bmad-plus 0.4.4 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +31 -0
- package/README.md +3 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +21 -8
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,129 @@
|
|
|
1
|
+
# SSP Writing Guide
|
|
2
|
+
|
|
3
|
+
The System Security Plan (SSP) is the centerpiece of the FedRAMP authorization package.
|
|
4
|
+
It tells the complete security story of the Cloud Service Offering (CSO): architecture,
|
|
5
|
+
data flows, control implementations, roles, and boundary. Many SSPs exceed 500 pages.
|
|
6
|
+
|
|
7
|
+
> Always use the official FedRAMP SSP template. One template covers all baselines
|
|
8
|
+
> (LI-SaaS, Low, Moderate, High). Templates at: https://www.fedramp.gov/rev5/documents-templates/
|
|
9
|
+
|
|
10
|
+
---
|
|
11
|
+
|
|
12
|
+
## SSP Section-by-Section Guide
|
|
13
|
+
|
|
14
|
+
### Section 1: Information System Name and Title
|
|
15
|
+
- Formal name of the CSO
|
|
16
|
+
- Unique identifier (assigned during FedRAMP process)
|
|
17
|
+
- Service model (IaaS / PaaS / SaaS)
|
|
18
|
+
- Deployment model (Public / Private / Community / Hybrid cloud)
|
|
19
|
+
|
|
20
|
+
### Section 2: System Categorization
|
|
21
|
+
- FIPS 199 impact determination: Confidentiality / Integrity / Availability
|
|
22
|
+
- Overall impact level = high-water mark of the three values
|
|
23
|
+
- Justify each categorization with the types of federal information processed
|
|
24
|
+
|
|
25
|
+
### Section 3: System Owner / Authorizing Official
|
|
26
|
+
- List CSP system owner, ISSO, and agency AO contacts
|
|
27
|
+
- For agency authorization, include the sponsoring agency AO
|
|
28
|
+
|
|
29
|
+
### Section 4: Assignment of Security Responsibility
|
|
30
|
+
- Identify the ISSO (Information System Security Officer)
|
|
31
|
+
- Document CSP security team contacts
|
|
32
|
+
|
|
33
|
+
### Section 5: System Mission / Purpose
|
|
34
|
+
- Brief description of what the system does
|
|
35
|
+
- What federal agencies/programs it supports
|
|
36
|
+
- What types of federal data it handles
|
|
37
|
+
|
|
38
|
+
### Section 6: System Description
|
|
39
|
+
- Narrative description of the system
|
|
40
|
+
- Technology stack overview
|
|
41
|
+
- Key system components
|
|
42
|
+
|
|
43
|
+
### Section 7: General System Description / System Environment
|
|
44
|
+
**This is one of the most scrutinized sections.**
|
|
45
|
+
- Detailed architecture description
|
|
46
|
+
- Authorization boundary narrative — clearly define what is IN and OUT of scope
|
|
47
|
+
- Network architecture diagram (embedded)
|
|
48
|
+
- Data flow diagrams (embedded)
|
|
49
|
+
- Ports, protocols, and services table
|
|
50
|
+
- External connections table (all services connecting to/from the boundary)
|
|
51
|
+
|
|
52
|
+
**Common mistakes:**
|
|
53
|
+
- Vague boundary descriptions ("the cloud environment") — be specific
|
|
54
|
+
- Missing data flows for admin/management traffic
|
|
55
|
+
- Not documenting external services (DNS, NTP, update servers, SaaS tools used by admins)
|
|
56
|
+
|
|
57
|
+
### Section 8: System Environment / Interconnections
|
|
58
|
+
- Interconnection Security Agreements (ISAs) for each external system
|
|
59
|
+
- Leveraged FedRAMP services (IaaS/PaaS) and their authorization status
|
|
60
|
+
- Inherited controls from leveraged services must be documented in CIS/CRM workbook
|
|
61
|
+
|
|
62
|
+
### Section 9: Laws, Regulations, Standards (Appendix B)
|
|
63
|
+
- Required attachment: SSP Appendix B (Laws & Regulations) — use the FedRAMP template
|
|
64
|
+
- Lists applicable federal laws (FISMA, Privacy Act, etc.)
|
|
65
|
+
- May include agency-specific requirements (HIPAA, CJIS if applicable)
|
|
66
|
+
|
|
67
|
+
### Section 10: Minimum Security Controls
|
|
68
|
+
**The largest section — one narrative per control.**
|
|
69
|
+
|
|
70
|
+
For each control in the applicable baseline:
|
|
71
|
+
|
|
72
|
+
```
|
|
73
|
+
[Control ID] [Control Name]
|
|
74
|
+
Implementation Status: Implemented | Partially Implemented | Planned | Not Applicable | Alternative Implementation
|
|
75
|
+
|
|
76
|
+
[Control Implementation Statement]
|
|
77
|
+
Describe HOW the control is implemented. Be specific:
|
|
78
|
+
- What tool, policy, or process implements this control?
|
|
79
|
+
- Who is responsible?
|
|
80
|
+
- Where is the evidence?
|
|
81
|
+
- For shared controls: what is the CSP responsibility vs. customer responsibility?
|
|
82
|
+
|
|
83
|
+
Customer Responsibility (if applicable):
|
|
84
|
+
[Describe what the customer/agency must do]
|
|
85
|
+
```
|
|
86
|
+
|
|
87
|
+
**Writing tips:**
|
|
88
|
+
- Address every verb in the control requirement — if the control says "monitor and record," describe both monitoring AND recording
|
|
89
|
+
- Reference specific policy document names, tool names, configuration settings
|
|
90
|
+
- For inherited controls from FedRAMP IaaS/PaaS: state "This control is fully/partially inherited from [Provider]. See CIS/CRM workbook."
|
|
91
|
+
- Mark unimplemented controls as "Planned" and ensure they appear in POA&M
|
|
92
|
+
|
|
93
|
+
### SSP Appendices (A through Q)
|
|
94
|
+
|
|
95
|
+
| Appendix | Content | Required? |
|
|
96
|
+
|---|---|---|
|
|
97
|
+
| A | Acronyms & Glossary | Yes |
|
|
98
|
+
| B | Related Laws & Regulations (Attachment 12) | Yes |
|
|
99
|
+
| C | Security Policies & Procedures | Yes (CSP-authored) |
|
|
100
|
+
| D | User Guide | Yes |
|
|
101
|
+
| E | Rules of Behavior | Yes (FedRAMP template) |
|
|
102
|
+
| F | IT Contingency Plan | Yes (FedRAMP ISCP template, updated Dec 2024) |
|
|
103
|
+
| G | Configuration Management Plan | Yes (CSP-authored) |
|
|
104
|
+
| H | Incident Response Plan | Yes (CSP-authored) |
|
|
105
|
+
| I | Control Implementation Summary (CIS) / CRM Workbook | Yes (FedRAMP template) |
|
|
106
|
+
| J | FIPS 199 Categorization | Yes |
|
|
107
|
+
| K | Integrated Inventory Workbook (IIW) | Yes (FedRAMP template, updated Dec 2024) |
|
|
108
|
+
| L | Cryptographic Modules Table | Yes |
|
|
109
|
+
| M | Continuous Monitoring Plan | Yes |
|
|
110
|
+
| N | Separation of Duties Matrix | Conditional |
|
|
111
|
+
| O | POA&M | Yes (FedRAMP template) |
|
|
112
|
+
| P | Supply Chain Risk Management Plan | Yes (Rev 5) |
|
|
113
|
+
| Q | Privacy Impact Assessment (PIA) | If PII in scope |
|
|
114
|
+
|
|
115
|
+
---
|
|
116
|
+
|
|
117
|
+
## SSP Quality Checklist
|
|
118
|
+
|
|
119
|
+
Before submitting, verify:
|
|
120
|
+
- [ ] All controls for the applicable baseline have implementation statements
|
|
121
|
+
- [ ] No controls describe future/planned state as currently implemented
|
|
122
|
+
- [ ] All "Planned" controls appear in POA&M
|
|
123
|
+
- [ ] Architecture diagrams and control narratives are consistent
|
|
124
|
+
- [ ] External connections table matches the data flow diagrams
|
|
125
|
+
- [ ] CIS/CRM workbook is complete for all shared/inherited controls
|
|
126
|
+
- [ ] IIW lists every asset in the boundary
|
|
127
|
+
- [ ] Cryptographic modules table lists all FIPS 140-2/3 validated modules in use
|
|
128
|
+
- [ ] All required appendices (C through Q as applicable) are attached
|
|
129
|
+
- [ ] SSP Appendix A-12 is the current FedRAMP Laws & Regulations template
|
|
@@ -0,0 +1,192 @@
|
|
|
1
|
+
# Consent Notice / Cookie Banner Template
|
|
2
|
+
|
|
3
|
+
## Legal Basis
|
|
4
|
+
Art. 7 (conditions for consent), Art. 4(11) (definition of consent), Recitals 32, 42–43.
|
|
5
|
+
ePrivacy Directive Art. 5(3) additionally applies to cookies/device storage.
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## Consent Requirements Checklist (Art. 7)
|
|
10
|
+
- [ ] **Freely given**: No bundling with service terms; genuine choice with no detriment (Art. 7(4))
|
|
11
|
+
- [ ] **Specific**: Separate consent for each distinct purpose (Recital 43)
|
|
12
|
+
- [ ] **Informed**: Clear plain-language explanation before consent given
|
|
13
|
+
- [ ] **Unambiguous**: Affirmative act required — no pre-ticked boxes (Recital 32)
|
|
14
|
+
- [ ] **Withdrawable**: "As easy to withdraw as to give" (Art. 7(3)); withdrawal does not affect prior processing
|
|
15
|
+
- [ ] **Documented**: Record of when, how, and what consented to (Art. 7(1))
|
|
16
|
+
- [ ] **Age verified**: Under-16 requires parental consent (Art. 8; check Member State derogation 13–16)
|
|
17
|
+
|
|
18
|
+
---
|
|
19
|
+
|
|
20
|
+
## Cookie Banner — Required Elements
|
|
21
|
+
|
|
22
|
+
### Layer 1 (Initial Banner)
|
|
23
|
+
```
|
|
24
|
+
We use cookies to [improve your experience / personalise content / analyse traffic].
|
|
25
|
+
[ACCEPT ALL] [REJECT ALL] [MANAGE PREFERENCES]
|
|
26
|
+
|
|
27
|
+
[Link to Cookie Policy]
|
|
28
|
+
```
|
|
29
|
+
|
|
30
|
+
**Critical**: "Accept" and "Reject" must be equally prominent. Dark patterns (hiding reject,
|
|
31
|
+
pre-selected toggles) violate Art. 7 and Art. 5(1)(a) (fairness).
|
|
32
|
+
|
|
33
|
+
### Layer 2 (Preference Centre)
|
|
34
|
+
Group cookies by purpose; each requires a separate opt-in toggle defaulting to OFF:
|
|
35
|
+
| Category | Description | Default |
|
|
36
|
+
|----------|-------------|---------|
|
|
37
|
+
| Strictly Necessary | Required for site function — no consent needed | Always ON |
|
|
38
|
+
| Analytics | [Provider, purpose] | OFF |
|
|
39
|
+
| Marketing | [Provider, purpose] | OFF |
|
|
40
|
+
| Personalisation | [Provider, purpose] | OFF |
|
|
41
|
+
|
|
42
|
+
### Consent Record to Store
|
|
43
|
+
```json
|
|
44
|
+
{
|
|
45
|
+
"userId": "...",
|
|
46
|
+
"consentTimestamp": "ISO-8601",
|
|
47
|
+
"consentVersion": "v1.2",
|
|
48
|
+
"purposes": {
|
|
49
|
+
"analytics": true,
|
|
50
|
+
"marketing": false
|
|
51
|
+
},
|
|
52
|
+
"method": "explicit-click",
|
|
53
|
+
"ipAddress": "[pseudonymised or omit]"
|
|
54
|
+
}
|
|
55
|
+
```
|
|
56
|
+
|
|
57
|
+
---
|
|
58
|
+
---
|
|
59
|
+
|
|
60
|
+
# DPIA Template (Data Protection Impact Assessment)
|
|
61
|
+
|
|
62
|
+
## Legal Basis
|
|
63
|
+
Art. 35 GDPR — mandatory when processing is "likely to result in a high risk" to individuals.
|
|
64
|
+
Art. 35(3) lists mandatory triggers; supervisory authorities publish lists (Art. 35(4)).
|
|
65
|
+
|
|
66
|
+
## When Required (Art. 35(3) + WP29/EDPB guidance — any 2+ of these factors)
|
|
67
|
+
- Systematic and extensive profiling
|
|
68
|
+
- Large-scale special category data (Art. 9)
|
|
69
|
+
- Systematic monitoring of public areas
|
|
70
|
+
- New technologies
|
|
71
|
+
- Automated decision-making with legal/significant effects (Art. 22)
|
|
72
|
+
- Children's data at scale
|
|
73
|
+
- Data matching / combining datasets
|
|
74
|
+
|
|
75
|
+
---
|
|
76
|
+
|
|
77
|
+
## DPIA Structure
|
|
78
|
+
|
|
79
|
+
### 1. Description of Processing (Art. 35(7)(a))
|
|
80
|
+
- **System / project name**: [NAME]
|
|
81
|
+
- **Controller**: [NAME + DPO if applicable]
|
|
82
|
+
- **Nature of processing**: [What operations are performed on the data]
|
|
83
|
+
- **Scope**: [Volume, frequency, geographic reach]
|
|
84
|
+
- **Context**: [Who are the data subjects; their vulnerability level]
|
|
85
|
+
- **Purpose**: [What is the legitimate aim]
|
|
86
|
+
- **Lawful basis**: Art. 6(1)[X]; Art. 9(2)[X] if special category
|
|
87
|
+
|
|
88
|
+
### 2. Necessity and Proportionality Assessment (Art. 35(7)(b))
|
|
89
|
+
Assess whether processing is:
|
|
90
|
+
- **Necessary** for the purpose — could the purpose be achieved with less/no personal data?
|
|
91
|
+
- **Proportionate** — do the benefits outweigh the risks to individuals?
|
|
92
|
+
- **Compliant** with data minimisation (Art. 5(1)(c)), purpose limitation (Art. 5(1)(b))
|
|
93
|
+
|
|
94
|
+
### 3. Risk Assessment (Art. 35(7)(c))
|
|
95
|
+
For each identified risk:
|
|
96
|
+
| Risk | Likelihood (1–3) | Severity (1–3) | Risk Score | Mitigation |
|
|
97
|
+
|------|-----------------|---------------|-----------|------------|
|
|
98
|
+
| Unauthorised access | 2 | 3 | High | Encryption, access controls |
|
|
99
|
+
| Function creep | 1 | 2 | Medium | Purpose limitation controls |
|
|
100
|
+
| Re-identification | 2 | 3 | High | Pseudonymisation |
|
|
101
|
+
|
|
102
|
+
### 4. Measures to Address Risks (Art. 35(7)(d))
|
|
103
|
+
For each High/Medium risk:
|
|
104
|
+
- Technical measure: [DESCRIBE]
|
|
105
|
+
- Organisational measure: [DESCRIBE]
|
|
106
|
+
- Residual risk after mitigation: [Low/Medium/High]
|
|
107
|
+
|
|
108
|
+
### 5. DPO / Stakeholder Sign-off (Art. 35(2))
|
|
109
|
+
- DPO consulted: Yes / No — DPO opinion: [ATTACH]
|
|
110
|
+
- Data subjects consulted (where appropriate): Yes / No
|
|
111
|
+
- Outcome: ✅ Proceed | ⚠️ Proceed with conditions | 🔴 Prior consultation with SA required (Art. 36)
|
|
112
|
+
|
|
113
|
+
---
|
|
114
|
+
---
|
|
115
|
+
|
|
116
|
+
# Data Retention Policy Template
|
|
117
|
+
|
|
118
|
+
## Legal Basis
|
|
119
|
+
Art. 5(1)(e) — storage limitation: data kept no longer than necessary for purpose.
|
|
120
|
+
Art. 17 — right to erasure triggers where retention period expired.
|
|
121
|
+
|
|
122
|
+
---
|
|
123
|
+
|
|
124
|
+
## Retention Schedule
|
|
125
|
+
|
|
126
|
+
| Data Category | Business Purpose | Retention Period | Lawful Basis | Deletion Method |
|
|
127
|
+
|--------------|-----------------|-----------------|--------------|----------------|
|
|
128
|
+
| Customer account data | Service provision | Duration of contract + 2 years | Contract (Art. 6(1)(b)) | Secure deletion |
|
|
129
|
+
| Marketing preferences | Direct marketing | Until withdrawal of consent | Consent (Art. 6(1)(a)) | Anonymisation |
|
|
130
|
+
| Transaction records | Financial/legal obligations | 7 years | Legal obligation (Art. 6(1)(c)) | Secure archival then deletion |
|
|
131
|
+
| Employee records | Employment law | Duration + 6 years | Legal obligation | Secure deletion |
|
|
132
|
+
| CCTV footage | Security | 30 days | Legitimate interests (Art. 6(1)(f)) | Automatic overwrite |
|
|
133
|
+
| Server/access logs | Security monitoring | 90 days | Legitimate interests | Automated purge |
|
|
134
|
+
| Consent records | Compliance evidence | 3 years after withdrawal | Legal obligation | Retain in audit log |
|
|
135
|
+
|
|
136
|
+
---
|
|
137
|
+
|
|
138
|
+
## Operational Requirements
|
|
139
|
+
- Automated deletion jobs should run [FREQUENCY] against retention schedule
|
|
140
|
+
- Backups must be included in retention policy — purge from backups within [X] days of primary deletion
|
|
141
|
+
- Exceptions process: legal hold procedure for litigation/investigation (suspend deletion)
|
|
142
|
+
- Retention schedule reviewed: annually or upon material change to processing
|
|
143
|
+
|
|
144
|
+
---
|
|
145
|
+
---
|
|
146
|
+
|
|
147
|
+
# Data Subject Rights Procedure
|
|
148
|
+
|
|
149
|
+
## Legal Basis
|
|
150
|
+
Arts. 15–22 (individual rights), Art. 12 (modalities — response within 1 month, extendable by 2 months).
|
|
151
|
+
|
|
152
|
+
---
|
|
153
|
+
|
|
154
|
+
## Rights Summary
|
|
155
|
+
|
|
156
|
+
| Right | Article | When Applicable | Response Time |
|
|
157
|
+
|-------|---------|----------------|--------------|
|
|
158
|
+
| Access (SAR) | Art. 15 | Always (with exceptions) | 1 month (Art. 12(3)) |
|
|
159
|
+
| Rectification | Art. 16 | Inaccurate/incomplete data | 1 month |
|
|
160
|
+
| Erasure | Art. 17 | Consent withdrawn; no longer necessary; unlawful processing | 1 month |
|
|
161
|
+
| Restriction | Art. 18 | Accuracy contested; objection pending; unlawful but subject wants restriction | 1 month |
|
|
162
|
+
| Portability | Art. 20 | Consent or contract basis; automated processing only | 1 month |
|
|
163
|
+
| Object | Art. 21 | Legitimate interests or public task basis; direct marketing (absolute) | Immediately for direct marketing |
|
|
164
|
+
| No automated decisions | Art. 22 | Solely automated decisions with legal/significant effect | 1 month |
|
|
165
|
+
|
|
166
|
+
---
|
|
167
|
+
|
|
168
|
+
## Request Handling Process
|
|
169
|
+
|
|
170
|
+
1. **Receive**: Accept requests via [EMAIL / WEB FORM / POST]. Identity verification required — proportionate to risk; do not request excessive info (Art. 12(6)).
|
|
171
|
+
2. **Verify identity**: [METHOD — e.g., match against account details; 2FA confirmation]
|
|
172
|
+
3. **Log**: Record date received, type of request, handler assigned.
|
|
173
|
+
4. **Assess**: Determine if exemptions apply (e.g., Art. 17(3) — overriding legal obligation prevents erasure).
|
|
174
|
+
5. **Respond**: Within **one calendar month** of receipt (Art. 12(3)). If extending, notify requester within first month with reason (Art. 12(3)).
|
|
175
|
+
6. **Response must be**: Free of charge (Art. 12(5)); in concise, plain language (Art. 12(1)); in writing or by electronic means where requested.
|
|
176
|
+
7. **Refusal**: If request is refused, inform subject of reasons and right to complain to SA and seek judicial remedy (Art. 12(4)).
|
|
177
|
+
|
|
178
|
+
## Exemptions to Document
|
|
179
|
+
- Legal claims (Art. 17(3)(e))
|
|
180
|
+
- Freedom of expression (Art. 17(3)(a))
|
|
181
|
+
- Public interest archiving (Art. 17(3)(d))
|
|
182
|
+
- Manifestly unfounded or excessive requests — can charge fee or refuse (Art. 12(5))
|
|
183
|
+
|
|
184
|
+
---
|
|
185
|
+
|
|
186
|
+
## SLA & Escalation
|
|
187
|
+
- Day 0: Request received and logged
|
|
188
|
+
- Day 3: Identity verified; request categorised
|
|
189
|
+
- Day 20: Draft response reviewed by DPO/legal
|
|
190
|
+
- Day 28: Response sent (allowing 2 days buffer before Day 30 deadline)
|
|
191
|
+
- Day 30: Statutory deadline
|
|
192
|
+
- Extension notice must go out by Day 30 if needed, citing complex/numerous requests (Art. 12(3))
|
|
@@ -0,0 +1,121 @@
|
|
|
1
|
+
# Data Processing Agreement (DPA) Template
|
|
2
|
+
|
|
3
|
+
## Legal Basis
|
|
4
|
+
Art. 28 GDPR — processors must be bound by a contract covering all mandatory Art. 28(3) terms.
|
|
5
|
+
Failure to have a compliant DPA is itself a violation exposable to Art. 83(4) fines (up to €10M / 2% turnover).
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## Parties
|
|
10
|
+
|
|
11
|
+
**Controller**: [CONTROLLER LEGAL NAME], [ADDRESS] ("Controller")
|
|
12
|
+
**Processor**: [PROCESSOR LEGAL NAME], [ADDRESS] ("Processor")
|
|
13
|
+
|
|
14
|
+
---
|
|
15
|
+
|
|
16
|
+
## 1. Subject Matter and Duration (Art. 28(3))
|
|
17
|
+
This DPA governs the processing of personal data by Processor on behalf of Controller in
|
|
18
|
+
connection with: [DESCRIPTION OF MAIN SERVICE / CONTRACT].
|
|
19
|
+
|
|
20
|
+
Duration: This DPA is co-terminus with the main service agreement dated [DATE].
|
|
21
|
+
|
|
22
|
+
## 2. Nature and Purpose of Processing (Art. 28(3))
|
|
23
|
+
The Processor will process personal data for the following purposes only:
|
|
24
|
+
- [e.g. Hosting and storing Controller's application data]
|
|
25
|
+
- [e.g. Sending transactional emails on Controller's instruction]
|
|
26
|
+
|
|
27
|
+
Processing shall occur only on documented instructions from the Controller (Art. 28(3)(a)).
|
|
28
|
+
|
|
29
|
+
## 3. Categories of Personal Data (Art. 28(3))
|
|
30
|
+
The following categories of personal data are covered by this DPA:
|
|
31
|
+
- [e.g. Contact data: name, email address, phone number]
|
|
32
|
+
- [e.g. Usage data: IP address, session identifiers]
|
|
33
|
+
- [List any special category data + confirm Art. 9 condition met]
|
|
34
|
+
|
|
35
|
+
## 4. Categories of Data Subjects (Art. 28(3))
|
|
36
|
+
- [e.g. Controller's end users / customers]
|
|
37
|
+
- [e.g. Controller's employees]
|
|
38
|
+
|
|
39
|
+
## 5. Processor Obligations (Art. 28(3))
|
|
40
|
+
|
|
41
|
+
### 5.1 Instructions Only (Art. 28(3)(a))
|
|
42
|
+
Processor shall process personal data only on documented instructions from Controller, including
|
|
43
|
+
with regard to transfers, unless required by law (in which case Processor shall notify Controller
|
|
44
|
+
unless prohibited).
|
|
45
|
+
|
|
46
|
+
### 5.2 Confidentiality (Art. 28(3)(b))
|
|
47
|
+
Processor shall ensure that persons authorised to process the data have committed to
|
|
48
|
+
confidentiality or are under a statutory obligation of confidentiality.
|
|
49
|
+
|
|
50
|
+
### 5.3 Security (Art. 28(3)(c); Art. 32)
|
|
51
|
+
Processor shall implement appropriate technical and organisational measures including at minimum:
|
|
52
|
+
- Encryption of personal data at rest and in transit
|
|
53
|
+
- Ongoing confidentiality, integrity, and availability of processing systems
|
|
54
|
+
- Ability to restore availability following incidents
|
|
55
|
+
- Regular testing of security measures
|
|
56
|
+
|
|
57
|
+
### 5.4 Sub-processors (Art. 28(2), 28(3)(d))
|
|
58
|
+
Processor shall not engage sub-processors without prior **specific or general written authorisation**
|
|
59
|
+
from Controller.
|
|
60
|
+
|
|
61
|
+
Current authorised sub-processors: [LIST or "See Schedule A"]
|
|
62
|
+
|
|
63
|
+
Processor shall impose equivalent data protection obligations on sub-processors (Art. 28(4)) and
|
|
64
|
+
remains liable to Controller for sub-processor failures.
|
|
65
|
+
|
|
66
|
+
### 5.5 Data Subject Rights (Art. 28(3)(e))
|
|
67
|
+
Processor shall assist Controller by appropriate technical and organisational measures to fulfil
|
|
68
|
+
Controller's obligation to respond to data subject rights requests (Arts. 15–22), given the nature
|
|
69
|
+
of processing.
|
|
70
|
+
|
|
71
|
+
### 5.6 Assistance with Controller Obligations (Art. 28(3)(f))
|
|
72
|
+
Processor shall assist Controller in ensuring compliance with: Art. 32 (security), Art. 33–34
|
|
73
|
+
(breach notification), Art. 35–36 (DPIAs), taking into account the nature of processing and
|
|
74
|
+
information available.
|
|
75
|
+
|
|
76
|
+
### 5.7 Deletion or Return (Art. 28(3)(g))
|
|
77
|
+
At Controller's choice, Processor shall delete or return all personal data upon termination of
|
|
78
|
+
services, and delete existing copies unless Union or Member State law requires storage.
|
|
79
|
+
Timeline for deletion/return: [X days after termination].
|
|
80
|
+
|
|
81
|
+
### 5.8 Audit Rights (Art. 28(3)(h))
|
|
82
|
+
Processor shall make available all information necessary to demonstrate compliance with Art. 28
|
|
83
|
+
and shall allow for and contribute to audits conducted by Controller or an authorised auditor.
|
|
84
|
+
Audit notice period: [X days]. Frequency: [no more than once per year absent cause].
|
|
85
|
+
|
|
86
|
+
## 6. International Transfers (Art. 44–49)
|
|
87
|
+
[If applicable:]
|
|
88
|
+
Where Processor transfers personal data outside the UK/EEA, the following safeguard applies:
|
|
89
|
+
- [ ] Adequacy decision (Art. 45): [COUNTRY]
|
|
90
|
+
- [ ] Standard Contractual Clauses (Art. 46(2)(c)): [MODULE — attach as Schedule B]
|
|
91
|
+
- [ ] Binding Corporate Rules (Art. 47)
|
|
92
|
+
- [ ] Other: [SPECIFY]
|
|
93
|
+
|
|
94
|
+
## 7. Breach Notification (Art. 33)
|
|
95
|
+
Processor shall notify Controller of any personal data breach **without undue delay** and in any
|
|
96
|
+
event within **[48/72] hours** of becoming aware, providing information per Art. 33(3) to the
|
|
97
|
+
extent available.
|
|
98
|
+
|
|
99
|
+
## 8. Governing Law
|
|
100
|
+
This DPA is governed by the laws of [JURISDICTION].
|
|
101
|
+
|
|
102
|
+
---
|
|
103
|
+
|
|
104
|
+
## Schedule A — Authorised Sub-processors
|
|
105
|
+
| Sub-processor | Location | Processing Activity |
|
|
106
|
+
|--------------|----------|-------------------|
|
|
107
|
+
| [NAME] | [COUNTRY] | [PURPOSE] |
|
|
108
|
+
|
|
109
|
+
## Schedule B — Standard Contractual Clauses
|
|
110
|
+
[Attach EU Commission SCCs (2021) or UK IDTA as applicable]
|
|
111
|
+
|
|
112
|
+
---
|
|
113
|
+
|
|
114
|
+
## Drafting Checklist
|
|
115
|
+
- [ ] All Art. 28(3)(a)–(h) clauses present
|
|
116
|
+
- [ ] Sub-processor list attached or mechanism described
|
|
117
|
+
- [ ] Transfer mechanism documented and attached
|
|
118
|
+
- [ ] Breach notification timeline specified
|
|
119
|
+
- [ ] Deletion timeline specified
|
|
120
|
+
- [ ] Audit rights defined with reasonable notice period
|
|
121
|
+
- [ ] Signed by authorised representatives of both parties
|
|
@@ -0,0 +1,87 @@
|
|
|
1
|
+
# Privacy Notice / Privacy Policy Template
|
|
2
|
+
|
|
3
|
+
## Legal Basis
|
|
4
|
+
Arts. 13–14 (information to be provided), Art. 12 (transparent communication).
|
|
5
|
+
Art. 13 applies when data collected directly from subject; Art. 14 when collected indirectly.
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## Required Sections (Art. 13/14 Checklist)
|
|
10
|
+
|
|
11
|
+
### 1. Identity and Contact Details of the Controller (Art. 13(1)(a))
|
|
12
|
+
> **[ORGANISATION NAME]** ("we", "us", "our")
|
|
13
|
+
> Registered address: [ADDRESS]
|
|
14
|
+
> Email: [PRIVACY@EMAIL.COM]
|
|
15
|
+
|
|
16
|
+
### 2. DPO Contact Details (Art. 13(1)(b)) — if applicable
|
|
17
|
+
> Our Data Protection Officer can be contacted at: [DPO EMAIL / ADDRESS]
|
|
18
|
+
|
|
19
|
+
### 3. Purposes and Lawful Basis (Art. 13(1)(c))
|
|
20
|
+
For each processing activity, state both purpose AND lawful basis:
|
|
21
|
+
|
|
22
|
+
| Purpose | Personal Data | Lawful Basis (Art. 6) |
|
|
23
|
+
|---------|--------------|----------------------|
|
|
24
|
+
| [e.g. Account creation] | [Name, email] | Contract (Art. 6(1)(b)) |
|
|
25
|
+
| [e.g. Marketing emails] | [Email, preferences] | Consent (Art. 6(1)(a)) |
|
|
26
|
+
| [e.g. Fraud prevention] | [Transaction data] | Legitimate interests (Art. 6(1)(f)) |
|
|
27
|
+
|
|
28
|
+
Where legitimate interests is relied upon, summarise the LIA outcome.
|
|
29
|
+
|
|
30
|
+
### 4. Legitimate Interests (Art. 13(1)(d)) — where applicable
|
|
31
|
+
> We process [DATA] for [PURPOSE] based on our legitimate interest in [INTEREST]. We have
|
|
32
|
+
> assessed that this interest is not overridden by your rights and interests because [REASON].
|
|
33
|
+
|
|
34
|
+
### 5. Recipients or Categories of Recipients (Art. 13(1)(e))
|
|
35
|
+
> We share your personal data with:
|
|
36
|
+
> - [SERVICE PROVIDER / PROCESSOR NAME]: for [PURPOSE], located in [COUNTRY]
|
|
37
|
+
> - [ANALYTICS PROVIDER]: for [PURPOSE]
|
|
38
|
+
> We do not sell your personal data to third parties.
|
|
39
|
+
|
|
40
|
+
### 6. International Transfers (Art. 13(1)(f))
|
|
41
|
+
> Where we transfer data outside the UK/EEA, we ensure appropriate safeguards are in place,
|
|
42
|
+
> including: [Adequacy decision / Standard Contractual Clauses (SCCs) / BCRs — Art. 46].
|
|
43
|
+
> Details available on request.
|
|
44
|
+
|
|
45
|
+
### 7. Retention Period (Art. 13(2)(a))
|
|
46
|
+
> We retain your personal data for [PERIOD / criteria used to determine period].
|
|
47
|
+
> See our Retention Schedule for full details.
|
|
48
|
+
|
|
49
|
+
### 8. Data Subject Rights (Art. 13(2)(b))
|
|
50
|
+
> You have the right to:
|
|
51
|
+
> - **Access** your data (Art. 15) — request a copy of data we hold about you
|
|
52
|
+
> - **Rectification** of inaccurate data (Art. 16)
|
|
53
|
+
> - **Erasure** ("right to be forgotten") in certain circumstances (Art. 17)
|
|
54
|
+
> - **Restrict** our processing in certain circumstances (Art. 18)
|
|
55
|
+
> - **Data portability** for data provided by you under consent or contract (Art. 20)
|
|
56
|
+
> - **Object** to processing based on legitimate interests or direct marketing (Art. 21)
|
|
57
|
+
> - **Withdraw consent** at any time without affecting prior processing (Art. 7(3))
|
|
58
|
+
>
|
|
59
|
+
> To exercise your rights, contact: [EMAIL / FORM URL]
|
|
60
|
+
> We will respond within **one month** (Art. 12(3)), extendable by two further months for
|
|
61
|
+
> complex requests.
|
|
62
|
+
|
|
63
|
+
### 9. Right to Lodge a Complaint (Art. 13(2)(d))
|
|
64
|
+
> You have the right to lodge a complaint with your supervisory authority.
|
|
65
|
+
> In the UK: **ICO** — ico.org.uk | 0303 123 1113
|
|
66
|
+
> In the EU: [LEAD SUPERVISORY AUTHORITY if applicable]
|
|
67
|
+
|
|
68
|
+
### 10. Whether Provision is Statutory/Contractual (Art. 13(2)(e))
|
|
69
|
+
> [Where applicable: "Providing this data is a contractual requirement. Failure to provide it
|
|
70
|
+
> may mean we cannot [provide the service]."]
|
|
71
|
+
|
|
72
|
+
### 11. Automated Decision-Making / Profiling (Art. 13(2)(f))
|
|
73
|
+
> [If applicable: "We use automated decision-making including profiling for [PURPOSE].
|
|
74
|
+
> This has [significant / no significant] effect on you. You have the right to [request human
|
|
75
|
+
> review / object — Art. 22]."]
|
|
76
|
+
> [If not applicable: "We do not use automated decision-making that produces legal or similarly
|
|
77
|
+
> significant effects on you."]
|
|
78
|
+
|
|
79
|
+
---
|
|
80
|
+
|
|
81
|
+
## Drafting Checklist
|
|
82
|
+
- [ ] Written in plain, clear language (Art. 12(1))
|
|
83
|
+
- [ ] Provided free of charge (Art. 12(5))
|
|
84
|
+
- [ ] All Art. 13(1) and 13(2) fields covered
|
|
85
|
+
- [ ] Separate sections for each processing purpose
|
|
86
|
+
- [ ] Version date and review schedule included
|
|
87
|
+
- [ ] Accessible format (e.g., layered notice for website)
|