• Latest
  • Trending
dsgvo 1

What belongs in a DPA? Data processing agreement in accordance with Art. 28 GDPR

17. October 2025
ChatGPT and lawyers: recordings of the Weblaw launch event

Private AI use in the company

24. October 2025
Lego brick still protected as a design patent

App purchases, in-app purchases and sales tax

21. October 2025
Smart contracts in the insurance industry: contract design and regulatory compliance for InsurTech start-ups

Contract for work vs. service contract in software, AI and games projects

15. October 2025

Influencer contract: performance profile, rights/buyouts, labeling and AI content

13. October 2025
AI content for subscription platforms

AI content for subscription platforms

29. September 2025
E-sports finally charitable? What the government draft of the Tax Amendment Act 2025 really brings

E-sports finally charitable? What the government draft of the Tax Amendment Act 2025 really brings

23. September 2025
Clubs, photos and minors: managing consent properly

Clubs, photos and minors: managing consent properly

22. September 2025
AI faces, voice clones and deepfakes in advertising: rules of the game under the EU AI Act and German law

AI faces, voice clones and deepfakes in advertising: rules of the game under the EU AI Act and German law

17. September 2025
Modding in EULAs and contracts – what applies legally in Germany?

Modding in EULAs and contracts – what applies legally in Germany?

8. September 2025
Arbitration agreements in EULAs and developer contracts

Arbitration agreements in EULAs and developer contracts

7. September 2025
Chain of title in game development: building a clean chain of rights

Chain of title in game development: building a clean chain of rights

6. September 2025
Fail-fast clauses in media productions – what are they actually?

Fail-fast clauses in media productions – what are they actually?

5. September 2025
Founder’s agreement vs. shareholder agreement: setting the course for startups at an early stage

Founder’s agreement vs. shareholder agreement: setting the course for startups at an early stage

12. August 2025
Cheat software without code intervention: What the BGH really decided in the Sony ./. Datel case (I ZR 157/21)

Cheat software without code intervention: What the BGH really decided in the Sony ./. Datel case (I ZR 157/21)

11. August 2025
Digital integrity as a (new) fundamental right: status in Germany and the EU in 2025

Digital integrity as a (new) fundamental right: status in Germany and the EU in 2025

10. August 2025
European Economic Interest Grouping (EEIG)

EU Digital Decade 2030: Data law, Data Act & eIDAS 2 – what needs to be implemented in 2025

8. August 2025
Upload filters between copyright and personal rights

Upload filters between copyright and personal rights

7. August 2025
On-demand transmission right in the digital space: streaming, Section 19a UrhG and licensing

On-demand transmission right in the digital space: streaming, Section 19a UrhG and licensing

6. August 2025
Q&A: Legal issues for game developers

5-day guide: Founding a game development studio

5. August 2025
Blockchain in digital forensics: fields of application, evidential value and data protection limits

Blockchain in digital forensics: fields of application, evidential value and data protection limits

3. August 2025
  • Mehr als 3 Millionen Wörter Inhalt
  • |
  • info@itmedialaw.com
  • |
  • Tel: 03322 5078053
Kurzberatung

No products in the cart.

  • en English
  • de Deutsch
  • Informationen
    • Ideal partner
    • About lawyer Marian Härtel
    • Quick and flexible access
    • Principles as a lawyer
    • Why a lawyer and business consultant?
    • Focus areas of attorney Marian Härtel
      • Focus on start-ups
      • Investment advice
      • Corporate law
      • Cryptocurrencies, Blockchain and Games
      • AI and SaaS
      • Streamers and influencers
      • Games and esports law
      • IT/IP Law
      • Law firm for GMBH,UG, GbR
      • Law firm for IT/IP and media law
    • The everyday life of an IT lawyer
    • How can I help clients?
    • Testimonials
    • Team: Saskia Härtel – WHO AM I?
    • Agile and lean law firm
    • Price overview
    • Various information
      • Terms
      • Privacy policy
      • Imprint
  • Services
    • Support and advice of agencies
    • Contract review and preparation
    • Games law consulting
    • Consulting for influencers and streamers
    • Advice in e-commerce
    • DLT and Blockchain consulting
    • Legal advice in corporate law: from incorporation to structuring
    • Legal compliance and expert opinions
    • Outsourcing – for companies or law firms
    • Booking as speaker
  • News
    • Gloss / Opinion
    • Law on the Internet
    • Online retail
    • Law and computer games
    • Law and Esport
    • Blockchain and web law
    • Data protection Law
    • Copyright
    • Labour law
    • Competition law
    • Corporate
    • EU law
    • Law on the protection of minors
    • Tax
    • Other
    • Internally
  • Podcast
    • ITMediaLaw Podcast
  • Knowledge base
    • Laws
    • Legal terms
    • Contract types
    • Clause types
    • Forms of financing
    • Legal means
    • Authorities
    • Company forms
    • Tax
    • Concepts
  • Videos
    • Information videos – about Marian Härtel
    • Videos – about me (Couch)
    • Blogpost – individual videos
    • Videos on services
    • Shorts
    • Podcast format
    • Third-party videos
    • Other videos
  • Contact
  • Informationen
    • Ideal partner
    • About lawyer Marian Härtel
    • Quick and flexible access
    • Principles as a lawyer
    • Why a lawyer and business consultant?
    • Focus areas of attorney Marian Härtel
      • Focus on start-ups
      • Investment advice
      • Corporate law
      • Cryptocurrencies, Blockchain and Games
      • AI and SaaS
      • Streamers and influencers
      • Games and esports law
      • IT/IP Law
      • Law firm for GMBH,UG, GbR
      • Law firm for IT/IP and media law
    • The everyday life of an IT lawyer
    • How can I help clients?
    • Testimonials
    • Team: Saskia Härtel – WHO AM I?
    • Agile and lean law firm
    • Price overview
    • Various information
      • Terms
      • Privacy policy
      • Imprint
  • Services
    • Support and advice of agencies
    • Contract review and preparation
    • Games law consulting
    • Consulting for influencers and streamers
    • Advice in e-commerce
    • DLT and Blockchain consulting
    • Legal advice in corporate law: from incorporation to structuring
    • Legal compliance and expert opinions
    • Outsourcing – for companies or law firms
    • Booking as speaker
  • News
    • Gloss / Opinion
    • Law on the Internet
    • Online retail
    • Law and computer games
    • Law and Esport
    • Blockchain and web law
    • Data protection Law
    • Copyright
    • Labour law
    • Competition law
    • Corporate
    • EU law
    • Law on the protection of minors
    • Tax
    • Other
    • Internally
  • Podcast
    • ITMediaLaw Podcast
  • Knowledge base
    • Laws
    • Legal terms
    • Contract types
    • Clause types
    • Forms of financing
    • Legal means
    • Authorities
    • Company forms
    • Tax
    • Concepts
  • Videos
    • Information videos – about Marian Härtel
    • Videos – about me (Couch)
    • Blogpost – individual videos
    • Videos on services
    • Shorts
    • Podcast format
    • Third-party videos
    • Other videos
  • Contact

What belongs in a DPA? Data processing agreement in accordance with Art. 28 GDPR

17. October 2025
in Data protection Law
Reading Time: 9 mins read
0 0
A A
0
dsgvo 1

Order processing is part of everyday life: cloud hosting, newsletter distribution, support desk, payment gateway, AI labeling, CRM operation. At the latest when personal data is processed on behalf of others, Art. 28 GDPR requires a robust data processing agreement (DPA). The DPA is not a form attachment, but the legally binding bridge between technology, organization and liability. This article bundles the mandatory contents of Art. 28 para. 3 GDPR in a structured continuous text, shows practical clause mechanics for sub-processors, audits, TOMs and data portability and delineates typical error patterns. Stylistically, the text builds on the compact knowledge articles on itmedialaw.com, but goes into greater depth at the operational level for SaaS, agency, games and AI setups.

Content Hide
1. Starting point and area of application
2. Subprocessors: permission, chain, control
3. Audit rights without downtime: evidence, remote verification, recognition logic
4. Set up TOMs correctly: Art. 32 level, but operational
5. Data portability, exit strategy and proof of deletion
6. Practical examples from SaaS, AI and games
7. Typical mistakes – and how to avoid them
8. Mini pattern logic in words – without form aesthetics
9. Interlocking with the main contract
10. Operational implementation: Governance beats form
11. 12. short answer for the search intention “AV contract / order processing contract sample”
12. Conclusion
12.1. Author: Marian Härtel

Starting point and area of application

Order processing means the processing of personal data “on behalf of” a controller. The decisive factor is not the label “service provider”, but rather the fact that the processor is bound by instructions and purpose limitation: The processor does not act for its own purposes, but exclusively within the documented instructions of the controller. Typical constellations are hosting, e-mail dispatch, analytics, payroll accounting, ticket systems, content moderation or data enrichment. The distinction between joint controllership (Art. 26 GDPR) and independent controllership is mandatory: those who co-determine purposes are no longer “mere processors”. The legal clarity protects against role conflicts and prevents data subjects’ rights, information obligations, erasure periods or security levels from being misplaced. A look at the compact itmedialaw introductions shows the practical relevance of the topic in the contract and cloud context.

A DPA must specify the subject matter and duration of the processing. This means not only the heading “Hosting”, but also a meaningful description of the processing operations covered by the contract (storage, retrieval, transmission, deletion, backup, testing, training). The duration follows the lifetime of the main contract, but is differentiated for backups, log retention and follow-up processes. Without this differentiation, deletion and release remain purely theoretical.

The type and purpose of the processing are required. For example, anyone operating a CRM processes master, contact and interaction data for customer management; a DSP/AdTech partner processes pseudonymous IDs for campaign management; an annotation service processes image, text or audio segments for AI training. The purpose is strict; a “purpose update” for internal analytics of the processor is not permitted without a separate legal basis.

The type of personal data and categories of data subjects must be specified. The categories are not described generically, but on a project-specific basis (e.g. customers, leads, employees, creators, player accounts; data types such as identification, communication, contract, usage, support, payment or health data). The more sensitive the data (Art. 9), the more precise the TOM depth, the tighter the sub-processor control.

The GCU enshrines the rights and obligations of the controller, in particular the right to issue instructions. Instructions are documented in writing or in a system; the processor checks obviously unlawful instructions and reports any concerns. The instruction regime includes emergency instructions if security incidents require immediate action.

The core of the processor obligations are confidentiality, TOMs and security level. Every person with access to data is obliged to maintain confidentiality; the TOMs are based on Art. 32 GDPR and are kept as a dynamic annex. This includes taking into account the state of the art, implementation costs, type, scope, circumstances and purposes. The DPA not only refers to “ISO certificates”, but also describes access controls, encryption, key management, network segmentation, hardening, logging/monitoring, backup/restore, vulnerability management, MFA obligations, role and rights concepts, pseudonymization/minimization, test and staging isolation and regular effectiveness checks.

The processor supports the controller with data subject rights (access, rectification, erasure, restriction, data portability, objection), security incidents (Art. 33/34), DPIA (Art. 35) and communication with supervisory authorities – in each case with clear response times and process descriptions. Without SLA cycles, deadlines become a mere hope.

Once the order has been completed, the personal data, including archive, backup and log files, is deleted or returned, provided there are no legal retention requirements to the contrary. The DPA regulates export formats and checking mechanisms, such as random deletion verifications or hash-based comparison procedures, in order to avoid “deletion fictions”.

Finally, verification and audit obligations must be anchored. The processor provides all information required to provide evidence of compliance and enables audits – by the person responsible or independent auditors – with appropriate safeguards. The GCU balances confidentiality, frequency and costs and allows remote audits, combined audit weeks, report recognition (e.g. ISO/SOC) and follow-up audits after major incidents.

Important for the design: Electronic form is sufficient (Art. 28 para. 9 GDPR). The DPA is therefore signature- or portal-capable; active change logs and version statuses ensure evidence in the audit. (

Subprocessors: permission, chain, control

No modern setup works without sub-processors. Nevertheless, Art. 28 para. 2/4 GDPR requires prior authorization and the transfer of all obligations to the sub-processors. Two models are common: specific individual authorization or general authorization with sub-processor register and right of objection. General approval with clear notice periods for changes and new additions, differentiated according to “critical” (storage, core compute, identity) and “non-critical” (e.g. e-mail delivery), is standard practice. A register lists the company, function, country, data categories and the relevant TOM anchors. Flow-down means: the same data protection obligations apply in the chain, including audit cooperation and incident reporting channels. Additional guarantees are agreed for third countries (standard contractual clauses, transfer impact assessment if applicable). A lean but resilient process prevents “shadow sub-processors” and addresses change scenarios without blocking operations.

Audit rights without downtime: evidence, remote verification, recognition logic

Audits are not a license to interrupt operations. The GCU defines how audits are carried out: preferably remote audits, inspection of policies, TOM systems, risk and action registers, random sampling of tickets/incidents, inspection of pen test summaries and certification reports. On-site audits are reserved for safety-critical cases and announced slots. A recognition mechanism clarifies which external evidence partially fulfills the audit obligation (e.g. ISO 27001, SOC 2 Type II) without undermining the statutory inspection rights. Deadlines, audit day quotas and confidentiality locks (clean rooms, view-only access) prevent data leaks and minimize trade secret risks.

Set up TOMs correctly: Art. 32 level, but operational

TOM annexes often turn into lists of keywords. The TOM annex becomes effective when technical and organizational measures are categorized, measurable and verifiable. These include identity and rights management (RBAC/ABAC, least privilege, JIT admin), MFA for internal and external access, key management (KMS/HSM, rotation, separation of duties), encryption at rest and in transit, network segmentation and zero trust principles, security logging with tamper-proof storage, backup/restore including regular recovery tests, vulnerability and patch processes, secure SDLC (code reviews, SAST/DAST, secrets scanning, build integrity), data lifecycle management (minimization, pseudonymization, retention), supply chain controls (SBOM, dependency monitoring), home office/BYOD rules and awareness programs. The effectiveness test is carried out cyclically and after major changes; results flow into the risk register. The supervisory authorities remind us that TOMs do not necessarily have to be fully spelled out in the GCU itself, but must be verifiably evaluated and documented; operationally, versioning in an annex with a change log makes sense.

Data portability, exit strategy and proof of deletion

The cleanest AVV loses value if the exit remains unclear. A portability clause therefore defines export paths: formats (CSV, JSON, Parquet), schemas, API accesses, timelines, revision loops and cost logic. For complex client data (e.g. in SaaS systems), a “read-only phase” is agreed after the end of the contract, during which access is still possible but no new processing takes place. Deletion does not only mean removal from production systems; the AVV includes backups, snapshots, cold storage, crash dumps and log data. Random deletion tests or hash comparisons ensure that proof is provided without exposing company secrets. In chain relationships, the processor obliges sub-processors to perform synchronous erasure and documents their evidence in the register.

Practical examples from SaaS, AI and games

SaaS operation of a CRM: Controller uses a hosted CRM. The DPA describes processing operations (collection, storage, segmentation, sending, deletion), data types (master data, communication data, usage data), data subject groups (leads, customers), TOM level (including encryption, RBAC, MFA), sub-processors (IaaS provider, email relay), audit mechanism (remote, SOC reports, annual slot check), exit (full export, data deletion, log retention). The controller receives copies of data subjects via the SaaS export; the processor provides support if system fields cannot be read out 1:1. In this way, the data protection foundation often outlined in the itmedialaw knowledge database is translated into product practice.

AI annotation and fine-tuning: A labeling service processes image and text data. The GCU specifies strict purpose limitation, confidentiality, isolated VDI environments, watermarks for synthetic data, handling of hallucinated content and a specific process for data subject rights support for training datasets. SCCs are implemented for third country references; subprocessor changes are displayed 30 days in advance. DSFA support receives its own reaction windows. Measurable TOM criteria (no BYOD storage, copy/paste blocker, clipboard protection) move up into the audit scope.

Games live ops with an external cloud: telemetry data flows into an analytics pipeline. The IaaS provider is a sub-processor, as are an event processing service and an A/B testing tool. The AVV requires data minimization (only necessary events), separate pseudonyms, deletion propagation towards subprocessors and clear A/B data retention. Since live ops is fast, the GCU regulates an express instruction window for hotfix changes to event schemas so that the purpose limitation is not “overtaken”.

Typical mistakes – and how to avoid them

Undefined scope: “Processor may process data to fulfill the contract” describes neither processes nor purposes. This results in extensions through the back door. Remedy: a meaningful scope including a catalog of processes and a sample matrix that sets out the framework without legalizing rigid technology.

Empty TOM keywords: “Encryption, logging, backup” without procedures and audit trails are not sufficient. A TOM annex specifies procedures (e.g. TLS versions, KMS operation, rotation cycles), controls (role assignment, recertification) and checks (recovery tests, pen test frequency).

Shadow sub-processors: Agencies incorporate “little helpers”, without register update. Solution: general approval with register, threshold values for “critical”, notification window, objection option and exit variants for mandatory changes.

Unrealistic audit rights: “Anytime, unannounced, full system access” is not practical in scaling multi-tenant environments. A smart AVV couples remote audits, report recognition and slot audits with escalation levels for incidents.

Exit without portability: “Deletion after end” without export formats leads to lock-in. A portability section defines formats, deadlines, interfaces and cost logic so that data can actually be transferred.

Art. 26/28 confusion: Joint controller models are incorrectly labeled as GCU. Result: Incorrect information obligations, unclear responsibility for data subject rights, liability shifts. Differentiation is based on purpose: those who co-determine purposes are at the wheel, not in the passenger seat.

“Data protection later” in agile roll-outs: feature teams go live, AVV follows. That is risky. Contracts and TOM processes are early enable requirements – not subordinate formalities.

Copied patterns without data reality: Copy & paste of external clauses ignores real data flows, subprocessor chains and deletion logic. This takes its toll in an audit or after an incident. Practical guidelines therefore remind you to anchor the mandatory content in concrete terms.

Mini pattern logic in words – without form aesthetics

A scope section specifies processing operations, purposes, data types, data subject categories and the operational systems. It contains a dynamic appendix “Processing activities” with versioning. An instruction section describes channels (ticket, portal, email signature), priorities, response windows and the obligation to object to manifestly unlawful instructions. The TOM section refers to an updatable TOM appendix with technical and organizational measures, test and review cycles; changes are documented and announced without having to renegotiate each time. The subprocessor section selects the general approval, provides a register, regulates announcement deadlines, objection and flow-down including audit cooperation. The audit section allows remote audits, recognizes ISO/SOC reports, maintains client and confidentiality protection and makes on-site an exception with lead time. The support section for data subject rights, DPIA and incidents contains SLA windows (e.g. 48 h for initial response to data protection incidents; 5 working days for data subject rights-related work). The data transfer section clearly classifies third country transfers and SCC and links transfer impact assessments to subprocessor changes. Portability and exit define export formats, test steps, deletion propagation and evidence. Liability/contractual penalties remain moderate and close to causality; they are not a substitute for good TOMs, but flank due diligence obligations.

Interlocking with the main contract

The DPA does not exist in isolation, but refers to the main contract. Service descriptions and SLAs must reflect the data protection obligations: If 24/7 support is agreed, incident processes need 24/7 availability; if nearshore/offshore teams are working, the subprocessor register and transfer protection must reflect this setup. Price blocks take data protection costs (e.g. export costs or additional audit days) into account transparently instead of “hiding” them. Change processes provide for a data protection check (privacy by design/default) so that new features do not fail due to Art. 28. The result is a consistent approach that can be recognized on itmedialaw.com in the cloud and contract environment: data protection is seen as an integral part of the product performance, not as a disruptive add-on.

Operational implementation: Governance beats form

A signed DPA is just the beginning. Those responsible check whether sufficient guarantees are in place before starting to use a service provider – not just in the event of an incident. This includes assessing the TOMs, inspecting certificates/reports, risk scoring and documentation in the vendor register. This status is updated on a regular basis during the term, and on an ad hoc basis in the event of major changes and incidents. The processor carries out awareness programs, renews confidentiality bindings, controls access rights and maintains the subprocessor list. The common focus is on verification: anyone who can show in three clicks which TOM version applied, when a subprocessor was added and when the last restore test was successful will pass every test – contractually and de facto. This governance line arises from the basic obligations of Art. 28 (1) and (3) GDPR and the verification logic set out therein.

12. short answer for the search intention “AV contract / order processing contract sample”

What belongs in a DPA? A clear processing scope with duration, purposes, data types and data subjects; a documented instruction regime; robust TOMs in accordance with Art. 32; transparent sub-processor chains with approval, notice periods and flow-down; audit and verification mechanisms; SLA-capable support for data subject rights, DPIA and incidents; exit and portability rules; deletion with verification; third country protection; and consistent integration with the main contract. If you anchor these elements at the level of procedures, deadlines and evidence, you not only have “a DPA”, but also a verifiable data protection architecture. Practical checklists show the same core – the decisive factor is the translation into your own tech stack. (

Conclusion

A good DP agreement is precise, auditable and operationally feasible. Mandatory content from Art. 28 GDPR forms the foundation; subprocessor control, audit mechanics, TOM versioning and portability make the contract suitable for everyday use. Samples help – the decisive factor remains the adaptation to real data flows, systems and responsibilities. For cloud, SaaS, games and AI projects, the GCU is both product and process law. Understanding it in this way reduces risks, speeds up audits and creates trust among customers, partners and regulators.

Recommendation: Check the specific data reality before concluding a contract and in the event of major changes – and seek advice.

Marian Härtel
Author: Marian Härtel

Marian Härtel ist Rechtsanwalt und Fachanwalt für IT-Recht mit einer über 25-jährigen Erfahrung als Unternehmer und Berater in den Bereichen Games, E-Sport, Blockchain, SaaS und Künstliche Intelligenz. Seine Beratungsschwerpunkte umfassen neben dem IT-Recht insbesondere das Urheberrecht, Medienrecht sowie Wettbewerbsrecht. Er betreut schwerpunktmäßig Start-ups, Agenturen und Influencer, die er in strategischen Fragen, komplexen Vertragsangelegenheiten sowie bei Investitionsprojekten begleitet. Dabei zeichnet sich seine Beratung durch einen interdisziplinären Ansatz aus, der juristische Expertise und langjährige unternehmerische Erfahrung miteinander verbindet. Ziel seiner Tätigkeit ist stets, Mandanten praxisorientierte Lösungen anzubieten und rechtlich fundierte Unterstützung bei der Umsetzung innovativer Geschäftsmodelle zu gewährleisten.

Weitere spannende Blogposts

GDPR: nearly 10 million fines for unsecured hotline * Update*

GDPR: nearly 10 million fines for unsecured hotline * Update*
9. December 2019

More and more fines are slowly being imposed and the data protection officers are getting more and more serious. Now...

Read moreDetails

Reminder: The GbR’s registrability is coming!

Reminder: The GbR’s registrability is coming!
30. November 2023

In July of this year, I already referred to the important changes in company law that specifically affect civil law...

Read moreDetails

Price adjustment clauses in general terms and conditions: A critical look at the example of the Netflix ruling

Price adjustment clauses in general terms and conditions: A critical look at the example of the Netflix ruling
24. November 2023

Introduction: In a recent ruling, the Court of Appeal in Berlin declared the price adjustment clause in Netflix's General Terms...

Read moreDetails

BGH on right of withdrawal and mattresses

No more free tissues at the pharmacy?
3. July 2019

The VIII Civil Senate of the Federal Court of Justice has ruled that a contract of sale concluded by a...

Read moreDetails

No withholding tax for online advertising

Risk Social Security / Tax audit for streamers, esports enthusiasts, etc.
7. November 2022

Not long ago, the topic of withholding tax on online advertising, such as Google Ads, was on everyone's lips. Also...

Read moreDetails

Game promotion: take advantage of opportunities with professional advice!

Game promotion: take advantage of opportunities with professional advice!
27. November 2019

The situation The entire industry of computer game developers in Germany is certainly pleased that the Federal Government has decided...

Read moreDetails

Model contract for esport teams

Model contract for esport teams
7. November 2022

For a while, I had offered sample contracts for esports teams here on the blog. However, due to the change...

Read moreDetails

AI training and copyright: US court backs fair use – what does this mean for AI and what applies in Germany?

AI training and copyright: US court backs fair use – what does this mean for AI and what applies in Germany?
26. June 2025

A US federal court has ruled for the first time that training AI models with copyrighted books is permissible as...

Read moreDetails

Twitter account and responsibility

Twitter account and responsibility
7. November 2022

The Berlin Regional Court today ruled in the case of AfD politician Jens Maier and Boris Becker's son, Noah Becker....

Read moreDetails
ChatGPT and lawyers: recordings of the Weblaw launch event
Law on the Internet

Private AI use in the company

24. October 2025

Private accounts on ChatGPT & Co. for corporate purposes are a gateway to data protection breaches, leaks of secrets and...

Read moreDetails
Lego brick still protected as a design patent

App purchases, in-app purchases and sales tax

21. October 2025
dsgvo 1

What belongs in a DPA? Data processing agreement in accordance with Art. 28 GDPR

17. October 2025
Smart contracts in the insurance industry: contract design and regulatory compliance for InsurTech start-ups

Contract for work vs. service contract in software, AI and games projects

15. October 2025

Influencer contract: performance profile, rights/buyouts, labeling and AI content

13. October 2025

Podcastfolge

d5e1e6cad87cb839a9e23af79034bd94

AI in the legal system: Towards a digital future of justice

16. October 2024

In this fascinating podcast episode, we take a deep dive into the world of artificial intelligence (AI) and its impact...

Read moreDetails
7c0b449a651fe0b81e5eec2e23515012 2

Copyright in the digital age

15. January 2025
da884f9e2769f2f96d6b74255be62c27

The role of the IT lawyer

5. September 2024
3c671c5134443338a4e0c30412ac3270

“Digital law decoded” with lawyer Marian Härtel

26. September 2024
238a909c26a0302cbd4792cbd18e4922

Global challenges for start-ups – A legal guide

10. October 2024

Video

My transparent billing

My transparent billing

10. February 2025

In this video, I talk a bit about transparent billing and how I communicate what it costs to work with...

Read moreDetails
Fascination between law and technology

Fascination between law and technology

10. February 2025
My two biggest challenges are?

My two biggest challenges are?

10. February 2025
What really makes me happy

What really makes me happy

10. February 2025
What I love about my job!

What I love about my job!

10. February 2025
  • Privacy policy
  • Imprint
  • Contact
  • About lawyer Marian Härtel
Marian Härtel, Rathenaustr. 58a, 14612 Falkensee, info@itmedialaw.com

Marian Härtel - Rechtsanwalt für IT-Recht, Medienrecht und Startups, mit einem Fokus auf innovative Geschäftsmodelle, Games, KI und Finanzierungsberatung.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
  • Informationen
    • Ideal partner
    • About lawyer Marian Härtel
    • Quick and flexible access
    • Principles as a lawyer
    • Why a lawyer and business consultant?
    • Focus areas of attorney Marian Härtel
      • Focus on start-ups
      • Investment advice
      • Corporate law
      • Cryptocurrencies, Blockchain and Games
      • AI and SaaS
      • Streamers and influencers
      • Games and esports law
      • IT/IP Law
      • Law firm for GMBH,UG, GbR
      • Law firm for IT/IP and media law
    • The everyday life of an IT lawyer
    • How can I help clients?
    • Testimonials
    • Team: Saskia Härtel – WHO AM I?
    • Agile and lean law firm
    • Price overview
    • Various information
      • Terms
      • Privacy policy
      • Imprint
  • Services
    • Support and advice of agencies
    • Contract review and preparation
    • Games law consulting
    • Consulting for influencers and streamers
    • Advice in e-commerce
    • DLT and Blockchain consulting
    • Legal advice in corporate law: from incorporation to structuring
    • Legal compliance and expert opinions
    • Outsourcing – for companies or law firms
    • Booking as speaker
  • News
    • Gloss / Opinion
    • Law on the Internet
    • Online retail
    • Law and computer games
    • Law and Esport
    • Blockchain and web law
    • Data protection Law
    • Copyright
    • Labour law
    • Competition law
    • Corporate
    • EU law
    • Law on the protection of minors
    • Tax
    • Other
    • Internally
  • Podcast
    • ITMediaLaw Podcast
  • Knowledge base
    • Laws
    • Legal terms
    • Contract types
    • Clause types
    • Forms of financing
    • Legal means
    • Authorities
    • Company forms
    • Tax
    • Concepts
  • Videos
    • Information videos – about Marian Härtel
    • Videos – about me (Couch)
    • Blogpost – individual videos
    • Videos on services
    • Shorts
    • Podcast format
    • Third-party videos
    • Other videos
  • Contact
  • en English
  • de Deutsch
Kostenlose Kurzberatung