Javascript is required
logo-dastralogo-dastra

Audit modelSubcontractor GDPR assessment (advanced)

GDPR
Advanced assessment of the measures implemented by a subcontractor to meet GDPR requirements.

1. GDPR Compliance Policy

1.1. Is there a contract between the Data Controller and the processor?
1.2. Does the contract contain clauses defining the subcontractor's responsibilities that comply with the GDPR?
1.3. Please download the contract and/or the addendum.
1.4. Has the processor formalised a Privacy Policy?
1.5. Please download the privacy policy
1.6. Has the processor appointed a DPO?
1.7. Please indicate DPO details (name, first name, telephone number, email address)
1.8. Has the processor appointed an Chief Information Security Officer (CISO)?
1.9. Please indicate CISO details (name, first name, telephone number, email address)
1.10. Does the processor keep a record of processing activities for the services entrusted to it by the controller?
1.11. Has the processor already carried out a compliance audit of the personal data used in connection with the services entrusted to it by the controller?
1.12. Has a risk analysis (privacy impact assessment as defined in the GDPR) been carried out on the services entrusted from the point of view of the protection of personal data?
1.13. Has the processor defined and formalised data protection procedures (exercise of data subject rights, data breach, privacy by design / default, etc.)?

2. Human resources

2.1. Has the processor defined and implemented a plan to raise awareness of the GDPR among employees?
2.2. Has the processor made its employees who have access to the data entrusted to it by its clients sign a confidentiality agreement, possibly in the employment contract?
2.3. Has the subcontractor drawn up a charter for the use of IT resources?

3. Physical access control to premises

3.1. Has the subcontractor taken appropriate state-of-the-art technical and organisational measures to control access to its premises?

3.2. Select the measures taken to control access to the premises
3.3. Has the processor taken appropriate state-of-the-art technical and organisational measures to control access to the facilities where personal data are processed, in particular to verify authorisation?
3.4. Select the measures taken to control access to the facilities where personal data are processed, in particular to verify authorization

4. Logical access control to IT systems

4.1. Has the subcontractor taken the technical and organisational measures for user identification and authentication to limit access to IT systems to only those persons concerned by the use of personal data for the service entrusted?
4.2. Select identification and authentication measures

5. Hosting and storage of personal data

5.1. Where are the data entrusted by the data controller hosted?
5.2. Identify the host(s) where the data entrusted by the data controller is stored
5.3. Are the hosting provider(s) ISO 27001 certified?
5.4. Is the processor ISO 27001 certified?
5.5. Has the processor defined and implemented an internal data retention policy that complies with the requirements of the GDPR?

E.g. retention and disposal policy.

5.6. Does the processor delete or return personal data in accordance with the documented instructions received from the controller?
5.7. Unless expressly authorised in the contract, is the data entrusted by the Customer to the processor for processing hosted and used within the EU/EEA or in an appropriate country?
5.8. How is it permitted to transfer personal data to countries outside the EU/EEA or to an unsuitable country?
5.9. What measures are in place to protect IT infrastructures?

6. Data security

6.1. Has the subcontractor set up a security incident management procedure?
6.2. Does the subcontractor take measures to prevent loss, alteration or unauthorised disclosure during electronic transfer, data transport, transmission control, communication or storage of data on data media (manual or electronic), etc, and thus control the risks of unauthorised disclosure?
6.3. Describe the measures in place
6.4. Does the processor regularly assess the technical and organisational measures designed to control access to personal data (e.g. penetration tests)?
6.5. Does the subcontractor have a business continuity plan (BCP) with data replication to a backup site?
6.6. Has the subcontractor implemented a data backup plan?

7. Compliance of processing activities' implementation

7.1. Has the processor put in place measures for subsequent verification of the entry, modification or deletion of data, and of the person who carried it out (logging of access and reporting)?
7.2. Does the subcontractor regularly inform the Customer of the proper execution of the Contract for the services entrusted to it (compliance with documented instructions)?
7.3. Does the processor comply with the principles of isolation of processing for different purposes and has it put in place appropriate measures?

8. Subsequent subcontracting

8.1. Is subsequent subcontracting part of the contract with the subcontractor?
8.2. Does the contract stipulate that the data controller must approve the choice of subsequent processors?
8.3. Are relations with subsequent subcontractors covered by a contract with the subcontractor?
8.4. Do these contracts take GDPR requirements into account?
8.5. Are any transfers of data outside the EU by subsequent processors governed by standard clauses or other provisions laid down by the supervisory authority?
8.6. Has the processor ensured that subsequent processors have taken the organisational and technical measures necessary to provide sufficient guarantees for the protection of personal data?
Created at:2021-10-04T21:46:29.552278

Updated on :2024-01-13T15:20:14.4893098

License : © Creative commons :
Attribution / Pas d'utilisation commerciale
CC-BY-NC AttributionPas d'utilisation commerciale

Uses :2


Access all our audit templates

Try Dastra now to access all of our audit templates that you can customize for your organization.It's free and there's no obligation for the first 30 days (no credit card required)

Build my audit
Subscribe to our newsletter

We will send you a few emails to keep you informed of our news and what's new in our solution

* You will always be able to unsubscribe on each newsletter. Learn more.