Auditing Data Processors

The GDPR requires you to audit your data processors. In this article, you will learn how to prepare and design your audits.

Auditing Data Processors

Table of Contents

    Auditing Data Processors 

    When your company passes personal data to a supplier (a data processor), you remain responsible for ensuring that the processor complies with the GDPR. 

    The GDPR states clearly that personal data must be handled responsibly at every stage of the supply chain. This ensures everyone's data, yours and mine, is protected correctly at all times. Simply outsourcing a business process doesn't remove your GDPR responsibilities.  

    Therefore, you must verify that your suppliers meet the GDPR standards required of you and provide the same level of data protection that your business expects. 

    This article explains why and how you should audit your data processors effectively. 

    Requirements for using data processors 

    The GDPR imposes specific rules on the relationship between the data controller (your business) and its data processors. 

    The rules require you to select only those data processors that offer sufficient guarantees they will handle personal data correctly under the GDPR. 

    Your data processors can't delegate their responsibilities to sub-processors without your prior approval. This ensures your personal data won't be handled insecurely by another party. 

    You must document any sharing of personal data with data processors in a Data Processing Agreement (DPA), clearly specifying your requirements. 

    The GDPR also requires you to demonstrate compliance actively. This means you must audit your data processors regularly, ensuring they fulfil their obligations under the DPA in practice. 

    Map your data processors 

    Auditing of your data processors starts with clearly identifying all of them, providing a clear overview of your suppliers. 

    Once you’ve mapped them, conduct a risk assessment of each data processor. You can base your audit strategy on these risk assessments or use the simple method provided below. 

    Choosing the right audit approach 

    The Danish Data Protection Agency (Datatilsynet) has created a guide to help you choose how to audit your data processors. It involves answering these four simple questions: 

    How many people’s data does the data processor handle? 

    1. Under 1,000 people (1 point) 

    2. 1,000–10,000 people (2 points) 

    3. More than 10,000 people (3 points) 

    Does the data processor handle sensitive personal data? 

    1. Yes (3 points) 

    2. No (0 points) 

    Does the data processor handle confidential personal data? 

    1. Yes (2 points) 

    2. No (0 points) 

    Is the data processor’s activity intrusive to the data subjects (e.g., profiling, combining datasets, surveillance)? 

    1. Yes (2 points) 

    2. No (0 points) 

    Results 

    Next, determine your audit method for each of your data processors by adding up the points from your four answers to the questions above. 

    • 1–2 points: Choose between audit methods 1–6 (below) 
    • 3–4 points: Methods 2–6 
    • 5–6 points: Methods 3–6 
    • 7–10 points: Methods 5–6 

    The results from the questionnaire above reflect your risk level when outsourcing personal data processing to your data processors. A higher risk indicates you should choose a more thorough auditing approach. 

    Choose between 6 methods 

    Datatilsynet suggests these six auditing methods, which you can select based on your risk assessment: 

    Method 1) Reactive audits 

    If your data processor has established a strong reputation and proven itself as trustworthy, you may choose a reactive auditing approach. This means you only carry out an audit if you become aware of potential problems with the data processor. 

    For example, you might learn about issues through media coverage or reports from regulatory authorities. You may also notice operational difficulties with the data processor that prompt you to perform an audit. 

    Method 2) Written confirmation from data processor 

    If your data processor has a strong reputation, you can simply request written confirmation from them that they continue to comply with GDPR. 

    This confirmation can be a straightforward statement in which the data processor assures you that no changes have occurred in their procedures or security measures compared to your Data Processing Agreement. 

    If you later become aware of security breaches or negative media coverage, you can then contact the data processor to perform additional audits or ensure the issues have been resolved. 

    Method 3) Annual status report from data processor 

    The data processor can provide an annual status report containing details of how they're complying with your Data Processing Agreement, including any changes made to their IT security, systems, or policies. This report can either be published on the data processor's website or sent directly to you. 

    It's important the status report clearly addresses the specific conditions outlined in your Data Processing Agreement, enabling you to effectively verify compliance with each requirement. 

    Method 4) Certifications and codes of conduct 

    If your data processor follows an approved code of conduct (as per GDPR Article 40) or holds a relevant certification (as per GDPR Article 42), you can use this as evidence during your audit. 

    You should ensure the code of conduct or certification covers all requirements specified in your Data Processing Agreement. If some requirements are not covered, ask the processor for additional documentation proving compliance with these terms. 

    Additionally, request documentation detailing any personal data breaches that have occurred since your last audit, along with the measures implemented to prevent future incidents. 

    Method 5) Independent third-party audits 

    An independent third party can audit your data processor’s compliance with your Data Processing Agreement, for example, through an ISAE 3000 report issued by an auditor. External audits provide an objective assessment of whether the data processor meets the necessary requirements. 

    If you choose this approach, ensure the audit covers all areas relevant to your business and included in your Data Processing Agreement. 

    If the audit identifies gaps or risks, you should contact the data processor to ensure these issues are addressed. 

    Method 6) Conduct your own audits 

    You can also carry out an audit yourself by sending questionnaires, requesting documentation, or visiting the data processor in person. A physical audit allows you to verify directly whether security measures, such as IT security, access controls, and physical protection of servers and systems, match the agreed requirements in practice. 

    What measures should you audit? 

    Fundamentally, your audit should focus on verifying compliance with the requirements in your Data Processing Agreement. These requirements vary depending on each individual agreement, as data processing activities differ, as do the types of companies providing these services, such as Microsoft or an external accounting firm. 

    This variability impacts what you should audit, but you should audit that the data processor: 

    • Only process personal data according to documented instructions from you (the data controller). 

    • Immediately inform you if any instructions given by you breach the GDPR. 

    • Restrict access to personal data exclusively to employees who genuinely need access and who are bound by confidentiality obligations. 

    • Have implemented appropriate technical and organisational security measures as required by GDPR Article 32, as well as any additional security measures specified by you. 

    • Help you conduct risk assessments by providing relevant information about their data processing and security measures. 

    • Perform their own risk assessment regarding processing done on your behalf and take steps to mitigate identified risks. 

    • Comply fully with GDPR requirements when using sub-processors (as stated in Article 28, sections 2 and 4), and regularly audit these sub-processors. 

    • Only transfer personal data to third countries on a lawful basis and can document the legality of these transfers. 

    • Support you in managing requests from data subjects (e.g., requests for access, correction, or deletion). 

    • Immediately notify you about any personal data breaches and assist you in reporting the breach to the Data Protection Authority within 72 hours. 

    • Regularly provide GDPR, IT security, and data protection training to relevant employees. 

    • Delete or return all personal data after termination of the Data Processing Agreement. 

    Audit Automation 

    Imagine you have 18 data processors, and you have identified that you will need to apply three different audit methods to ensure they comply with your Data Processing Agreements.  

    Managing this manually is complex and time-consuming, making it natural to standardise and automate as much as possible. 

    Getting started with automation 

    Once you have completed the risk assessments for each data processor and chosen your audit approach, the next step is to standardise and automate your auditing process. 

    First, create audit templates. You can either prepare individual templates customised to each data processor for reuse each year or create general templates for each of the six audit methods. 

    Next, send out the audit requests to your data processors. You can set up a standard email to send these requests regularly (e.g., annually). Alternatively, create customised emails for each data processor, each including the specific auditing template you have prepared. 

    Finally, ensure you receive a timely response from each processor and verify that the information provided is complete and satisfactory. 

    Vendor Management Software 

    Using vendor management software gives you all the tools needed to automate the auditing of your data processors. 

    It helps you track risk assessments, manage audit templates, send and receive your audit requests, automatically handle reminders, and enables structured follow-ups. This is especially useful if responses from your data processors aren't satisfactory and require many follow-ups. 

    Additionally, all your audit activities are clearly documented within the software, simplifying your overall compliance documentation. 

    If you would like to try this in practice right now, you can try the free version of a vendor management tool here. 

    Documentation 

    The GDPR requires you to document your compliance with GDPR, which means documenting all your audit activities, including risk assessments of data processors, the audit results, communications with data processors about the audits, follow-ups, and the data processors’ overall compliance with GDPR requirements. 

    Processing activities

    .legal compliance platform Start your compliance journey today

    Curious to try it yourself? Experience our free compliance platform and kickstart your compliance journey today.
    • No credit card needed
    • Unlimited time on Free plan
    • No commitment
    +300 large and small companies use .legal
    Region Sjælland
    Aarhus Universitet
    Zwipe
    aj_vaccines_logo
    Realdania
    Right People
    IO Gates
    PLO
    Finans Danmark
    geia-food
    Vestforbrænding
    Evida
    Klasselotteriet
    NRGI1
    BLUE WATER SHIPPING
    Karnov
    Ingvard Christensen
    VP Securities
    AH Industries
    Lægeforeningen
    InMobile
    AK Nygart
    ARP Hansen
    DEIF
    DMJX
    Axel logo
    qUINT Logo
    KAUFMANN (1)
    SMILfonden-logo