← Back to Resources
DPAGDPRChecklist

Data Processing Agreement Checklist: What to Look For

A comprehensive checklist for reviewing and negotiating GDPR-compliant Data Processing Agreements with vendors and partners.

GlobalDataShield Team||7 min read

What Is a Data Processing Agreement?

A Data Processing Agreement (DPA) is a legally binding contract between a data controller and a data processor that governs how personal data is processed. GDPR Article 28 mandates that processing by a processor must be governed by a contract that sets out specific terms regarding data protection.

Without a compliant DPA in place, both the controller and the processor risk regulatory penalties -- even if the actual data processing is otherwise lawful and secure.

When Do You Need a DPA?

You need a DPA whenever you engage a third party to process personal data on your behalf. Common scenarios include:

  • Cloud hosting providers storing personal data
  • SaaS applications processing customer or employee data
  • Outsourced IT support with access to personal data systems
  • Payroll and HR service providers
  • Marketing platforms handling customer contact information
  • Analytics providers processing user behavior data
  • Customer support platforms managing ticket data

The Complete DPA Checklist

1. Parties and Roles

  • Clearly identifies which party is the controller and which is the processor
  • If both parties act as controllers in some contexts, defines the scope of each role
  • Names and contact details of both parties
  • Contact details for the processor's Data Protection Officer (if applicable)

2. Subject Matter and Scope

  • Describes the subject matter of the processing
  • Specifies the duration of the processing
  • Defines the nature and purpose of the processing
  • Lists the types of personal data processed
  • Lists the categories of data subjects
  • States that processing is limited to the purposes described in the agreement

3. Controller Instructions

  • Processor commits to processing personal data only on documented instructions from the controller
  • Specifies how instructions are communicated (written, electronic, via platform configuration)
  • Processor must inform the controller if an instruction infringes GDPR or other data protection law
  • Defines what happens with processing that goes beyond the controller's instructions

4. Confidentiality

  • Processor ensures that persons authorized to process the data have committed to confidentiality or are under a statutory obligation of confidentiality
  • Specifies the scope of confidentiality obligations
  • Confidentiality obligations survive the termination of the agreement

5. Security Measures

  • Processor implements appropriate technical and organizational measures to ensure a level of security appropriate to the risk
  • Specific security measures are described (not just vague references to "appropriate" security)

Key measures to verify are included:

Security AreaExpected Commitments
EncryptionAt rest and in transit, with specified algorithms
Access controlRole-based access, principle of least privilege
AuthenticationMulti-factor authentication for administrative access
MonitoringIntrusion detection, audit logging
Vulnerability managementRegular patching, penetration testing
Physical securityData center access controls
Employee securityBackground checks, security training
Incident responseDocumented procedures and contact points

6. Sub-Processors

  • Processor must obtain prior written consent (general or specific) before engaging sub-processors
  • If general authorization, processor must inform controller of any intended changes and allow objections
  • Processor imposes the same data protection obligations on sub-processors as contained in the DPA
  • Processor remains fully liable for the performance of sub-processors
  • A current list of sub-processors is provided or made available
  • Sub-processor locations are disclosed

7. Data Subject Rights

  • Processor assists the controller in fulfilling obligations to respond to data subject requests (access, rectification, erasure, portability, restriction, objection)
  • Specifies the nature of the assistance (technical measures, timelines, process)
  • Defines the timeline for the processor to respond to controller requests for assistance

8. Breach Notification

  • Processor notifies controller of personal data breaches without undue delay
  • Specifies the notification timeline (ideally within 24-48 hours; GDPR requires "without undue delay")
  • Notification includes required information: nature of breach, categories and approximate number of data subjects, likely consequences, and measures taken
  • Processor assists the controller in fulfilling its own breach notification obligations

9. Data Protection Impact Assessments

  • Processor assists the controller in conducting DPIAs where required
  • Processor provides information necessary for the assessment
  • Processor assists with prior consultation with supervisory authorities if needed

10. Data Transfers

  • Specifies where personal data will be processed geographically
  • If data is transferred outside the EU/EEA, identifies the transfer mechanism (SCCs, adequacy decision, BCRs)
  • Transfer Impact Assessments are referenced or incorporated
  • Supplementary measures for international transfers are documented

11. Audit Rights

  • Controller has the right to conduct audits or inspections of the processor's operations
  • Specifies the format of audits (on-site inspection, questionnaire, third-party audit report)
  • Defines the frequency and notice period for audits
  • Processor makes available all information necessary to demonstrate compliance with Article 28

12. Data Return and Deletion

  • At the end of the processing relationship, processor returns all personal data to the controller and/or deletes it
  • Controller can choose between data return and deletion
  • Specifies the format for data return
  • Specifies the timeline for deletion after contract termination
  • Processor certifies deletion upon completion
  • Addresses what happens to data in backups after contract termination

13. Liability and Indemnification

  • Allocation of liability between controller and processor is clearly defined
  • Indemnification provisions cover data protection breaches
  • Limitation of liability clauses do not undermine the processor's data protection obligations
  • Insurance requirements, if any, are specified

14. Term and Termination

  • Duration of the DPA is defined (typically aligned with the main service agreement)
  • Conditions for termination are specified
  • Provisions for data return and deletion upon termination are cross-referenced
  • Obligations that survive termination are identified (confidentiality, deletion certification)

Negotiation Tips

Areas Where You Should Push

  • Specific breach notification timelines: "Without undue delay" is vague. Negotiate a specific window (24 or 48 hours).
  • Audit rights: Insist on meaningful audit rights, even if exercised through third-party audit reports.
  • Sub-processor transparency: Require proactive notification of sub-processor changes with a reasonable objection period.
  • Data deletion certification: Get a written commitment to certify deletion, including from backups, within a defined timeline.
  • Data residency guarantees: Ensure the DPA explicitly states where data will be processed and stored, including by sub-processors.

Areas Where Flexibility Is Reasonable

  • Audit frequency: Accepting annual third-party audit reports (SOC 2 Type II) in lieu of on-site audits is standard practice.
  • General sub-processor authorization: Acceptable if combined with proactive notification and objection rights.
  • Backup deletion timelines: Reasonable to allow backup rotation cycles (30-90 days) for deletion from backups.

Common DPA Deficiencies

  • No specific security measures described (just references to "industry standard" or "appropriate" measures)
  • No sub-processor list or mechanism for updates
  • Breach notification timelines that are too vague or too long
  • No data residency commitments
  • No practical audit rights
  • No clear data deletion obligations at contract end
  • Liability caps that effectively eliminate the processor's accountability

How GlobalDataShield Handles DPA Requirements

GlobalDataShield provides a transparent, GDPR-aligned Data Processing Agreement that addresses each of the requirements outlined in this checklist. With explicit data residency guarantees, documented security measures, clear sub-processor disclosures, and meaningful audit provisions, the DPA is designed to give controllers confidence that their compliance obligations are fully supported.

Ready to Solve Data Residency?

Get started with GlobalDataShield - compliant document hosting, ready when you are.