Una Claude Skill que revisa un Data Processing Addendum (DPA) — el contrato del Art. 28 del GDPR / CCPA-CPRA / UK GDPR que regula cómo un proveedor procesa datos personales por cuenta del responsable — frente al checklist de DPA de la firma (ver el checklist de DPA) y a una lista curada de banderas rojas (mecanismo de transferencia internacional, postura de consentimiento de subprocesadores, alcance de los derechos de auditoría, ventana de notificación de brechas, obligaciones de eliminación / devolución al término del contrato). Devuelve una revisión estructurada con citas por sección, la obligación que implementa o no implementa, y el redline recomendado. Reemplaza la primera lectura de DPA del privacy counsel, de 60 a 90 minutos, por una revisión de 15 minutos sobre un reporte estructurado — dejando el tiempo del counsel para los casos donde el criterio importa.
Cuándo usarlo
Procurement de proveedores te está enviando DPAs para revisar cada semana, y el privacy counsel es el cuello de botella.
La firma tiene un checklist de DPA por escrito (ver la entrada learn de checklist de DPA) contra el cual la skill puede auditar. Sin el checklist, la skill solo puntúa contra expectativas genéricas del Art. 28 del GDPR.
Manejas datos personales de la UE o del Reino Unido (gatillos de GDPR o UK GDPR); o información personal de California en el umbral de CCPA-CPRA (USD 25M de ingresos, 100K consumidores de California, o 50%+ de ingresos provenientes de información personal de CA).
El privacy counsel revisa el reporte y aprueba los redlines antes de que vayan al proveedor.
Cuándo NO usarlo
Reemplazar el criterio del privacy counsel en temas novedosos. La skill detecta las fallas de patrón estándar (sin SCCs, sin ventana de brecha, consentimiento vago de subprocesadores). Los temas novedosos — un proveedor estrenando un nuevo mecanismo de transferencia, una arquitectura de flujo de datos única — necesitan la lectura del counsel.
Auto-firmar DPAs basándose en el veredicto “passes” de la skill. La skill recomienda; el counsel aprueba.
DPAs en jurisdicciones que la firma no ha mapeado. APAC (PDPA de Singapur, APPI de Japón), LGPD de Brasil, PIPEDA de Canadá, etc. tienen cada una sus propios requisitos. Los defaults de la skill son GDPR de la UE + CCPA-CPRA. Agrega jurisdicciones al checklist antes de revisar.
Escrutar un DPA final ya negociado por completo. Usa la skill en la revisión del primer borrador, donde el volumen es más alto. La revisión del borrador final se beneficia menos de la automatización y más de la atención del counsel.
Setup
Suelta el bundle. Coloca apps/web/public/artifacts/dpa-review-claude-skill/SKILL.md en tu directorio de skills de Claude Code.
Redacta o importa el checklist de DPA de la firma. El bundle incluye un checklist inicial en references/1-dpa-checklist.md ligado al Art. 28 del GDPR + CCPA-CPRA estándar. Personalízalo según la postura de riesgo de la firma (p. ej. ventana de brecha más estricta, consentimiento de subprocesadores más acotado).
Configura el perfil por proveedor. Distintos proveedores tienen comportamiento base distinto (el DPA de un hyperscaler es distinto del DPA de una startup Series A). El references/2-vendor-profile-template.md del bundle captura notas específicas del proveedor que la skill pondera dentro de la revisión.
Haz un dry-run con tres DPAs cerrados. Revisa tres DPAs que el privacy counsel aprobó el trimestre pasado. Compara las banderas rojas de la skill contra los redlines reales del counsel. Ajusta los pesos del checklist.
Qué hace la skill
Cinco pasos. Identificación de secciones antes de la detección de banderas rojas, porque las banderas rojas son tipadas por sección (una cláusula faltante de ventana de brecha solo es bandera roja en la sección de notificación de un DPA).
Seccionar el DPA. Identifica las secciones estándar: Definiciones, Objeto y Duración, Obligaciones del Procesador, Subprocesadores, Transferencias Internacionales, Derechos de Auditoría, Notificación de Brechas, Eliminación / Devolución al Término, Responsabilidad. Detente si el documento no parece un DPA (p. ej. es un master services agreement con disposiciones de privacidad enterradas en el §17 — marca y pide al usuario que extraiga las disposiciones equivalentes a un DPA).
Correr el checklist por sección. Para cada obligación en el checklist de la firma, encuentra el lenguaje de soporte en el DPA. Output: presente + citado / presente-pero-vago / ausente. El lenguaje vago es un hallazgo, no un pase.
Correr el detector de banderas rojas. Más allá del checklist, escanea por anti-patrones conocidos: processor may transfer data internationally without notice, consentimiento de subprocesadores renunciado de forma amplia, derechos de auditoría limitados a “summary findings only”, notificación de brechas “within a reasonable time”, eliminación al término atada al “ordinary deletion cycle” del proveedor.
Cita por hallazgo. Cada hallazgo cita el número de sección del DPA y el texto específico de la cláusula. Sin número de sección → sin hallazgo.
Redlines recomendados por hallazgo. Para cada obligación ausente o vaga, sugiere lenguaje de reemplazo específico. El redline está anclado en el checklist de la firma o en redlines previos aprobados por el counsel.
Realidad de costos
Por revisión de DPA (documento típico de 8 a 25 páginas), en Claude Sonnet 4.6:
Tokens del LLM — típicamente 15-40k de input (DPA + checklist + instrucciones de la skill) y 3-6k de output. Aproximadamente USD 0.15-0.40 por DPA.
Tiempo del privacy counsel — el verdadero gane. La primera lectura del DPA por el counsel es de 60 a 90 minutos. Revisar el reporte estructurado y aprobar redlines es de 15 a 25 minutos.
Tiempo de setup — 30 minutos para personalizar el checklist. Los perfiles de proveedor agregan 5 a 10 minutos por proveedor mayor.
Métrica de éxito
Tasa de edición del counsel sobre los redlines recomendados por la skill — la proporción de redlines que el counsel modifica antes de enviar. Debería ubicarse en 15-30%. Por debajo del 5% significa que el counsel está firmando sin mirar; por encima del 50% significa que el grounding del redline está mal.
Throughput de DPAs por semana — número de DPAs revisados y devueltos a procurement semanalmente. Debería subir respecto del baseline en 2-3× sin regresión de calidad.
Misses marcados por el counsel — proporción de DPAs donde el counsel marca temas que la skill no detectó. Debe rastrearse mensualmente; un patrón de misses es la señal para actualizar el checklist o la lista de banderas rojas.
vs alternativas
vs los módulos de DPA de Spellbook / Harvey / ContractPodAi. Esos productos manejan la revisión de DPA dentro de su propio producto con sus propios checklists. Elígelos si tu equipo vive en la plataforma. Elige la skill si quieres el checklist versionado en tu repo, el modelo intercambiable, y el log de auditoría portable.
vs primera revisión por un paralegal. La revisión de paralegal está bien donde el equipo tiene la headcount. La skill complementa a los paralegales — captura los misses de estilo determinístico; los paralegales capturan los contextuales.
vs el counsel revisa todo de extremo a extremo. El default en firmas más pequeñas. Cuello de botella predecible.
vs no revisar DPAs de bajo riesgo. A veces es la decisión correcta (el DPA de la marketing-tool puede no merecer tiempo del counsel). La skill es el punto medio liviano.
Watch-outs
Alucinación de citas.Guard: cada hallazgo cita el número de sección del DPA y el texto específico de la cláusula. Los hallazgos sin sección citable se marcan como “no está en el documento — counsel a verificar” en lugar de afirmarse.
Drift por jurisdicción.Guard: el checklist nombra las jurisdicciones que cubre. DPAs que cubren jurisdicciones no cubiertas (p. ej. LGPD brasileña) disparan un warning de “el checklist no cubre esta jurisdicción” en lugar de un miss silencioso.
Sobre-redline en relaciones de proveedor.Guard: los redlines son recomendaciones. El privacy counsel aplica criterio sobre cuáles redlines valen el costo de negociación. La skill no envía automáticamente.
Confidencialidad de los DPAs de proveedores.Guard: la skill procesa localmente, donde corre la sesión de Claude que la invoca. Usa acceso por API con configuración de retención cero para cualquier DPA que cargue datos reales del proveedor.
Drift de versión de las Standard Contractual Clauses (SCC).Guard: el checklist captura las versiones de módulos de SCC que la firma acepta (actualmente módulos UE 2021/914). DPAs que citan versiones SCC más antiguas u omiten la identificación del módulo se marcan.
Stack
El bundle vive en apps/web/public/artifacts/dpa-review-claude-skill/:
SKILL.md — la definición de la skill
references/1-dpa-checklist.md — el checklist de DPA de la firma
references/2-vendor-profile-template.md — plantilla rellenable de perfil de proveedor
---
name: dpa-reviewer
description: Review a Data Processing Addendum (DPA) against the firm's DPA checklist (GDPR Art. 28 + CCPA-CPRA defaults). Returns a structured Markdown report with per-section citations, the obligation status (present-cited / present-vague / absent), and recommended redlines. Never auto-signs; the privacy counsel reviews and approves.
---
# DPA reviewer
## When to invoke
Use this skill when a privacy counsel or legal-ops lead has a vendor's DPA draft and wants a structured first-pass review against the firm's DPA checklist.
Do NOT invoke this skill for:
- **Auto-signing or approval based on the skill's verdict.** The skill recommends; the counsel approves.
- **DPAs in jurisdictions not in the checklist.** Add the jurisdiction to the checklist first.
- **Final-draft review.** The skill is calibrated for first-pass, where volume is highest.
- **Novel contract structures** (e.g. a master agreement with privacy embedded). Extract the DPA-equivalent provisions first; the skill expects DPA shape.
## Inputs
- Required: `dpa_path` — path to the DPA file (Markdown, plain text, or pre-extracted from PDF).
- Required: `checklist_path` — path to the firm's DPA checklist file.
- Optional: `vendor_profile_path` — vendor-specific notes that shape the review.
- Optional: `jurisdictions_in_scope` — array of jurisdictions, e.g. `["EU-GDPR", "UK-GDPR", "CCPA-CPRA"]`. Defaults to the checklist's stated coverage.
## Reference files
- `references/1-dpa-checklist.md` — the firm's checklist shape and starter content.
- `references/2-vendor-profile-template.md` — vendor-profile shape.
## Method
Five steps.
### 1. Section the DPA
Identify the standard sections by heading and content match:
- Definitions
- Subject matter, duration, nature, purpose
- Processor obligations
- Sub-processors
- International transfers
- Audit rights
- Breach notification
- Deletion / return on termination
- Liability and indemnification
If the document doesn't match a DPA shape (e.g. it's an MSA with privacy buried in §17), halt with a "not a standalone DPA — extract privacy provisions" message.
### 2. Run the checklist per section
For each obligation in the checklist, find the supporting DPA language in the corresponding section. Output per obligation:
- `status: present_cited` — language exists; cite section and quote.
- `status: present_vague` — language exists but doesn't carry the obligation's force ("commercially reasonable" instead of named timeframe; "industry standard" instead of named technical measure).
- `status: absent` — no language found.
### 3. Run the red-flag detector
Scan beyond the checklist for known anti-patterns:
- **International transfer without mechanism**: `processor may transfer data internationally` without naming the transfer mechanism (SCCs by module, BCRs, adequacy decision).
- **Broad sub-processor consent waiver**: `controller consents to use of any sub-processor` without notification or objection rights.
- **Audit rights limited to summaries**: `processor will provide summary of audits` instead of right to audit.
- **Vague breach notification**: `within a reasonable time` instead of named hours (GDPR is "without undue delay"; firm checklist usually pins to 24-72 hours).
- **Deletion-tied to vendor cycle**: `processor will delete data per its ordinary deletion cycle` instead of a named timeframe.
- **Liability cap below underlying agreement**: privacy claims excluded from the master cap, or capped at fees-paid-in-prior-12-months for breaches that could carry GDPR Art. 83 fines.
### 4. Citation per finding
Every finding must cite:
- DPA section number / heading
- The specific clause text (quoted)
- Length: ≤80 words per quoted clause to keep the report scannable.
Findings without a citable section are flagged as "not in document — counsel to verify" rather than asserted.
### 5. Recommended redlines per finding
For each absent or vague obligation, suggest replacement language. Source the redline from:
- The firm's checklist's stated obligation (preferred)
- The firm's prior approved redlines for similar issues (if a `prior_redlines/` corpus is available)
- GDPR Art. 28 / CCPA-CPRA standard language as fallback
Mark the redline source so counsel can weight ("from firm checklist" vs "from prior redline" vs "fallback to standard language").
## Output format
```markdown
# DPA review — {vendor name} — {date received}
Reviewed: {ISO timestamp} · Skill v1.0 · Checklist: {sha} · Jurisdictions: {list}
## Summary
- Sections present: {count}/9
- Obligations present (cited): {count}
- Obligations present (vague): {count}
- Obligations absent: {count}
- Red flags: {count}
Recommended action: {return-with-redlines | escalate-to-counsel | safe-to-counter-sign}
## Section-by-section findings
### Sub-processors (DPA §5)
- **Sub-processor consent (checklist §3.2):** present_vague. DPA quote: "Controller hereby consents to Processor's use of sub-processors as listed on Processor's website, which may be updated from time to time." Concern: blanket consent with no notification or objection right. Recommended redline:
> Controller's consent to sub-processors is limited to those listed in Annex C as of the Effective Date. Processor shall notify Controller of any new sub-processor at least 30 days before engagement, and Controller may object on reasonable grounds; if Controller objects, the parties shall negotiate in good faith, and if no resolution within 30 days, Controller may terminate the affected services.
### International transfers (DPA §6)
- **Transfer mechanism (checklist §4.1):** absent. DPA does not name SCCs, BCRs, or adequacy. Recommended redline:
> The parties agree that any transfer of Personal Data to a country outside the EEA / UK shall be governed by the Standard Contractual Clauses (Module 2: Controller-to-Processor) annexed hereto as Annex D, with the data importer being Processor and the data exporter being Controller.
(further sections...)
## Red flags
- **Vague breach window** (DPA §7.1): "within a reasonable time" — recommend pinning to 48 hours from confirmed discovery.
- **Liability cap on privacy claims** (DPA §9): privacy claims capped at fees-paid-in-prior-12-months. Recommend uncapped for GDPR Art. 83 fines and reasonable cap (12-24 months) for indemnification.
## Provenance
- DPA: `{path}`
- Checklist: `{path}` SHA `{short}`
- Vendor profile: `{path}` (if used)
- Generated: {ISO timestamp}
```
## Watch-outs
- **Citation hallucination.** *Guard:* findings without citable sections get "not in document" tag, not asserted.
- **Jurisdiction drift.** *Guard:* checklist names covered jurisdictions; uncovered jurisdictions trigger warning.
- **Confidentiality.** *Guard:* DPAs carry vendor-confidential terms. Use API access with zero-retention.
- **SCC version drift.** *Guard:* checklist captures accepted SCC modules; older or unidentified modules flagged.
- **Redline grounding.** *Guard:* every redline marks its source (firm checklist / prior redline / fallback) so counsel can weight.
# DPA checklist (firm template)
The DPA reviewer scores against this checklist. Copy this file to `firm-dpa-checklist.md`, customize for the firm's risk posture and the jurisdictions in scope, and version it in git.
The checklist is the comparison anchor. The reviewer's findings cite obligations by ID (`§1.1`, `§3.2`, etc.) — keep IDs stable across versions or document renumbering in a changelog.
## §0 — Scope
- **§0.1** Jurisdictions covered: EU GDPR (Reg. 2016/679), UK GDPR + DPA 2018, CCPA-CPRA. To extend coverage, add the jurisdiction's required obligations to the relevant section below.
- **§0.2** Scope: this checklist applies to vendor DPAs where the firm is the controller or business and the vendor is the processor or service provider.
- **§0.3** Out of scope for this checklist: joint-controller arrangements, controller-to-controller transfers, intra-group DPAs (handled separately).
## §1 — Definitions
- **§1.1** "Personal Data" defined to track GDPR Art. 4(1) AND CCPA-CPRA "Personal Information" — the broader of the two governs the DPA.
- **§1.2** "Processing" tracks GDPR Art. 4(2).
- **§1.3** "Sub-processor" defined to include any party engaged by Processor to process Personal Data on Controller's behalf.
- **§1.4** "Personal Data Breach" tracks GDPR Art. 4(12).
## §2 — Subject matter, duration, nature, purpose, types of data, categories of data subjects
- **§2.1** DPA names the subject matter and duration of processing.
- **§2.2** DPA names the nature and purpose of processing in specific terms (not just "providing the Services").
- **§2.3** DPA names the types of Personal Data and the categories of data subjects.
## §3 — Processor obligations
- **§3.1** Processor processes Personal Data only on documented instructions from Controller.
- **§3.2** Sub-processor consent: Processor obtains prior written consent for sub-processors. Default: per-sub-processor consent. Acceptable alternative: notification + 30-day objection right.
- **§3.3** Confidentiality: Processor ensures personnel processing data are bound by confidentiality.
- **§3.4** Technical and organizational measures (TOMs): Processor implements appropriate measures per GDPR Art. 32. The DPA names specific measures (encryption at rest and in transit, access controls, logging) — vague "industry-standard" language is a finding.
- **§3.5** Assistance with data-subject rights: Processor assists Controller with data-subject access, rectification, erasure, restriction, portability, and objection requests.
- **§3.6** Assistance with DPIAs: Processor assists Controller with Data Protection Impact Assessments where required.
## §4 — International transfers
- **§4.1** Transfer mechanism named: SCCs (specify modules — usually Module 2: Controller-to-Processor and/or Module 3: Processor-to-Processor for sub-processor transfers), BCRs, or adequacy decision.
- **§4.2** SCC version pinned: EU 2021/914 modules (current as of this checklist version). UK: International Data Transfer Agreement (IDTA) or UK Addendum to EU SCCs.
- **§4.3** Transfer impact assessment (TIA) obligation acknowledged where Schrems II / equivalent applies.
- **§4.4** Onward transfers from sub-processors covered by the same mechanism.
## §5 — Audit rights
- **§5.1** Controller has the right to audit Processor's compliance with the DPA, either directly or through an independent third-party auditor.
- **§5.2** Audit frequency: at least annually, and on material change in processing or breach.
- **§5.3** Audit scope: not limited to "summary findings" — Controller can review the actual evidence (sub-processor lists, log samples, TOM documentation).
- **§5.4** Reasonable notice: Controller provides reasonable advance notice (default: 30 days) for routine audits. Breach-related audits may proceed on shorter notice.
## §6 — Breach notification
- **§6.1** Processor notifies Controller of a Personal Data Breach without undue delay.
- **§6.2** Named timeframe: 48 hours from confirmed discovery (firm preference; GDPR Art. 33 sets the Controller's obligation at 72 hours, so Processor must notify earlier).
- **§6.3** Notification includes: nature of breach, categories and approximate number of data subjects, likely consequences, measures taken or proposed.
- **§6.4** No "reasonable time" or "as soon as practicable" — these are findings.
## §7 — Deletion / return on termination
- **§7.1** On termination, Processor returns or deletes all Personal Data (Controller's choice).
- **§7.2** Named timeframe: within 30 days of termination, or earlier if required by Controller.
- **§7.3** Processor certifies in writing that deletion has occurred (or that data has been returned).
- **§7.4** Retention beyond termination only as required by applicable law, with named legal basis.
## §8 — Liability
- **§8.1** Privacy claims (GDPR Art. 82, equivalent CCPA-CPRA private rights of action) are NOT subject to the master agreement's general liability cap, OR are subject to a higher cap (e.g. 24x monthly fees) reflecting privacy risk.
- **§8.2** Indemnification for Processor's breach of the DPA is separately addressed.
## §9 — CCPA-CPRA-specific (where applicable)
- **§9.1** Vendor classification: Service Provider, Contractor, or Third Party — DPA names which.
- **§9.2** Service-Provider obligations under CCPA-CPRA §1798.140(ag) included.
- **§9.3** Sale / share of Personal Information explicitly prohibited (DPA states Processor does not "sell" or "share" Personal Information as defined under CPRA).
- **§9.4** Notification of unauthorized use as Service Provider.
## §10 — Schedule of TOMs
- **§10.1** Annex / Schedule lists specific Technical and Organizational Measures, not just generic categories.
- **§10.2** TOMs include: encryption at rest, encryption in transit, access controls, logging, vulnerability management, incident response, business continuity.
- **§10.3** Certifications named (SOC 2 Type II, ISO 27001, ISO 27018) where applicable.
## §11 — Sub-processor list (Annex)
- **§11.1** DPA includes a current sub-processor list as an annex, OR references a maintained list (URL) with notification on changes.
- **§11.2** Sub-processor list includes: name, processing activity, location.
## How to customize
When you adapt this template:
1. Tighten or loosen specific obligations to match the firm's risk posture (e.g. shorter breach window for highly regulated industries).
2. Add jurisdictions to §0.1 and the corresponding required-obligation sections.
3. Document the per-vendor exception process — some sub-processor consent waivers are acceptable for hyperscaler dependencies.
4. Versioning: bump the version line in §0 when you make changes; the reviewer captures the SHA per audit.
# Vendor profile template
Vendor profiles let the DPA reviewer weight findings by what's known about the vendor's baseline behavior. A hyperscaler's DPA reads differently from a Series A startup's DPA; the same vague language may be acceptable in one context and a red flag in another.
The profile is optional. Without it, the reviewer scores against the checklist alone.
## Profile shape
Save one file per major vendor as `vendor-profiles/<vendor-slug>.md`.
```yaml
vendor: AWS
profile_version: 2026.1
profile_updated: 2026-04-15
# Vendor classification
classification: hyperscaler # hyperscaler | enterprise-saas | mid-market-saas | startup | services-vendor
sub-processor-of-others: true # does this vendor act as your sub-processor for other vendors?
# Standard offerings
standard_dpa_url: https://aws.amazon.com/agreements/data-processing/
sccs_offered: [eu-2021-914-module-2, eu-2021-914-module-3]
certifications_held: [soc2-type-ii, iso-27001, iso-27018, hipaa-baa]
# Negotiation posture
negotiation_likelihood: low # how likely is this vendor to accept redlines? hyperscalers: usually low for standard terms
prior_redlines_accepted:
- "tightened breach window from 72h to 48h, accepted 2025-11"
- "added Annex C sub-processor notification, accepted 2026-02"
# Risk posture
data_sensitivity: high # how sensitive is the data this vendor processes?
data_volume: high
firm_dependency_score: 9 # 1-10; how disruptive would changing vendor be?
# Known issues
known_issues:
- "Sub-processor list at standard URL is updated without per-customer notification — Controller must monitor."
- "Audit rights via SOC 2 reports only; no direct audit. Counsel has accepted this for SOC 2 Type II + ISO 27001 holders."
- "Liability cap for privacy claims tied to fees-paid; firm has previously accepted with carve-out for GDPR Art. 83 fines."
# Reviewer guidance
weight_findings_lower:
- "blanket sub-processor consent — accepted for hyperscalers per firm policy"
- "audit-via-summary — accepted for SOC 2 Type II + ISO 27001 holders"
weight_findings_higher:
- "any new processing purpose — escalate to counsel even for routine reviews"
```
## How the reviewer uses the profile
- Findings tagged with `weight_findings_lower` patterns are surfaced with `informational` severity instead of red-flag — the firm has already evaluated and accepted the trade-off for this vendor class.
- Findings tagged with `weight_findings_higher` patterns are escalated regardless of normal severity.
- `prior_redlines_accepted` informs the recommended-redline section: "this vendor accepted similar redline at this date."
- `negotiation_likelihood: low` adds a note to the report: "vendor unlikely to accept redlines — the legal-ops lead may prioritize accept-with-risk-acceptance over negotiation."
## When to update a profile
- Vendor accepts a new redline → add to `prior_redlines_accepted`.
- Vendor refuses a redline the firm has accepted before → flag and escalate; profile may need re-version.
- Vendor changes their standard DPA → update `standard_dpa_url` and bump `profile_version`.
- Annual review: confirm certifications still held, sub-processor list still accurate, classification unchanged.
## What NOT to put in the profile
- Confidential commercial terms (pricing, custom-negotiated rates) — those belong in procurement records.
- Personal information about vendor counsel or contacts.
- Speculation about vendor strategy.
The profile is for reviewer calibration, not a vendor-relationship CRM.