GDPR Compliance Checklist

By Het Mehta

Source: Based on the EU General Data Protection Regulation (GDPR).

Disclaimer: This checklist is for informational and tracking purposes only. Descriptions are interpretations and may not cover all nuances. Implementation details depend on your specific organizational context. Always consult the official GDPR text and qualified legal/privacy professionals for definitive guidance. This tool does not constitute legal advice.

Done Checklist Item GDPR Article Ref. Detailed Description Responsible Dept. Notes

1. Data Mapping & Inventory

Identify Personal Data Art. 4(1), Art. 30 Identify all types of personal data processed by the organization (e.g., names, emails, IP addresses, financial data, health data). IT, Legal, Business Units
Map Data Flows Art. 30 Document where personal data comes from, how it is processed, where it is stored, who has access, and where it is transferred. IT, Legal, Compliance
Maintain Record of Processing Activities (RoPA) Art. 30 Create and maintain a detailed inventory of all processing activities involving personal data, including purposes, categories of data subjects/data, recipients, transfers, retention periods, and security measures. (Mandatory for most orgs). Legal, Compliance, DPO

2. Legal Basis for Processing

Identify Legal Basis Art. 6, Art. 9 For each processing activity identified in the RoPA, determine and document the appropriate legal basis (e.g., consent, contract, legal obligation, vital interests, public task, legitimate interests). Identify conditions for processing special category data if applicable. Legal, Compliance, Business Units
Legitimate Interests Assessment (LIA) Art. 6(1)(f) If relying on legitimate interests, conduct and document a Legitimate Interests Assessment (LIA) balancing the organization's interests against the individual's rights and interests. Legal, Compliance
Review Legal Basis Periodically Recital 39, Art. 5(1)(a) Regularly review the documented legal bases to ensure they remain appropriate for the ongoing processing activities. Legal, Compliance

3. Consent & Data Subject Rights

Valid Consent Mechanisms Art. 7, Art. 4(11) Ensure consent mechanisms are clear, specific, informed, freely given, and unambiguous. Use opt-in methods (e.g., unticked checkboxes). Keep records of consent. Marketing, Legal, IT
Easy Consent Withdrawal Art. 7(3) Ensure individuals can withdraw consent easily at any time, and that withdrawal is acted upon promptly. Marketing, IT, Customer Service
Procedures for Data Subject Rights (DSR) Art. 12-22 Establish clear procedures and assign responsibilities for handling Data Subject Requests (Access, Rectification, Erasure, Restriction, Portability, Objection, Automated Decision-Making). Legal, DPO, Customer Service, IT
DSR Response Timelines Art. 12(3) Ensure DSRs are responded to without undue delay and within one month (extendable by two months if necessary, with justification). Legal, DPO, Customer Service
Identity Verification for DSR Art. 12(6) Implement processes to verify the identity of individuals making DSR requests, where necessary. Customer Service, Legal

4. Data Minimization & Retention

Data Minimization Principle Art. 5(1)(c) Ensure only personal data that is adequate, relevant, and necessary for the specified purpose is collected and processed. Business Units, IT, Legal
Data Retention Policy Art. 5(1)(e) Establish and implement a data retention policy defining how long personal data is kept for specific purposes. Ensure data is securely deleted or anonymized when no longer needed. Legal, Compliance, IT
Implement Retention Schedules Art. 5(1)(e) Apply defined retention periods to data stores and systems; implement mechanisms for automated or manual deletion/anonymization. IT, Data Owners

5. Security Measures (Article 32)

Risk-Based Security Art. 32(1) Implement appropriate technical and organizational measures (TOMs) to ensure a level of security appropriate to the risk (considering state of the art, costs, nature, scope, context, purposes, and risks). IT Security, CISO, Risk
Specific Security Measures Art. 32(1) Consider implementing: pseudonymization, encryption, measures ensuring confidentiality, integrity, availability, and resilience of systems, backup/restore capabilities, regular testing/assessment of security measures. IT Security, IT Operations
Access Control Art. 32(1)(b) Implement strong access controls (e.g., role-based access, principle of least privilege) to limit access to personal data. IT Security, HR
Security Testing & Assessment Art. 32(1)(d) Regularly test, assess, and evaluate the effectiveness of technical and organizational security measures (e.g., vulnerability scanning, penetration testing, audits). IT Security, Internal Audit

6. Privacy by Design & Default (Article 25)

Implement Privacy by Design Art. 25(1) Integrate data protection principles and safeguards into the design of new projects, processes, products, or services from the outset. Product Dev, IT, Project Mgmt, Legal
Implement Privacy by Default Art. 25(2) Ensure that, by default, only personal data necessary for each specific purpose is processed (e.g., default settings are privacy-protective). Product Dev, IT, Marketing

7. DPIAs & Risk Assessments

DPIA Trigger Identification Art. 35(1), Art. 35(3) Establish a process to identify processing activities likely to result in a high risk to individuals' rights and freedoms, requiring a Data Protection Impact Assessment (DPIA). Legal, DPO, Risk, Project Mgmt
Conduct DPIAs Art. 35 Conduct DPIAs for high-risk processing activities, documenting the assessment, risks identified, and measures envisaged to address risks. Consult DPO. Project Owners, Legal, DPO, IT Security
Consult Supervisory Authority Art. 36 Consult the relevant Supervisory Authority prior to processing if a DPIA indicates high residual risk that cannot be mitigated. Legal, DPO

8. Vendor / Processor Compliance

Processor Due Diligence Art. 28(1) Conduct due diligence on data processors (vendors) to ensure they provide sufficient guarantees regarding technical and organizational security measures. Procurement, Legal, IT Security, Vendor Mgmt
Data Processing Agreements (DPAs) Art. 28(3) Ensure legally binding Data Processing Agreements (DPAs) are in place with all data processors, containing mandatory clauses specified in Article 28. Legal, Procurement, Vendor Mgmt
Processor Audits & Monitoring Art. 28(3)(h) Establish processes to monitor processor compliance and exercise audit rights as defined in DPAs. Vendor Mgmt, Internal Audit, IT Security

9. Cross-border Data Transfers

Identify International Transfers Chapter V (Art. 44-50) Identify all transfers of personal data outside the European Economic Area (EEA). Legal, IT, Compliance
Implement Transfer Mechanisms Art. 45, 46, 47, 49 Ensure appropriate safeguards are in place for international transfers (e.g., Adequacy Decision, Standard Contractual Clauses (SCCs) + Transfer Impact Assessment (TIA), Binding Corporate Rules (BCRs), Derogations). Legal, Compliance
Transfer Impact Assessments (TIAs) Schrems II Judgement Conduct and document TIAs when relying on SCCs or BCRs to assess the level of data protection in the third country and identify supplementary measures if needed. Legal, IT Security

10. Breach Notification Readiness (Articles 33 & 34)

Breach Detection & Response Plan Art. 33, Art. 34 Establish and maintain an incident response plan specifically addressing personal data breaches, including detection, assessment, containment, and recovery. IT Security, IR Team, Legal, DPO
Breach Assessment Procedure Art. 33(1) Define a procedure to assess the risk to individuals' rights and freedoms following a breach to determine notification requirements. Legal, DPO, IT Security
Supervisory Authority Notification Art. 33 Ensure procedures are in place to notify the relevant Supervisory Authority of a notifiable breach without undue delay, and where feasible, within 72 hours of becoming aware. Legal, DPO, IR Team
Data Subject Notification Art. 34 Ensure procedures are in place to notify affected data subjects without undue delay if a breach is likely to result in a high risk to their rights and freedoms. Legal, DPO, Communications, IR Team
Internal Breach Register Art. 33(5) Maintain an internal register of all personal data breaches, regardless of whether notification was required. Compliance, DPO, IT Security

11. Governance, Documentation & Training

Data Protection Policies Art. 24, Art. 5 Develop, approve, and disseminate comprehensive data protection policies and procedures covering all aspects of GDPR compliance. Legal, Compliance, DPO
Maintain Documentation Art. 5(2), Art. 24, Art. 30 Keep records to demonstrate compliance (accountability principle), including policies, RoPA, consent records, DPIAs, DPAs, TIAs, breach logs, training records. All Depts, Compliance, DPO
Staff Training & Awareness Art. 39(1)(b), Art. 47(2)(n) Conduct regular data protection training for all relevant staff members, tailored to their roles and responsibilities. Maintain training records. HR, Compliance, DPO, IT Security

12. DPO Role & Internal Accountability

Appoint Data Protection Officer (DPO) Art. 37 Determine if a DPO appointment is mandatory. If so, appoint a DPO with expert knowledge, ensure independence, and provide necessary resources. Publish DPO contact details. Legal, HR, Senior Management
Define DPO Responsibilities Art. 39 Clearly define and document the DPO's tasks (informing, advising, monitoring compliance, cooperating with authorities, acting as contact point). Legal, Senior Management
Internal Accountability Structure Art. 24 Establish clear internal roles, responsibilities, and reporting lines for data protection compliance across the organization. Senior Management, Compliance, Legal

13. Logging, Monitoring & Audit Trails

Implement System Logging Art. 32(1)(b) Implement logging mechanisms for critical systems processing personal data to record access, modification, and deletion events (where appropriate and feasible). IT Operations, IT Security
Monitor System Activity Art. 32(1)(d) Regularly monitor system logs and security alerts for suspicious activities or potential security incidents involving personal data. IT Security, SOC
Maintain Audit Trails Art. 5(2), Art. 24 Ensure audit trails are maintained for key data processing activities to support accountability and incident investigation. Securely store logs. IT Operations, Compliance, IT Security

14. Preparing for DORA (aligned GDPR controls for resilience)

Review Security Measures (Art. 32) for Resilience GDPR Art. 32 / DORA Art. 9, 12 Assess if current GDPR security measures (confidentiality, integrity, availability, resilience, backup/restore) meet the heightened operational resilience expectations under DORA. IT Security, Risk, BCM
Align Incident Response with DORA Reporting GDPR Art. 33 / DORA Art. 17-19 Review and update the data breach response plan to align terminology, classification, and reporting timelines with DORA's ICT-related incident reporting requirements. IR Team, Legal, DPO, Compliance
Review Vendor DPAs for DORA Clauses GDPR Art. 28 / DORA Art. 30 Assess if existing DPAs with critical ICT service providers include clauses covering DORA requirements (e.g., audit rights, exit strategies, resilience standards). Plan updates. Legal, Vendor Mgmt, Procurement
Enhance Resilience Testing GDPR Art. 32(1)(d) / DORA Art. 24-27 Incorporate resilience testing (BCP/DR tests, potentially TLPT if applicable under DORA) into the regular security testing schedule required by GDPR. IT Security, BCM, Risk

GDPR Core Concepts Map

graph TD GDPR[GDPR Compliance] --> PRINCIPLES(Core Principles Art. 5) GDPR --> BASIS(Lawful Basis Art. 6 & 9) GDPR --> RIGHTS(Data Subject Rights Art. 12–23) GDPR --> OBLIGATIONS(Controller & Processor Obligations) GDPR --> TRANSFERS(International Transfers Chapter V) GDPR --> ACCOUNTABILITY(Accountability) PRINCIPLES --> LAWFULNESS(Lawfulness, Fairness, Transparency) PRINCIPLES --> PURPOSE(Purpose Limitation) PRINCIPLES --> MINIMIZE(Data Minimization) PRINCIPLES --> ACCURACY(Accuracy) PRINCIPLES --> STORAGE(Storage Limitation) PRINCIPLES --> INTEGRITY(Integrity and Confidentiality) RIGHTS --> ACCESS(Access – Art. 15) RIGHTS --> RECTIFY(Rectification – Art. 16) RIGHTS --> ERASE(Erasure – Art. 17) RIGHTS --> RESTRICT(Restriction – Art. 18) RIGHTS --> PORT(Portability – Art. 20) RIGHTS --> OBJECT(Objection – Art. 21) OBLIGATIONS --> SECURITY(Security – Art. 32) OBLIGATIONS --> PBD(Privacy by Design – Art. 25) OBLIGATIONS --> ROPA(Records of Processing – Art. 30) OBLIGATIONS --> DPIA(Data Protection Impact – Art. 35) OBLIGATIONS --> PROCESSOR(Processor Management – Art. 28) OBLIGATIONS --> BREACH(Breach Notification – Art. 33/34) OBLIGATIONS --> DPO(DPO – Art. 37–39) ACCOUNTABILITY --> DOCS(Documentation) ACCOUNTABILITY --> POLICIES(Policies) ACCOUNTABILITY --> TRAINING(Training) style GDPR fill:#ccf,stroke:#333,stroke-width:2px; style PRINCIPLES fill:#cfc; style BASIS fill:#ffc; style RIGHTS fill:#fcc; style OBLIGATIONS fill:#cff; style TRANSFERS fill:#f9c; style ACCOUNTABILITY fill:#ddd;

This map shows key areas and articles within GDPR.