Vendor and Processor Checklist
If third parties touch personal data, they should not be treated as a procurement footnote. Vendor review is part of competent operational privacy hygiene.
What to review
- Which vendors touch personal data at all
- What categories of data they can access
- Why they need that access
- Whether internal teams actually understand the workflow
Practical checklist
- List core vendors touching user/customer data
- Check whether access scope is clear and still justified
- Review contracts, handoffs, and operational ownership
- Flag high-risk tools or shadow usage patterns