Data Mapping & Inventory

Document all personal data collection points, storage locations, and processing flows.

0/4
0%
Name, email, phone, IP address, location, preferences, etc.
Critical
From website forms, CRM, analytics, email campaigns, etc.
Critical
How long you store customer data, logs, backups, etc.
High
Email provider, hosting, analytics, payment processor, etc.
Critical

Legal Basis & Consent

Establish lawful basis for all data processing activities (consent, contract, legal obligation, legitimate interests, etc.).

0/4
0%
Consent, contract, legal obligation, vital interest, public task, legitimate interest
Critical
Cookie banner, consent forms, double opt-in for email
Critical
Proof of consent, consent version, language, withdrawal options
High
Link to withdraw consent, unsubscribe button in emails
High

Data Subject Rights Implementation

Ensure individuals can exercise their GDPR rights (access, rectification, deletion, portability, objection).

0/5
0%
Respond within 30 days, provide all data in machine-readable format
Critical
Delete personal data upon request; exemptions: legal storage, legitimate interests
Critical
Allow users to update their profile and contact info
High
Export user data in machine-readable format (CSV, JSON)
High
Unsubscribe, do-not-track, opt-out of profiling
Medium

Data Processing Agreements (DPA)

Establish legal contracts with all data processors (vendors, subcontractors, cloud providers).

0/4
0%
With every vendor that processes personal data
Critical
US cloud providers require SCCs post-Schrems II decision
Critical
Ensure processor only uses approved sub-processors
High
Document all DPAs, update dates, contact persons
Medium

Technical & Organizational Measures (TOM)

Implement security controls to protect personal data from unauthorized access, loss, and breaches.

0/6
0%
SSL certificates, encryption for sensitive fields, encrypted backups
Critical
Only authorized employees access personal data, principle of least privilege
Critical
Log who accessed data, when, and why; retention 1+ year
High
Regular backups, tested recovery procedures, offsite copies
High
Annual GDPR training, password security, phishing awareness
Medium
Penetration testing, code review, patch management
Medium

Breach Notification & Incident Response

Prepare processes for detecting, reporting, and managing data breaches within required timeframes.

0/4
0%
Designated incident coordinator, escalation procedures, contact list
Critical
Notify German supervisory authority (Datenschutzbehörde) of high-risk breaches
Critical
If high risk to their rights/freedoms (email, letter, notification)
Critical
Keep records for supervisory authority review and audit trail
High

Data Protection Officer (DPO) & Governance

Determine DPO necessity and establish governance structures for ongoing compliance oversight.

0/4
0%
Public authority or large-scale systematic monitoring (typically required for startups with data processing)
Medium
Provide contact details on website and to supervisory authority
Medium
Document all processing, purposes, categories, retention periods
Critical
Profiling, automated decision-making, large-scale data, special categories
High