· Michael Avdeev · Guides · 5 min read
PII Compliance Checklist: 12 Requirements You Need to Meet in 2026
If you collect, store, or process personal data, you have compliance obligations. GDPR, CCPA, HIPAA, GLBA, and a growing list of state privacy laws all have requirements for how you handle PII.
This checklist breaks down the core requirements into actionable items. Use it to assess your current state and identify gaps.
The PII Compliance Checklist
1. Know What PII You Have
Requirement: You cannot protect what you don’t know exists.
Checklist:
- Inventory all systems that store personal data
- Identify what types of PII exist (SSNs, emails, addresses, financial data)
- Document where PII is stored (databases, file shares, cloud storage, backups)
- Map data flows between systems
- Identify shadow IT and unmanaged data stores
Why it matters: GDPR Article 30 requires a record of processing activities. CCPA requires you to disclose what data you collect. You can’t comply if you don’t know what you have.
2. Establish a Legal Basis for Processing
Requirement: You need a lawful reason to collect and use personal data.
Checklist:
- Document the legal basis for each category of PII you process
- Obtain explicit consent where required
- Ensure consent is freely given, specific, informed, and unambiguous
- Maintain records of when and how consent was obtained
- Provide easy mechanisms to withdraw consent
Applies to: GDPR (Article 6), CCPA (opt-out rights), state privacy laws
3. Implement Data Minimization
Requirement: Only collect and retain the PII you actually need.
Checklist:
- Review what data you collect vs. what you actually use
- Stop collecting data you don’t need
- Delete data that no longer serves a business purpose
- Set retention periods for each data category
- Automate data deletion where possible
Why it matters: Less data = less risk. If you don’t have it, it can’t be breached.
4. Secure PII with Appropriate Safeguards
Requirement: Protect personal data from unauthorized access, disclosure, or destruction.
Checklist:
- Encrypt PII at rest and in transit
- Implement access controls (role-based, least privilege)
- Use multi-factor authentication for systems containing PII
- Monitor access to sensitive data
- Conduct regular security assessments
- Patch systems promptly
Applies to: GDPR (Article 32), HIPAA Security Rule, CCPA (reasonable security), GLBA Safeguards Rule
5. Control Third-Party Access
Requirement: Vendors and partners who access your PII must also protect it.
Checklist:
- Inventory all third parties with access to PII
- Execute Data Processing Agreements (DPAs) with processors
- Verify vendor security practices before sharing data
- Include data protection clauses in contracts
- Monitor third-party compliance
- Have a process for vendor offboarding and data return/deletion
Why it matters: You’re responsible for PII even when a vendor mishandles it. Third-party breaches are your breaches.
6. Enable Data Subject Rights
Requirement: Individuals have rights over their personal data.
Checklist:
- Implement a process for access requests (right to know)
- Enable data portability (provide data in machine-readable format)
- Allow data correction (right to rectification)
- Enable data deletion (right to erasure / right to delete)
- Respond to requests within required timeframes (30-45 days typically)
- Verify identity before fulfilling requests
Applies to: GDPR (Articles 15-22), CCPA (Sections 1798.100-1798.125), all state privacy laws
7. Provide Privacy Notices
Requirement: Tell people what data you collect and how you use it.
Checklist:
- Publish a clear, accessible privacy policy
- Disclose categories of PII collected
- Explain purposes for data collection
- List third parties with whom data is shared
- Describe data subject rights and how to exercise them
- Update notices when practices change
Applies to: GDPR (Articles 13-14), CCPA, GLBA, all state privacy laws
8. Conduct Privacy Impact Assessments
Requirement: Assess privacy risks before launching new projects or processing activities.
Checklist:
- Identify when PIAs are required (high-risk processing, new systems, new vendors)
- Document data flows and potential risks
- Evaluate necessity and proportionality
- Identify mitigation measures
- Obtain approval before proceeding
- Review assessments periodically
Applies to: GDPR (Article 35), recommended under CCPA and other frameworks
9. Implement Breach Notification Procedures
Requirement: Report breaches to authorities and affected individuals within required timeframes.
Checklist:
- Define what constitutes a reportable breach
- Establish an incident response team
- Document breach detection and escalation procedures
- Know notification deadlines (72 hours for GDPR, varies by state)
- Prepare notification templates
- Maintain a breach register
Key deadlines:
- GDPR: 72 hours to supervisory authority
- HIPAA: 60 days to HHS (if 500+ individuals)
- State laws: Varies (some require notification “without unreasonable delay”)
10. Train Your Workforce
Requirement: Employees who handle PII must understand their obligations.
Checklist:
- Provide privacy training to all employees who handle PII
- Include role-specific training for high-risk roles
- Cover phishing awareness and social engineering
- Document training completion
- Refresh training annually
- Update training when regulations or practices change
Why it matters: Human error causes most breaches. Training is your first line of defense.
11. Maintain Documentation
Requirement: Document your compliance program.
Checklist:
- Maintain records of processing activities
- Document policies and procedures
- Keep consent records
- Log data subject requests and responses
- Retain breach investigation records
- Document security assessments and audits
Why it matters: If regulators ask, you need to prove compliance. “We do it” isn’t enough—you need documentation.
12. Monitor and Audit Continuously
Requirement: Compliance is ongoing, not one-time.
Checklist:
- Conduct regular compliance audits
- Monitor for new regulations and requirements
- Scan for new data stores and shadow IT
- Review access logs and detect anomalies
- Update risk assessments when the environment changes
- Report compliance status to leadership
What Regulations Apply to You?
| If you… | These regulations likely apply |
|---|---|
| Do business with EU residents | GDPR |
| Operate in California | CCPA/CPRA |
| Handle health information | HIPAA |
| Provide financial services | GLBA |
| Process children’s data | COPPA |
| Operate in Virginia, Colorado, Connecticut, Utah, etc. | State privacy laws |
The First Step: Know What You Have
Every item on this checklist depends on one thing: knowing what PII exists in your systems.
You can’t secure data you haven’t found. You can’t fulfill deletion requests for data you don’t know exists. You can’t notify the right people after a breach if you don’t know whose data was exposed.
Data discovery isn’t just the first step—it’s the foundation of PII compliance.
Next Steps
- Audit your current state against this checklist
- Identify gaps where you’re not meeting requirements
- Prioritize based on risk and regulatory exposure
- Scan your systems to find PII you don’t know you have
- Document everything as you implement controls
PII compliance isn’t a destination—it’s an ongoing process. But it starts with visibility into your own data.