Audit modelDPIA Template for AI Systems – GDPR and EU AI Act Compliance
1. General information
Provide a concise overview: its name, purpose(s), expected benefits, and usage context
Describe the roles and responsibilities of the stakeholders
Indicate here which reference frameworks apply to the processing. These frameworks serve as normative standards and help guide the completion of the assessment.
2. Description
List the data collected and processed, specifying their retention periods, recipients, and persons with access.
Describe the data lifecycle here. You may attach a flow diagram as an appendix to your response.
Detail the data storage media here — for example, the application or software used to process the data.
3. Proportionality and necessity of data
Explain how the purposes of the processing are determined, explicit, and legitimate.
Specify the legal basis associated with your processing — for example, consent, legal obligation, or legitimate interest.
Explain how each data item is necessary to achieve the purposes of the processing.
Describe the measures implemented to ensure data quality.
Explain how the planned retention period for each data item is necessary to fulfill the purposes of the processing.
4. Protective measures for rights
Indicate here the methods used to inform data subjects (data charter, forms, etc.) and the content of the information provided.
Indicate here the methods used to collect consent.
Indicate here the procedures for exercising these rights.
Indicate here the procedures for exercising these rights.
Indicate here the procedures for exercising these rights.
A data processing agreement must be concluded with each processor, specifying all elements required under Article 28 of the GDPR.
Specify the country of transfer and the transfer mechanism used.
5. Lawfulness of data processing
6. Security of personal data
7. Data subjects’ rights
8. Quality and lawfulness of training data
9. Unlawful and unsecured transfer of personal data
10. Mitigation measures: lawfulness of processing
As both provider and deployer, it is important to verify that:
As both provider and deployer, it is important to verify that:
As both provider and deployer, it is important to verify that:
11. Mitigation measures: security of personal data
As both provider and deployer, it is important to verify that:
12. Mitigation measures: data subjects’ rights
As both provider and deployer, it is important to verify that:
As both provider and deployer, it is important to verify that:
As both provider and deployer, it is important to verify that:
13. Mitigation measures: quality and lawfulness of training data
As both provider and deployer, it is important to verify that:
As both provider and deployer, it is important to verify that:
As both provider and deployer, it is important to verify that:
14. Mitigation measures: unlawful and unsecured data transfer
As both provider and deployer, it is important to verify that:
15. Opinion of data subjects
16. Opinion of the DPO
17. Validation
The assessment must be signed by the data controller. In this case, it will be the organization’s legal representative or their authorized delegate.
Attribution / Pas d'utilisation commerciale
CC-BY-NC