bmad-plus 0.4.4 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +31 -0
  2. package/README.md +3 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +21 -8
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,129 @@
1
+ # SSP Writing Guide
2
+
3
+ The System Security Plan (SSP) is the centerpiece of the FedRAMP authorization package.
4
+ It tells the complete security story of the Cloud Service Offering (CSO): architecture,
5
+ data flows, control implementations, roles, and boundary. Many SSPs exceed 500 pages.
6
+
7
+ > Always use the official FedRAMP SSP template. One template covers all baselines
8
+ > (LI-SaaS, Low, Moderate, High). Templates at: https://www.fedramp.gov/rev5/documents-templates/
9
+
10
+ ---
11
+
12
+ ## SSP Section-by-Section Guide
13
+
14
+ ### Section 1: Information System Name and Title
15
+ - Formal name of the CSO
16
+ - Unique identifier (assigned during FedRAMP process)
17
+ - Service model (IaaS / PaaS / SaaS)
18
+ - Deployment model (Public / Private / Community / Hybrid cloud)
19
+
20
+ ### Section 2: System Categorization
21
+ - FIPS 199 impact determination: Confidentiality / Integrity / Availability
22
+ - Overall impact level = high-water mark of the three values
23
+ - Justify each categorization with the types of federal information processed
24
+
25
+ ### Section 3: System Owner / Authorizing Official
26
+ - List CSP system owner, ISSO, and agency AO contacts
27
+ - For agency authorization, include the sponsoring agency AO
28
+
29
+ ### Section 4: Assignment of Security Responsibility
30
+ - Identify the ISSO (Information System Security Officer)
31
+ - Document CSP security team contacts
32
+
33
+ ### Section 5: System Mission / Purpose
34
+ - Brief description of what the system does
35
+ - What federal agencies/programs it supports
36
+ - What types of federal data it handles
37
+
38
+ ### Section 6: System Description
39
+ - Narrative description of the system
40
+ - Technology stack overview
41
+ - Key system components
42
+
43
+ ### Section 7: General System Description / System Environment
44
+ **This is one of the most scrutinized sections.**
45
+ - Detailed architecture description
46
+ - Authorization boundary narrative — clearly define what is IN and OUT of scope
47
+ - Network architecture diagram (embedded)
48
+ - Data flow diagrams (embedded)
49
+ - Ports, protocols, and services table
50
+ - External connections table (all services connecting to/from the boundary)
51
+
52
+ **Common mistakes:**
53
+ - Vague boundary descriptions ("the cloud environment") — be specific
54
+ - Missing data flows for admin/management traffic
55
+ - Not documenting external services (DNS, NTP, update servers, SaaS tools used by admins)
56
+
57
+ ### Section 8: System Environment / Interconnections
58
+ - Interconnection Security Agreements (ISAs) for each external system
59
+ - Leveraged FedRAMP services (IaaS/PaaS) and their authorization status
60
+ - Inherited controls from leveraged services must be documented in CIS/CRM workbook
61
+
62
+ ### Section 9: Laws, Regulations, Standards (Appendix B)
63
+ - Required attachment: SSP Appendix B (Laws & Regulations) — use the FedRAMP template
64
+ - Lists applicable federal laws (FISMA, Privacy Act, etc.)
65
+ - May include agency-specific requirements (HIPAA, CJIS if applicable)
66
+
67
+ ### Section 10: Minimum Security Controls
68
+ **The largest section — one narrative per control.**
69
+
70
+ For each control in the applicable baseline:
71
+
72
+ ```
73
+ [Control ID] [Control Name]
74
+ Implementation Status: Implemented | Partially Implemented | Planned | Not Applicable | Alternative Implementation
75
+
76
+ [Control Implementation Statement]
77
+ Describe HOW the control is implemented. Be specific:
78
+ - What tool, policy, or process implements this control?
79
+ - Who is responsible?
80
+ - Where is the evidence?
81
+ - For shared controls: what is the CSP responsibility vs. customer responsibility?
82
+
83
+ Customer Responsibility (if applicable):
84
+ [Describe what the customer/agency must do]
85
+ ```
86
+
87
+ **Writing tips:**
88
+ - Address every verb in the control requirement — if the control says "monitor and record," describe both monitoring AND recording
89
+ - Reference specific policy document names, tool names, configuration settings
90
+ - For inherited controls from FedRAMP IaaS/PaaS: state "This control is fully/partially inherited from [Provider]. See CIS/CRM workbook."
91
+ - Mark unimplemented controls as "Planned" and ensure they appear in POA&M
92
+
93
+ ### SSP Appendices (A through Q)
94
+
95
+ | Appendix | Content | Required? |
96
+ |---|---|---|
97
+ | A | Acronyms & Glossary | Yes |
98
+ | B | Related Laws & Regulations (Attachment 12) | Yes |
99
+ | C | Security Policies & Procedures | Yes (CSP-authored) |
100
+ | D | User Guide | Yes |
101
+ | E | Rules of Behavior | Yes (FedRAMP template) |
102
+ | F | IT Contingency Plan | Yes (FedRAMP ISCP template, updated Dec 2024) |
103
+ | G | Configuration Management Plan | Yes (CSP-authored) |
104
+ | H | Incident Response Plan | Yes (CSP-authored) |
105
+ | I | Control Implementation Summary (CIS) / CRM Workbook | Yes (FedRAMP template) |
106
+ | J | FIPS 199 Categorization | Yes |
107
+ | K | Integrated Inventory Workbook (IIW) | Yes (FedRAMP template, updated Dec 2024) |
108
+ | L | Cryptographic Modules Table | Yes |
109
+ | M | Continuous Monitoring Plan | Yes |
110
+ | N | Separation of Duties Matrix | Conditional |
111
+ | O | POA&M | Yes (FedRAMP template) |
112
+ | P | Supply Chain Risk Management Plan | Yes (Rev 5) |
113
+ | Q | Privacy Impact Assessment (PIA) | If PII in scope |
114
+
115
+ ---
116
+
117
+ ## SSP Quality Checklist
118
+
119
+ Before submitting, verify:
120
+ - [ ] All controls for the applicable baseline have implementation statements
121
+ - [ ] No controls describe future/planned state as currently implemented
122
+ - [ ] All "Planned" controls appear in POA&M
123
+ - [ ] Architecture diagrams and control narratives are consistent
124
+ - [ ] External connections table matches the data flow diagrams
125
+ - [ ] CIS/CRM workbook is complete for all shared/inherited controls
126
+ - [ ] IIW lists every asset in the boundary
127
+ - [ ] Cryptographic modules table lists all FIPS 140-2/3 validated modules in use
128
+ - [ ] All required appendices (C through Q as applicable) are attached
129
+ - [ ] SSP Appendix A-12 is the current FedRAMP Laws & Regulations template
@@ -0,0 +1,192 @@
1
+ # Consent Notice / Cookie Banner Template
2
+
3
+ ## Legal Basis
4
+ Art. 7 (conditions for consent), Art. 4(11) (definition of consent), Recitals 32, 42–43.
5
+ ePrivacy Directive Art. 5(3) additionally applies to cookies/device storage.
6
+
7
+ ---
8
+
9
+ ## Consent Requirements Checklist (Art. 7)
10
+ - [ ] **Freely given**: No bundling with service terms; genuine choice with no detriment (Art. 7(4))
11
+ - [ ] **Specific**: Separate consent for each distinct purpose (Recital 43)
12
+ - [ ] **Informed**: Clear plain-language explanation before consent given
13
+ - [ ] **Unambiguous**: Affirmative act required — no pre-ticked boxes (Recital 32)
14
+ - [ ] **Withdrawable**: "As easy to withdraw as to give" (Art. 7(3)); withdrawal does not affect prior processing
15
+ - [ ] **Documented**: Record of when, how, and what consented to (Art. 7(1))
16
+ - [ ] **Age verified**: Under-16 requires parental consent (Art. 8; check Member State derogation 13–16)
17
+
18
+ ---
19
+
20
+ ## Cookie Banner — Required Elements
21
+
22
+ ### Layer 1 (Initial Banner)
23
+ ```
24
+ We use cookies to [improve your experience / personalise content / analyse traffic].
25
+ [ACCEPT ALL] [REJECT ALL] [MANAGE PREFERENCES]
26
+
27
+ [Link to Cookie Policy]
28
+ ```
29
+
30
+ **Critical**: "Accept" and "Reject" must be equally prominent. Dark patterns (hiding reject,
31
+ pre-selected toggles) violate Art. 7 and Art. 5(1)(a) (fairness).
32
+
33
+ ### Layer 2 (Preference Centre)
34
+ Group cookies by purpose; each requires a separate opt-in toggle defaulting to OFF:
35
+ | Category | Description | Default |
36
+ |----------|-------------|---------|
37
+ | Strictly Necessary | Required for site function — no consent needed | Always ON |
38
+ | Analytics | [Provider, purpose] | OFF |
39
+ | Marketing | [Provider, purpose] | OFF |
40
+ | Personalisation | [Provider, purpose] | OFF |
41
+
42
+ ### Consent Record to Store
43
+ ```json
44
+ {
45
+ "userId": "...",
46
+ "consentTimestamp": "ISO-8601",
47
+ "consentVersion": "v1.2",
48
+ "purposes": {
49
+ "analytics": true,
50
+ "marketing": false
51
+ },
52
+ "method": "explicit-click",
53
+ "ipAddress": "[pseudonymised or omit]"
54
+ }
55
+ ```
56
+
57
+ ---
58
+ ---
59
+
60
+ # DPIA Template (Data Protection Impact Assessment)
61
+
62
+ ## Legal Basis
63
+ Art. 35 GDPR — mandatory when processing is "likely to result in a high risk" to individuals.
64
+ Art. 35(3) lists mandatory triggers; supervisory authorities publish lists (Art. 35(4)).
65
+
66
+ ## When Required (Art. 35(3) + WP29/EDPB guidance — any 2+ of these factors)
67
+ - Systematic and extensive profiling
68
+ - Large-scale special category data (Art. 9)
69
+ - Systematic monitoring of public areas
70
+ - New technologies
71
+ - Automated decision-making with legal/significant effects (Art. 22)
72
+ - Children's data at scale
73
+ - Data matching / combining datasets
74
+
75
+ ---
76
+
77
+ ## DPIA Structure
78
+
79
+ ### 1. Description of Processing (Art. 35(7)(a))
80
+ - **System / project name**: [NAME]
81
+ - **Controller**: [NAME + DPO if applicable]
82
+ - **Nature of processing**: [What operations are performed on the data]
83
+ - **Scope**: [Volume, frequency, geographic reach]
84
+ - **Context**: [Who are the data subjects; their vulnerability level]
85
+ - **Purpose**: [What is the legitimate aim]
86
+ - **Lawful basis**: Art. 6(1)[X]; Art. 9(2)[X] if special category
87
+
88
+ ### 2. Necessity and Proportionality Assessment (Art. 35(7)(b))
89
+ Assess whether processing is:
90
+ - **Necessary** for the purpose — could the purpose be achieved with less/no personal data?
91
+ - **Proportionate** — do the benefits outweigh the risks to individuals?
92
+ - **Compliant** with data minimisation (Art. 5(1)(c)), purpose limitation (Art. 5(1)(b))
93
+
94
+ ### 3. Risk Assessment (Art. 35(7)(c))
95
+ For each identified risk:
96
+ | Risk | Likelihood (1–3) | Severity (1–3) | Risk Score | Mitigation |
97
+ |------|-----------------|---------------|-----------|------------|
98
+ | Unauthorised access | 2 | 3 | High | Encryption, access controls |
99
+ | Function creep | 1 | 2 | Medium | Purpose limitation controls |
100
+ | Re-identification | 2 | 3 | High | Pseudonymisation |
101
+
102
+ ### 4. Measures to Address Risks (Art. 35(7)(d))
103
+ For each High/Medium risk:
104
+ - Technical measure: [DESCRIBE]
105
+ - Organisational measure: [DESCRIBE]
106
+ - Residual risk after mitigation: [Low/Medium/High]
107
+
108
+ ### 5. DPO / Stakeholder Sign-off (Art. 35(2))
109
+ - DPO consulted: Yes / No — DPO opinion: [ATTACH]
110
+ - Data subjects consulted (where appropriate): Yes / No
111
+ - Outcome: ✅ Proceed | ⚠️ Proceed with conditions | 🔴 Prior consultation with SA required (Art. 36)
112
+
113
+ ---
114
+ ---
115
+
116
+ # Data Retention Policy Template
117
+
118
+ ## Legal Basis
119
+ Art. 5(1)(e) — storage limitation: data kept no longer than necessary for purpose.
120
+ Art. 17 — right to erasure triggers where retention period expired.
121
+
122
+ ---
123
+
124
+ ## Retention Schedule
125
+
126
+ | Data Category | Business Purpose | Retention Period | Lawful Basis | Deletion Method |
127
+ |--------------|-----------------|-----------------|--------------|----------------|
128
+ | Customer account data | Service provision | Duration of contract + 2 years | Contract (Art. 6(1)(b)) | Secure deletion |
129
+ | Marketing preferences | Direct marketing | Until withdrawal of consent | Consent (Art. 6(1)(a)) | Anonymisation |
130
+ | Transaction records | Financial/legal obligations | 7 years | Legal obligation (Art. 6(1)(c)) | Secure archival then deletion |
131
+ | Employee records | Employment law | Duration + 6 years | Legal obligation | Secure deletion |
132
+ | CCTV footage | Security | 30 days | Legitimate interests (Art. 6(1)(f)) | Automatic overwrite |
133
+ | Server/access logs | Security monitoring | 90 days | Legitimate interests | Automated purge |
134
+ | Consent records | Compliance evidence | 3 years after withdrawal | Legal obligation | Retain in audit log |
135
+
136
+ ---
137
+
138
+ ## Operational Requirements
139
+ - Automated deletion jobs should run [FREQUENCY] against retention schedule
140
+ - Backups must be included in retention policy — purge from backups within [X] days of primary deletion
141
+ - Exceptions process: legal hold procedure for litigation/investigation (suspend deletion)
142
+ - Retention schedule reviewed: annually or upon material change to processing
143
+
144
+ ---
145
+ ---
146
+
147
+ # Data Subject Rights Procedure
148
+
149
+ ## Legal Basis
150
+ Arts. 15–22 (individual rights), Art. 12 (modalities — response within 1 month, extendable by 2 months).
151
+
152
+ ---
153
+
154
+ ## Rights Summary
155
+
156
+ | Right | Article | When Applicable | Response Time |
157
+ |-------|---------|----------------|--------------|
158
+ | Access (SAR) | Art. 15 | Always (with exceptions) | 1 month (Art. 12(3)) |
159
+ | Rectification | Art. 16 | Inaccurate/incomplete data | 1 month |
160
+ | Erasure | Art. 17 | Consent withdrawn; no longer necessary; unlawful processing | 1 month |
161
+ | Restriction | Art. 18 | Accuracy contested; objection pending; unlawful but subject wants restriction | 1 month |
162
+ | Portability | Art. 20 | Consent or contract basis; automated processing only | 1 month |
163
+ | Object | Art. 21 | Legitimate interests or public task basis; direct marketing (absolute) | Immediately for direct marketing |
164
+ | No automated decisions | Art. 22 | Solely automated decisions with legal/significant effect | 1 month |
165
+
166
+ ---
167
+
168
+ ## Request Handling Process
169
+
170
+ 1. **Receive**: Accept requests via [EMAIL / WEB FORM / POST]. Identity verification required — proportionate to risk; do not request excessive info (Art. 12(6)).
171
+ 2. **Verify identity**: [METHOD — e.g., match against account details; 2FA confirmation]
172
+ 3. **Log**: Record date received, type of request, handler assigned.
173
+ 4. **Assess**: Determine if exemptions apply (e.g., Art. 17(3) — overriding legal obligation prevents erasure).
174
+ 5. **Respond**: Within **one calendar month** of receipt (Art. 12(3)). If extending, notify requester within first month with reason (Art. 12(3)).
175
+ 6. **Response must be**: Free of charge (Art. 12(5)); in concise, plain language (Art. 12(1)); in writing or by electronic means where requested.
176
+ 7. **Refusal**: If request is refused, inform subject of reasons and right to complain to SA and seek judicial remedy (Art. 12(4)).
177
+
178
+ ## Exemptions to Document
179
+ - Legal claims (Art. 17(3)(e))
180
+ - Freedom of expression (Art. 17(3)(a))
181
+ - Public interest archiving (Art. 17(3)(d))
182
+ - Manifestly unfounded or excessive requests — can charge fee or refuse (Art. 12(5))
183
+
184
+ ---
185
+
186
+ ## SLA & Escalation
187
+ - Day 0: Request received and logged
188
+ - Day 3: Identity verified; request categorised
189
+ - Day 20: Draft response reviewed by DPO/legal
190
+ - Day 28: Response sent (allowing 2 days buffer before Day 30 deadline)
191
+ - Day 30: Statutory deadline
192
+ - Extension notice must go out by Day 30 if needed, citing complex/numerous requests (Art. 12(3))
@@ -0,0 +1,121 @@
1
+ # Data Processing Agreement (DPA) Template
2
+
3
+ ## Legal Basis
4
+ Art. 28 GDPR — processors must be bound by a contract covering all mandatory Art. 28(3) terms.
5
+ Failure to have a compliant DPA is itself a violation exposable to Art. 83(4) fines (up to €10M / 2% turnover).
6
+
7
+ ---
8
+
9
+ ## Parties
10
+
11
+ **Controller**: [CONTROLLER LEGAL NAME], [ADDRESS] ("Controller")
12
+ **Processor**: [PROCESSOR LEGAL NAME], [ADDRESS] ("Processor")
13
+
14
+ ---
15
+
16
+ ## 1. Subject Matter and Duration (Art. 28(3))
17
+ This DPA governs the processing of personal data by Processor on behalf of Controller in
18
+ connection with: [DESCRIPTION OF MAIN SERVICE / CONTRACT].
19
+
20
+ Duration: This DPA is co-terminus with the main service agreement dated [DATE].
21
+
22
+ ## 2. Nature and Purpose of Processing (Art. 28(3))
23
+ The Processor will process personal data for the following purposes only:
24
+ - [e.g. Hosting and storing Controller's application data]
25
+ - [e.g. Sending transactional emails on Controller's instruction]
26
+
27
+ Processing shall occur only on documented instructions from the Controller (Art. 28(3)(a)).
28
+
29
+ ## 3. Categories of Personal Data (Art. 28(3))
30
+ The following categories of personal data are covered by this DPA:
31
+ - [e.g. Contact data: name, email address, phone number]
32
+ - [e.g. Usage data: IP address, session identifiers]
33
+ - [List any special category data + confirm Art. 9 condition met]
34
+
35
+ ## 4. Categories of Data Subjects (Art. 28(3))
36
+ - [e.g. Controller's end users / customers]
37
+ - [e.g. Controller's employees]
38
+
39
+ ## 5. Processor Obligations (Art. 28(3))
40
+
41
+ ### 5.1 Instructions Only (Art. 28(3)(a))
42
+ Processor shall process personal data only on documented instructions from Controller, including
43
+ with regard to transfers, unless required by law (in which case Processor shall notify Controller
44
+ unless prohibited).
45
+
46
+ ### 5.2 Confidentiality (Art. 28(3)(b))
47
+ Processor shall ensure that persons authorised to process the data have committed to
48
+ confidentiality or are under a statutory obligation of confidentiality.
49
+
50
+ ### 5.3 Security (Art. 28(3)(c); Art. 32)
51
+ Processor shall implement appropriate technical and organisational measures including at minimum:
52
+ - Encryption of personal data at rest and in transit
53
+ - Ongoing confidentiality, integrity, and availability of processing systems
54
+ - Ability to restore availability following incidents
55
+ - Regular testing of security measures
56
+
57
+ ### 5.4 Sub-processors (Art. 28(2), 28(3)(d))
58
+ Processor shall not engage sub-processors without prior **specific or general written authorisation**
59
+ from Controller.
60
+
61
+ Current authorised sub-processors: [LIST or "See Schedule A"]
62
+
63
+ Processor shall impose equivalent data protection obligations on sub-processors (Art. 28(4)) and
64
+ remains liable to Controller for sub-processor failures.
65
+
66
+ ### 5.5 Data Subject Rights (Art. 28(3)(e))
67
+ Processor shall assist Controller by appropriate technical and organisational measures to fulfil
68
+ Controller's obligation to respond to data subject rights requests (Arts. 15–22), given the nature
69
+ of processing.
70
+
71
+ ### 5.6 Assistance with Controller Obligations (Art. 28(3)(f))
72
+ Processor shall assist Controller in ensuring compliance with: Art. 32 (security), Art. 33–34
73
+ (breach notification), Art. 35–36 (DPIAs), taking into account the nature of processing and
74
+ information available.
75
+
76
+ ### 5.7 Deletion or Return (Art. 28(3)(g))
77
+ At Controller's choice, Processor shall delete or return all personal data upon termination of
78
+ services, and delete existing copies unless Union or Member State law requires storage.
79
+ Timeline for deletion/return: [X days after termination].
80
+
81
+ ### 5.8 Audit Rights (Art. 28(3)(h))
82
+ Processor shall make available all information necessary to demonstrate compliance with Art. 28
83
+ and shall allow for and contribute to audits conducted by Controller or an authorised auditor.
84
+ Audit notice period: [X days]. Frequency: [no more than once per year absent cause].
85
+
86
+ ## 6. International Transfers (Art. 44–49)
87
+ [If applicable:]
88
+ Where Processor transfers personal data outside the UK/EEA, the following safeguard applies:
89
+ - [ ] Adequacy decision (Art. 45): [COUNTRY]
90
+ - [ ] Standard Contractual Clauses (Art. 46(2)(c)): [MODULE — attach as Schedule B]
91
+ - [ ] Binding Corporate Rules (Art. 47)
92
+ - [ ] Other: [SPECIFY]
93
+
94
+ ## 7. Breach Notification (Art. 33)
95
+ Processor shall notify Controller of any personal data breach **without undue delay** and in any
96
+ event within **[48/72] hours** of becoming aware, providing information per Art. 33(3) to the
97
+ extent available.
98
+
99
+ ## 8. Governing Law
100
+ This DPA is governed by the laws of [JURISDICTION].
101
+
102
+ ---
103
+
104
+ ## Schedule A — Authorised Sub-processors
105
+ | Sub-processor | Location | Processing Activity |
106
+ |--------------|----------|-------------------|
107
+ | [NAME] | [COUNTRY] | [PURPOSE] |
108
+
109
+ ## Schedule B — Standard Contractual Clauses
110
+ [Attach EU Commission SCCs (2021) or UK IDTA as applicable]
111
+
112
+ ---
113
+
114
+ ## Drafting Checklist
115
+ - [ ] All Art. 28(3)(a)–(h) clauses present
116
+ - [ ] Sub-processor list attached or mechanism described
117
+ - [ ] Transfer mechanism documented and attached
118
+ - [ ] Breach notification timeline specified
119
+ - [ ] Deletion timeline specified
120
+ - [ ] Audit rights defined with reasonable notice period
121
+ - [ ] Signed by authorised representatives of both parties
@@ -0,0 +1,87 @@
1
+ # Privacy Notice / Privacy Policy Template
2
+
3
+ ## Legal Basis
4
+ Arts. 13–14 (information to be provided), Art. 12 (transparent communication).
5
+ Art. 13 applies when data collected directly from subject; Art. 14 when collected indirectly.
6
+
7
+ ---
8
+
9
+ ## Required Sections (Art. 13/14 Checklist)
10
+
11
+ ### 1. Identity and Contact Details of the Controller (Art. 13(1)(a))
12
+ > **[ORGANISATION NAME]** ("we", "us", "our")
13
+ > Registered address: [ADDRESS]
14
+ > Email: [PRIVACY@EMAIL.COM]
15
+
16
+ ### 2. DPO Contact Details (Art. 13(1)(b)) — if applicable
17
+ > Our Data Protection Officer can be contacted at: [DPO EMAIL / ADDRESS]
18
+
19
+ ### 3. Purposes and Lawful Basis (Art. 13(1)(c))
20
+ For each processing activity, state both purpose AND lawful basis:
21
+
22
+ | Purpose | Personal Data | Lawful Basis (Art. 6) |
23
+ |---------|--------------|----------------------|
24
+ | [e.g. Account creation] | [Name, email] | Contract (Art. 6(1)(b)) |
25
+ | [e.g. Marketing emails] | [Email, preferences] | Consent (Art. 6(1)(a)) |
26
+ | [e.g. Fraud prevention] | [Transaction data] | Legitimate interests (Art. 6(1)(f)) |
27
+
28
+ Where legitimate interests is relied upon, summarise the LIA outcome.
29
+
30
+ ### 4. Legitimate Interests (Art. 13(1)(d)) — where applicable
31
+ > We process [DATA] for [PURPOSE] based on our legitimate interest in [INTEREST]. We have
32
+ > assessed that this interest is not overridden by your rights and interests because [REASON].
33
+
34
+ ### 5. Recipients or Categories of Recipients (Art. 13(1)(e))
35
+ > We share your personal data with:
36
+ > - [SERVICE PROVIDER / PROCESSOR NAME]: for [PURPOSE], located in [COUNTRY]
37
+ > - [ANALYTICS PROVIDER]: for [PURPOSE]
38
+ > We do not sell your personal data to third parties.
39
+
40
+ ### 6. International Transfers (Art. 13(1)(f))
41
+ > Where we transfer data outside the UK/EEA, we ensure appropriate safeguards are in place,
42
+ > including: [Adequacy decision / Standard Contractual Clauses (SCCs) / BCRs — Art. 46].
43
+ > Details available on request.
44
+
45
+ ### 7. Retention Period (Art. 13(2)(a))
46
+ > We retain your personal data for [PERIOD / criteria used to determine period].
47
+ > See our Retention Schedule for full details.
48
+
49
+ ### 8. Data Subject Rights (Art. 13(2)(b))
50
+ > You have the right to:
51
+ > - **Access** your data (Art. 15) — request a copy of data we hold about you
52
+ > - **Rectification** of inaccurate data (Art. 16)
53
+ > - **Erasure** ("right to be forgotten") in certain circumstances (Art. 17)
54
+ > - **Restrict** our processing in certain circumstances (Art. 18)
55
+ > - **Data portability** for data provided by you under consent or contract (Art. 20)
56
+ > - **Object** to processing based on legitimate interests or direct marketing (Art. 21)
57
+ > - **Withdraw consent** at any time without affecting prior processing (Art. 7(3))
58
+ >
59
+ > To exercise your rights, contact: [EMAIL / FORM URL]
60
+ > We will respond within **one month** (Art. 12(3)), extendable by two further months for
61
+ > complex requests.
62
+
63
+ ### 9. Right to Lodge a Complaint (Art. 13(2)(d))
64
+ > You have the right to lodge a complaint with your supervisory authority.
65
+ > In the UK: **ICO** — ico.org.uk | 0303 123 1113
66
+ > In the EU: [LEAD SUPERVISORY AUTHORITY if applicable]
67
+
68
+ ### 10. Whether Provision is Statutory/Contractual (Art. 13(2)(e))
69
+ > [Where applicable: "Providing this data is a contractual requirement. Failure to provide it
70
+ > may mean we cannot [provide the service]."]
71
+
72
+ ### 11. Automated Decision-Making / Profiling (Art. 13(2)(f))
73
+ > [If applicable: "We use automated decision-making including profiling for [PURPOSE].
74
+ > This has [significant / no significant] effect on you. You have the right to [request human
75
+ > review / object — Art. 22]."]
76
+ > [If not applicable: "We do not use automated decision-making that produces legal or similarly
77
+ > significant effects on you."]
78
+
79
+ ---
80
+
81
+ ## Drafting Checklist
82
+ - [ ] Written in plain, clear language (Art. 12(1))
83
+ - [ ] Provided free of charge (Art. 12(5))
84
+ - [ ] All Art. 13(1) and 13(2) fields covered
85
+ - [ ] Separate sections for each processing purpose
86
+ - [ ] Version date and review schedule included
87
+ - [ ] Accessible format (e.g., layered notice for website)