Skip to main content

DPIA Pre-Screen

Last updated: 2026-04-20.

Documents whether a full Data Protection Impact Assessment (Datenschutz-Folgenabschätzung) is required. The pre-screen applies the threshold in Art. 35(3) GDPR, the BayLfD "Muss-Liste" for Bavarian public bodies, and the DSK white-list.

1. Threshold check against Art. 35(3) GDPR

TriggerPresent?Reason
Systematic and extensive evaluation, including profiling, that forms the basis for decisions producing legal effects or similarly significant effects (Art. 35(3)(a))NoHephaestus produces advisory Findings and Guidance delivered to the Contributor and visible to other workspace members (peers, workspace administrators, team leads, teaching staff) on dashboards and per-Artifact views. They are not consumed by any automated grading, assessment, HR, or access-control pipeline operated by Hephaestus; the platform does not grade, admit, dismiss, or withhold access from Contributors. The processing is not "systematic and extensive" in the EDPB WP248 sense — coverage is workspace-scoped, practice-scoped, and defined by the workspace administrator, not exhaustively profiling individuals across a large population. §3 and §4.4 of the privacy statement and §16 of the VVT are the authoritative record.
Large-scale processing of Art. 9 (special categories) or Art. 10 (criminal convictions) dataNoNo special-category data is processed. Contributors are warned in the privacy statement not to enter third-party personal data into commits, reviews, or practice-review diffs.
Systematic monitoring of a publicly accessible area on a large scaleNoHephaestus does not monitor publicly accessible areas.

None of the three Art. 35(3) triggers is present, so the GDPR's hard "mandatory DPIA" threshold is not met. The residual elevated risk on the AI surface is handled through §5 below ("DPIA-light").

2. Check against the BayLfD "Muss-Liste"

CriterionPresent?Reasoning
Vulnerable data subjects on a large scaleNoUsers are primarily TUM members and invited external open-source contributors. No BayLfD-vulnerable group is processed systematically.
Employee performance / behaviour monitoringNoHephaestus does not observe employment performance. Staff who use the platform as mentors or administrators do so on the same footing as any other Contributor. Leaderboards and league signals are student-facing engagement features, opt-in per workspace, and not used for HR purposes.
Innovative technology with unclear DP impactPartly (AI-assisted features)AI-assisted guidance and automated practice review call an external LLM provider (OpenAI or Azure OpenAI) per workspace. This is a commonly understood class of processing under enterprise API terms with no-training clauses and DPF / SCC safeguards, but falls on the "elevated risk" side of the BayLfD innovative-technology criterion and warrants documented mitigations (see §5 below).
Dataset-matching from different sourcesNoHephaestus does not cross-match Contributor data with external profiles beyond the federated identity attributes that the IdP itself discloses.
Third-country transfer outside adequacy decisionNoAll U.S. recipients (GitHub, OpenAI, Azure OpenAI, Slack) are DPF-certified; Standard Contractual Clauses Module 2 under Art. 46(2)(c) GDPR are contracted as a fall-back.
Scoring / profiling affecting service accessNoFindings are advisory and do not gate access, features, or grades within Hephaestus.
Biometric / genetic dataNo
Surveillance of publicly accessible areasNo

3. Check against the DSK white-list

Activity fits the profile of a "standard university teaching-support platform with authenticated federated login and an external LLM integration". The DSK does not require a DPIA for this profile per se, provided the AI surface is bounded by enterprise no-training terms, the shared-responsibility model is documented, and the data-subject rights — including the Art. 21 objection against AI-assisted processing — are surfaced in the privacy statement. All three conditions are satisfied (privacy §3.2, §4.4, §9).

4. Residual risk analysis

RiskLikelihoodImpactMitigation
Free-text Artifact content (PR descriptions, commit messages, review comments) contains personal data of identifiable third parties and is transmitted to the LLM providerLow-mediumLow-mediumPrivacy notice warns Contributors not to enter third-party personal data; practice-review sandbox runs on an internal Docker network with no outbound connectivity except a per-job LLM proxy; only the diff and relevant context — not the full user profile — is transmitted; Contributors have an Art. 21 objection switch in their profile settings ("AI review comments").
LLM provider retains the prompt beyond the enterprise default retention windowLowLow-mediumEnterprise API terms with no-training clauses; default 30-day abuse-monitoring retention; Zero Data Retention can be negotiated per workspace; DPF + SCCs Module 2 in place.
Server access logs retain IP addressesLowLowThe application server writes a minimal web access log (IP, timestamp, method, path, protocol, status, response size, processing time) and deletes it automatically after 14 days. Logs are not merged with other sources; only AET operators have access.
gitlab.lrz.de content leaks via the LRZ integrationLowLowLRZ is a separate controller under Art. 16 Abs. 1 Satz 2 BayHIG public-body cooperation — this is not an Art. 28 processor chain; LRZ applies its own TOMs on its own infrastructure; LRZ privacy notice and GitLab terms of use are linked from the Hephaestus privacy statement.
Workspace administrator routes personal data through an unexpected channel (Slack digest containing leaderboard snippets, for example)LowLowShared-responsibility model is documented in §3.2 of the privacy statement; workspace administrators are named as joint controllers for the six decisions in §3.2 with Art. 26(2) duty allocation; Contributors can see the workspace-level configuration and raise Art. 21 objections.
Keycloak compromise exposes federated identity tokensLowMediumSelf-hosted Keycloak on AET infrastructure; confidential client; TLS-only ingress; regular patching; incident-response under TUM DPO oversight.

5. Required additional measures for the "DPIA-light" posture

In lieu of a full DPIA, the following mitigations are documented and must remain in place. Any material change triggers an amended VVT and a re-assessment under this file:

  • No-training enterprise API terms for every configured LLM provider. Regressing to a consumer tier is a material change and triggers an amended VVT + full DPIA.
  • Per-job LLM proxy enforced by the practice-review sandbox. DNS disabled inside the sandbox; outbound traffic limited to a per-job, token-authenticated proxy. Any widening of this network posture is a material change.
  • Art. 21 objection switch in Contributor profile settings ("AI review comments"). Disabling or hiding the switch is a material change.
  • Workspace-administrator joint-controllership notice in the privacy statement (§3.2). Structural changes to the shared-responsibility split trigger an amended VVT.
  • Bounded server-log retention via the application server's native access-log retention (server.tomcat.accesslog.max-days=14) and a data-minimised access-log pattern. Extending the retention window, widening the logged fields, or retaining access logs elsewhere beyond that window is a material change.
  • Error telemetry and product analytics remain disabled. The webapp image ships a Sentry integration and a PostHog integration, both disabled in the current production deployment (SENTRY_DSN empty, POSTHOG_ENABLED=false). Activating either (self-hosted Sentry, SaaS Sentry, or PostHog) is a material change and requires amending the VVT, the AVV checklist (05-avv-checklist.md), the privacy statement, and this pre-screen before go-live.

6. Conclusion

No full DPIA required at the current scope. Hephaestus operates within the DSK white-list profile with documented mitigations for the elevated-risk AI surface. Submit the VVT with the DPIA-light attachments (02-dsfa-prescreen.md, 04-toms.md, 05-avv-checklist.md) without a full DPIA template.

A full DPIA must be opened before any of the following takes effect:

  • LLM provider is added, changed to a consumer tier, or loses its no-training commitment.
  • Practice-review sandbox gains outbound connectivity beyond the per-job LLM proxy.
  • Findings begin to drive any automated decision within Hephaestus (grading, recognition caps, feature access).
  • The built-in Sentry integration is activated against a SaaS tenant (converts a currently unused integration into an Art. 28 U.S. processor), or the built-in PostHog integration is activated (product analytics on Art. 6(1)(a) consent).
  • The processing population broadens beyond TUM members and invited external contributors into a category covered by the BayLfD "vulnerable data subjects" criterion.

If the DSB requests a full DPIA, upgrade to the BayLfD DPIA template and expand the residual-risk section with concrete technical evidence (pen-test report, dependency-scan summary, LLM-provider DPA copies).