{"id":1494,"date":"2020-01-24T15:34:22","date_gmt":"2020-01-24T15:34:22","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=1494"},"modified":"2021-04-12T05:20:37","modified_gmt":"2021-04-12T05:20:37","slug":"ultimate-gdpr-compliance-checklist","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/","title":{"rendered":"The Ultimate GDPR Compliance Checklist"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p class=\"p1\"><span class=\"s1\">The European Union\u2019s General Data Protection Regulation (GDPR) took full effect on May 25, 2018. Per its <a href=\"https:\/\/gdpr-info.eu\/art-1-gdpr\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"s2\">official website<\/span><\/a>, the Regulation spells out rules for protecting EU citizens regarding the processing and movement of their personal data. It also outlines the fundamental rights and freedoms of EU citizens with respect to their personal data. In the event an organization does not comply with GDPR\u2019s requirements, they could incur an administrative fine of up to 20 million EUR or four percent of their total global annual turnover, whichever is higher.<\/span><\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><p class=\"p1\"><span class=\"s1\">One would think those penalties would be sufficient motivation for organizations to comply with the Regulation. But as it turns out, many organizations are still struggling with their GDPR compliance. Back in July 2018, for instance, <a href=\"http:\/\/info.trustarc.com\/Web-Resource-2018-07-12-GDPR-ResearchReport_LP.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"s2\">TrustArc<\/span><\/a> found that only one in five organizations in the United States, United Kingdom and European Union believed it had achieved compliance with GDPR. The <a href=\"https:\/\/iapp.org\/resources\/article\/iapp-ey-annual-governance-report-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"s2\">International Association of Privacy Professionals<\/span><\/a> (IAPP) discovered that 50 percent of firms were still non-compliant several months later in December 2018. More than a year after GDPR took effect, <a href=\"https:\/\/gdpr.report\/news\/2019\/07\/22\/almost-a-third-of-eu-firms-still-not-gdpr-compliant\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"s2\">RSM<\/span><\/a> learned that nearly a third of EU firms had not yet achieved compliance. The rate was even greater for UK firms at 50 percent through September 2019, per a report from <a href=\"https:\/\/pages.egress.com\/GDPR-survey-2019.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"s2\">Egress<\/span><\/a>.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Companies clearly need help in complying with GDPR. To that end, a compliance checklist for entities that are actively working to comply with the Regulation is detailed below. <\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><p class=\"p1\"><strong><span class=\"s1\">Implement Data Protection by Design<\/span><\/strong><\/p><\/h2><\/div><div class=\"fusion-text fusion-text-3\"><ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">Carry out a risk assessment of the data processing operations<\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">The risk assessment should include the following elements:<\/span>\n<ul class=\"ul2\">\n<li class=\"li1\"><span class=\"s2\">A description of the processing operations and of the purpose(s) for those operations, where applicable.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">An assessment of the proportionality of the processing operations to their intended purposes.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">An assessment that details the risks to data subjects\u2019 rights and freedoms.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">The security measures that could help mitigate those risks.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div><div class=\"fusion-text fusion-text-4\"><ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">Implement security measures that meet the requirements of the Regulation<\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">These security controls should accomplish the following:<\/span>\n<ul class=\"ul2\">\n<li class=\"li1\"><span class=\"s2\">Encrypt and pseudonymize data subjects\u2019 information.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">Ensure the confidentiality, integrity, availability and resilience of data processing systems and services.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">Demonstrate the ability to restore the availability and access to personal data following a physical or technical event in a timely manner.<\/span><\/li>\n<li class=\"li2\"><span class=\"s2\">Allow for regular testing that evaluates the ability of these measures to secure the information of data subjects.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><p class=\"p1\"><strong><span class=\"s1\">Consider Appointing a Data Protection Officer (DPO)<\/span><\/strong><\/p><\/h2><\/div><div class=\"fusion-text fusion-text-5\"><ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">Recognize when it\u2019s necessary to appoint a DPO under GDPR<\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">A DPO must be appointed when any of the following conditions are met:<\/span>\n<ul class=\"ul2\">\n<li class=\"li1\"><span class=\"s2\">A public authority or body carries out the data processing except in instances when a court executes these duties for judicial purposes.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">The processing operations require regular and\/or systematic monitoring of data subjects on a large scale.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">The data to be processed consists of special categories of information, per <a href=\"https:\/\/gdpr-info.eu\/art-9-gdpr\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"s5\">Article 9<\/span><\/a>, or information pertaining to criminal offenses, per <a href=\"https:\/\/gdpr-info.eu\/art-10-gdpr\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"s5\">Article 10<\/span><\/a>.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div><div class=\"fusion-text fusion-text-6\"><ul>\n<li><span class=\"s2\">Instruct the DPO to carry out certain tasks<\/span><\/li>\n<li style=\"list-style-type: none;\">\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">In particular, the DPO should discharge the following duties:<\/span>\n<ul class=\"ul2\">\n<li class=\"li1\"><span class=\"s2\">Inform and advise the data controller or processor as well as all employees who are involved in the processing.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">Monitor compliance with the Regulation and with the policies of the data controller or processor.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">Advise on the crafting of a data protection impact assessment and monitor its performance.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">Cooperate with the relevant supervisory authority.<\/span><\/li>\n<li class=\"li2\"><span class=\"s2\">Act as the point of contact for the controller or processor to the supervisory authority.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><p class=\"p1\"><strong><span class=\"s1\">Uphold Responsibility Following a Data Breach<\/span><\/strong><\/p><\/h2><\/div><div class=\"fusion-text fusion-text-7\"><ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">Individually notify data subjects of a data breach <\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">Data controllers or processors should not waste any time in issuing this notification in the event the data breach carries high risks to the data subjects\u2019 rights and freedoms, as identified under the Regulation.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">Data processors or controllers should use plain language to clearly communicate the effects of a data breach.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">Recognize that individual communication is not necessary if any of the following conditions are met:<\/span>\n<ul class=\"ul2\">\n<li class=\"li1\"><span class=\"s2\">The data controller or processor already applied security measures, especially encryption, to the pieces of information affected by the breach.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">The data controller or processor took additional measures following its discovery of the data breach to limit its risks.<\/span><\/li>\n<li class=\"li2\"><span class=\"s2\">It\u2019s more effective for the data controller or processor to notify all potentially affected data subjects about the breach via a dedicated website or other public forms of communication.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><p class=\"p1\"><strong><span class=\"s1\">Contemplate Obtaining Certification of Your GDPR Compliance<\/span><\/strong><\/p><\/h2><\/div><div class=\"fusion-text fusion-text-8\"><ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">Pursue a compliance certification program by doing the following:<\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s2\">Submit all information and necessary access surrounding its processing activities to the certification body, as referred to in <a href=\"https:\/\/gdpr-info.eu\/art-43-gdpr\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"s4\">Article 43<\/span><\/a>, or the supervisory authority, where appropriate.<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">Understand that certification will last a maximum time period of three years.<\/span>\n<ul class=\"ul2\">\n<li class=\"li1\"><span class=\"s2\">They will be able to renew their certification if they continue to meet the same conditions for certification of compliance.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><p class=\"p1\"><strong><span class=\"s1\">Streamlining Your Organization\u2019s GDPR Compliance Efforts<\/span><\/strong><\/p><\/h2><\/div><div class=\"fusion-text fusion-text-9\"><p class=\"p1\"><span class=\"s1\">As the above checklist helps to demonstrate, organizations have a lot to consider when it comes to achieving compliance with GDPR. That\u2019s why organizations would be best served by building a GDPR compliance program with the help of a trusted partner. Learn how ITEGRITI can help your organization get started on its path to GDPR compliance by clicking <a href=\"http:\/\/72.52.228.46\/~itegriti\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"s2\">here<\/span><\/a>.<\/span><\/p>\n<p><em>Editor\u2019s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of ITEGRITI, Inc.<\/em><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":12,"featured_media":1496,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[1200],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Ultimate GDPR Compliance Checklist for 2020<\/title>\n<meta name=\"description\" content=\"For the many entities that are actively working to achieve GDPR compliance, consider consulting our compliance checklist detailed below.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ultimate GDPR Compliance Checklist\" \/>\n<meta property=\"og:description\" content=\"For the many entities that are actively working to achieve GDPR compliance, consider consulting our compliance checklist detailed below.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-24T15:34:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T05:20:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Blog-Image_GDPR-Compliance-Checklist.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"David Bisson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DMBisson\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Bisson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/\"},\"author\":{\"name\":\"David Bisson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807\"},\"headline\":\"The Ultimate GDPR Compliance Checklist\",\"datePublished\":\"2020-01-24T15:34:22+00:00\",\"dateModified\":\"2021-04-12T05:20:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/\"},\"wordCount\":1568,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Blog-Image_GDPR-Compliance-Checklist.png\",\"keywords\":[\"4 Minute Read\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/\",\"name\":\"The Ultimate GDPR Compliance Checklist for 2020\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Blog-Image_GDPR-Compliance-Checklist.png\",\"datePublished\":\"2020-01-24T15:34:22+00:00\",\"dateModified\":\"2021-04-12T05:20:37+00:00\",\"description\":\"For the many entities that are actively working to achieve GDPR compliance, consider consulting our compliance checklist detailed below.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Blog-Image_GDPR-Compliance-Checklist.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Blog-Image_GDPR-Compliance-Checklist.png\",\"width\":800,\"height\":450,\"caption\":\"The Ultimate GDPR Compliance Checklist\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Ultimate GDPR Compliance Checklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807\",\"name\":\"David Bisson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g\",\"caption\":\"David Bisson\"},\"description\":\"David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/david-bisson-43335489\/\",\"https:\/\/x.com\/DMBisson\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/david-bisson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Ultimate GDPR Compliance Checklist for 2020","description":"For the many entities that are actively working to achieve GDPR compliance, consider consulting our compliance checklist detailed below.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/","og_locale":"en_US","og_type":"article","og_title":"The Ultimate GDPR Compliance Checklist","og_description":"For the many entities that are actively working to achieve GDPR compliance, consider consulting our compliance checklist detailed below.","og_url":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2020-01-24T15:34:22+00:00","article_modified_time":"2021-04-12T05:20:37+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Blog-Image_GDPR-Compliance-Checklist.png","type":"image\/png"}],"author":"David Bisson","twitter_card":"summary_large_image","twitter_creator":"@DMBisson","twitter_site":"@itegriti","twitter_misc":{"Written by":"David Bisson","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/"},"author":{"name":"David Bisson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807"},"headline":"The Ultimate GDPR Compliance Checklist","datePublished":"2020-01-24T15:34:22+00:00","dateModified":"2021-04-12T05:20:37+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/"},"wordCount":1568,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Blog-Image_GDPR-Compliance-Checklist.png","keywords":["4 Minute Read"],"articleSection":["Compliance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/","url":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/","name":"The Ultimate GDPR Compliance Checklist for 2020","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Blog-Image_GDPR-Compliance-Checklist.png","datePublished":"2020-01-24T15:34:22+00:00","dateModified":"2021-04-12T05:20:37+00:00","description":"For the many entities that are actively working to achieve GDPR compliance, consider consulting our compliance checklist detailed below.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Blog-Image_GDPR-Compliance-Checklist.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Blog-Image_GDPR-Compliance-Checklist.png","width":800,"height":450,"caption":"The Ultimate GDPR Compliance Checklist"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/ultimate-gdpr-compliance-checklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"The Ultimate GDPR Compliance Checklist"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807","name":"David Bisson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g","caption":"David Bisson"},"description":"David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.","sameAs":["https:\/\/www.linkedin.com\/in\/david-bisson-43335489\/","https:\/\/x.com\/DMBisson"],"url":"https:\/\/itegriti.com\/kw022024\/author\/david-bisson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1494"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=1494"}],"version-history":[{"count":7,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1494\/revisions"}],"predecessor-version":[{"id":1999,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1494\/revisions\/1999"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/1496"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=1494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=1494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=1494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}