GDPR Vendor Compliance Assessment Template

A GDPR Vendor Compliance Assessment Template is a structured questionnaire that maps vendor data processing activities against GDPR Articles 28-36 requirements. Use it to collect evidence on data location, sub-processors, security controls, breach notification procedures, and cross-border transfer mechanisms before contract execution.

Key takeaways:

  • Maps directly to GDPR processor obligations in Articles 28, 32, and 33
  • Covers technical controls, organizational measures, and data subject rights
  • Requires evidence collection for DPAs, security certifications, and BCRs/SCCs
  • Integrates with SOC 2 Type II, ISO 27001, and NIST frameworks
  • Scales from 50-question DDQs for low-risk vendors to 300+ for critical processors

Get this template

Full GDPR coverage with data processing lawfulness review, data subject rights readiness, privacy by design evaluation

GDPR vendor assessments consume 40% more time than standard security DDQs due to specific evidence requirements for cross-border transfers, sub-processor management, and data subject rights. Your assessment template needs to capture both technical controls and legal mechanisms while remaining practical for vendors to complete.

The right template extracts GDPR-specific artifacts—Data Processing Agreements (DPAs), Standard Contractual Clauses (SCCs), Records of Processing Activities (RoPA)—without duplicating questions already covered in your security assessment. Financial services firms processing EU customer data face particular scrutiny, with regulators expecting granular evidence of Article 32 technical measures and Article 33 breach notification capabilities.

This guide breaks down the essential sections, control mapping strategies, and evidence requirements for building or optimizing your GDPR vendor assessment process.

Core Template Sections

1. Data Processing Fundamentals (Articles 28, 30)

Start with processing scope before diving into controls. Your template should capture:

Processing Activities Matrix:

Data Category Purpose Legal Basis Retention Location
Customer PII Service delivery Contract 7 years EU/US
Employee data HR management Legitimate interest Term + 5 years EU only
Analytics Product improvement Consent 2 years Global

Request the vendor's Records of Processing Activities (RoPA) as primary evidence. If unavailable, build it through targeted questions on data types, volumes, and cross-functional flows.

2. Technical and Organizational Measures (Article 32)

Skip generic "Do you encrypt data?" questions. GDPR Article 32 demands risk-appropriate measures with specific evidence:

Required Evidence Collection:

  • Encryption standards for data at rest (AES-256) and in transit (TLS 1.2+)
  • Pseudonymization techniques for test environments
  • Access control matrices showing role-based permissions
  • Incident response runbooks with EU-specific timelines
  • Business continuity test results from the last 12 months

Map these controls to your existing framework. SOC 2 Type II reports cover 60% of Article 32 requirements—focus your questions on the gaps.

3. Sub-processor Management (Article 28.2, 28.4)

Sub-processors create your biggest GDPR exposure. Structure this section as a cascade:

  1. Sub-processor inventory with data access levels
  2. Contractual flow-downs proving Article 28 obligations
  3. Due diligence evidence for each critical sub-processor
  4. Change notification procedures with opt-out rights

Require vendors to maintain a public sub-processor page. Examples: AWS, Salesforce, and Microsoft publish comprehensive lists with change RSS feeds.

4. Cross-Border Transfer Mechanisms (Chapter V)

Post-Schrems II, transfer assessments need teeth. Build a decision tree:

Is data processed outside the EEA?
├─ No → Document hosting locations
└─ Yes → Which mechanism?
    ├─ Adequacy decision → Verify country status
    ├─ SCCs → Collect executed copy + TIA
    ├─ BCRs → Verify approval documents
    └─ Derogation → Document specific exception

Transfer Impact Assessments (TIAs) are non-negotiable for US transfers. Your template should extract:

  • Government access laws in destination country
  • Technical supplementary measures implemented
  • Contractual safeguards beyond SCCs

5. Data Subject Rights (Articles 15-22)

Test operational readiness, not policy promises:

Scenario-Based Questions:

  • "Walk through your process for a deletion request affecting 3 integrated systems"
  • "How do you handle access requests when data sits with sub-processors?"
  • "Show evidence of portability request completed within 30 days"

Require screenshots of data subject request portals and SLA performance metrics from the last quarter.

Industry-Specific Applications

Financial Services

Add sections for:

  • PSD2 data segregation requirements
  • Regulatory reporting data retention
  • Cross-border transfer restrictions for payment data
  • Evidence of local data residency for certain EU countries

Healthcare

Expand coverage for:

  • Health data special category protections
  • Clinical trial data anonymization standards
  • Medical device data processing under MDR
  • Genetic data handling procedures

Technology/SaaS

Focus on:

  • API data flows and third-party integrations
  • Development environment data segregation
  • Customer-managed encryption key options
  • Multi-tenant data isolation controls

Framework Integration

Your GDPR template should reference—not duplicate—existing assessments:

Control Mapping Table:

GDPR Article SOC 2 Criteria ISO 27001 Control NIST Function
Art. 32 (Security) CC6.1, CC6.7 A.8, A.9, A.10 Protect
Art. 33 (Breach notification) CC7.3, CC7.4 A.16.1 Respond
Art. 35 (DPIA) CC1.4, CC3.2 A.18.1.4 Identify

Pull existing evidence from these frameworks first, then gap-fill with GDPR-specific questions.

Implementation Best Practices

1. Risk-Tier Your Assessments

  • Critical vendors (processing 100k+ records): Full 300-question assessment
  • High-risk vendors (special categories): 150 questions focusing on Articles 9, 32, 35
  • Standard vendors (limited processing): 50-question subset covering core obligations
  • Low-risk vendors (no direct processing): DPA review only

2. Automate Evidence Collection Build evidence requirements into your workflow:

Question: "Describe your breach notification process"
Required evidence: 
□ Incident response plan (PDF)
□ EU notification template
□ 72-hour timeline confirmation
□ Test scenario results (last 6 months)

3. Create Conditional Logic Paths Don't ask AI/ML questions if the vendor doesn't use automated decision-making. Build skip logic:

  • No EU data processing → Skip Chapter V entirely
  • Using only adequacy countries → Skip SCC/TIA sections
  • Processor only → Skip controller obligations

4. Set Evidence Expiration

  • DPAs: Review on contract renewal
  • SCCs: Re-evaluate annually post-Schrems II
  • Security certifications: Update within 30 days of expiration
  • Sub-processor lists: Verify quarterly

Common Implementation Mistakes

1. Over-Indexing on Policies Collecting 40-page privacy policies proves nothing. Focus on operational evidence: logs showing deletion execution, access request response times, breach notification test results.

2. Missing the Processor/Controller Distinction Using controller-focused questions for processors wastes everyone's time. Your template should branch based on the vendor's role, with distinct question sets for each.

3. Ignoring Existing Assessments Vendors complete 50+ assessments annually. Reference their SOC 2 reports, ISO certifications, and existing DPAs before requesting redundant information.

4. Static Sub-Processor Tracking Sub-processors change monthly. Manual tracking guarantees compliance gaps. Require vendors to maintain current lists with change notifications.

5. Weak Transfer Assessments Generic "Do you comply with Schrems II?" questions provide zero assurance. Demand specific TIAs, supplementary measures documentation, and government access assessments.

Frequently Asked Questions

How often should I reassess vendors for GDPR compliance?

Annual assessments for critical vendors processing special categories or 1M+ records. Biennial for standard processors. Trigger immediate reassessment for new sub-processors, transfer mechanism changes, or data breaches.

Can I rely on vendor SOC 2 reports instead of a full GDPR assessment?

SOC 2 Type II covers 60% of GDPR technical requirements but misses legal mechanisms, data subject rights, and transfer assessments. Use SOC 2 as baseline evidence, then supplement with GDPR-specific questions.

What's the minimum viable GDPR assessment for low-risk vendors?

Five critical areas: DPA execution, data location/transfers, sub-processor list, breach notification capability, and security certification. This 20-question subset takes 30 minutes versus 3 hours for full assessment.

How do I handle vendors refusing to complete another assessment?

Implement a "evidence first" approach—accept existing documentation (SOC 2, ISO 27001, completed assessments for similar firms) that maps to your requirements. Only gap-fill missing GDPR-specific elements.

Should I build separate assessments for processors vs. controllers?

Yes. Processor assessments focus on Article 28 obligations, security controls, and sub-processors. Controller assessments add lawful basis, data subject rights, and privacy notice requirements. Share 40% common questions maximum.

Frequently Asked Questions

How often should I reassess vendors for GDPR compliance?

Annual assessments for critical vendors processing special categories or 1M+ records. Biennial for standard processors. Trigger immediate reassessment for new sub-processors, transfer mechanism changes, or data breaches.

Can I rely on vendor SOC 2 reports instead of a full GDPR assessment?

SOC 2 Type II covers 60% of GDPR technical requirements but misses legal mechanisms, data subject rights, and transfer assessments. Use SOC 2 as baseline evidence, then supplement with GDPR-specific questions.

What's the minimum viable GDPR assessment for low-risk vendors?

Five critical areas: DPA execution, data location/transfers, sub-processor list, breach notification capability, and security certification. This 20-question subset takes 30 minutes versus 3 hours for full assessment.

How do I handle vendors refusing to complete another assessment?

Implement a "evidence first" approach—accept existing documentation (SOC 2, ISO 27001, completed assessments for similar firms) that maps to your requirements. Only gap-fill missing GDPR-specific elements.

Should I build separate assessments for processors vs. controllers?

Yes. Processor assessments focus on Article 28 obligations, security controls, and sub-processors. Controller assessments add lawful basis, data subject rights, and privacy notice requirements. Share 40% common questions maximum.

Automate your third-party assessments

Daydream turns these manual spreadsheets into automated, trackable workflows — with AI-prefilled questionnaires, real-time risk scoring, and continuous monitoring.

Try Daydream