Last updated: 2026-04-03
Guide
Comprehensive compliance checklist¶
Use this checklist to track your organization's compliance progress across all key areas. Review quarterly and update status as initiatives are completed. Check boxes when items are complete and verified.
Governance and organization¶
Executive and leadership¶
- Executive sponsorship secured for compliance program
- Annual compliance budget allocated
- Data Protection Officer appointed (or Compliance Lead if not required)
- DPO has adequate resources and authority
- Monthly compliance review meetings scheduled
- Compliance escalation process documented
- Board-level compliance reporting established (if applicable)
Policies and procedures¶
- Master Data Protection Policy documented
- Privacy/Data Protection Policy approved
- Data Retention Policy established
- Data Subject Rights Process documented
- Breach Response Procedure created
- Vendor Management Policy defined
- Data Access Control Policy implemented
- Cross-border Transfer Policy (if applicable)
- All policies reviewed and updated within last 12 months
- Policy acknowledgment obtained from all employees
Organizational structure¶
- Privacy roles and responsibilities clearly defined
- Compliance team structure appropriate for organization size
- Department-level privacy contacts designated
- Escalation paths documented
- Cross-functional governance committee established
- Regular communication channels for privacy issues
Data inventory and mapping¶
Register of Processing Activities (RoPA)¶
- RoPA created and documented
- All processing activities documented with:
- Purpose of processing
- Categories of data processed
- Categories of data subjects
- Categories of recipients
- Retention periods
- Legal basis for processing
- Security measures implemented
- RoPA covers all departments (Sales, HR, Finance, Operations, IT, etc.)
- RoPA includes third-party processors and subprocessors
- RoPA reviewed and updated within last 90 days
- RoPA accessible to compliance team and auditors
Data inventory and classification¶
- All data types classified by sensitivity level
- Sensitive/special category data clearly identified
- Data sources documented (where data originates)
- Data flows mapped (from collection to disposal)
- High-risk processing activities identified
- Legacy systems and data documented
- Shadow IT/unauthorized processing identified and remediated
- Data inventory shared with all data custodians
Processing activity documentation¶
- Data minimization principle applied (collect only what's needed)
- Purpose limitation documented for each processing activity
- Storage limitation policies enforced (retention periods)
- Data integrity and confidentiality measures documented
- Accuracy procedures established
- Obsolete data disposal procedures implemented
Legal basis and consent¶
Lawful basis¶
- Lawful basis identified for all processing activities
- Lawful bases documented in RoPA (consent, contract, legal obligation, vital interests, public task, legitimate interests, etc.)
- Legitimate Interest Assessment (LIA) conducted for legitimate interest basis
- Necessity tests conducted before relying on each basis
- Basis review scheduled annually or when processing changes
Consent management¶
- Consent request language clear and non-deceptive
- Consent requests granular (separate consent per purpose)
- Consent forms unambiguous and easy to understand
- Consent given through clear affirmative action (not pre-checked boxes)
- Records of consent kept and documented
- Consent withdrawal mechanism available and easy to use
- Consent withdrawal requests honored within one month
- Consent system tracks consent version and date
- Consent audit trail maintained
- Regular consent audits conducted
Transparency and privacy notices¶
Privacy notices¶
- Privacy notice created for each processing context (website, app, employment, etc.)
- Privacy notices provided at point of data collection
- Privacy notices written in clear, accessible language
- Privacy notices cover all required elements:
- Identity of data controller and DPO contact
- Purposes of processing
- Legal basis for processing
- Categories of data processed
- Categories of recipients
- Retention periods
- Data subject rights available
- Right to lodge complaint with authority
- Automated decision-making information (if applicable)
- Withdrawal of consent process (if applicable)
- International transfer mechanisms (if applicable)
- Separate privacy notices for distinct processing purposes
- Privacy notices reviewed and updated within last 12 months
- Privacy notice versions controlled and archived
- Easy-to-understand summaries provided where appropriate
Notice delivery¶
- Privacy notices easily accessible on website (privacy page link)
- Privacy notice version control maintained
- Layered privacy notices (summary + detailed) implemented
- Multi-language privacy notices available (for applicable jurisdictions)
- Privacy notice language matches terms actually used in processing
- Annual privacy notice compliance audit conducted
Data subject rights management¶
Access rights (right to access)¶
- Process established for Subject Access Requests (SARs)
- SAR request form published or process documented
- SARs can be submitted through multiple channels
- SAR receipt acknowledged to requester
- Verification procedures conducted to authenticate requester identity
- Collected data compiled and provided in accessible format
- Response provided within regulatory timeframe (one month for GDPR, 45 days for CCPA depending on jurisdiction)
- Complex requests documented and tracked
- Extensions justified and communicated to requester
- SAR records maintained and auditable
- No fees charged for access requests
Rectification and erasure rights¶
- Process established for data correction requests
- Data correction requests handled within one month
- Inaccurate data corrected in all systems
- Notification to recipients of corrections (where feasible)
- Process established for erasure/deletion requests (right to be forgotten)
- Erasure requests evaluated against legal obligations and business needs
- Data deleted from primary systems when erasure approved
- Deletion from backup systems documented and tracked
- Notification to recipients of deletion (where feasible)
Data portability rights¶
- Data portability available for data provided by individuals
- Data provided in structured, commonly used, machine-readable format
- Direct transmission to third parties available (where technically feasible)
- Data portability process documented and user-friendly
- Portability requests handled within one month for GDPR (45 days for CCPA)
Right to object¶
- Direct marketing communications include unsubscribe links
- Easy mechanism to object to processing available
- Objection requests honored within one month
- Objection honoring confirmed to requester
- Legitimate interest processing can be objected to
- Profiling objections available
Rights related to automated decisions¶
- Automated decision-making processes identified and documented
- Individuals informed of automated decision-making (in privacy notice)
- Right to human review available for automated decisions
- Humans capable of reviewing and overriding automated decisions
- Automated decision-making impact assessments conducted
- Safeguards implemented to prevent discriminatory automated decisions
Rights tracking and monitoring¶
- All data subject rights requests tracked centrally
- Request log includes: requestor, request type, received date, response date
- Monthly reporting on outstanding rights requests
- None of processing used to determine rights fulfillment
- Performance metrics established (% handled within SLA)
Security and data protection¶
Access controls¶
- Role-based access control (RBAC) implemented
- Principle of least privilege enforced
- User access reviews conducted annually
- Dormant accounts deactivated
- Privileged access monitored and logged
- Multi-factor authentication (MFA) enabled for sensitive systems
- Administrative access restricted and audited
Encryption and technical controls¶
- Personal data encrypted in transit (TLS/SSL)
- Sensitive data encrypted at rest
- Encryption keys managed securely
- Database encryption enabled where applicable
- Data masking implemented for non-production environments
- Secure deletion protocols implemented
- Regular vulnerability assessments conducted
- Penetration testing completed (annually for large organizations)
Incident detection and response¶
- Security monitoring and logging enabled
- Log retention policy established
- Security incident response plan documented
- Incident response team identified and trained
- Incident severity classification system established
- Breach notification procedures documented
- Breach contact list maintained (regulatory authorities, individuals)
- Breach notification timelines understood (72 hours typical)
- Incident response drills conducted annually
- Post-incident reviews conducted for actual incidents
Network and system security¶
- Firewalls and intrusion detection enabled
- Regular security patches applied
- Antivirus/malware protection deployed
- Data loss prevention (DLP) tools configured
- Secure development lifecycle followed
- Security code reviews conducted
- Dependency scanning for known vulnerabilities
- Third-party security assessments current
Physical and environmental security¶
- Data centers have appropriate physical security controls
- Server access restricted to authorized personnel
- CCTV monitoring where applicable
- Environmental controls (temperature, humidity) maintained
- Backup procedures documented and tested
- Disaster recovery plan in place
- Business continuity plan updated annually
Vendor management and third parties¶
Vendor assessment¶
- Vendor inventory created and maintained
- All vendors processing personal data identified
- Vendors classified as processors or controllers
- Security questionnaires completed by all vendors
- Vendor certifications reviewed (SOC 2, ISO 27001, etc.)
- Reference checks conducted
- On-site vendor audits performed (for critical vendors)
- Annual vendor compliance reviews scheduled
Vendor agreements¶
- Data Processing Agreements (DPAs) signed with all processors
- Standard DPA terms documented
- DPAs include required clauses:
- Processor limitations on data use
- Subprocessor requirements and approval
- Security and confidentiality obligations
- Data subject rights cooperation
- Audit and inspection rights
- Data deletion/return upon termination
- International transfer mechanisms
- Liability and indemnification
- Processor agreements with Service Level Agreements (SLAs)
- Termination clauses address data handling
- DPA version control maintained
- New processors require DPA prior to processing
Subprocessor management¶
- Subprocessor list maintained and published
- Subprocessor approvals documented
- Individuals notified of subprocessor changes
- Subprocessors under equivalent protection agreements
- Right to object to new subprocessors reserved
- Annual subprocessor compliance review conducted
Vendor breach and incident notification¶
- Breach notification requirements in processor agreements
- Vendors required to notify within 24-48 hours of breach
- Escalation procedures for vendor incidents
- Vendor incident contact list maintained
- Right to audit vendors following incidents
Data protection assessments¶
Data Protection Impact Assessments (DPIAs)¶
- High-risk processing identified
- DPIAs completed for:
- Large-scale systematic processing
- Sensitive/special category data processing
- Automated decision-making with legal effect
- New technologies or systems
- Significant process changes
- DPIA documentation includes:
- Description of processing
- Necessity and proportionality assessment
- Identified risks and severity
- Mitigation measures
- Residual risk assessment
- DPIA results documented and retained
- High-risk DPIAs shared with regulatory authority (if required)
- DPIAs reviewed annually and updated when changes occur
Legitimate Interest Assessments (LIAs)¶
- LIAs completed for legitimate interest basis processing
- LIAs assess:
- Purpose legitimacy
- Necessity of processing
- Reasonable expectations of individuals
- Impact on individual rights
- Mitigation measures
- LIA documentation maintained
- LIA results drive security and notice enhancements
Breach management¶
Breach detection and reporting¶
- Breach definition understood across organization
- Breach detection mechanisms in place
- Breach reporting procedures documented
- Central breach log/register maintained
- Breach assessment process established (severity, scope, impact)
- Regulatory authority notification timeline clear (72 hours typical)
- Individual notification timeline clear (without undue delay)
- Authority contact information up to date
Breach response¶
- Incident response team trained on breach procedures
- Initial response steps documented
- Containment procedures established
- Forensic investigation procedures documented
- Notification templates prepared
- Authority notification letter template available
- Individual notification templates available
- Breach remediation measures documented
Post-breach management¶
- Root cause analysis conducted for breaches
- Corrective actions implemented
- Follow-up monitoring established
- Lessons learned documented
- Systemic improvements implemented
- Breach communication with stakeholders completed
Training and awareness¶
Mandatory training¶
- Privacy training mandatory for all employees
- Training covers:
- Data protection principles
- Privacy regulations applicable to organization
- Employee privacy responsibilities
- Data handling best practices
- Breach reporting procedures
- Data subject rights and how to handle requests
- Initial training required for all new hires (within 30 days)
- Annual refresher training scheduled
- Training completion tracked and documented
- Training effectiveness evaluated
Role-specific training¶
- IT staff trained on security and access controls
- HR staff trained on employee privacy rights
- Marketing staff trained on consent and profiling
- Sales staff trained on legitimate interest and customer data
- Customer service trained on rights request handling
- DPO/Compliance team trained on advanced topics
Awareness and culture¶
- Privacy champions identified in each department
- Privacy communication program established
- Monthly privacy tips or reminders distributed
- Privacy incidents discussed in team meetings
- Success stories and best practices shared
- Privacy awareness posters or communications displayed
- Privacy considered in performance evaluations
Compliance monitoring and auditing¶
Internal monitoring¶
- Monthly compliance metrics tracked and reported:
- Training completion percentage
- Pending data subject rights requests
- Vendor assessment status
- Security incidents and breaches
- Policy compliance violations
- Quarterly compliance review meetings held
- Compliance dashboard or scorecard developed
- Key performance indicators (KPIs) established
Internal audits¶
- Annual internal compliance audit scheduled
- Audit scope covers all compliance areas
- Audit procedures documented
- Audit findings documented and tracked
- Remediation plans developed for findings
- Follow-up audits verify remediation
- Audit reports shared with management and board
Regulatory compliance¶
- Regulatory requirement changes monitored
- Privacy authority guidance reviewed regularly
- Compliance with applicable regulations verified
- Regulatory authority communications tracked
- Data Protection Authority investigation procedures understood
- Cooperation obligations with DPAs understood
- Legal hold procedures for regulatory investigations in place
External audits and assessments¶
- Third-party audits scheduled as needed
- SOC 2 or equivalent assessment completed (if applicable)
- Certifications current (ISO 27001, C2A, etc.)
- External audit recommendations tracked and implemented
- Audit findings communicated to stakeholders
Documentation and record-keeping¶
Compliance documentation¶
- All compliance decisions documented
- Policy development history maintained
- Approval and sign-off recorded
- Policy implementation dates tracked
- Policy version control maintained
- Dated records of significant compliance events maintained
Auditable records¶
- Consent records maintained with version and date
- Data subject rights request records kept
- Breach incident records documented and retained
- Vendor assessment records maintained
- Training records and completion certificates retained
- DPA and processor agreement archives kept
- Audit and monitoring records preserved
- Records retention policy established
Record accessibility¶
- Compliance records organized and easily retrievable
- Access to compliance records controlled (confidential)
- Records backed up and disaster recovery tested
- Records accessible to auditors and regulators upon request
- Record retention periods comply with legal requirements
Jurisdictional-specific items¶
GDPR (if applicable)¶
- GDPR applicability assessed
- DPO appointed if required
- EU representative appointed (if non-EU organization)
- International transfer mechanisms documented
- Standard Contractual Clauses (SCCs) reviewed and updated
- Transfer Impact Assessment (TIA) completed
- GDPR-specific policies implemented
CCPA/CPRA (if applicable)¶
- CCPA/CPRA applicability assessed
- Consumer rights processes implemented
- Opt-out mechanisms available for sale/sharing
- Service provider vs. third party distinctions documented
- California Privacy Protection Agency (CalPPA) cooperation procedures
- Private right of action for data breaches prepared
PDPA (if applicable)¶
- PDPA applicability assessed
- Consent processes compliant with PDPA
- Purpose limitation enforced
- PDPC notification procedures understood
- Third-party disclosure requirements met
APPI (if applicable)¶
- APPI applicability assessed
- Sensitive information classification implemented
- Purpose specification documented
- Cross-border transfer mechanisms for Japan transfers
- Personal Information Protection Commission (PPC) cooperation procedures
LGPD (if applicable)¶
- LGPD applicability assessed
- DPO appointed if required
- Lawful basis documentation for Brazilian data
- Subject rights processes LGPD-compliant
- International transfer mechanisms documented
- ANPD cooperation and notification procedures understood
Quick self-assessment scoring¶
Count completed checkboxes in each section:
| Section | Completed | Total |
|---|---|---|
| Governance & Organization | ___ | 17 |
| Data Inventory & Mapping | ___ | 20 |
| Legal Basis & Consent | ___ | 10 |
| Transparency & Privacy Notices | ___ | 16 |
| Data Subject Rights Management | ___ | 28 |
| Security & Data Protection | ___ | 29 |
| Vendor Management | ___ | 22 |
| Data Protection Assessments | ___ | 16 |
| Breach Management | ___ | 14 |
| Training & Awareness | ___ | 13 |
| Compliance Monitoring & Auditing | ___ | 14 |
| Documentation & Record-Keeping | ___ | 11 |
| Jurisdictional-Specific | ___ | 15 |
| TOTAL SCORE | ___ | 225 |
- 200-225: Mature compliance program
- 175-199: Strong program with minor gaps
- 150-174: Developing program, prioritize remaining items
- <150: Focus on foundational elements first
What to read next¶
- Global privacy laws overview → — Understand your regulatory obligations
- Practical compliance guidance → — Step-by-step implementation strategies
- Employee training program → — Build awareness across your team
Note: Review this checklist quarterly. Use it as both a progress tracker and a compliance verification tool. Your score should increase over time as your program matures.
Not legal advice
AI-generated content does not constitute legal advice. Consult a qualified legal professional for advice specific to your jurisdiction and business context.