Javascript is required
logo-dastralogo-dastra

Modelo de auditoríaSubcontractor GDPR assessment (advanced)

GDPR
Advanced assessment of the measures implemented by a subcontractor to meet GDPR requirements.

1. GDPR Compliance Policy

1.1. Is there a contract between the Data Controller and the processor?
1.2. Does the contract contain clauses defining the subcontractor's responsibilities that comply with the GDPR?
1.3. Please download the contract and/or the addendum.
1.4. Has the processor formalised a Privacy Policy?
1.5. Please download the privacy policy
1.6. Has the processor appointed a DPO?
1.7. Please indicate DPO details (name, first name, telephone number, email address)
1.8. Has the processor appointed an Chief Information Security Officer (CISO)?
1.9. Please indicate CISO details (name, first name, telephone number, email address)
1.10. Does the processor keep a record of processing activities for the services entrusted to it by the controller?
1.11. Has the processor already carried out a compliance audit of the personal data used in connection with the services entrusted to it by the controller?
1.12. Has a risk analysis (privacy impact assessment as defined in the GDPR) been carried out on the services entrusted from the point of view of the protection of personal data?
1.13. Has the processor defined and formalised data protection procedures (exercise of data subject rights, data breach, privacy by design / default, etc.)?

2. Human resources

2.1. Has the processor defined and implemented a plan to raise awareness of the GDPR among employees?
2.2. Has the processor made its employees who have access to the data entrusted to it by its clients sign a confidentiality agreement, possibly in the employment contract?
2.3. Has the subcontractor drawn up a charter for the use of IT resources?

3. Physical access control to premises

3.1. Has the subcontractor taken appropriate state-of-the-art technical and organisational measures to control access to its premises?

3.2. Select the measures taken to control access to the premises
3.3. Has the processor taken appropriate state-of-the-art technical and organisational measures to control access to the facilities where personal data are processed, in particular to verify authorisation?
3.4. Select the measures taken to control access to the facilities where personal data are processed, in particular to verify authorization

4. Logical access control to IT systems

4.1. Has the subcontractor taken the technical and organisational measures for user identification and authentication to limit access to IT systems to only those persons concerned by the use of personal data for the service entrusted?
4.2. Select identification and authentication measures

5. Hosting and storage of personal data

5.1. Where are the data entrusted by the data controller hosted?
5.2. Identify the host(s) where the data entrusted by the data controller is stored
5.3. Are the hosting provider(s) ISO 27001 certified?
5.4. Is the processor ISO 27001 certified?
5.5. Has the processor defined and implemented an internal data retention policy that complies with the requirements of the GDPR?

E.g. retention and disposal policy.

5.6. Does the processor delete or return personal data in accordance with the documented instructions received from the controller?
5.7. Unless expressly authorised in the contract, is the data entrusted by the Customer to the processor for processing hosted and used within the EU/EEA or in an appropriate country?
5.8. How is it permitted to transfer personal data to countries outside the EU/EEA or to an unsuitable country?
5.9. What measures are in place to protect IT infrastructures?

6. Data security

6.1. Has the subcontractor set up a security incident management procedure?
6.2. Does the subcontractor take measures to prevent loss, alteration or unauthorised disclosure during electronic transfer, data transport, transmission control, communication or storage of data on data media (manual or electronic), etc, and thus control the risks of unauthorised disclosure?
6.3. Describe the measures in place
6.4. Does the processor regularly assess the technical and organisational measures designed to control access to personal data (e.g. penetration tests)?
6.5. Does the subcontractor have a business continuity plan (BCP) with data replication to a backup site?
6.6. Has the subcontractor implemented a data backup plan?

7. Compliance of processing activities' implementation

7.1. Has the processor put in place measures for subsequent verification of the entry, modification or deletion of data, and of the person who carried it out (logging of access and reporting)?
7.2. Does the subcontractor regularly inform the Customer of the proper execution of the Contract for the services entrusted to it (compliance with documented instructions)?
7.3. Does the processor comply with the principles of isolation of processing for different purposes and has it put in place appropriate measures?

8. Subsequent subcontracting

8.1. Is subsequent subcontracting part of the contract with the subcontractor?
8.2. Does the contract stipulate that the data controller must approve the choice of subsequent processors?
8.3. Are relations with subsequent subcontractors covered by a contract with the subcontractor?
8.4. Do these contracts take GDPR requirements into account?
8.5. Are any transfers of data outside the EU by subsequent processors governed by standard clauses or other provisions laid down by the supervisory authority?
8.6. Has the processor ensured that subsequent processors have taken the organisational and technical measures necessary to provide sufficient guarantees for the protection of personal data?
Creado el:09/04/2021

Actualizado el :07/29/2024

Licencia : © Creative commons :
Attribution / Pas d'utilisation commerciale
CC-BY-NC AttributionPas d'utilisation commerciale

Número de usos :4


Acceda a todos nuestros modelos de auditoría

Pruebe Dastra ahora mismo para acceder a la totalidad de nuestros modelos de auditoría que podrá adaptar a su organización. Es gratuito y sin compromiso durante los primeros 30 días (no se requiere tarjeta de crédito).

Utilizar este modelo de auditoría
Suscríbase a nuestro boletín

Le enviaremos algunos correos electrónicos para mantenerlo informado sobre nuestras novedades y las actualizaciones de nuestra solución.

* Siempre podrá darse de baja en cada boletín.