GDPR7 min read

GDPR Compliance Checklist: Step-by-Step Guide

This comprehensive checklist helps you systematically achieve GDPR compliance. Use it as a roadmap for your compliance journey and as an ongoing reference to maintain compliance.

Key Takeaways

Point Summary
5 phases Assessment → Legal Foundations → Rights & Processes → Technical Security → Ongoing Maintenance
Start with data audit Map all personal data: what, where, why, how long, who has access
Key documents Privacy policy, cookie policy, DPAs with vendors, ROPA, breach response plan
Technical requirements Data security, encryption, access controls, breach detection
Ongoing DSAR handling, privacy training, vendor reviews, policy updates

Quick Answer: GDPR compliance involves: (1) audit your data, (2) establish legal bases, (3) set up rights handling processes, (4) implement technical security, (5) maintain ongoing compliance. Start with a data map and privacy policy.

Phase 1: Assessment and Planning

1.1 Determine Applicability

  • Confirm GDPR applies to your organization
  • Identify if you're a controller, processor, or both
  • Determine which EU/EEA countries you operate in
  • Identify your lead supervisory authority (if operating in multiple countries)

1.2 Conduct Data Audit

Data Audit Checklist:

Inventory:

  • List all systems processing personal data
  • Identify all data categories collected
  • Document data sources (direct/indirect)
  • Map data flows between systems

Analysis:

  • Identify special category data
  • Flag high-risk processing activities
  • Assess current security measures
  • Review existing policies and procedures

1.3 Gap Analysis

  • Compare current practices against GDPR requirements
  • Prioritize gaps by risk level
  • Estimate resources needed for remediation
  • Create remediation timeline

Phase 2: Governance and Accountability

2.1 Leadership and Responsibility

  • Assign privacy responsibility to specific role/person
  • Obtain executive sponsorship
  • Establish privacy budget
  • Determine if DPO is required
  • Appoint DPO if required (or voluntary)
  • Ensure DPO independence and resources

2.2 Documentation

Document Status Owner Review Date
ROPA (Record of Processing)
Privacy Policy
Cookie Policy
Data Retention Policy
Information Security Policy
Incident Response Plan
DSAR Procedures

2.3 Record of Processing Activities (ROPA)

  • Document all processing activities
  • Include all required GDPR fields
  • Identify legal basis for each activity
  • Document retention periods
  • List recipients and transfers
  • Establish update process

Phase 3: Legal Basis and Consent

3.1 Legal Basis Documentation

For each processing activity:

  • Identify appropriate legal basis
  • Document justification
  • For legitimate interests: complete LIA
  • For consent: implement valid consent mechanism
  • Update privacy policy with legal bases

3.2 Consent Management

Consent Implementation Checklist:

Collection:

  • Design compliant consent forms
  • Separate consent for different purposes
  • No pre-ticked boxes
  • Clear, plain language
  • Link to privacy policy

Recording:

  • Log consent timestamp
  • Record consent text/version
  • Link to user identifier
  • Secure storage

Withdrawal:

  • Easy withdrawal mechanism
  • Process withdrawals promptly
  • Update all systems
  • Confirm to user

3.3 Marketing Consent

  • Audit existing marketing lists
  • Implement double opt-in for new signups
  • Add unsubscribe to all marketing emails
  • Re-consent lists where needed
  • Clean lists of non-consented contacts

Phase 4: Transparency

4.1 Privacy Policy

  • Contains all GDPR-required information
  • Written in clear, plain language
  • Published and easily accessible
  • Covers all processing activities
  • Current and dated
  • Available before data collection

4.2 Just-in-Time Notices

  • Registration forms include mini-notices
  • Contact forms explain data use
  • Checkout process is transparent
  • Mobile app has appropriate notices

4.3 Cookie Compliance

  • Cookie audit completed
  • Cookie policy published
  • Cookie banner implemented
  • Consent before non-essential cookies
  • Accept and reject equally prominent
  • Granular consent options
  • Easy preference changes
  • Technical blocking working

Phase 5: Data Subject Rights

5.1 Rights Handling Procedures

Right Procedure Documented Process Tested Timeline Met
Access (DSAR) One month
Rectification One month
Erasure One month
Restriction One month
Portability One month
Object Immediate for marketing

5.2 DSAR Process

DSAR Readiness Checklist:

Intake:

  • Request channel established
  • Acknowledgment template ready
  • Identity verification process

Processing:

  • Data discovery process documented
  • All systems searchable
  • Response template created
  • Review process established

Delivery:

  • Secure delivery method
  • Response format defined
  • Tracking system in place

Timeline:

  • One-month deadline tracked
  • Extension criteria defined (two further months for complex requests)
  • Escalation process established

5.3 Self-Service Options

  • Users can view their data in-app
  • Users can update their information
  • Users can download their data
  • Users can delete their account
  • Marketing preferences accessible

Phase 6: Data Security

6.1 Technical Measures

Measure Implemented Tested Documented
Encryption at rest
Encryption in transit
Access controls
Multi-factor authentication
Secure backups
Intrusion detection
Vulnerability scanning
Secure development practices

6.2 Organizational Measures

  • Information security policy documented
  • Access management process established
  • Employee background checks (where appropriate)
  • Security awareness training implemented
  • Incident response plan created
  • Business continuity plan in place

6.3 Regular Security Activities

  • Quarterly access reviews scheduled
  • Annual penetration testing planned
  • Regular vulnerability assessments
  • Security training refresh schedule
  • Security policy reviews scheduled

Phase 7: Vendor Management

7.1 Vendor Inventory

  • List all vendors processing personal data
  • Identify processors vs. controllers
  • Document data shared with each
  • Assess vendor security posture

7.2 Data Processing Agreements

Vendor DPA Status SCC Required Last Review

7.3 Ongoing Vendor Management

  • Sub-processor notification process
  • Annual vendor reviews scheduled
  • Vendor security questionnaire template
  • Offboarding/data deletion procedures

Phase 8: International Transfers

8.1 Transfer Assessment

  • Identify all international data transfers
  • Determine destination country adequacy status
  • Implement appropriate safeguards (SCCs, etc.)
  • Complete Transfer Impact Assessments
  • Document in ROPA and privacy policy

8.2 Transfer Mechanisms

Transfer Destination Mechanism TIA Complete

Phase 9: Breach Preparedness

9.1 Incident Response

  • Incident response plan documented
  • Response team identified
  • Escalation procedures clear
  • Communication templates ready
  • DPA notification process established

9.2 Breach Response Capability

Breach Readiness Checklist:

Detection:

  • Monitoring systems in place
  • Reporting channels clear
  • 24/7 detection capability

Response:

  • Response team trained
  • Containment procedures documented
  • Forensic capability available
  • Legal counsel accessible

Notification:

  • 72-hour timeline achievable
  • DPA contact information current
  • Notification templates ready
  • Individual notification process

Documentation:

  • Breach log maintained
  • Investigation procedures
  • Lessons learned process

Phase 10: Training and Awareness

10.1 Training Program

Training Audience Frequency Last Completed
GDPR Overview All staff Annual
Data Handling Data handlers Annual
Security Awareness All staff Quarterly
Incident Response Response team Annual
Privacy by Design Developers Annual

10.2 Awareness Activities

  • Privacy policy accessible to all staff
  • Regular privacy communications
  • Privacy contact point known
  • Reporting procedures clear

Phase 11: Ongoing Compliance

11.1 Regular Reviews

Activity Frequency Last Complete Next Due
ROPA update Quarterly
Privacy policy review Annual
DPA review Annual
Security assessment Annual
Training refresh Annual
Vendor review Annual

11.2 Change Management

  • Privacy impact in change process
  • New processing requires review
  • New vendors require DPA
  • New features assessed for privacy

11.3 Documentation Maintenance

  • All documentation dated
  • Version control in place
  • Historical versions retained
  • Regular accuracy reviews

Compliance Dashboard

Track your overall compliance status:

Area Status Priority Target Date
Governance 🟡 In Progress High
Legal Basis 🔴 Not Started High
Transparency 🟡 In Progress High
Rights 🔴 Not Started Medium
Security 🟢 Complete High
Vendors 🔴 Not Started Medium
Transfers 🟡 In Progress Medium
Breach Prep 🔴 Not Started High
Training 🟡 In Progress Medium

How Bastion Helps

GDPR compliance is an ongoing commitment rather than a one-time project. Working with experienced partners helps organizations achieve compliance efficiently and maintain it over time.

Challenge How We Help
Assessment Comprehensive gap analysis to understand your current state
Documentation Proven templates and streamlined processes for required documentation
Implementation Expert guidance to ensure controls are implemented correctly
Training Staff awareness programs tailored to different roles
Ongoing Compliance Continuous monitoring and periodic reviews to maintain compliance

Our managed services approach brings additional expertise to handle the heavy lifting, helping ensure things are done right the first time and avoiding the costly iterations that often come from addressing compliance without experienced guidance.


Ready to discuss your GDPR compliance approach? Talk to our team →