Blog · 23 de abril de 2026 · 7 min read

GDPR-compliant team chat for EU teams: architecture that matters

What GDPR actually requires from a team-chat tool, the architectural decisions that matter, and five questions to ask a vendor before signing.

Picking a team-chat product for an EU team is more than a feature-list decision. A chat tool processes personal data under GDPR from the moment someone signs up with a work email. That means the choice of vendor commits the organisation to a specific architecture, a specific data-processing agreement, and a specific set of sub-processors. It is the kind of commitment that is far easier to get right before adoption than after, when switching costs have a way of making bad decisions feel permanent.

What GDPR actually requires from a chat tool

The regulation is dense, but what it demands from any tool that processes employee or customer personal data can be distilled into a practical list. You need a lawful basis for processing — usually contract performance for internal team chat, legitimate interest for some operational processing. You need a signed Data Processing Agreement with the vendor covering the terms of Article 28. Both the controller and processor need a record of processing activities. The vendor must document their technical and organisational measures. There must be a transparent sub-processor list with a notice window before any change, a breach-notification SLA consistent with the 72-hour window in Article 33, tooling for data-subject rights — access, rectification, erasure, portability — and transfer safeguards if personal data leaves the EU or EEA.

That is a lot of paper, and most of it is achievable with a competent legal team and a cooperative vendor. But two items on that list are not just paperwork. They are architectural, and that is where the real divergence between products begins.

Where the architecture starts to matter

The first architectural question is where the data physically lives. A product with EU-only hosting has a shorter compliance path than one that replicates to US regions. A self-hosted product has the shortest path of all — you choose the region, full stop.

The second is who can technically access message content. A product that holds decryption keys server-side has a vendor in the data path even when the paperwork says otherwise. End-to-end encryption and tenant-controlled key designs can reduce that surface, but only if the implementation and deployment mode actually remove persistent vendor-held reconstruction paths.

The paperwork gap between products can usually be closed with a good DPA. The architectural gap cannot. If message content is technically accessible to a US-parented vendor, Schrems II and the realities of the US CLOUD Act mean the exposure is real regardless of what the contract says. This is worth sitting with. A contract is only as strong as the architecture underneath it.

What to ask a vendor before signing

Five questions that usually reveal how seriously a vendor takes GDPR. First, do you have a signed DPA template I can review before contracting, or is it negotiated per customer? Second, where physically are the servers that hold my message content and files — and is that configurable per customer or fixed? Third, what is your sub-processor list today, and what is the notice window when it changes? Fourth, what is your breach-notification SLA from the point of detection, and is it contractually committed? Fifth, if I issue a data-subject access request, what is the technical path to fulfil it, and how long does it take in practice?

A vendor that answers all five in writing without escalation is a vendor that has done the work. A vendor that promises to "get back to you on that" has not.

Self-hosted, managed, and the middle ground

There are three typical architectures for GDPR-sensitive team chat, and they sit on a spectrum of control versus operational burden.

The first is self-hosted, single tenant. You control the tenant environment and the infrastructure. A DPA with a chat vendor may not be needed for that tenant content if no external processor operates the deployment, but the organisation still has its own controller and processor obligations.

The second is managed cloud with EU-only hosting. The vendor is the processor, a DPA is signed, hosting is in the EU, sub-processors are disclosed. This is the most common shape for SMBs that want GDPR alignment without running their own servers.

The third is managed cloud with tenant-controlled encryption. The vendor is still the processor for the service it operates, and a DPA is still signed, but the technical access path to content can be narrower when the deployed key model truly avoids persistent vendor-held content keys.

What TheChatApp provides

TheChatApp is built for GDPR-conscious deployments. The managed Cloud tier hosts in Europe by default. The self-hosted tier lets the customer pick the region. A DPA template is available on request without negotiation. Sub-processors are disclosed with a notice window. Breach notification is committed in writing. Managed enterprise encryption uses server-managed tenant content keys with KMS wrapping when configured; tenant-controlled Mode 2 is the stronger-separation path when it is enabled and committed.

For the full picture, see the Data Processing Agreement, the privacy policy, or the sub-processors list.

Team chat you actually own

End-to-end encrypted chat, voice, video, and meetings — self-hosted or managed.