SlideShare a Scribd company logo
GDPR Accountability
Contracts and Data Sharing
Data Sharing Policies and
Procedures
Your organisation's policies
and procedures make sure
that you appropriately
manage data sharing
decisions.
7.1.1
You have a review process, through a DPIA or
similar exercise, to assess the legality, benefits and
risks of the data sharing.
7.1.2
You document all sharing decisions for audit,
monitoring and investigation purposes and you
regularly review them.
7.1.3
Your organisation has clear policies, procedures and
guidance about data sharing, including who has the
authority to make decisions about systematic data
sharing or one-off disclosures, and when it is
appropriate to do so.
7.1.4
Your organisation adequately trains all staff likely to
make decisions about data sharing, and makes
them aware of their responsibilities. You refresh
this training appropriately.
Data Sharing Agreements
You arrange and regularly
review data sharing
agreements with parties with
whom you regularly share
personal data.
7.2.1
You agree data sharing agreements with all the
relevant parties and senior management signs them
off.
7.2.2
The data sharing agreement includes details about:
the parties' roles; the purpose of the data sharing;
what is going to happen to the data at each stage;
and sets standards (with a high privacy default for
children).
7.2.3
Where necessary, procedures and guidance
covering each organisation's day-to-day operations
support the agreements.
7.2.4
If your organisation is acting as a joint controller
(within the meaning of Article 26 of the GDPR), you
set out responsibilities under an arrangement or a
data sharing agreement, and you provide
appropriate privacy information to individuals.
7.2.5
You have a regular review process to make sure
that the information remains accurate and up-to-
date, and to examine how the agreement is
working.
7.2.6
There is a central log of the current data sharing
agreements.
Restricted Transfers
Your organisation has
procedures in place to make
sure that restricted transfers
are made appropriately.
7.3.1
You consider whether the restricted transfer is
covered by an adequacy decision or by 'appropriate
safeguards' listed in data protection law, such as
contracts incorporating standard contractual data
protection clauses adopted by the Commission or
Binding Corporate Rules (BCRs).
7.3.2
If a restricted transfer is not covered by an
adequacy decision nor an appropriate safeguard,
you consider whether it is covered by an exemption
set out in Article 49 of the GDPR.
Processors 7.4.1 You have written contracts with all processors.
GDPR Accountability
You have appropriate
procedures in place regarding
the work that processors do
on your behalf.
7.4.2
If using a processor, you assess the risk to
individuals and make sure that these risks are
mitigated effectively.
7.4.3
An appropriate level of management approves the
contracts and both parties sign. The level of
management required for approval is proportionate
to the value and risk of the contract.
7.4.4
Each contract (or other legal act) sets out details of
the processing including the:
• subject matter of the processing;
• duration of the processing;
• nature and purpose of the processing;
• type of personal data involved;
• categories of data subject; and
• controller’s obligations and rights, in accordance
with the list set out in Article 28(3) of the GDPR.
7.4.5
You keep a record or log of all current processor
contracts, which you update when processors
change.
7.4.6
You review contracts periodically to make sure they
remain up-to-date.
7.4.7
If a processor uses a sub-processor to help with the
processing it is doing on your behalf, they have
written authorisation from your organisation and a
written contract with that sub-processor.
Controller-Processor Contract
Requirements
All of your controller-
processor contracts cover the
terms and clauses necessary
to comply with data
protection law.
7.5.1
The contract or other legal act includes terms or
clauses stating that the processor must:
• only act on the controller’s documented
instructions, unless required by law to act without
such instructions;
• make sure that the people processing the data are
subject to a duty of confidence;
• help the controller respond to requests from
individuals to exercise their rights; submit to audits
and inspections.
7.5.2
Contracts include the technical and organisational
security measures the processor will adopt
(including encryption, pseudonymisation, resilience
of processing systems and backing up personal data
in order to be able to reinstate the system).
7.5.3
The contract includes clauses to make sure that the
processor either deletes or returns all personal data
to the controller at the end of the contract. The
processor must also delete existing personal data
unless the law requires its storage.
7.5.4
Clauses are included to make sure that the
processor assists the controller in meeting its GDPR
obligations regarding the security of processing, the
notification of personal data breaches and DPIAs.
GDPR Accountability
Processor Due Diligence
Checks
You carry out due diligence
checks to guarantee that
processors will implement
appropriate technical and
organisational measures to
meet GDPR requirements.
7.6.1
The procurement process builds in due diligence
checks proportionate to the risk of the processing
before you agree a contract with a processor.
7.6.2
The due diligence process includes data security
checks, eg site visits, system testing and audit
requests.
7.6.3
The due diligence process includes checks to
confirm a potential processor will protect data
subject's rights.
Processor Compliance
Reviews
Your organisation reviews
data processors' compliance
with their contracts.
7.7.1
Contracts include clauses to allow your organisation
to conduct audits or checks, to confirm the
processor is complying with all contractual terms
and conditions.
7.7.2
You carry out routine compliance checks,
proportionate to the processing risks, to test that
processors are complying with contractual
agreements.
Third Party Products and
Services
Your organisation considers
'data protection by design'
when selecting services and
products to use in data
processing activities.
7.8.1
When third parties supply products or services to
process personal data, you choose suppliers that
design their products or services with data
protection in mind.
Purpose Limitation
Your organisation proactively
takes steps to only share
necessary personal data with
processors or other third
parties.
7.9.1
Your organisation only shares the personal data
necessary to achieve its specific purpose.
7.9.2
When information is shared, it is pseudonymised or
minimised wherever possible. You also consider
anonymisation so that the information is no longer
personal data.

More Related Content

PDF
GDPR 12 Steps infographic
PDF
12 steps to prepare for GDPR
PDF
How does GDPR affect the design of user experiences?
PPTX
The General Data Protection Regulation (GDPR) in Ireland-What You Should Know
PDF
The implications of gdpr for the solutions industry tatech 2018
PPTX
GDPR & Your Cloud Provider - What You Need to Know
PPTX
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
PPTX
GDPR How to get started?
GDPR 12 Steps infographic
12 steps to prepare for GDPR
How does GDPR affect the design of user experiences?
The General Data Protection Regulation (GDPR) in Ireland-What You Should Know
The implications of gdpr for the solutions industry tatech 2018
GDPR & Your Cloud Provider - What You Need to Know
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
GDPR How to get started?

What's hot (16)

PPT
Getting It Right
PDF
Data protection services lifecycle approach to critical information protection
PDF
Developer view on new EU privacy legislation (GDPR)
PDF
Everything you Need to Know about The Data Protection Officer Role
PDF
5 key steps for SMBs for reaching GDPR Compliance
PDF
Personal data Protection Act Singapore How-to Perform Assessment
PDF
PCI Certification and remediation services
PDF
GDPR and technology - details matter
PDF
Beginning your General Data Protection Regulation (GDPR) Journey
PDF
DAMA Ireland - GDPR
PDF
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
DOCX
IS Audits and Internal Controls
PDF
Microsoft sql-and-the-gdpr
PPTX
GDPR - what you need to know
PPTX
Teradata's approach to addressing GDPR
PDF
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
Getting It Right
Data protection services lifecycle approach to critical information protection
Developer view on new EU privacy legislation (GDPR)
Everything you Need to Know about The Data Protection Officer Role
5 key steps for SMBs for reaching GDPR Compliance
Personal data Protection Act Singapore How-to Perform Assessment
PCI Certification and remediation services
GDPR and technology - details matter
Beginning your General Data Protection Regulation (GDPR) Journey
DAMA Ireland - GDPR
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
IS Audits and Internal Controls
Microsoft sql-and-the-gdpr
GDPR - what you need to know
Teradata's approach to addressing GDPR
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
Ad

Similar to Gdpr contracts and data sharing (20)

PDF
General Data Protection Regulation: what do you need to do to get prepared? -...
PPTX
Are You GDPR Ready?
PDF
GDPR: why your contracts need updating
PPTX
GDPR: Your Journey to Compliance
PPTX
MRS Operations Network: GDPR - Organisational Measures
 
PDF
Top 10 GDPR Requirements
PPTX
Prepare Your Firm for GDPR
PDF
10 Key GDPR Requirements You Must Know to Protect Your Business
PPTX
The General Data Protection Regulation ("GDPR")
PDF
Data breaches, privacy programs and what will change for processors
PDF
Privacy KPIs.pdf
PPTX
GDPR Introduction and overview
PPTX
SCCE Processors and GDPR
PDF
IAB Europe's GDPR Compliance Primer
PPTX
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
PDF
Gdpr for business full
PDF
Protection des données et de la vie privée : nouvelles obligations pour les e...
PPTX
An Introduction to the General Data Protection Regulation (GDPR)
PDF
Public sector breakfast club, October 2016, Exeter
PPTX
GDPR Breakfast Briefing for Business Advisors
General Data Protection Regulation: what do you need to do to get prepared? -...
Are You GDPR Ready?
GDPR: why your contracts need updating
GDPR: Your Journey to Compliance
MRS Operations Network: GDPR - Organisational Measures
 
Top 10 GDPR Requirements
Prepare Your Firm for GDPR
10 Key GDPR Requirements You Must Know to Protect Your Business
The General Data Protection Regulation ("GDPR")
Data breaches, privacy programs and what will change for processors
Privacy KPIs.pdf
GDPR Introduction and overview
SCCE Processors and GDPR
IAB Europe's GDPR Compliance Primer
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
Gdpr for business full
Protection des données et de la vie privée : nouvelles obligations pour les e...
An Introduction to the General Data Protection Regulation (GDPR)
Public sector breakfast club, October 2016, Exeter
GDPR Breakfast Briefing for Business Advisors
Ad

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
Programs and apps: productivity, graphics, security and other tools
Building Integrated photovoltaic BIPV_UPV.pdf
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I

Gdpr contracts and data sharing

  • 1. GDPR Accountability Contracts and Data Sharing Data Sharing Policies and Procedures Your organisation's policies and procedures make sure that you appropriately manage data sharing decisions. 7.1.1 You have a review process, through a DPIA or similar exercise, to assess the legality, benefits and risks of the data sharing. 7.1.2 You document all sharing decisions for audit, monitoring and investigation purposes and you regularly review them. 7.1.3 Your organisation has clear policies, procedures and guidance about data sharing, including who has the authority to make decisions about systematic data sharing or one-off disclosures, and when it is appropriate to do so. 7.1.4 Your organisation adequately trains all staff likely to make decisions about data sharing, and makes them aware of their responsibilities. You refresh this training appropriately. Data Sharing Agreements You arrange and regularly review data sharing agreements with parties with whom you regularly share personal data. 7.2.1 You agree data sharing agreements with all the relevant parties and senior management signs them off. 7.2.2 The data sharing agreement includes details about: the parties' roles; the purpose of the data sharing; what is going to happen to the data at each stage; and sets standards (with a high privacy default for children). 7.2.3 Where necessary, procedures and guidance covering each organisation's day-to-day operations support the agreements. 7.2.4 If your organisation is acting as a joint controller (within the meaning of Article 26 of the GDPR), you set out responsibilities under an arrangement or a data sharing agreement, and you provide appropriate privacy information to individuals. 7.2.5 You have a regular review process to make sure that the information remains accurate and up-to- date, and to examine how the agreement is working. 7.2.6 There is a central log of the current data sharing agreements. Restricted Transfers Your organisation has procedures in place to make sure that restricted transfers are made appropriately. 7.3.1 You consider whether the restricted transfer is covered by an adequacy decision or by 'appropriate safeguards' listed in data protection law, such as contracts incorporating standard contractual data protection clauses adopted by the Commission or Binding Corporate Rules (BCRs). 7.3.2 If a restricted transfer is not covered by an adequacy decision nor an appropriate safeguard, you consider whether it is covered by an exemption set out in Article 49 of the GDPR. Processors 7.4.1 You have written contracts with all processors.
  • 2. GDPR Accountability You have appropriate procedures in place regarding the work that processors do on your behalf. 7.4.2 If using a processor, you assess the risk to individuals and make sure that these risks are mitigated effectively. 7.4.3 An appropriate level of management approves the contracts and both parties sign. The level of management required for approval is proportionate to the value and risk of the contract. 7.4.4 Each contract (or other legal act) sets out details of the processing including the: • subject matter of the processing; • duration of the processing; • nature and purpose of the processing; • type of personal data involved; • categories of data subject; and • controller’s obligations and rights, in accordance with the list set out in Article 28(3) of the GDPR. 7.4.5 You keep a record or log of all current processor contracts, which you update when processors change. 7.4.6 You review contracts periodically to make sure they remain up-to-date. 7.4.7 If a processor uses a sub-processor to help with the processing it is doing on your behalf, they have written authorisation from your organisation and a written contract with that sub-processor. Controller-Processor Contract Requirements All of your controller- processor contracts cover the terms and clauses necessary to comply with data protection law. 7.5.1 The contract or other legal act includes terms or clauses stating that the processor must: • only act on the controller’s documented instructions, unless required by law to act without such instructions; • make sure that the people processing the data are subject to a duty of confidence; • help the controller respond to requests from individuals to exercise their rights; submit to audits and inspections. 7.5.2 Contracts include the technical and organisational security measures the processor will adopt (including encryption, pseudonymisation, resilience of processing systems and backing up personal data in order to be able to reinstate the system). 7.5.3 The contract includes clauses to make sure that the processor either deletes or returns all personal data to the controller at the end of the contract. The processor must also delete existing personal data unless the law requires its storage. 7.5.4 Clauses are included to make sure that the processor assists the controller in meeting its GDPR obligations regarding the security of processing, the notification of personal data breaches and DPIAs.
  • 3. GDPR Accountability Processor Due Diligence Checks You carry out due diligence checks to guarantee that processors will implement appropriate technical and organisational measures to meet GDPR requirements. 7.6.1 The procurement process builds in due diligence checks proportionate to the risk of the processing before you agree a contract with a processor. 7.6.2 The due diligence process includes data security checks, eg site visits, system testing and audit requests. 7.6.3 The due diligence process includes checks to confirm a potential processor will protect data subject's rights. Processor Compliance Reviews Your organisation reviews data processors' compliance with their contracts. 7.7.1 Contracts include clauses to allow your organisation to conduct audits or checks, to confirm the processor is complying with all contractual terms and conditions. 7.7.2 You carry out routine compliance checks, proportionate to the processing risks, to test that processors are complying with contractual agreements. Third Party Products and Services Your organisation considers 'data protection by design' when selecting services and products to use in data processing activities. 7.8.1 When third parties supply products or services to process personal data, you choose suppliers that design their products or services with data protection in mind. Purpose Limitation Your organisation proactively takes steps to only share necessary personal data with processors or other third parties. 7.9.1 Your organisation only shares the personal data necessary to achieve its specific purpose. 7.9.2 When information is shared, it is pseudonymised or minimised wherever possible. You also consider anonymisation so that the information is no longer personal data.