TracePass
Buyer's guide

DPP vendor evaluation — our answers

The questions a buyer should ask any DPP vendor before signing — and how TracePass answers each. Forward this to your procurement, compliance, and engineering teams; every answer carries evidence.

Technical

7

Do you have public APIs?

Yes

REST + OpenAPI. Read and write across passports, products, and templates.

What you're really asking

Whether you can operate your DPP catalogue at scale without humans clicking through a UI — bulk reads, automated writes, integration into your PIM, ERP, or PLM.

Our answer

TracePass exposes a documented REST API covering passports, products, templates, organisations, and webhooks. Read and write surfaces are symmetrical — anything that can be done in the UI can be driven through the API.

Authentication is per-organisation API keys with scoped permissions. The OpenAPI spec is published to every customer in the developer portal — no NDA gating, no "talk to our integration team" friction.

Industry note

Some vendors expose only public-passport read endpoints. "We have an API" can mean a single GET — push for write coverage and a published spec.

Can you bulk-import passports via CSV or API?

Yes

Per-category CSV templates and a bulk-import endpoint. UI drop-zone for non-technical users.

What you're really asking

This is a cost-of-onboarding question disguised as a feature question. A manufacturer with 5,000 SKUs and no bulk path will pay agency fees forever.

Our answer

Each category template ships with its own CSV template — column names match the schema, types and constraints validated on upload. Drop a file in the UI; the bulk-import endpoint accepts the same CSV via API for automated pipelines.

Validation is per-row with column-level error reporting; partial imports are atomic (either all rows commit or the file is rejected with a diff). For high-volume customers, the import API supports multi-file batches.

Industry note

Generic, schema-agnostic CSV imports usually require weeks of mapping per category. Per-category templates collapse that to minutes.

Who owns the GS1 resolver — and what happens if I leave?

Yes

Custom domain on every paid plan. URL portability is permanent because the domain is yours; 30-day post-termination grace at no cost.

What you're really asking

If the QR code on your packaging points at the vendor's domain, switching vendors means reprinting every package. Resolver ownership is the single biggest lock-in risk in DPP.

Our answer

Every paid plan can route QR codes through the customer's own domain (e.g. id.your-brand.eu/01/...). TracePass resolves under your domain, so URL portability is permanent — even if you exit, the URL on the package keeps working.

Free / trial accounts resolve under tracepass.eu/p/...; switching to a paid tier does not break in-flight QR codes that started on the shared domain. After cancellation, TracePass continues to resolve your existing passports for 30 days at no cost (see Terms of Service) — for paid customers on a custom domain, that gives you a window to re-point DNS to another vendor's resolver. After the 30-day grace, shared-domain URLs return expired and TracePass stops serving the custom domain.

Industry note

Some vendors print their own domain on the QR code without exit clauses. In that model, exit means physically reprinting every product ever shipped.

Do you support EPCIS for supply-chain event tracking?

Roadmap

On roadmap. Built on first prospect requirement; design notes available on request.

What you're really asking

GS1's standard for tracking supply-chain events ("this batch left this facility on this date"). Critical for mid-large enterprises with end-to-end traceability ambitions.

Our answer

EPCIS is not currently in product. We hold working notes on integration shape and event-vocabulary alignment with our existing passport model — we share these with prospects evaluating EPCIS as a hard requirement.

Default posture: no speculative product work pre-deal, but commitment to ship on the first deal that requires EPCIS is on the table.

Industry note

EPCIS is mature but narrow. If you don't already use it internally, asking is a vanity check; if you do, lack of support is disqualifying.

Do you support serial-level passports?

Yes

Native. gs1.serialNumber is the canonical primary join key.

What you're really asking

The Battery Regulation mandates serial-level (not SKU-level) passports for industrial and EV batteries; category-specific delegated acts will follow. A vendor that only does SKU-level is consumer-goods only.

Our answer

Every passport in TracePass is keyed by serial number. gs1.serialNumber is the canonical primary join, with SKU/model as a secondary field for grouping. The data model was designed serial-first because the regulatory direction is serial-first.

Serial-level passports support per-unit lifecycle data: state of health, repair history, ownership transfers, end-of-life status. Bulk creation and bulk update by serial range are first-class operations.

Industry note

Vendors built around SKU-level data models retrofit serial as a custom field, which breaks bulk operations and analytics. Serial-first vs serial-as-afterthought is visible in the API shape.

Are passport edits versioned and auditable?

Yes

Every edit audit-logged. Version timeline visible per passport. Authority queries can specify a version.

What you're really asking

ESPR-implied requirement. A passport printed on a 2026 jar must remain amendable AND auditable in 2036. A vendor with single-mutable-record storage is a compliance bomb when an authority asks "what did this passport say on date X."

Our answer

Every passport edit is recorded with timestamp, actor, and field-level diff. The passport detail page renders a version timeline; each historical version is fetchable by ID via the API.

Public passport URLs serve the latest version by default; ?version=N or ?as_of=DATE return the historical state. This is the surface authorities use during conformity-assessment queries.

Industry note

"We have an audit log" without UI surfacing usually means raw database records nobody can read. Auditors want timeline views, not log-aggregator queries.

Can I export my data?

Yes

Full JSON-LD per passport. Tenant-wide bulk export. Media included with stable URLs.

What you're really asking

Tied to exit risk. "We'll send you a CSV" usually means there's no actual export feature; the data lives in the vendor's database and you'd be lucky to get column-level fidelity.

Our answer

Each passport exports as JSON-LD via the API or UI download. The export preserves field metadata, source attribution, version history, and translations.

Tenant-wide bulk export packages every passport, every product, every template you've created. Media attachments (images, test reports, PDFs) ship with stable URLs that remain resolvable for the 30-day post-termination grace window — long enough to migrate to a successor vendor.

Industry note

Export is the single feature most vendors haven't actually built — they discover the gap when the first customer asks to leave.

Compliance

5

Which exact Battery Regulation articles are supported?

Partial

Article-level mapping for 6 (carbon footprint), 7 (recycled content), 11 (removability), 14 (state of health), 77 (DPP).

What you're really asking

This separates marketing from substance. A vendor that says "we support the Battery Regulation" without an article-level breakdown is bluffing.

Our answer

Our battery template models all five core articles: 6 (carbon footprint declaration), 7 (recycled content thresholds), 11 (removability and replaceability information), 14 (state-of-health for industrial and EV batteries), 77 (DPP fields including QR code, supplier identification, and lifecycle status).

Implementing acts continue to refine some thresholds — recycled-content percentages and SOH measurement methodology in particular. We track every change in the Regulatory Changelog and version-bump the schema when material.

Industry note

Full article coverage is rare; partial-with-roadmap is more honest than blanket "compliant."

Which ESPR delegated acts have you modelled?

Partial

Per-template matrix: jewellery, chemicals, furniture, tyres, electronics. Speculative ahead of final acts; explicitly labelled.

What you're really asking

ESPR delegated acts are mid-flight. A vendor with speculative coverage now is doing your R&D for you (good); one that says "we'll add when finalised" is a risk if you need to be in market by deadline.

Our answer

We ship templates for jewellery, chemicals, furniture, tyres, and electronics. Each template maps to the proposed delegated-act fields known at the time of release; speculative fields are flagged in the schema metadata.

When a delegated act is finalised, our normal versioning flow applies: in-flight passports stay valid against their original schema until amended; the new version becomes available for new passports immediately.

Industry note

Vendors who claim "we already support all ESPR delegated acts" are claiming something that doesn't yet exist — the acts are still being drafted.

How do you update schemas as regulation evolves?

Yes

Versioned templates. Public regulatory changelog. In-flight passports unaffected by amendments.

What you're really asking

A passport printed on a 2026 product must remain valid in 2036 even if Article 77 changes twice in between.

Our answer

Templates are versioned. Adding a field is non-breaking; changing or removing one creates a new schema version with an explicit migration path. In-flight passports stay valid against their original schema; amended passports validate against the latest version.

Every regulatory change we track is logged in the public Regulatory Changelog with date, scope, and migration impact. Customers are notified before any schema change takes effect.

Industry note

Vendors that say "we'll let you know" pass migration cost back to you. Versioned templates make a regulatory amendment a 30-minute review instead of a project.

Can authorities query machine-readable endpoints?

Yes

JSON-LD via content negotiation on every public passport URL. GS1 Digital Link conformant.

What you're really asking

ESPR Article 12 (and equivalents): competent authorities must be able to query DPPs machine-readably. JSON-LD or equivalent structured format is the default expectation.

Our answer

Every public passport URL serves valid JSON-LD when the request carries Accept: application/ld+json. The same URL serves HTML for browsers and JSON-LD for crawlers and authority systems — no separate endpoint to discover.

URLs follow the GS1 Digital Link grammar (.../01/{GTIN}/21/{serial}). The resolver is conformance-tested against GS1's reference suite.

Industry note

Vendors who serve text/html only at the passport URL fail the basic interoperability test.

Does the passport identify all economic operators a regulator expects?

Yes

Yes. Manufacturer + recycler + producer-responsibility-organisation + importer + authorised representative + distributor as a structured roles map keyed on validated GS1 GLNs. Per-category required-role enforcement matches each regulation.

What you're really asking

Battery Regulation 2023/1542 Articles 47–50 require manufacturer + recycler + PRO. PPWR Article 11 requires manufacturer + PRO. Toy Safety Directive Article 4 requires manufacturer + importer for non-EU makers. The regulation defines a chain of accountable parties; the passport needs to carry that chain in machine-readable form, not just as free-text in a single "manufacturerName" field.

Our answer

Each passport carries a structural `parties` block keyed by economic-operator role. Each entry has a validated GS1 GLN (13 digits, mod-10 check digit), legal name, ISO 3166-1 country code, and optional URL. The GLN is emitted in both `gs1:partyGLN` (GS1 Web Vocabulary, spec-precise) and `schema:identifier` with `propertyID: "GS1:GLN"` (schema.org mirror) so DPP-aware readers and standard schema.org crawlers each see what they expect.

For suppliers without a GLN, a `legacyOperatorId` field accepts a VAT, EORI, national tax ID, or internal supplier code — every party stays traceable even before the supplier's GS1 onboarding is complete.

Per-category required-role enforcement matches the regulation: battery passports need manufacturer + recycler + PRO; toys need manufacturer + importer; packaging-bearing categories (FMCG, packaging) need PRO. Optional roles surface in the editor but don't block publish. The same role map drives the dashboard editor, the v1 API (`PATCH /api/v1/passports/{id}/parties/{role}`), and the CSV bulk-import templates (dotted-key columns: `manufacturer.gln`, `recycler.legalName`, etc.).

Industry note

Most DPP vendors today model only the manufacturer as a free-text string. A buyer running GS1-native master data needs the full economic-operator chain validated and structured — single-string manufacturer fields don't survive procurement at any GS1-keyed enterprise.

Operational

5

What's your SLA?

Yes

99.9% portal, 99.95% resolver. Resolver is split out because regulators query it directly.

What you're really asking

99.9% on the application is fine, but the QR resolver is the regulatory surface — a passport that doesn't resolve is, from an authority's standpoint, a passport that doesn't exist.

Our answer

Two distinct SLAs: 99.9% for the application portal where you and your team work; 99.95% for the public resolver that authorities and consumers hit through QR codes. The resolver is fronted by a CDN and replicated across regions for the higher target.

The status page tracks both surfaces independently. Outage credits apply per surface — portal credits do not require resolver outage, and vice versa.

Industry note

A single SLA across portal and resolver hides the asymmetric risk: the resolver is the part that can't go down without regulatory consequence.

Where is data hosted?

Yes

EU-only. Primary database in Frankfurt; CDN, email, monitoring all in EU.

What you're really asking

ESPR and GDPR expectations push toward EU residency. US-only hosting is a non-starter for regulated EU product data; sub-processors in the US can leak metadata even when primary storage is EU.

Our answer

Primary database: MongoDB Atlas in eu-west-1 (Frankfurt). Application runtime: Vercel EU edge regions. Email delivery: EU-region SES. Monitoring and logging: EU-region. Full sub-processor list with jurisdictions on the trust page.

We do not use any US-only sub-processors for production data paths. The Anthropic AI processing path (used for category extraction and translations) is invoked on customer demand only and is governed by an explicit DPA — the trust page documents this in detail.

Industry note

A US-headquartered vendor with an "EU region" toggle is not the same as an EU-resident operation; check sub-processors carefully.

How do you handle GDPR — data subject access, deletion, sub-processor disclosure?

Yes

DPA in place. Sub-processor register published. SAR and erasure endpoints exist. 72-hour breach notification.

What you're really asking

Less interesting for the passport itself (most DPP fields are not personal data) and more interesting for analytics — if the vendor logs IP addresses and user agents on every QR scan, that's GDPR territory.

Our answer

Standard processor DPA available; signed before customer data flows. The sub-processor register on the trust page lists every processor with role and jurisdiction; additions trigger advance notification per Article 28.

Subject access and erasure requests can be served against the analytics surface (the passport content itself is product data, not personal data). Breach notification: 72 hours from confirmed incident, codified in the DPA.

Industry note

Most DPP fields are not personal data, so GDPR risk concentrates in scan analytics. Vendors that log IP, user-agent, and referrer on every scan create exposure your privacy team should know about.

What are your backup and retention policies?

Yes

Operational backups (30-day PITR) and category-aligned product-lifecycle retention tracked separately.

What you're really asking

Backups and lifecycle retention are different concepts that vendors often conflate. ESPR requires passports to remain accessible for the product's lifetime — that's not a backup question.

Our answer

Operational backups: 30-day point-in-time recovery on the primary database. Restore tested on a recurring schedule.

Product-lifecycle retention: passports remain live and queryable for the full regulatory lifetime applicable to each product category, in line with the relevant ESPR or sector-specific retention expectation. Lifetime is enforced even after subscription termination, for the duration of the resolver continuity window.

Industry note

"Backed up nightly" is not the answer to this question. The relevant policy is whether the passport is still resolvable in year 12 of the product's life.

How is tenant data isolated?

Yes

Logical isolation (companyId scope) by default. Physical isolation tier on Enterprise.

What you're really asking

Three industry postures — logical (DB-level filter), physical (separate cluster per tenant), or hybrid. Big brands worry that logical isolation is one developer mistake away from a leak.

Our answer

Default isolation is logical: every read and write is scoped by companyId, enforced at the data-access layer (not the controller). Tests verify the scope cannot be bypassed even with deliberate companyId omission in queries.

Enterprise customers can request physical isolation: their data lives in a dedicated MongoDB cluster, with a dedicated application instance. Pricing is talk-to-us; turnaround is days, not weeks.

Industry note

Logical isolation enforced only at controllers (not the data layer) creates real leak risk; ask where the scope is applied.

Commercial

3

Per passport, scan, SKU, or serial — how does pricing work?

Yes

Tiered passport allowance. Never per scan. Serial-volume bundle for high-volume manufacturers.

What you're really asking

Each model penalises a different volume axis. Per-scan blows up if a product goes viral; per-serial is unviable for high-volume manufacturers; the wrong model can 10× your bill in a month.

Our answer

Tiered passport allowance. Each plan includes a passport count; overage is metered at a published rate that drops at scale. We never charge per scan — consumer scan volume is unpredictable, and we will not send you a surprise invoice when one of your products trends.

For high-volume battery, EV, and tyre manufacturers with serial-level mandates, we offer a serial-volume bundle with marginal-cost pricing that makes the economics work at scale. Talk to us.

Industry note

Per-scan pricing is the most dangerous model in DPP — scan rates are determined by your customers, not you. Per-passport tiers tie the bill to what you control: catalogue size.

What does exit and migration look like?

Yes

Full JSON-LD export, no fee. 30-day post-termination grace for the resolver. Customer-as-controller throughout. Optional source escrow.

What you're really asking

This is where vendor answers tend to be vaguest. The hard parts of exit are not data export — it's resolver continuity (otherwise QR codes brick) and contractual clarity on data ownership during the transition.

Our answer

Full JSON-LD export of every passport, product, template, and media attachment is available on demand at no charge. No "export fee."

After cancellation, TracePass continues to resolve your existing passports for 30 days at no cost (codified in the Master Services Agreement). During that window, QR codes on already-printed packaging keep resolving to your data while you migrate; on a custom domain you re-point DNS to a successor vendor and the printed codes never break.

Customer is the data controller throughout the relationship and after termination. Optional source escrow available on Enterprise: a tagged copy of our application source code is held by an independent third party, releasable to you under defined trigger events.

Industry note

Migration support without resolver continuity is migration support that bricks your QR codes. Always read the resolver clause first.

What are your liability terms and do you carry E&O insurance?

Yes

12× monthly cap default; 24× rider on Enterprise. E&O insurance in place; cap published.

What you're really asking

If a vendor bug produces an incorrect passport and the manufacturer eats an EU fine, what is the vendor's actual exposure? Most SaaS caps at 12 months of fees — confirm whether that's enough.

Our answer

Standard liability cap: 12× monthly fees. Enterprise customers can negotiate a 24× rider for higher exposure profiles.

E&O insurance is in place; policy cap is published on the trust page. The trust page also lists indemnification carve-outs (third-party IP claims, regulatory penalties traceable to vendor error).

Evidence

Industry note

Most SaaS caps liability at 12× monthly. For an EU manufacturer with potential fine exposure, that's small comfort — push for an explicit rider.

Future-proofing

5

Decentralised identifiers and verifiable credentials — on roadmap?

Roadmap

On roadmap. EBSI direction. Built on first prospect requirement.

What you're really asking

EBSI (European Blockchain Services Infrastructure) is pushing toward verifiable credentials for DPP authenticity. Not table stakes today; will be by 2028.

Our answer

DID/VC support is not in the current product. The architecture is compatible — passport documents are content-addressable, edits are signed, and the schema can carry credential proofs as an additional field set.

Trigger to ship: first deal that raises VC issuance as a hard requirement. Design notes available on request.

Industry note

Vendors claiming live VC support today are usually demoing prototypes. The EBSI ecosystem itself is still pre-production for most use cases.

Can passports be timestamped or notarised for tamper-evidence?

Partial

Per-field audit trail with timestamp and actor; visible in passport history. Cryptographic anchoring + third-party notarisation on roadmap.

What you're really asking

Useful for disputes — proof that passport content existed in version X at date Y, where neither party can rewrite history.

Our answer

Every field write goes through a single update path that appends an audit entry — timestamp, actor, previous value, source (manual / AI / API / supplier). The per-field history is queryable via API and visible in the passport version timeline. Entries are append-only by application convention.

Cryptographic anchoring (a content-hash chain over each passport's audit entries, optionally co-signed by a trusted timestamping authority or a public ledger) is on the roadmap and not yet built. Trigger: first prospect that requires it for a regulator-defended tamper-evidence story. Until then, the audit trail is verifiable against our database, not independently — call this out explicitly in any RFP response that asks for tamper-evidence.

Industry note

An audit log without cryptographic snapshots is verifiable only against the vendor's own database — the vendor could rewrite it if compelled.

Conformance against published interoperability standards?

Yes

GS1 Digital Link conformance result published. CIRPASS-aligned vocabulary. Schema.org JSON-LD + GS1 vocabulary (gs1:partyGLN) on every passport. Validated GLN identifiers per economic-operator role.

What you're really asking

Interop conformance test results — not just "we follow the spec." GS1 Digital Link, schema.org, CIRPASS alignment, and structured GS1 GLN identifiers your master-data system can lift directly.

Our answer

We publish the GS1 Digital Link conformance test result on the trust page. Schema.org JSON-LD is emitted on every public passport URL. Vocabulary alignment with CIRPASS recommendations is documented field-by-field.

GS1 GLN (Global Location Number) identifiers are first-class fields on every passport — strict 13-digit mod-10 validation, multi-role keyed (manufacturer / importer / authorised representative / distributor / recycler / producer-responsibility organisation), and emitted in both gs1:partyGLN and schema:identifier 'GS1:GLN' shapes so DPP-aware readers and standard schema.org crawlers each see what they expect.

Where conformance is partial (e.g. CIRPASS recommendations that postdate our last alignment review, or the /414/{gln} resolver path which is on the build-on-first-ask roadmap), the gap is named explicitly with a target version.

Industry note

"We follow the spec" is not a conformance claim. Look for tested results, not stated intent.

Can prospects influence schema decisions for pre-final delegated acts?

Yes

Yes. Pro/Enterprise prospects shape pre-final delegated-act templates through a documented mechanism.

What you're really asking

Pre-final delegated acts mean vendor schema decisions are speculative. Big brands often have lobbying-stage information about likely final shape that vendors don't.

Our answer

For categories where the delegated act is not yet final, we maintain explicit speculative-field markers in the template. Pro and Enterprise customers can submit field-level proposals that go into the next template version after a brief review.

Customers are listed as contributors on the template's metadata block — credit and traceability for the contribution.

Industry note

Vendor roadmap-as-influence is a feature for buyers with regulatory expertise, not a downgrade.

Source escrow if you go bust?

Yes

Available on Enterprise. Tagged source held by independent third party with defined release triggers.

What you're really asking

For a category that mandates DPP availability for 10–20 years, vendor longevity becomes a real risk. Source escrow is a cheap insurance policy.

Our answer

Enterprise customers can opt into source escrow via an independent third-party escrow agent. A tagged copy of the application source code is deposited and updated on a recurring cadence.

Release triggers are defined in the escrow agreement and typically include: vendor insolvency, material breach uncured, or sustained outage beyond a defined threshold.

Industry note

Source escrow with no defined release triggers is theatre; the triggers are the substance.