Technical and Organizational Measures
BMX Holdings Ltd ("Orcha")
Version 5.0 | As of: 12.04.2026
Legal Basis: Art. 32 GDPR, Art. 28(3)(c) GDPR
This TOM documentation applies to the processing of personal data within the SaaS platform of BMX Holdings Ltd ("Orcha"), which processes financial documents (invoices, receipts, contracts, purchase orders, goods receipt notes) for businesses and tax advisory firms. The platform operates as a processor pursuant to Art. 28 GDPR.
The measures described in this document meet the requirements of Art. 32 GDPR and additionally align with the protection level of §203 StGB (German Criminal Code -- Professional Secrecy), to also be suitable for clients with special confidentiality obligations. This applies as a universal standard for all customers, regardless of whether they are tax advisory firms or regular business customers.
The purpose of this documentation is to describe the technical and organizational measures that ensure the protection of customer data and trade secrets, as well as compliance with GDPR and German data protection law.
Orcha's infrastructure is hosted in the Amazon Web Services (AWS) region Frankfurt am Main (eu-central-1). This ensures processing within the European Union and compliance with local data protection requirements. The physical data centers are protected by comprehensive security measures:
Orcha employees have no physical access to production servers. Administrative access is exclusively via secure, auditable remote sessions (AWS Systems Manager) without exposed SSH ports.
Access to the platform is protected through federated identity providers via AWS Cognito. End users authenticate through their existing Google or Microsoft accounts using industry-standard OAuth 2.0 / OpenID Connect protocols, benefiting from the authentication policies (including MFA where configured) of the respective identity provider.
Sessions are managed via HTTP-only, secure cookies. Cryptographic tokens are encrypted at rest using a customer-managed AWS KMS key before database storage.
Access to customer data follows the principle of least privilege:
The network architecture is designed to limit exposure and segment access:
All data transfers are encrypted:
All significant data operations are logged:
Orcha ensures availability through the following measures:
A backup strategy ensures data integrity:
All personal data is encrypted at rest. Database storage, object storage, and message queues are encrypted using AWS-managed encryption. Sensitive application fields (authentication tokens, third-party credentials) are additionally encrypted using a customer-managed AWS KMS key with automatic annual rotation.
Pseudonymization (per GDPR Art. 4(5)) is the processing of data such that it cannot be attributed to a specific person without additional information (the key) stored separately.
Customer data is organized by internal tenant identifiers. The mapping between tenant identifiers and real customer identity is maintained in the authentication system, stored separately from the processed data.
Additional measures specific to AI-based document processing are described in Section 14.
The development process integrates security into all phases:
A structured vulnerability management process protects against known security gaps:
The effectiveness of TOMs is regularly reviewed:
Orcha uses the following sub-processors for specialized tasks (detailed list in separate document O3 "Sub-Processor List"):
All sub-processors are contractually bound to equivalent technical and organizational measures. A current list with detailed data flows is available in document O3.
Security incidents are proactively detected through automated alerting systems, application-level error monitoring with structured context, and employee reports of suspected security incidents.
Security incidents are classified by severity:
Every incident receives a timely response. The controller (client) is notified no later than 24 hours after discovery. For critical incidents, immediate containment measures are taken. Orcha supports the controller in reporting to supervisory authorities (72-hour deadline per Art. 33 GDPR). All response measures are documented.
After detection of an incident, all relevant logs and audit trails are preserved, affected systems are isolated to prevent further contamination, and forensic analysis is conducted for root cause determination. All evidence is preserved for potential criminal investigations.
After resolution of an incident, a detailed root cause analysis is conducted, improvement measures are implemented, this documentation and security procedures are updated, and lessons learned are communicated to affected customers (without disclosing sensitive details).
Customer data is deleted upon instruction of the controller. Deletion occurs within 30 days of contract termination or deletion request, covering all systems: production database, backups, caches, and logs. Verification of deletion is conducted through separate automated control runs, and a deletion confirmation is issued upon request. Archive retention for compliance requirements is taken into account.
Upon request, customer data can be returned in machine-readable format (JSON or CSV as agreed), transmitted in encrypted form, with completeness verified before transmission.
All employees are obligated to maintain trade secrets through a written obligation to comply with data confidentiality (§53 BDSG), a written confidentiality agreement, and explicit reference to criminal consequences under §203 StGB. These measures apply as a universal standard for all employees.
Data protection and security training is mandatory. This includes annual training on GDPR and German data protection law, awareness of §203 StGB criminal provisions, training in incident response and phishing detection, and documentation of all training participation.
Data access is strictly limited to what is necessary. Tenant isolation is enforced at the application level. The administrative interface is restricted to Orcha employee accounts. Development and testing use exclusively synthetic and anonymized data.
Upon termination of employment, access is immediately revoked, all credentials and devices are returned, access history is archived for audit purposes, and compliance with confidentiality agreements is confirmed.
The automated processing of documents with AI systems is subject to special protective measures:
Orcha uses closed AI models from Anthropic (Claude) and Google (Gemini, Document AI, Vertex AI) for document extraction, classification, email triage, post-processing, and semantic search. Contractual guarantees ensure that customer data is not used for model training by any AI sub-processor.
Only the documents and content necessary for the respective processing purpose are transmitted to AI services. Semantic search embeddings use derived text fields and explicitly exclude bank account details. Email triage uses truncated content and low-resolution previews. AI sub-processors are contractually prohibited from retaining input data beyond the processing duration or using it for model training.
AI processing statistics are recorded per document, including the model used, token counts, and confidence levels. AI responses are retained for audit purposes.
No fully automated decisions with legal effect are made pursuant to Art. 22 GDPR. AI results are used as suggestions for human validation. Financial export actions (e.g. DATEV booking) require explicit human confirmation, and documents flagged for review are blocked from export until a user has reviewed them. Controllers are informed about AI use in privacy notices.
| Version | Date | Changes | Author |
|---|---|---|---|
| 1.0 | 25.03.2026 | Initial version with basic measures | [Name] |
| 2.0 | 04.04.2026 | Extended with: Network Security, Vulnerability Management, Secure Software Development, Data Deletion and Return, AI-Specific Measures, expanded §203 StGB employee measures as universal standard | [Name] |
| 3.0 | 04.04.2026 | Entity renamed to BMX Holdings Ltd ("Orcha"). Removed: Separation Control/Tenant Isolation (Section 2.4), Security Vetting (13.2), Zero-Plaintext Access (14.2), video surveillance/biometrics, quarterly DR tests, external penetration tests, automated vulnerability scans. Changed: SLA to 99.5%, AI data minimization rephrased, terminology "Tenant" replaced with "Customer". All affected sections renumbered. | [Name] |
| 4.0 | April 2026 | Restored external penetration testing requirement; Added data classification scheme; Clarified pseudonymisation vs anonymisation; Added international transfer safeguards section; Reduced session timeout to 15 minutes; Added UK GDPR transfer mechanisms | [Name] |
| 5.0 | 12.04.2026 | Aligned measures with current implementation: federated OAuth authentication model, network architecture, backup retention, encryption scope, sub-processor list, AI provider list | [Name] |