GDPR Readiness Assessment
To get the most value out of this exercise,
we encourage you to give
objective answers. Click on
for more information on each question.
We have determined if we are required to appoint a Data Protection Officer (DPO), appointed one if necessary, and communicated their contact details to the local supervisory authority.
According to Article 37 (1) you must appoint a DPO if you are a public authority, your core activity involves regular and systematic monitoring of data subjects on a large scale or you process special categories of data on a large scale.
Also, according to Article 37 (7) you 'shall publish the contact details of the data protection officer and communicate them to the supervisory authority'.
Even if you are not required to appoint a DPO you can decide to do so voluntarily.
|
We have established a privacy team, assigned privacy-related responsibilities throughout our organization, and organized specific training
Successful privacy-management programs depend on everyone in the organization being aware of their data privacy responsibilities and supporting the compliance efforts.
It is essential to ensure your compliance programme has identified suitable roles and responsibilities, and awareness training has been established.
|
We have an updated record of the personal data processing activities carried out under our responsibility (GDPR controller register).
You cannot assess and document compliance for an activity you did not identify. That's why maintaining an accurate and up-to-date register of processing activities is the cornerstone of your compliance efforts
Even if the register is not mandatory for your your organization - Article 30 (5) - you should still create an inventory of personal data processing activities and update it regularly, to ensure you can properly document compliance with other Regulation requirements.
|
We have an updated record of all categories of processing activities carried out on behalf of other organizations (GDPR processor register).
Pursuant to Article 30 (2), you should keep written records of the categories of processing activities you carry out as a processor.
Even if the register is not mandatory for your your organization - Article 30 (5) - you should still create this inventory as it will help you better document the security of your activities.
|
The purpose for each personal data processing activity is clearly described
Pursuant to Article 5 (1) personal data shall be collected for specified, explicit and legitimate purposes. A clearly identified purpose for each processing activity is also needed to comply with several other Regulation requirements (e.g.: right to be informed, obtaining consent etc).
|
The lawful basis for each processing activity is determined
Without determining a lawful basis you cannot demonstrate compliance with Article 6, which specifies the conditions that have to be met so the processing activities are lawful.
If you are processing special categories of data you should also check if any of the Article 9 (2) conditions are met.
|
A legitimate interest analysis (LIA) was conducted for processing activities based on legitimate interest
According to Article 6 (2) when processing is necessary for the purposes of the legitimate interests pursued by your organization, you need to make sure the interests or fundamental rights and freedoms of the data subject are not affected, in particular where the data subject is a child.
LIA includes a balancing test which looks at whether your legitimate interest might be overridden by the impact the processing can have on the data subject.
|
Controls are in place to ensure valid consent is obtained (if applicable)
Consent of the data subject has to be freely given, specific, informed and unambiguous. You should be able to demonstrate that the data subject has given consent to the processing operation and consent must be revocable.
Identify, document and implement specific measures that will allow you to demonstrate a systematic and sustainable approach to comply with these requirements.
|
Previous
Next
GDPR Readiness Assessment
This is a high-level assessment. Your report will
include comments and suggestions for a more
detailed
analysis on each topic.
For each processing activity we explained why the data is needed and controls are in place to minimise data collection and processing
For each processing activity we explained why the data is needed and controls are in place to minimise data collection and processing
|
We have a ‘Data Quality Policy’ and controls are in place to ensure data accuracy
According to Article 5 (1) 'personal data should be accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay (‘accuracy’);' Identify, document and implement specific measures that will allow you to demonstrate a systematic and sustainable approach to comply with these requirements.
|
We have determined the data retention period for each activity and created a ‘Data Retention Policy’
Pursuant to Article 5 (1) 'personal data should be kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed; personal data may be stored for longer periods insofar as the personal data will be processed solely for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes in accordance with Article 89(1) subject to implementation of the appropriate technical and organisational measures required by this Regulation in order to safeguard the rights and freedoms of the data subject (‘storage limitation’).
The 'Data Retention Policy' provides guidelines on how long personal data should be kept for each processing purpose, which helps implement appropriate measures to ensure storage limitation.
|
We have a 'Data Anonymisation/Pseudonymisation Policy'
The 'Data Anonymisation/Pseudonymisation Policy' is a document that provides guidelines on how and when to use anonymization and pseudonimisation of personal data. Create this document to help demonstrate compliance with the 'storage limitation' principle.
|
We have a 'Media Destruction, Retention & Backups Policy'
Create this document to help demonstrate compliance with the 'storage limitation' and 'integrity and confidentiality' principles mentioned in Article 5(1).
|
Previous
Next
GDPR Readiness Assessment
Unless you have an unlimited budget, there is no such thing as perfect compliance.
Identifying and prioritizing high-risk areas will help you focus on where you can make the biggest difference.
We created an organization-wide inventory of data supporting assets
Personal data is just a concept. It doesn’t exist in the real world until it is collected and stored somewhere.
A data supporting asset is the physical form the data takes in order to be created, accessed, modified, transported and eventually destroyed.
Data supporting assets can be hardware (e.g. laptops, networking gear, storage devices), software (e.g. applications, databases, files), documents, transmission channels (e.g. Wifi, mail, internal workflow) and people (e.g. users accessing the data).
A regularly updated data supporting assets inventory is essential to be able to ensure the personal data integrity and confidentiality.
|
Each data supporting asset was analyzed to identify threats and vulnerabilities
Protecting the data supporting assets in your inventory requires a regular assessment of their vulnerabilities and potential threats that might exploit them. Once these are identified they can be prioritised and addressed with specifric controls.
|
Privacy and security controls are implemented for each data supporting asset
Personal data is protected by implementing control measures for 'data supporting assets', in order to address the vulnerabilities and threats identified and prevent events like illegitimate access, unwanted modification or destruction of personal data.
|
We have a system in place to ensure that planned privacy and security controls are implemented
Security audits often come with recommendations, in the form of additional controls to be implemented or improvements to existing controls. You should make sure a system is in place to follow-up on these recommendations until they are implemented. And then ensure periodical reviews are conducted.
|
We have a ‘Vendor Selection/Onboarding Procedure’
When selecting vendors to process personal data on your behalf it's your responsibility to ensure that their security is adequate. You should have a procedure to ensure that each vendor undergoes an assessment.
|
Each vendor involved in data processing activities is subject to a periodic security assessment
Make sure vendor security assessments are regularly reviewed and updated.
|
We have determined what security policies we need and created them
According to Article 32 (1) 'taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk'.
These measures can include policies and procedures like 'Information Security Policy', 'Clear Desk and Clear Screen Policy', 'Bring Your Own Device (BYOD) Policy','Mobile Device and Teleworking Policy' etc. Your security team should determine your needs and create these policies accordingly.
|
We keep a security incidents log and have a data breach response and authority notification procedure
Pursuant to Article 33 (1) 'in the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons.'
To comply with this requirement, you must keep a log of security incidents and maintain a procedure that allows you to promptly determine if an incident represents a data breach that should be reported.
|
Previous
Next
GDPR Readiness Assessment
This tool is based on the much more detailed virtual assistant feature available in Sypher, which is designed to help
you find and fill specific gaps in your privacy-related documentation.
We created the necessary privacy notices
According to Article 13 and 14 whenever you collect personal data you must provide specific information to the data subject.
Even if in some cases (e.g. if the processing is based on legal obligation or contract performance) the data subject might already know about the processing it's best to inform them anyway, if possible.
|
We have a system in place to identify relevant changes that require an update for the privacy notices
Privacy notices are probably the most visible part of your compliance status.
It's what the data subjects see when they get in contact with your organization.
You need to have a system that ensures they are regularly updated whenever a change occurs.
|
We have a ‘Data Subject Requests Management Procedure’ and response templates
Make sure every public-facing person in your organization is able to recognize a data subject request and has access to a procedure that tells them how to handle it - or to whom to send it.
Also keep in mind that your employees are data subjects too.
|
Controls are in place to ensure data subjects rights are protected
Ignoring or forgetting to answer a request is a sure way to get a complaint and a visit from your data protection authority.
Determine the practical measures to be implemented so you are able to identify and comply in time with data subjects requests (e.g. a monitoring system that sends notifications when requests are approaching the deadline).
|
We have a system to identify all third country transfers of personal data
Transferring data to a third country comes with risks that should be considered prior to transferring it. It is recommended to have a system to determine if you or your vendors or partners engage in this type of transfers.
|
The adequacy of each personal data transfer to a third country was assessed and documented
Every third country transfer should be subject to an assessment to determine whether the law or practice of the third country provides enough protection and if supplementary measures are needed or not. This assessment should be documented and reviewed on a regular basis. For more details please check EDPB recommendations.
|
We have a system in place to assess the risk of each processing activity and to identify those that require a DPIA
Pursuant to Article 35 'where a type of processing in particular using new technologies, and taking into account the nature, scope, context and purposes of the processing, is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall, prior to the processing, carry out an assessment of the impact of the envisaged processing operations on the protection of personal data.'
DPIAs should be properly documented and updated on a regular basis.
|
Previous
Next
GDPR Readiness Assessment
This is the last page! After answering these questions click on 'See results' to get to your report.
We have a ‘Personal Data Protection Policy’
This is a fundamental document that sets out your organization's approach to meeting its obligations under data protection law.
It serves as the basis for your organization's GDPR compliance practices, explains the GDPR requirements for employees and affirms the commitment to become and stay compliant.
|
We have a disaster recovery plan that covers resuming the activities for which a DPIA was deemed necessary
Make sure your organization is able to demonstrate its ability to resume at least the activities that have an important impact on data subjects.
|
We have a contract or data processing agreement in place with every data recipient that we work with
This will allow you to demonstrate you took formal steps to ensure the data is adequately protected when it leaves your organization.
It also establishes clear rules of collaboration and responsibilities in case of joint controllers.
|
We have a reviewing system in place, that ensures our ability to demonstrate compliance is verified and confirmed on a regular basis
Your compliance is as strong as the information you used to document it. It's almost impossible to maintain it without a system in place to monitor changes and ensure regular updates are performed.
|
Previous