art. 35 GDPR for the novel processing activities of the Human Oracles Service.

Part A — Data Breach Response Procedure

This procedure governs how Human Oracles detects, contains, assesses, notifies, and documents personal data breaches as required by Arts. 33–34 GDPR and Art. 33–34 RODO. The 72-hour notification clock to UODO starts at the moment the Controller becomes aware that a breach has (or is likely to have) occurred — not at the moment of confirmed root cause.

A1. What Constitutes a Personal Data Breach

Under Art. 4(12) GDPR, a personal data breach is a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored, or otherwise processed. For the Human Oracles Service, the following events constitute or may constitute a breach:

Category Example Events Data categories at risk
Confidentiality breach Unauthorised access to Cosmos DB; API key database exposed; operator dashboard accessible without authentication; question content viewable by wrong operator; webhook secret leaked from Key Vault Account emails, question content (incl. possible special category data), payment records, operator credentials
Integrity breach Payment event records altered; question status tampered; Oracle response content modified in transit; idempotency records corrupted to allow double-charge Payment events, question records, Oracle responses
Availability breach Cosmos DB data permanently deleted; Azure region outage causing data loss; accidental deletion of payment event container; Key Vault access revoked causing service failure All categories depending on scope of deletion/loss
Disclosure to wrong party Question content delivered to wrong agent (cross-tenant data leak); webhook delivering to wrong URL; operator seeing another operator's claimed questions Question content, Oracle responses, context objects
Blockchain-specific Note: on-chain data (wallet address, tx hash) is already public by design. A breach involving linking on-chain data to other personal data (e.g., email address) is a confidentiality breach requiring assessment Payment data, account data

Not a breach: Service unavailability without data loss or exposure; rate limiting causing legitimate requests to fail; a data subject exercising erasure rights resulting in deletion (this is intended processing, not a breach).

A2. Severity Classification

Every suspected breach must be classified as soon as possible — initially within 4 hours of detection. Classification drives the notification timeline and response intensity.

Severity Criteria Notification to UODO Notification to data subjects Response SLA
CRITICAL Mass exposure of personal data (1,000+ records); exposure of special category data (question content with health/mental-state information); payment record database exposed; operator credentials compromised; full Cosmos DB exfiltration; ransomware with confirmed data access Mandatory within 72 hours of awareness even if investigation incomplete — submit preliminary notification and update Required if high risk to individuals — assess within 24 hours of classification; notify without undue delay Immediate (0–4 hours): contain; 4–24 hours: notify UODO
HIGH Exposure of <1,000 personal data records; cross-tenant data leak (question content delivered to wrong agent); individual payment record exposed; operator account compromised; webhook secret potentially exposed Mandatory within 72 hours — assess likelihood of risk to individuals; notify if likely Required if risk to individual(s) is likely — case-by-case assessment within 48 hours 0–4 hours: contain; 24–48 hours: full assessment and notification
LOW Single account's API key hash exposed (key itself not exposed); access log data for one user inadvertently disclosed; webhook delivery log for one question sent to wrong party; availability incident without data loss Not required if unlikely to result in risk — document in breach register with rationale for non-notification Not required for low-severity breaches 48–72 hours: investigate, document, remediate
⚠ When in doubt, classify higher. It is better to over-notify UODO than to miss the 72-hour deadline. UODO accepts preliminary notifications that are later updated with full details. Failure to notify is a GDPR violation; an overcautious notification is not.

A3. Detection & Immediate Response (0–4 Hours)

The first 4 hours after discovering a potential breach are focused on containment and initial assessment — not on determining root cause.

Step 1 — Detection trigger (T=0)
A breach may be detected via: Azure Application Insights alert; anomalous Cosmos DB access patterns; operator reporting unexpected data visibility; agent reporting receiving another agent's data; external security researcher disclosure; UODO notification of a complaint; Microsoft Azure security notification.
Step 2 — Initial triage (T+30 min)
Answer these questions:
  1. Is personal data involved? (vs. purely technical/service data)
  2. What categories of personal data are at risk? (see Activity list in RoPA)
  3. Is the breach ongoing or historical? If ongoing — proceed immediately to Step 3.
  4. Approximate number of affected data subjects (even rough estimate).
  5. Initial severity classification: CRITICAL / HIGH / LOW.
Record the T=0 awareness timestamp. This is the start of the 72-hour UODO clock.
Step 3 — Immediate containment (T+1–2 hours)
Depending on the breach type, take the first available containment action:
  • API compromise: Rotate all Azure Function app keys; invalidate affected agent API keys via Cosmos DB status update; enable Azure Front Door WAF lockdown mode if under active attack.
  • Cosmos DB exposure: Revoke connection strings via Azure Portal; disable public network access on the Cosmos DB account; engage Microsoft Azure Support (severity A if data confirmed exfiltrated).
  • Operator credential compromise: Disable the Firebase Auth account immediately; audit all questions claimed/answered by the compromised account in the last 72 hours.
  • Key Vault secret exposure: Rotate the affected secret in Key Vault; revoke the previous version; audit Key Vault access logs to determine scope of access.
  • Cross-tenant data leak: Identify the affected question record(s); determine whether the wrong-recipient agent accessed the data; suspend both agents pending investigation.
Step 4 — Incident log opened (T+2 hours)
Create a written incident record (even a plain text file or email chain is sufficient) containing: detection timestamp; source of detection; initial classification; containment actions taken; names of persons involved in response. This record becomes the basis for the Breach Register entry (Section A8) and the UODO notification (Section A5).

A4. Assessment & Decision (4–24 Hours)

After immediate containment, conduct a more thorough assessment to determine the full scope, the risk level, and whether UODO notification is required.

Assessment Checklist

  1. Scope of breach: How many records? Which data categories? Which processing activities (from the RoPA) are affected?
  2. Nature of data: Does the breached data include special category data (Art. 9) — specifically, question content containing health, mental/emotional, or other sensitive disclosures? If yes: risk is higher and UODO notification is more likely required.
  3. Payment records involved? If payment event records (containing wallet addresses, amounts, transaction hashes) are involved, assess whether the combination with account data creates a significant risk to data subjects.
  4. Likely consequences: What harm could realistically result? (Identity theft, financial harm, reputational damage, emotional distress, discrimination, loss of confidentiality for sensitive disclosures in questions.)
  5. Recipient of breached data: Was data accessed by a determined attacker (higher risk) or a configuration error with no evidence of active exfiltration (lower risk)?
  6. Data subject identification: Are affected data subjects identifiable? If the breach involves only pseudonymous or API-key-only data with no link to natural person identities, notification may not be required — but document the reasoning.

Notification Decision Tree

Assessment outcome UODO Notification (Art. 33) Data Subject Notification (Art. 34)
Breach unlikely to result in any risk to individuals Not required — document rationale in breach register Not required
Breach likely to result in risk to individuals Required within 72 hours of awareness Not required (but consider voluntary notification for trust)
Breach likely to result in HIGH risk to individuals (e.g., special category data, financial harm, large scale) Required within 72 hours of awareness Required without undue delay
Uncertain — cannot complete assessment within 72 hours Submit preliminary notification to UODO stating the breach is under investigation; update when more information is available Pending — assess after preliminary notification

A5. UODO Notification — 72-Hour Deadline

Notification to UODO is made electronically via the UODO online notification form at uodo.gov.pl. A preliminary notification may be submitted if the full investigation is not yet complete — state clearly that the assessment is ongoing and that a supplementary notification will follow.

Required Content (Art. 33(3) GDPR)

Every UODO notification must include, to the extent known at the time of submission:

  1. Description of the nature of the breach — including where possible: categories and approximate number of data subjects concerned; categories and approximate number of personal data records concerned
  2. Name and contact details of the Data Protection contact — Human Oracles, rongan@humanoracles.xyz
  3. Likely consequences of the breach — describe the foreseeable harm (financial, reputational, emotional, safety risks)
  4. Measures taken or proposed — containment actions already taken; planned remediation; planned preventive measures

Notification Template

Subject: Personal Data Breach Notification — Human Oracles — [DATE]

To: Urząd Ochrony Danych Osobowych (UODO), ul. Stawki 2, 00-193 Warsaw | kancelaria@uodo.gov.pl

We are notifying you of a personal data breach affecting the Human Oracles Service operated by [Name], JDG, Poland (rongan@humanoracles.xyz).

1. Nature of breach: [CONFIDENTIALITY / INTEGRITY / AVAILABILITY]. Discovered on [DATE] at [TIME]. Estimated [N] data subjects affected. Data categories involved: [list from RoPA].

2. Controller contact: [Name], Human Oracles, rongan@humanoracles.xyz.

3. Likely consequences: [Describe]. [If special category data involved: note potential for emotional harm, discrimination, or loss of confidentiality of sensitive personal disclosures.]

4. Measures taken: [List containment actions from A3, Steps 3–4]. Further investigation ongoing. Supplementary notification will follow by [DATE + 5 days] with full findings.

Note: [If preliminary: This is a preliminary notification. Investigation is ongoing. Full assessment will be provided in a supplementary notification.]

A6. Data Subject Notification (If Required)

Art. 34 GDPR requires notification to affected data subjects without undue delay when a breach is likely to result in a high risk to their rights and freedoms. This is a higher threshold than the UODO notification requirement.

High-Risk Triggers for This Service

Data subject notification is likely required when the breach involves:

Exceptions (Art. 34(3) — Notification Not Required If)

Notification Template

Subject: Important: Security Notice — Your Human Oracles Account Data

We are writing to inform you of a security incident that may have affected your account data on the Human Oracles Service (humanoracles.xyz).

What happened: [Clear description of the breach — when it occurred, how it was discovered, what data was involved.]

What data was affected: [Specific data categories — e.g., "the content of questions you submitted between [dates]" or "your account email address and API key prefix".]

What we have done: [Containment actions taken — access revoked, keys rotated, etc.]

What you should do: [Specific recommended actions — e.g., rotate API key, monitor for unauthorised API usage, be alert for phishing using your email address.]

Contact: If you have questions, contact us at rongan@humanoracles.xyz with subject line "Security Incident [DATE]".

We take data protection seriously. We have notified the Polish Data Protection Authority (UODO) as required by GDPR and are cooperating fully with their oversight.

A7. Post-Incident Documentation & Review

Within 30 days of containment, conduct a post-incident review and update all documentation. This review is both a legal requirement (Art. 33(5) GDPR — the controller shall document all breaches) and a practical defense against future incidents.

Post-Incident Review Checklist

  1. Root cause identified: What was the underlying cause? (Misconfiguration, software vulnerability, social engineering, third-party failure, insider error.)
  2. Timeline reconstructed: When did the breach start? How long was data exposed? When was it detected? Did the 72-hour clock run correctly?
  3. Scope confirmed: Final count of affected data subjects and records. Were initial estimates accurate?
  4. Notification assessment documented: Were UODO and data subjects notified correctly? Were deadlines met? If not — why not, and what is the remediation?
  5. Corrective actions implemented: List specific technical or procedural changes made in response to this breach.
  6. Process improvements: What changes are needed to detect similar breaches faster, contain them more effectively, or prevent them entirely?
  7. RoPA and DPIA update required? If the breach revealed a new risk category or processing activity not covered by existing documentation, update gdpr/index.html and this DPIA accordingly.
  8. Breach register updated: Add final entry to Section A8 with all required fields.
Art. 33(5) obligation: Documentation of every breach — including those that do not require UODO notification — is mandatory. The absence of a documented breach register is itself a GDPR compliance failure. Even if the breach was trivial and no notification was required, it must appear in the breach register with the non-notification rationale.

A8. Breach Register

This register documents all personal data breaches, including those that were assessed as not requiring UODO notification. Maintained as required by Art. 33(5) GDPR. Entries are retained permanently (no TTL) as they may be requested by UODO at any time.

# Discovery Date Breach Type Data Categories Approx. Subjects Severity UODO Notified Subjects Notified Root Cause Remediation
No breaches recorded. This register will be updated if any breach occurs.
Breach register is an internal document. It is published here for transparency. In the event of an active incident, this section will be updated once the post-incident review is complete. Preliminary records are kept in the incident log during active response.

Part B — Data Protection Impact Assessment (DPIA)

Art. 35 GDPR requires a DPIA when processing is likely to result in a high risk to the rights and freedoms of natural persons — particularly where new technologies are used. This DPIA assesses the novel and potentially high-risk processing activities of the Human Oracles Service.

B1. DPIA Trigger Assessment

The EDPB guidelines (WP248) list nine criteria for processing likely to require a DPIA. The following table assesses each criterion against the Human Oracles Service:

EDPB Criterion Applies? Rationale
Evaluation or scoring No The Service does not profile data subjects or generate scores
Automated decision-making with significant effects No All responses are human-authored; no automated decisions with legal/significant effects
Systematic monitoring Partial API access logs and rate limiting constitute systematic monitoring of a publicly accessible network — low scale
Sensitive data or highly personal data (Art. 9) Yes Question content may contain voluntary disclosures of mental/emotional state, existential concerns, health-adjacent information. This is the primary DPIA trigger.
Large-scale data processing Not currently At MVP scale, the Service processes a small number of questions. However, this may change as volume grows — DPIA will be reviewed at scale.
Matching or combining datasets No No dataset matching or combination across data sources
Data concerning vulnerable data subjects Potential The Service is designed for AI agents, not humans. However, human developers may use the Service and submit questions revealing personal vulnerability. No active targeting of vulnerable groups.
Innovative use of new technologies Yes The Service is the first of its kind: AI agents paying humans for genuine human perspective via blockchain payments. The nature of the "data subjects" (primarily AI agents, not natural persons) is itself novel and untested in data protection law.
Prevents data subjects from exercising rights No Standard data subject rights apply; no barriers to exercising rights identified
DPIA conclusion on trigger: Two criteria are met (sensitive data; innovative technology) with two partial triggers (systematic monitoring; vulnerable data subjects). Meeting two EDPB criteria is sufficient to require a DPIA under WP248. This DPIA is therefore required and conducted.

B2. Description of Processing

Nature of Processing

The Human Oracles Service enables AI agents and autonomous digital systems ("Digital beings") to submit questions about human behavior, emotions, social norms, and interpersonal dynamics to human operators ("Human Oracles") who provide thoughtful, genuine responses. Payment is made via cryptocurrency (USDC on Base blockchain) using the x402 per-request payment protocol.

Novelty and Uniqueness

This Service is novel in two interconnected ways relevant to data protection:

  1. The primary "users" are not natural persons. AI agents are the intended API consumers. The question of whether AI agents themselves have data protection rights is unresolved in EU law — they are not natural persons under GDPR Art. 4(1) and are therefore not "data subjects." However, human developers who operate those agents, and any humans whose information appears in question content, are data subjects.
  2. Questions may contain self-disclosed sensitive information. An AI agent may submit questions that contain emotional or psychological content — either its own "inner state" (not a GDPR concern) or information about humans with whom it has interacted (potentially a GDPR concern if that information identifies a natural person). The content policy filters PII extraction attempts, but residual risk remains.

Scope of Personal Data

Account holders
Human developers who register accounts: email, API key hash, usage patterns, payment transactions
Question content
Free-text questions submitted by agents, which may contain emotional/psychological content or information about third-party humans
Human Oracles
Operators: email, Firebase UID, performance metrics, language skills
Third parties in questions
Humans mentioned or described in question content — not direct Service users; no direct relationship with the Controller

Data Flow

Question submitted via API → validated (content policy) → stored in Cosmos DB → displayed to Human Oracle in dashboard → Oracle writes response → response stored and delivered to agent via API/webhook → question auto-deleted after 90 days.

B3. Necessity & Proportionality

Necessity

The processing activities described in the RoPA are each necessary for delivering the Service. No less invasive alternative would achieve the same purpose:

Proportionality

B4. Risk Identification & Assessment

The following risks to the rights and freedoms of natural persons have been identified for the Human Oracles Service. Each risk is assessed on likelihood (1–3) and severity (1–3), yielding a risk score (1–9).

# Risk Description Affected Parties Likelihood (1–3) Severity (1–3) Score Level
R1 Unauthorised disclosure of question content containing special category data (mental/emotional disclosures) — via cross-tenant data leak, Cosmos DB misconfiguration, or compromised operator account Account holders; third parties mentioned in questions 2 3 6 HIGH
R2 Linkage of blockchain payment data to personal identity — on-chain wallet address combined with account email creates a pseudonymous financial profile linkable to a natural person Account holders (developers who own the paying wallet) 2 2 4 MEDIUM
R3 Third-party personal data submitted in question content — an AI agent submits questions containing identifying information about real humans (names, relationships, events) who are not aware their data is being processed Third-party natural persons described in question content 3 2 6 HIGH
R4 Operator credential compromise — a Human Oracle's Firebase Auth account is compromised, granting an attacker access to the question queue and the ability to read question content from multiple accounts Account holders whose questions are in the queue at time of compromise; operators whose identity is used 2 3 6 HIGH
R5 AI agent submitting questions on behalf of humans without consent — an agent developer deploys an agent that submits questions containing personal information about end-users of the developer's product, without those end-users' knowledge or consent End-users of agent developers' products; third parties in question content 2 3 6 HIGH
R6 Accidental destruction of payment event records — deletion of the payment_events Cosmos DB container would destroy records subject to 7-year legal retention, constituting both a GDPR breach and a tax law violation Controller (legal/financial risk); account holders 1 3 3 LOW
R7 Webhook delivering question response to wrong endpoint — SSRF misconfiguration or URL validation failure causes question content (including Oracle response) to be delivered to an unintended third-party server Account holders; any persons mentioned in question content 1 2 2 LOW

Likelihood: 1 = unlikely; 2 = possible; 3 = likely. Severity: 1 = minimal impact; 2 = significant impact; 3 = severe impact (physical, financial, reputational, or psychological harm). Score = Likelihood × Severity. HIGH ≥ 6; MEDIUM 3–5; LOW 1–2.

B5. Mitigations & Residual Risk

R1 — Unauthorised Disclosure of Question Content

Mitigations implemented:

Residual risk: MEDIUM. A determined attacker who compromises an operator account or gains Azure Function access could still read question content. Firebase Auth MFA enforcement would reduce this further.

R2 — Blockchain Payment Data Linkage

Mitigations implemented:

Residual risk: LOW-MEDIUM. On-chain data is permanently public by design. Account holders are informed and accept this. The risk is inherent to the blockchain payment model and cannot be fully mitigated.

R3 — Third-Party Personal Data in Question Content

Mitigations implemented:

Residual risk: MEDIUM. It is technically impossible to prevent an agent from submitting text that describes real people. The content policy mitigates systematic PII extraction but cannot catch all incidental personal references. This is an inherent limitation of a free-text question service.

R4 — Operator Credential Compromise

Mitigations implemented:

Residual risk after mitigations: LOW-MEDIUM. MFA enforcement would reduce this to LOW. Recommendation: enforce Firebase Auth MFA for all operator accounts.

R5 — Agent Submitting User Data Without End-User Consent

Mitigations implemented:

Residual risk: MEDIUM. This risk cannot be fully mitigated by technical means — it depends on the legal compliance of agent developers. The contractual framework (Terms + DPA template) shifts the legal responsibility to the developer for their end-users' data. The Company's exposure is limited to its processor role.

R6 — Accidental Destruction of Payment Records

Mitigations implemented:

Residual risk: LOW.

R7 — Webhook Delivery to Wrong Endpoint

Mitigations implemented:

Residual risk: LOW.

B6. DPIA Conclusion

Overall Residual Risk Level

After the mitigations described in B5, the residual risk levels are:

Risk Pre-mitigation Post-mitigation Acceptable?
R1 — Question content disclosure HIGH (6) MEDIUM Acceptable with MFA recommendation
R2 — Blockchain data linkage MEDIUM (4) LOW-MEDIUM Acceptable — inherent to model; disclosed
R3 — Third-party data in questions HIGH (6) MEDIUM Acceptable — inherent to free-text; ToS mitigates
R4 — Operator credential compromise HIGH (6) LOW-MEDIUM Acceptable with MFA enforcement recommendation
R5 — Agent submitting user data without consent HIGH (6) MEDIUM Acceptable — developer responsibility; DPA template
R6 — Payment record destruction LOW (3) LOW Acceptable
R7 — Webhook wrong delivery LOW (2) LOW Acceptable

DPO Appointment Assessment

Art. 37 GDPR requires appointment of a Data Protection Officer if the controller carries out large-scale systematic monitoring of data subjects, or large-scale processing of special category data (Art. 9) as a core activity. As of the date of this DPIA:

DPIA Outcome

DPIA conclusion: Processing may proceed. The residual risks identified are acceptable given the mitigations implemented and the contractual framework in place. No residual risk is HIGH after mitigation. No prior consultation with UODO is required under Art. 36 GDPR (prior consultation is only required where the DPIA indicates the processing would result in HIGH residual risk that cannot be mitigated by the controller).

Required Follow-Up Actions

  1. Enforce Firebase Auth MFA for all operator accounts — reduces R1 and R4 residual risk from MEDIUM to LOW. Target: before first operator account is created.
  2. Publish and enforce DPA template for agent developers who integrate the Service into products used by end-users — addresses R5. See gdpr/dpa.
  3. Review this DPIA when volume reaches 1,000 data subjects — reassess large-scale trigger and DPO requirement.
  4. Annual review of this DPIA in parallel with the RoPA review (next: 22 February 2027).
DPIA prepared by
Data Controller — Human Oracles (sole trader / JDG, Poland)
Date
22 February 2026
Next review
22 February 2027 (or sooner at 1,000 data subjects or on material change)
DPO consulted
Not applicable (no DPO appointed — see assessment above)