Skip to content
TECHNOMATON | Docs SAI Certified Trainers

GDPR Checklist

Status: Ongoing


Part C: GDPR Compliance

#ActivityReferencePhaseDescription
C1Scope & GAP AnalysisArt. 2, 3PreparationDetermine processing scope and analyse gaps
C1.1— Territorial scopeArt. 3PreparationProcessing data of EU residents?
C1.2— Current state assessmentArt. 5, 24PreparationAudit current GDPR compliance state
C1.3— GAP identificationArt. 24PreparationIdentify gaps vs. GDPR requirements
C2Data Mapping (ROPA)Art. 30AnalysisRecords of Processing Activities
C2.1— Personal Data CategoriesArt. 30(1)(c)AnalysisNames, emails, IPs, cookies, behavioural, health data
C2.2— Legal BasisArt. 6, 9AnalysisConsent / Contract / Legal obligation / Legitimate interest
C2.3— Data Subject CategoriesArt. 30(1)(c)AnalysisCustomers, employees, partners, prospects
C2.4— Retention PeriodsArt. 5(1)(e), 30(1)(f)AnalysisHow long to retain? Auto-delete procedures
C2.5— Data Flow DiagramArt. 30AnalysisVisualisation of personal data flows
C2.6— Third-country transfersArt. 44-49AnalysisTransfers outside EU/EEA
C3Data Processing Agreements (DPA)Art. 28GovernanceAgreements with all processors
C3.1— Controllers vs. ProcessorsArt. 4(7,8), 26GovernanceAudit: Who is controller? Who is processor?
C3.2— Processor listArt. 28(1)GovernanceList of all processors
C3.3— Sub-processor ManagementArt. 28(2,4)GovernanceWho are sub-processors? Approvals?
C3.4— DPA TemplatesArt. 28(3)GovernanceStandardised agreements
C3.5— SCCs for transfersArt. 46(2)(c)GovernanceStandard Contractual Clauses for non-EU transfers
C4Privacy by Design & DefaultArt. 25ImplementationPrivacy in system design
C4.1— Privacy by Design principlesArt. 25(1)ImplementationEmbed privacy in system design
C4.2— Privacy by DefaultArt. 25(2)ImplementationDefault settings = minimum data
C4.3— Data MinimisationArt. 5(1)(c)ImplementationOnly necessary data. Delete unnecessary fields
C4.4— PseudonymisationArt. 4(5), 25ImplementationFor analytics: pseudonymise where possible
C4.5— AnonymisationGDPR Recital 26ImplementationFull anonymisation where possible
C5Technical & Organisational MeasuresArt. 32ImplementationSecurity of processing
C5.1— Encryption at restArt. 32(1)(a)ImplementationEncryption of personal data at rest (AES-256)
C5.2— Encryption in transitArt. 32(1)(a)ImplementationEncryption in transit (TLS 1.3)
C5.3— Access controlArt. 32(1)(b)ImplementationAccess control for personal data
C5.4— ConfidentialityArt. 32(1)(b)ImplementationEnsure confidentiality
C5.5— IntegrityArt. 32(1)(b)ImplementationEnsure data integrity
C5.6— AvailabilityArt. 32(1)(b)ImplementationEnsure availability
C5.7— ResilienceArt. 32(1)(b)ImplementationSystem resilience
C5.8— Restore capabilityArt. 32(1)(c)ImplementationAbility to restore data availability
C5.9— Regular testingArt. 32(1)(d)TestingRegular testing of measure effectiveness
C6DPIA (Impact Assessment)Art. 35AnalysisData Protection Impact Assessment
C6.1— DPIA process definedArt. 35(1)GovernanceWhen and how to conduct DPIA
C6.2— DPIA templateArt. 35(7)GovernanceDPIA template
C6.3— DPIA for high-risk processingArt. 35(3)AnalysisConducted for high-risk processing
C6.4— DPIA for AI systemsArt. 35 + AI ActAnalysisDPIA for AI processing personal data
C7Subject Rights (DSAR)Art. 15-22ImplementationData subject rights
C7.1— DSAR workflowArt. 12ImplementationProcess for handling subject requests
C7.2— DSAR email/formArt. 12(2)ImplementationChannel for receiving requests
C7.3— Identity verificationArt. 12(6)ImplementationProcess for verifying requester identity
C7.4— Right to AccessArt. 15ImplementationWorkflow: respond within 30 days
C7.5— Right to ErasureArt. 17ImplementationDelete user data including backups
C7.6— Right to RectificationArt. 16ImplementationCorrect errors, audit log
C7.7— Right to PortabilityArt. 20ImplementationExport in CSV/JSON/XML
C7.8— Right to RestrictionArt. 18ImplementationRestriction of processing
C7.9— Right to ObjectArt. 21ImplementationObjection to processing
C7.10— DSAR registerArt. 12MonitoringRecord of processed requests
C8Consent ManagementArt. 7ImplementationConsent management
C8.1— Cookie ManagementArt. 7, ePrivacyImplementationEssential/Functional/Analytics/Marketing cookies
C8.2— Cookie bannerePrivacyImplementationGDPR-compliant cookie banner
C8.3— Email Consent TrackingArt. 7(1)ImplementationDouble-opt-in workflow
C8.4— Consent WithdrawalArt. 7(3)ImplementationConsent withdrawal procedure
C8.5— Consent recordsArt. 7(1)MonitoringRecords of given consents
C9Privacy Policy & TransparencyArt. 12-14DocumentationInformation obligation
C9.1— Privacy PolicyArt. 13, 14DocumentationClear, complete, up-to-date
C9.2— GDPR Transparency (Art. 13/14)Art. 13, 14Documentation18 information items for subjects
C9.3— AI TransparencyArt. 22 + AI ActDocumentationInformation about AI in decision-making
C9.4— Layered noticesArt. 12(1)DocumentationMulti-layered information (summary + detail)
C10Data Breach ManagementArt. 33, 34IncidentBreach reporting procedure
C10.1— Breach detectionArt. 33IncidentBreach detection processes
C10.2— Breach assessmentArt. 33(1)IncidentRisk assessment of breach impact
C10.3— DPA notification (72h)Art. 33IncidentNotification within 72 hours
C10.4— Subject notificationArt. 34IncidentNotification of subjects in case of high risk
C10.5— Breach registerArt. 33(5)MonitoringRecord of all breaches
C10.6— Notification templatesArt. 33, 34DocumentationTemplates for notifications (DPA, subjects)
C11DPO (Data Protection Officer)Art. 37-39GovernanceData Protection Officer
C11.1— DPO appointedArt. 37GovernanceDPO designated and appointed
C11.2— DPO independenceArt. 38(3)GovernanceDPO independence ensured
C11.3— DPO Contact PublicArt. 37(7)Governancedpo@company.com published on website
C11.4— DPO registered with DPAArt. 37(7)GovernanceDPO registration with supervisory authority
C11.5— DPO ResponsibilitiesArt. 39GovernanceMonitoring, audit, education, liaison
C12Training & AwarenessArt. 39(1)(b)TrainingEmployee training
C12.1— GDPR training (all staff)Art. 39(1)(b)TrainingBasic GDPR training for all
C12.2— Role-specific trainingArt. 39(1)(b)TrainingSpecialised training (HR, Marketing, IT)
C12.3— Training recordsArt. 24(1)MonitoringRecords of completed training
C12.4— Awareness programmeArt. 39(1)(b)TrainingOngoing awareness raising

Critical Path

  1. C2 Data Mapping (ROPA) -> complete by 31.1.2026
  2. C7.4-C7.5 DSAR Access + Erasure -> complete by 28.2.2026
  3. C10 Breach Management -> complete by 28.2.2026
  4. C3 DPA with all vendors -> complete by 31.3.2026
  5. C5 Technical Measures -> complete by 31.3.2026

Implementation Phases


Resources