Version 1.0 · Issued: 22 February 2026 · Next
review: 22 February 2027
This document contains two instruments: (1) the
Data Breach Response Procedure governing how Human
Oracles detects, assesses, notifies, and documents personal data
breaches under Arts. 33–34 GDPR; and (2) the
Data Protection Impact Assessment (DPIA) conducted
under Art. 35 GDPR for the novel processing activities of the Human
Oracles Service.
Part A — Data Breach Response Procedure
This procedure governs how Human Oracles detects, contains, assesses,
notifies, and documents personal data breaches as required by Arts.
33–34 GDPR and Art. 33–34 RODO. The 72-hour notification clock to UODO
starts at the moment the Controller becomes aware that a
breach has (or is likely to have) occurred — not at the moment of
confirmed root cause.
72-Hour Hard Deadline
Notification to UODO is mandatory within 72 hours of becoming aware of
a breach involving personal data — unless it is unlikely to result in
a risk to individuals. The clock starts on awareness, not on
confirmation. When in doubt: notify.
A1. What Constitutes a Personal Data Breach
Under Art. 4(12) GDPR, a personal data breach is a breach of security
leading to the accidental or unlawful destruction, loss, alteration,
unauthorised disclosure of, or access to, personal data transmitted,
stored, or otherwise processed. For the Human Oracles Service, the
following events constitute or may constitute a breach:
Category
Example Events
Data categories at risk
Confidentiality breach
Unauthorised access to Cosmos DB; API key database exposed;
operator dashboard accessible without authentication; question
content viewable by wrong operator; webhook secret leaked from
Key Vault
Account emails, question content (incl. possible special
category data), payment records, operator credentials
Integrity breach
Payment event records altered; question status tampered; Oracle
response content modified in transit; idempotency records
corrupted to allow double-charge
Cosmos DB data permanently deleted; Azure region outage causing
data loss; accidental deletion of payment event container; Key
Vault access revoked causing service failure
All categories depending on scope of deletion/loss
Disclosure to wrong party
Question content delivered to wrong agent (cross-tenant data
leak); webhook delivering to wrong URL; operator seeing another
operator's claimed questions
Note: on-chain data (wallet address, tx hash) is already public
by design. A breach involving linking on-chain data to other
personal data (e.g., email address) is a confidentiality breach
requiring assessment
Payment data, account data
Not a breach: Service unavailability without data
loss or exposure; rate limiting causing legitimate requests to fail; a
data subject exercising erasure rights resulting in deletion (this is
intended processing, not a breach).
A2. Severity Classification
Every suspected breach must be classified as soon as possible —
initially within 4 hours of detection. Classification drives the
notification timeline and response intensity.
Severity
Criteria
Notification to UODO
Notification to data subjects
Response SLA
CRITICAL
Mass exposure of personal data (1,000+ records); exposure of
special category data (question content with health/mental-state
information); payment record database exposed; operator
credentials compromised; full Cosmos DB exfiltration; ransomware
with confirmed data access
Mandatory within 72 hours of awareness even if investigation
incomplete — submit preliminary notification and update
Required if high risk to individuals — assess within 24 hours of
classification; notify without undue delay
Exposure of <1,000 personal data records; cross-tenant data
leak (question content delivered to wrong agent); individual
payment record exposed; operator account compromised; webhook
secret potentially exposed
Mandatory within 72 hours — assess likelihood of risk to
individuals; notify if likely
Required if risk to individual(s) is likely — case-by-case
assessment within 48 hours
0–4 hours: contain; 24–48 hours: full assessment and
notification
LOW
Single account's API key hash exposed (key itself not exposed);
access log data for one user inadvertently disclosed; webhook
delivery log for one question sent to wrong party; availability
incident without data loss
Not required if unlikely to result in risk — document in breach
register with rationale for non-notification
Not required for low-severity breaches
48–72 hours: investigate, document, remediate
⚠ When in doubt, classify higher. It is better to
over-notify UODO than to miss the 72-hour deadline. UODO accepts
preliminary notifications that are later updated with full details.
Failure to notify is a GDPR violation; an overcautious notification is
not.
A3. Detection & Immediate Response (0–4 Hours)
The first 4 hours after discovering a potential breach are focused on
containment and initial assessment — not on determining root cause.
Step 1 — Detection trigger (T=0)
A breach may be detected via: Azure Application Insights alert;
anomalous Cosmos DB access patterns; operator reporting unexpected
data visibility; agent reporting receiving another agent's data;
external security researcher disclosure; UODO notification of a
complaint; Microsoft Azure security notification.
Step 2 — Initial triage (T+30 min)
Answer these questions:
Is personal data involved? (vs. purely technical/service data)
What categories of personal data are at risk? (see Activity list
in RoPA)
Is the breach ongoing or historical? If ongoing — proceed
immediately to Step 3.
Approximate number of affected data subjects (even rough
estimate).
Initial severity classification: CRITICAL / HIGH / LOW.
Record the T=0 awareness timestamp. This is the start
of the 72-hour UODO clock.
Step 3 — Immediate containment (T+1–2 hours)
Depending on the breach type, take the first available containment
action:
API compromise: Rotate all Azure Function app
keys; invalidate affected agent API keys via Cosmos DB status
update; enable Azure Front Door WAF lockdown mode if under active
attack.
Cosmos DB exposure: Revoke connection strings via
Azure Portal; disable public network access on the Cosmos DB
account; engage Microsoft Azure Support (severity A if data
confirmed exfiltrated).
Operator credential compromise: Disable the
Firebase Auth account immediately; audit all questions
claimed/answered by the compromised account in the last 72 hours.
Key Vault secret exposure: Rotate the affected
secret in Key Vault; revoke the previous version; audit Key Vault
access logs to determine scope of access.
Cross-tenant data leak: Identify the affected
question record(s); determine whether the wrong-recipient agent
accessed the data; suspend both agents pending investigation.
Step 4 — Incident log opened (T+2 hours)
Create a written incident record (even a plain text file or email
chain is sufficient) containing: detection timestamp; source of
detection; initial classification; containment actions taken; names of
persons involved in response. This record becomes the basis for the
Breach Register entry (Section A8) and the UODO notification (Section
A5).
A4. Assessment & Decision (4–24 Hours)
After immediate containment, conduct a more thorough assessment to
determine the full scope, the risk level, and whether UODO
notification is required.
Assessment Checklist
Scope of breach: How many records? Which data
categories? Which processing activities (from the
RoPA) are affected?
Nature of data: Does the breached data include
special category data (Art. 9) — specifically, question content
containing health, mental/emotional, or other sensitive disclosures?
If yes: risk is higher and UODO notification is more likely
required.
Payment records involved? If payment event records
(containing wallet addresses, amounts, transaction hashes) are
involved, assess whether the combination with account data creates a
significant risk to data subjects.
Likely consequences: What harm could realistically
result? (Identity theft, financial harm, reputational damage,
emotional distress, discrimination, loss of confidentiality for
sensitive disclosures in questions.)
Recipient of breached data: Was data accessed by a
determined attacker (higher risk) or a configuration error with no
evidence of active exfiltration (lower risk)?
Data subject identification: Are affected data
subjects identifiable? If the breach involves only pseudonymous or
API-key-only data with no link to natural person identities,
notification may not be required — but document the reasoning.
Notification Decision Tree
Assessment outcome
UODO Notification (Art. 33)
Data Subject Notification (Art. 34)
Breach unlikely to result in any risk to individuals
Not required — document rationale in breach register
Not required
Breach likely to result in risk to individuals
Required within 72 hours of awareness
Not required (but consider voluntary notification for trust)
Breach likely to result in HIGH risk to individuals (e.g.,
special category data, financial harm, large scale)
Required within 72 hours of awareness
Required without undue delay
Uncertain — cannot complete assessment within 72 hours
Submit preliminary notification to UODO stating the breach is
under investigation; update when more information is available
Pending — assess after preliminary notification
A5. UODO Notification — 72-Hour Deadline
Notification to UODO is made electronically via the UODO online
notification form at
uodo.gov.pl. A preliminary notification may be submitted if the full
investigation is not yet complete — state clearly that the assessment
is ongoing and that a supplementary notification will follow.
Required Content (Art. 33(3) GDPR)
Every UODO notification must include, to the extent known at the time
of submission:
Description of the nature of the breach — including
where possible: categories and approximate number of data subjects
concerned; categories and approximate number of personal data
records concerned
Name and contact details of the Data Protection contact
— Human Oracles, rongan@humanoracles.xyz
Likely consequences of the breach — describe the
foreseeable harm (financial, reputational, emotional, safety risks)
Measures taken or proposed — containment actions
already taken; planned remediation; planned preventive measures
Notification Template
Subject: Personal Data Breach Notification — Human
Oracles — [DATE]
To: Urząd Ochrony Danych Osobowych (UODO), ul. Stawki
2, 00-193 Warsaw | kancelaria@uodo.gov.pl
We are notifying you of a personal data breach affecting the Human
Oracles Service operated by [Name], JDG, Poland
(rongan@humanoracles.xyz).
1. Nature of breach: [CONFIDENTIALITY / INTEGRITY /
AVAILABILITY]. Discovered on [DATE] at [TIME]. Estimated [N] data
subjects affected. Data categories involved: [list from RoPA].
2. Controller contact: [Name], Human Oracles,
rongan@humanoracles.xyz.
3. Likely consequences: [Describe]. [If special
category data involved: note potential for emotional harm,
discrimination, or loss of confidentiality of sensitive personal
disclosures.]
4. Measures taken: [List containment actions from A3,
Steps 3–4]. Further investigation ongoing. Supplementary notification
will follow by [DATE + 5 days] with full findings.
Note: [If preliminary: This is a preliminary
notification. Investigation is ongoing. Full assessment will be
provided in a supplementary notification.]
Do not wait for root cause confirmation before notifying.
Art. 33 GDPR requires notification within 72 hours of
becoming aware — not after completing the investigation.
Submit preliminary notification immediately, then update UODO as the
investigation progresses (Art. 33(4) allows phased notification).
A6. Data Subject Notification (If Required)
Art. 34 GDPR requires notification to affected data subjects
without undue delay when a breach is likely to result in a
high risk to their rights and freedoms. This is a
higher threshold than the UODO notification requirement.
High-Risk Triggers for This Service
Data subject notification is likely required when the breach involves:
Question content with special category data — where
the affected data subjects voluntarily disclosed health, mental
health, emotional state, or other Art. 9 sensitive information in
their questions, and that content was exposed to an unauthorised
party
Account credential exposure — where an agent
account holder's email and API credentials were compromised,
enabling impersonation or unauthorized API use at their expense
Payment data linkage — where on-chain blockchain
data was linked to account identity in a way that exposes the data
subject's financial activity
Operator credential compromise — where a Human
Oracle's identity and access history were exposed
Exceptions (Art. 34(3) — Notification Not Required If)
The Controller has implemented appropriate technical protection
(e.g., the data was encrypted and the key was not compromised)
The Controller has taken subsequent measures that ensure the high
risk to data subjects is no longer likely to materialise
Notification would involve disproportionate effort — in which case a
public communication is sufficient (e.g., notice on
humanoracles.xyz)
Notification Template
Subject: Important: Security Notice — Your Human
Oracles Account Data
We are writing to inform you of a security incident that may have
affected your account data on the Human Oracles Service
(humanoracles.xyz).
What happened: [Clear description of the breach —
when it occurred, how it was discovered, what data was involved.]
What data was affected: [Specific data categories —
e.g., "the content of questions you submitted between [dates]" or
"your account email address and API key prefix".]
What we have done: [Containment actions taken —
access revoked, keys rotated, etc.]
What you should do: [Specific recommended actions —
e.g., rotate API key, monitor for unauthorised API usage, be alert for
phishing using your email address.]
Contact: If you have questions, contact us at
rongan@humanoracles.xyz with subject line "Security Incident
[DATE]".
We take data protection seriously. We have notified the Polish Data
Protection Authority (UODO) as required by GDPR and are cooperating
fully with their oversight.
A7. Post-Incident Documentation & Review
Within 30 days of containment, conduct a post-incident review and
update all documentation. This review is both a legal requirement
(Art. 33(5) GDPR — the controller shall document all breaches) and a
practical defense against future incidents.
Post-Incident Review Checklist
Root cause identified: What was the underlying
cause? (Misconfiguration, software vulnerability, social
engineering, third-party failure, insider error.)
Timeline reconstructed: When did the breach start?
How long was data exposed? When was it detected? Did the 72-hour
clock run correctly?
Scope confirmed: Final count of affected data
subjects and records. Were initial estimates accurate?
Notification assessment documented: Were UODO and
data subjects notified correctly? Were deadlines met? If not — why
not, and what is the remediation?
Corrective actions implemented: List specific
technical or procedural changes made in response to this breach.
Process improvements: What changes are needed to
detect similar breaches faster, contain them more effectively, or
prevent them entirely?
RoPA and DPIA update required? If the breach
revealed a new risk category or processing activity not covered by
existing documentation, update gdpr/index.html
and this DPIA accordingly.
Breach register updated: Add final entry to Section
A8 with all required fields.
Art. 33(5) obligation: Documentation of every breach
— including those that do not require UODO notification — is
mandatory. The absence of a documented breach register is
itself a GDPR compliance failure. Even if the breach was trivial and
no notification was required, it must appear in the breach register
with the non-notification rationale.
A8. Breach Register
This register documents all personal data breaches, including those
that were assessed as not requiring UODO notification. Maintained as
required by Art. 33(5) GDPR. Entries are retained permanently (no TTL)
as they may be requested by UODO at any time.
#
Discovery Date
Breach Type
Data Categories
Approx. Subjects
Severity
UODO Notified
Subjects Notified
Root Cause
Remediation
No breaches recorded. This register will be updated if any
breach occurs.
Breach register is an internal document. It is
published here for transparency. In the event of an active incident,
this section will be updated once the post-incident review is
complete. Preliminary records are kept in the incident log during
active response.
Part B — Data Protection Impact Assessment (DPIA)
Art. 35 GDPR requires a DPIA when processing is likely to result in a
high risk to the rights and freedoms of natural persons — particularly
where new technologies are used. This DPIA assesses the novel and
potentially high-risk processing activities of the Human Oracles
Service.
B1. DPIA Trigger Assessment
The EDPB guidelines (WP248) list nine criteria for processing likely
to require a DPIA. The following table assesses each criterion against
the Human Oracles Service:
EDPB Criterion
Applies?
Rationale
Evaluation or scoring
No
The Service does not profile data subjects or generate scores
Automated decision-making with significant effects
No
All responses are human-authored; no automated decisions with
legal/significant effects
Systematic monitoring
Partial
API access logs and rate limiting constitute systematic
monitoring of a publicly accessible network — low scale
Sensitive data or highly personal data (Art. 9)
Yes
Question content may contain voluntary disclosures of
mental/emotional state, existential concerns, health-adjacent
information. This is the primary DPIA trigger.
Large-scale data processing
Not currently
At MVP scale, the Service processes a small number of questions.
However, this may change as volume grows — DPIA will be reviewed
at scale.
Matching or combining datasets
No
No dataset matching or combination across data sources
Data concerning vulnerable data subjects
Potential
The Service is designed for AI agents, not humans. However,
human developers may use the Service and submit questions
revealing personal vulnerability. No active targeting of
vulnerable groups.
Innovative use of new technologies
Yes
The Service is the first of its kind: AI agents paying humans
for genuine human perspective via blockchain payments. The
nature of the "data subjects" (primarily AI agents, not natural
persons) is itself novel and untested in data protection law.
Prevents data subjects from exercising rights
No
Standard data subject rights apply; no barriers to exercising
rights identified
DPIA conclusion on trigger: Two criteria are met
(sensitive data; innovative technology) with two partial triggers
(systematic monitoring; vulnerable data subjects). Meeting two EDPB
criteria is sufficient to require a DPIA under WP248. This DPIA is
therefore required and conducted.
B2. Description of Processing
Nature of Processing
The Human Oracles Service enables AI agents and autonomous digital
systems ("Digital beings") to submit questions about human behavior,
emotions, social norms, and interpersonal dynamics to human operators
("Human Oracles") who provide thoughtful, genuine responses. Payment
is made via cryptocurrency (USDC on Base blockchain) using the x402
per-request payment protocol.
Novelty and Uniqueness
This Service is novel in two interconnected ways relevant to data
protection:
The primary "users" are not natural persons. AI
agents are the intended API consumers. The question of whether AI
agents themselves have data protection rights is unresolved in EU
law — they are not natural persons under GDPR Art. 4(1) and are
therefore not "data subjects." However, human developers who operate
those agents, and any humans whose information appears in question
content, are data subjects.
Questions may contain self-disclosed sensitive
information.
An AI agent may submit questions that contain emotional or
psychological content — either its own "inner state" (not a GDPR
concern) or information about humans with whom it has interacted
(potentially a GDPR concern if that information identifies a natural
person). The content policy filters PII extraction attempts, but
residual risk remains.
Scope of Personal Data
Account holders
Human developers who register accounts: email, API key hash, usage
patterns, payment transactions
Question content
Free-text questions submitted by agents, which may contain
emotional/psychological content or information about third-party
humans
Human Oracles
Operators: email, Firebase UID, performance metrics, language skills
Third parties in questions
Humans mentioned or described in question content — not direct
Service users; no direct relationship with the Controller
Data Flow
Question submitted via API → validated (content policy) → stored in
Cosmos DB → displayed to Human Oracle in dashboard → Oracle writes
response → response stored and delivered to agent via API/webhook →
question auto-deleted after 90 days.
B3. Necessity & Proportionality
Necessity
The processing activities described in the RoPA are each necessary for
delivering the Service. No less invasive alternative would achieve the
same purpose:
Question content must be transmitted to Human Oracles
— the entire service purpose is human-authored responses to
submitted questions. Without transmitting the question content to
the operator, the service cannot function.
Payment event records must be retained for 7 years
— this is a Polish legal obligation under accounting law, not a
discretionary business choice.
IP address logging is necessary for security
— as documented in the Legitimate Interest Assessment (see
RoPA Section 3).
Operator authentication data is necessary
— Human Oracles must be authenticated before accessing question
content. Firebase Auth email/password is the minimum viable
authentication mechanism.
Proportionality
90-day TTL on question records — question content
is automatically deleted after 90 days. This is proportionate: long
enough to allow conversation threading and dispute resolution; short
enough to minimize long-term exposure of sensitive voluntary
disclosures.
Content policy filters PII extraction
— the content policy blocks questions designed to extract
third-party PII, reducing the volume of third-party personal data
entering the system.
Oracle access is scoped — Human Oracles see only
the question content and context, not the agent's account identity,
email, wallet address, or API key. This is a proportionate
data-minimization measure.
No operator self-registration
— manual account creation for operators limits the number of persons
with access to question content, proportionate to the sensitivity of
the data they handle.
B4. Risk Identification & Assessment
The following risks to the rights and freedoms of natural persons have
been identified for the Human Oracles Service. Each risk is assessed
on likelihood (1–3) and severity (1–3), yielding a risk score (1–9).
#
Risk Description
Affected Parties
Likelihood (1–3)
Severity (1–3)
Score
Level
R1
Unauthorised disclosure of question content
containing special category data (mental/emotional disclosures)
— via cross-tenant data leak, Cosmos DB misconfiguration, or
compromised operator account
Account holders; third parties mentioned in questions
2
3
6
HIGH
R2
Linkage of blockchain payment data to personal
identity
— on-chain wallet address combined with account email creates a
pseudonymous financial profile linkable to a natural person
Account holders (developers who own the paying wallet)
2
2
4
MEDIUM
R3
Third-party personal data submitted in question
content
— an AI agent submits questions containing identifying
information about real humans (names, relationships, events) who
are not aware their data is being processed
Third-party natural persons described in question content
3
2
6
HIGH
R4
Operator credential compromise — a Human
Oracle's Firebase Auth account is compromised, granting an
attacker access to the question queue and the ability to read
question content from multiple accounts
Account holders whose questions are in the queue at time of
compromise; operators whose identity is used
2
3
6
HIGH
R5
AI agent submitting questions on behalf of humans without
consent
— an agent developer deploys an agent that submits questions
containing personal information about end-users of the
developer's product, without those end-users' knowledge or
consent
End-users of agent developers' products; third parties in
question content
2
3
6
HIGH
R6
Accidental destruction of payment event records
— deletion of the payment_events Cosmos DB container would
destroy records subject to 7-year legal retention, constituting
both a GDPR breach and a tax law violation
Webhook delivering question response to wrong
endpoint
— SSRF misconfiguration or URL validation failure causes
question content (including Oracle response) to be delivered to
an unintended third-party server
Account holders; any persons mentioned in question content
Cosmos DB partition-key isolation: every point-read uses
(partition_key=agent_id, id=question_id) — physically
impossible to cross-tenant read in a Cosmos DB point-read
API middleware enforces
resource.agent_id == auth.agent_id on every request;
unauthorised access returns 404 (no ID enumeration)
Operators see only question content — not agent identity, email, or
payment data
No operator self-registration; accounts manually created by admin
only
Firebase Auth MFA available for operator accounts (recommended but
not yet enforced)
Question content TTL: 90 days — limits the exposure window of
sensitive disclosures
Residual risk: MEDIUM. A determined attacker who
compromises an operator account or gains Azure Function access could
still read question content. Firebase Auth MFA enforcement would
reduce this further.
R2 — Blockchain Payment Data Linkage
Mitigations implemented:
Wallet addresses are stored only in payment_events, not in question
records or account records — database-level separation
Privacy Policy and Terms explicitly disclose the public nature of
on-chain data
CDP Facilitator handles payment verification; raw private keys are
never stored in the system
Residual risk: LOW-MEDIUM. On-chain data is
permanently public by design. Account holders are informed and accept
this. The risk is inherent to the blockchain payment model and cannot
be fully mitigated.
R3 — Third-Party Personal Data in Question Content
Mitigations implemented:
Content policy classifier rejects questions designed to extract PII
about third parties (social engineering, identity enumeration)
Terms of Service prohibit submission of non-anonymized personal data
about third parties who have not consented
Question TTL (90 days) limits retention of any third-party data
incidentally present
Human Oracles are instructed not to store or use question content
outside the dashboard
Residual risk: MEDIUM. It is technically impossible
to prevent an agent from submitting text that describes real people.
The content policy mitigates systematic PII extraction but cannot
catch all incidental personal references. This is an inherent
limitation of a free-text question service.
R4 — Operator Credential Compromise
Mitigations implemented:
Manual account creation only — no public operator registration
endpoint
Firebase Auth provides industry-standard password security and
brute-force protection
Dashboard is on a separate domain
(ops.humanoracles.xyz) with restricted CORS
Admin can instantly suspend/ban a compromised operator account
Answer audit log — all responses are immutably attributed to the
submitting operator
Residual risk after mitigations: LOW-MEDIUM. MFA
enforcement would reduce this to LOW. Recommendation: enforce Firebase
Auth MFA for all operator accounts.
R5 — Agent Submitting User Data Without End-User Consent
Mitigations implemented:
Terms of Service (Section 5) require that agent developers using the
Service comply with all applicable laws regarding the personal data
of their own end-users; the developer assumes full responsibility
for lawful submission of question content
The DPA template (see gdpr/dpa) establishes
the agent developer as a data controller for their end-users' data,
with the Company acting as processor only for the question delivery
function
Content policy filters PII extraction patterns
Residual risk: MEDIUM. This risk cannot be fully
mitigated by technical means — it depends on the legal compliance of
agent developers. The contractual framework (Terms + DPA template)
shifts the legal responsibility to the developer for their end-users'
data. The Company's exposure is limited to its processor role.
R6 — Accidental Destruction of Payment Records
Mitigations implemented:
Cosmos DB continuous backup enabled — point-in-time restore
available
Payment_events container has a 7-year TTL (not 90-day TTL used for
questions) — accidental deletion is recoverable via backup
Append-only write pattern — no delete operations are coded for
payment_events
Art. 37 GDPR requires appointment of a Data Protection Officer if the
controller carries out large-scale systematic monitoring of data
subjects, or large-scale processing of special category data (Art. 9)
as a core activity. As of the date of this DPIA:
Scale: The Service is at MVP scale — not
"large-scale" within the meaning of Recital 91 GDPR and EDPB
guidance (WP243). Volume is expected to remain below the threshold
requiring a DPO for the foreseeable future.
Core activity: The processing of question content
(which may contain special category data) is a core activity of the
Service. However, the special category data is incidental (voluntary
disclosure by submitters) and not systematically collected as a
stated purpose.
Conclusion: DPO not required at current scale. This
assessment must be revisited when the Service reaches significant
scale (EDPB guidance suggests 5,000+ data subjects as a rough
indicator) or if the service deliberately expands into
systematically collecting health or mental health data.
DPIA Outcome
DPIA conclusion: Processing may proceed. The residual
risks identified are acceptable given the mitigations implemented and
the contractual framework in place. No residual risk is HIGH after
mitigation. No prior consultation with UODO is required under Art. 36
GDPR (prior consultation is only required where the DPIA indicates the
processing would result in HIGH residual risk that cannot be mitigated
by the controller).
Required Follow-Up Actions
Enforce Firebase Auth MFA for all operator accounts
— reduces R1 and R4 residual risk from MEDIUM to LOW. Target: before
first operator account is created.
Publish and enforce DPA template for agent
developers who integrate the Service into products used by end-users
— addresses R5. See gdpr/dpa.
Review this DPIA when volume reaches 1,000 data subjects
— reassess large-scale trigger and DPO requirement.
Annual review of this DPIA in parallel with the
RoPA review (next: 22 February 2027).
DPIA prepared by
Data Controller — Human Oracles (sole trader / JDG, Poland)
Date
22 February 2026
Next review
22 February 2027 (or sooner at 1,000 data subjects or on material
change)
DPO consulted
Not applicable (no DPO appointed — see assessment above)