Third-Party Data Protection Compliance Checklist
Due Diligence
Vendor risk assessment completed
Data protection agreement reviewed
Security certifications verified
Contractual Controls
Data processing terms included
Breach notification procedures defined
Sub-processor disclosures obtained
Data Handling & Security
Data minimization practices implemented
Encryption standards verified
Access controls in place
Ongoing Monitoring
Regular security audits scheduled
Incident response plan tested
Compliance reviews documented
Termination
Data return/destruction confirmed
Access revocation documented