Data Mapping & Inventory
Document all personal data collection points, storage locations, and processing flows.
0/4
0%
Name, email, phone, IP address, location, preferences, etc.
From website forms, CRM, analytics, email campaigns, etc.
How long you store customer data, logs, backups, etc.
Email provider, hosting, analytics, payment processor, etc.
Legal Basis & Consent
Establish lawful basis for all data processing activities (consent, contract, legal obligation, legitimate interests, etc.).
0/4
0%
Consent, contract, legal obligation, vital interest, public task, legitimate interest
Cookie banner, consent forms, double opt-in for email
Proof of consent, consent version, language, withdrawal options
Link to withdraw consent, unsubscribe button in emails
Data Subject Rights Implementation
Ensure individuals can exercise their GDPR rights (access, rectification, deletion, portability, objection).
0/5
0%
Respond within 30 days, provide all data in machine-readable format
Delete personal data upon request; exemptions: legal storage, legitimate interests
Allow users to update their profile and contact info
Export user data in machine-readable format (CSV, JSON)
Unsubscribe, do-not-track, opt-out of profiling
Data Processing Agreements (DPA)
Establish legal contracts with all data processors (vendors, subcontractors, cloud providers).
0/4
0%
With every vendor that processes personal data
US cloud providers require SCCs post-Schrems II decision
Ensure processor only uses approved sub-processors
Document all DPAs, update dates, contact persons
Technical & Organizational Measures (TOM)
Implement security controls to protect personal data from unauthorized access, loss, and breaches.
0/6
0%
SSL certificates, encryption for sensitive fields, encrypted backups
Only authorized employees access personal data, principle of least privilege
Log who accessed data, when, and why; retention 1+ year
Regular backups, tested recovery procedures, offsite copies
Annual GDPR training, password security, phishing awareness
Penetration testing, code review, patch management
Breach Notification & Incident Response
Prepare processes for detecting, reporting, and managing data breaches within required timeframes.
0/4
0%
Designated incident coordinator, escalation procedures, contact list
Notify German supervisory authority (Datenschutzbehörde) of high-risk breaches
If high risk to their rights/freedoms (email, letter, notification)
Keep records for supervisory authority review and audit trail
Data Protection Officer (DPO) & Governance
Determine DPO necessity and establish governance structures for ongoing compliance oversight.
0/4
0%
Public authority or large-scale systematic monitoring (typically required for startups with data processing)
Provide contact details on website and to supervisory authority
Document all processing, purposes, categories, retention periods
Profiling, automated decision-making, large-scale data, special categories