Operations

Vendor and Processor Checklist

Audience: founders, ops, procurement-adjacent teams · Last reviewed: March 2026

See also: Compliance portal · Official resources · Guides index

If vendors or service providers touch personal data, they are part of your operational privacy picture whether or not the business has formally documented that relationship well.

The biggest risk is usually not the existence of vendors. It is that nobody can clearly explain which vendors access what data, why they need it, and what would happen during a request, incident, or workflow change.

Checklist

  1. Build a vendor matrix. Rows = vendors; columns = data categories, processing purposes, lawful role (fiduciary/processor), geography, and criticality.
  2. Validate access scope. Compare contract exhibits to actual SSO roles, API scopes, and exported datasets—shadow access is common.
  3. Subprocessors. Capture onward transfers, change-notification clauses, and whether you must publish names (subprocessor page).
  4. Security & confidentiality baseline. Document minimum technical controls (encryption, logging, MFA) you expect and verify during onboarding.
  5. Incident cooperation. Confirm timelines for breach assistance, data location disclosure, and regulator communication support.
  6. Deletion & return. Define how vendor deletes or returns personal data on exit; rehearse a termination once a year.
  7. Data location & transfers. Note residency promises vs actual regions; map cross-border transfer posture when India notifications evolve.
  8. Instruction flow. For processors, retain written instructions or ticket trails showing you control purpose changes (processor primer).
  9. DPAs / schedules. Check auditing rights, insurance, liability caps, and whether marketing-friendly “we comply with all laws” language is backed by specifics.
  10. Shadow IT sweep. Hunt for unsanctioned CRMs, chatbots, or AI assistants that ingest customer data without procurement review.
  11. Rights propagation. Table how access, correction, erasure, withdrawal, or grievance requests flow to each vendor—include timeouts.
  12. Renewal trigger. Add vendor privacy review to renewal calendars, not only security scans.

Common blind spots

What a good review produces

A good vendor review leaves the team with a clearer inventory, better ownership, and a more defensible answer to simple questions like: who can see this data, what are they doing with it, and what happens when the user or workflow changes?