GDPR DPIA Checklist — Article 35 Data Protection Impact Assessment
Last updated: 2026-04-21 — ComplianceStack Editorial Team
Generate Your Personalized GDPR Checklist
Tell us about your organization and we'll tailor this 14-item checklist to your situation — highlighting your gaps, marking what you already have, and calculating your readiness score. Free. Instant. Downloadable.
GDPR Article 35 mandates a Data Protection Impact Assessment before beginning any processing that is 'likely to result in a high risk' to individuals' rights and freedoms. The EDPB has published a list of nine processing characteristics that trigger mandatory DPIAs — if two or more apply, a DPIA is required. Beyond mandatory cases, supervisory authorities publish their own blacklists of always-required DPIAs, and conducting a DPIA for high-risk processing even when not strictly mandatory demonstrates Article 5(2) accountability. Failure to conduct a required DPIA can result in fines up to €10 million or 2% of global annual turnover under Article 83(4). This 20-item checklist covers every required element of a compliant DPIA and the practical steps supervisory authorities expect to see documented.
Generate Your Personalized Checklist
Tell us about your data protection impact assessment and we'll filter this checklist to what applies to you — with a readiness score and priority gaps highlighted.
📄 Reference Checklist
Generic — use the generator above for a personalized versionGDPR Reference Checklist for Data Protection Impact Assessment
SEO ReferenceUse the generator above for your personalized checklist. The complete reference checklist is below.
GDPR Compliance Checklist for Data Protection Impact Assessment
Determine whether a DPIA is mandatory for the processing activity
EDPB criteria triggering mandatory DPIA when two or more apply: systematic profiling, automated decision-making with legal/significant effects, large-scale processing of special category data, large-scale public monitoring, processing children's data at scale, innovative technology use, data combinations enabling re-identification, cross-border transfers of large datasets. Consult your supervisory authority's published blacklist for per se mandatory activities.
Consult the Data Protection Officer before beginning the DPIA
If a DPO has been designated, Article 35(2) requires mandatory consultation before conducting the DPIA. Document the DPO's advice and recommendations. The DPO's involvement does not transfer responsibility — the controller retains accountability. Record when the DPO was consulted and their written assessment.
Provide a systematic description of the envisaged processing operations and purposes
Document: what data is collected, from whom, how, why, how long it's retained, who has access, what systems process it, and any automated logic applied. The description must be sufficient for the risk assessment to be meaningful. Generic descriptions ('HR data for employment purposes') are insufficient — be specific about every stage of the data lifecycle.
Assess the necessity and proportionality of the processing in relation to its purposes
Document why this processing is necessary to achieve the stated purpose (could you achieve the same goal with less data or less invasive means?). Confirm a lawful basis under Article 6 exists. For special category data, confirm an Article 9(2) exception applies. Evaluate data minimisation, storage limitation, and purpose limitation compliance.
Identify and systematically assess risks to the rights and freedoms of data subjects
For each identified risk, document: the source of the risk, the harm that could result (physical, material, or non-material), the likelihood of occurrence, and the severity of the potential harm. EDPB recommends assessing risks from the data subject's perspective, not the organisation's. Consider risks from accidental loss, unauthorised access, unlawful processing, and inaccuracy.
Document measures envisaged to address each identified risk
For every risk, document the technical and organisational measures that will be implemented to mitigate it. Measures must be specific and actionable — 'we use security measures' is insufficient. Examples: encryption specifications (algorithm, key management), access controls (RBAC, MFA), pseudonymisation, data minimisation techniques, processor contractual requirements, and incident response procedures.
Assess residual risk after mitigation measures are applied
After documenting mitigation measures, re-evaluate the likelihood and severity of each risk. If residual risk remains 'high' after all feasible measures are applied, you must consult the supervisory authority before processing (Article 36). Document the residual risk assessment with the DPO's sign-off. Do not proceed with high-residual-risk processing without prior consultation.
Seek prior consultation with the supervisory authority if high residual risk cannot be mitigated
If the DPIA concludes that residual risk is high despite mitigation, you must consult the competent supervisory authority before proceeding. Provide the DPIA and processing documentation. The supervisory authority has up to 8 weeks to respond (extendable by 6 weeks for complex cases). Do not begin processing until you receive written advice or the period expires without prohibition.
Seek views of data subjects or their representatives where appropriate
Article 35(9) requires controllers to seek views of data subjects or their representatives 'where appropriate, without prejudice to the protection of commercial or public interests.' Document your assessment of whether consultation is appropriate and, if not, the justification. For consumer-facing products processing sensitive data, consultation is generally appropriate.
Verify the DPIA covers data protection by design requirements
Article 25 requires controllers to implement appropriate technical and organisational measures designed to implement data protection principles. The DPIA should confirm that privacy-by-design is built into the system architecture: pseudonymisation by default, data minimisation at point of collection, access controls enforced at system level, and retention limits enforced automatically.
Assess and document third-party processor risks
If the processing involves processors (SaaS vendors, cloud providers, analytics tools), the DPIA must assess the risks their involvement creates. Review processor data processing agreements under Article 28, assess their subprocessor chains, verify they implement equivalent security measures, and document transfer mechanisms if data leaves the EEA.
Document all cross-border data transfer mechanisms in the DPIA
If personal data will be transferred outside the EEA, document the transfer mechanism: adequacy decision (Article 45), Standard Contractual Clauses (Article 46(2)(c-d)), Binding Corporate Rules (Article 47), or derogations (Article 49). Post-Schrems II, SCCs must be accompanied by a Transfer Impact Assessment for transfers to third countries without adequacy.
Establish a DPIA review schedule and document triggers for reassessment
A DPIA is not a one-time exercise. Article 35(11) requires ongoing review 'to assess if processing is performed in accordance with the DPIA at least when there is a change of the risk.' Document review triggers: system changes, new processing purposes, new categories of data, incidents, or supervisory authority guidance. Conduct formal reviews at least annually for high-risk processing.
Retain the DPIA documentation for the full processing lifecycle
Maintain the completed DPIA, all supporting documentation, consultation records, and review history for as long as the processing activity continues and for a period after cessation sufficient to defend against regulatory enquiries. EDPB recommends retention aligned with the relevant limitation period in your jurisdiction (typically 3-5 years post-processing).
See How Your Data Protection Impact Assessment Scores on GDPR
Run a free gap analysis to find out which items you have covered and where the risks are.
Gap Analyzer → Training Tracker →Common Mistakes That Trigger Enforcement
Frequently Asked Questions
When is a DPIA mandatory under GDPR Article 35?
A DPIA is mandatory when processing is 'likely to result in a high risk' to individuals. Article 35(3) lists three always-required scenarios: systematic and extensive profiling with significant effects, large-scale processing of special category data or criminal records, and systematic monitoring of publicly accessible areas. Beyond these, EDPB Guidelines WP248 rev.01 identify nine criteria where meeting two or more triggers a mandatory DPIA: evaluation/scoring, automated decisions with legal/significant effects, systematic monitoring, sensitive data, large-scale data, matched or combined datasets, vulnerable data subjects, innovative technological or organisational use, and cross-border transfers. Each supervisory authority also publishes a 'blacklist' of processing types that always require a DPIA in their jurisdiction.
Who is responsible for conducting the DPIA?
The data controller is responsible for conducting the DPIA (Article 35(1)). If a DPO has been designated, they must be consulted (Article 35(2)), but this does not transfer responsibility. The controller may delegate the practical execution to the DPO, a compliance team, or an external consultant, but the controller signs off and retains accountability under Article 5(2). Processors do not conduct DPIAs — their role is to assist the controller by providing necessary information about their processing activities.
What happens if a DPIA reveals high residual risk that cannot be mitigated?
If the DPIA concludes that high residual risk remains despite applying all feasible mitigation measures, Article 36 requires prior consultation with the competent supervisory authority before beginning the processing. The controller must provide the DPIA and processing documentation. The supervisory authority has 8 weeks (extendable by 6 weeks) to provide written advice, which may include: recommendations to modify the processing, a warning that it would violate GDPR, or a ban on the processing. Controllers who proceed with high-residual-risk processing without prior consultation face fines of up to €10 million or 2% of global annual turnover.
Does every DPIA need to be shared with the supervisory authority?
No. DPIAs are internal documents that must be available to the supervisory authority upon request (Article 35(7) read with Article 58(1)(a)) but are not routinely submitted. The only time proactive submission is required is under Article 36 prior consultation, when residual risk remains high after mitigation. Supervisory authorities may ask to see DPIAs during investigations, audits, or in response to complaints. Maintaining a DPIA register that tracks all conducted DPIAs and their review dates is considered best practice for Article 5(2) accountability.
✉ Save This Checklist
Enter your email and we'll send you a clean copy — plus updates when requirements change.
We also offer a free personalized gap analysis for your specific situation.
Related Resources
- Complete GDPR Framework Guide
- GDPR for SaaS Companies
- GDPR Tier 1 Fines
- GDPR Tier 2 Fines
- HIPAA Compliance Checklist for Dental Practices
- HIPAA Compliance Checklist for Mental Health Providers
- HIPAA Compliance Checklist for Pharmacies
- Free Compliance Gap Analyzer
- Employee Training Tracker
- 5-Minute Compliance Quiz