Processing roles
Clarify controller, processor, customer, and service-provider roles by product use case.
§ Legal - DPA
How CORE data processing, security measures, subprocessors, and deletion obligations should be reviewed during procurement.
Borrower documents, extracted facts, generated credit work, and audit events need clear processing roles, security measures, and retention/deletion expectations.
Processing roles + TOMs + subprocessors§ DPA Scope
Clarify controller, processor, customer, and service-provider roles by product use case.
Tie technical and organizational measures to the security posture and product architecture.
List hosting, infrastructure, analytics, communications, and AI-related subprocessors in an approved schedule.
§ Fit
The DPA should give legal and security teams a concrete path for reviewing how sensitive credit data moves through CORE.
Subprocessor schedule
TOMs/security appendix
Data subject request process
Deletion and retention terms
Breach notice language
§ Path
Identify borrower files, extracted facts, generated work product, account data, and audit events.
Connect data categories to security measures, retention expectations, and subprocessors.
Use the DPA and security appendix in the procurement packet for formal review.
§ Next Step
Security and data processing questions can route through contact while the public DPA is finalized.