This DPA covers processor and subprocessor obligations, security controls, subprocessors, retention, deletion, transfer terms, agent-generated data, and workspace metadata handling for buildr-plannr.
Determines the workspace purpose, users, agent scopes, source material, support contacts, and lawful basis for processing customer personal data.
buildr-plannr
Processor or service provider
Processes customer personal data only for documented product purposes to provide, secure, support, bill, and improve the governed agent planning service under customer instructions.
Subprocessors
Approved service providers
Provide hosting, authentication, billing, monitoring, email, analytics, or support capabilities listed in the public subprocessor register.
Workspace metadata
workspace names
project labels
issue metadata
roles and permissions
import and export history
Operate planning workspaces, preserve permission boundaries, support exports, and maintain audit-ready account state.
Agent-generated data
task contracts
agent recommendations
approval requests
risk scores
verification evidence
Coordinate agent work, preserve human review evidence, enforce approval gates, and explain why a delegated task was accepted, blocked, or escalated.
User and authentication data
names
email addresses
Cognito identifiers
identity provider claims
session metadata
Authenticate users, authorize workspace access, support account recovery, investigate security events, and maintain role-based access controls.
Billing, support, and legal data
Stripe customer references
subscription metadata
support request summaries
procurement contacts
data request evidence
Administer plans, subscriptions, invoices, refunds, enterprise review, legal requests, and support workflows without storing raw payment card data.
Operations and security data
request IDs
redacted logs
deployment health signals
security diagnostics
incident evidence
Monitor reliability, detect abuse, investigate incidents, maintain backups, and document production readiness evidence.
Scope and processing roles
This DPA applies when buildr-plannr processes customer personal data for a workspace, procurement review, billing flow, support case, or governed agent planning workflow.
The customer acts as controller or business for customer personal data submitted to the service.
buildr-plannr acts as processor or service provider and processes customer personal data only for documented product, security, support, billing, and legal purposes.
Customer instructions are captured through the product, signed order forms, support requests, enterprise security review, and mutually approved written instructions.
This DPA does not authorize customers to submit regulated data, secrets, payment card data, health data, or government identifiers unless a signed enterprise agreement explicitly allows it.
Processing instructions
Customer instructions cover operation of the application, agent governance, support, billing, security, analytics, imports, exports, and deletion workflows.
Processing is limited to providing the product, enforcing workspace permissions, coordinating human and agent work, maintaining entitlement state, and producing verification evidence.
Agents and integrations may process workspace metadata, issue records, task contracts, and context packs only within configured workspace scopes and approval controls.
buildr-plannr may refuse or suspend processing instructions that appear unlawful, unsafe, outside contract scope, or likely to expose secrets or third-party data without authority.
Product analytics must use pseudonymous identifiers and must not collect raw prompts, private issue bodies, customer source material, secrets, or full support payloads.
Agent-generated and workspace data
Agent-generated data and workspace metadata are treated as customer data when they identify users, describe customer work, or preserve customer-specific evidence.
Agent-generated recommendations, task contracts, approval requests, risk scores, and verification evidence remain connected to the workspace that generated them.
Human review and approval evidence is retained to explain delegated work, release decisions, escalations, blocked actions, and audit outcomes.
Imports, exports, bulk operations, and API access must preserve workspace ownership and avoid leaking data across tenants or environments.
Support and debugging workflows must use privacy-safe references instead of raw prompts, customer secrets, private source material, or full issue bodies wherever possible.
Security controls
Security controls are designed to protect customer personal data, agent execution evidence, and workspace state throughout the service lifecycle.
Use Cognito-backed authentication, environment-specific AWS accounts, least-privilege roles, protected deployment workflows, and secure session handling.
Encrypt data in transit and at rest using AWS-managed or service-managed encryption unless a signed enterprise agreement requires a different control.
Redact tokens, secrets, API keys, Cognito tokens, webhook signatures, private keys, raw passwords, and full customer email values from logs and support evidence.
Maintain incident response, access review, change management, backup, restore, and monitoring evidence as launch readiness controls mature.
Subprocessors and transfers
Subprocessors support hosting, authentication, billing, monitoring, analytics, email, support, and related service operations.
The public subprocessor list records vendor purpose, status, region, data categories, transfer notes, and the update process.
Subprocessors must be assessed before customer data is sent to them and must be used only for the documented service purpose.
Enterprise customers receive material subprocessor change notices through their nominated legal or security contact when required by contract.
International transfers, where applicable, use the vendor transfer terms, Standard Contractual Clauses, or other approved transfer mechanisms available for the relevant service.
Retention, deletion, and return
Retention, deletion, return, and export handling are governed by product lifecycle, customer requests, security duties, billing obligations, and enterprise contract terms.
Workspace records, issue data, agent activity, task contracts, and evidence are retained while the workspace is active and then exported, deleted, or aged out through the supported lifecycle.
Operational logs are redacted and retained according to the active Terraform-managed CloudWatch retention policy unless a scoped incident, abuse, or legal hold requires otherwise.
Billing records, invoices, tax data, support history, fraud prevention evidence, and dispute records may be retained where legally or contractually required.
Enterprise deletion, return, and backup aging expectations must be captured in the order form, DPA, security addendum, or approved written request.
Assistance, audits, and incidents
buildr-plannr supports reasonable data request, audit, security review, incident, and procurement assistance through documented support and enterprise review paths.
Customers can request access, correction, export, deletion, restriction, and portability help through /support?intent=legal.
Enterprise customers can request security whitepaper, subprocessors, architecture, access control, logging, backup, and incident response evidence through /contact?intent=security-review.
Security incidents involving customer personal data are triaged through incident response procedures and communicated through the customer contact route required by contract or law.
Audit assistance should use existing evidence, privacy-safe exports, and scoped review materials rather than direct production access.
Enterprise and checkout review paths
Use these routes for subprocessor review, privacy terms, security evidence, data requests, procurement, and enterprise security review.