· Michael Avdeev · Guides  · 5 min read

PII Compliance Checklist: 12 Requirements You Need to Meet in 2026

If you collect, store, or process personal data, you have compliance obligations. GDPR, CCPA, HIPAA, GLBA, and a growing list of state privacy laws all have requirements for how you handle PII.

This checklist breaks down the core requirements into actionable items. Use it to assess your current state and identify gaps.


The PII Compliance Checklist

1. Know What PII You Have

Requirement: You cannot protect what you don’t know exists.

Checklist:

  • Inventory all systems that store personal data
  • Identify what types of PII exist (SSNs, emails, addresses, financial data)
  • Document where PII is stored (databases, file shares, cloud storage, backups)
  • Map data flows between systems
  • Identify shadow IT and unmanaged data stores

Why it matters: GDPR Article 30 requires a record of processing activities. CCPA requires you to disclose what data you collect. You can’t comply if you don’t know what you have.


Requirement: You need a lawful reason to collect and use personal data.

Checklist:

  • Document the legal basis for each category of PII you process
  • Obtain explicit consent where required
  • Ensure consent is freely given, specific, informed, and unambiguous
  • Maintain records of when and how consent was obtained
  • Provide easy mechanisms to withdraw consent

Applies to: GDPR (Article 6), CCPA (opt-out rights), state privacy laws


3. Implement Data Minimization

Requirement: Only collect and retain the PII you actually need.

Checklist:

  • Review what data you collect vs. what you actually use
  • Stop collecting data you don’t need
  • Delete data that no longer serves a business purpose
  • Set retention periods for each data category
  • Automate data deletion where possible

Why it matters: Less data = less risk. If you don’t have it, it can’t be breached.


4. Secure PII with Appropriate Safeguards

Requirement: Protect personal data from unauthorized access, disclosure, or destruction.

Checklist:

  • Encrypt PII at rest and in transit
  • Implement access controls (role-based, least privilege)
  • Use multi-factor authentication for systems containing PII
  • Monitor access to sensitive data
  • Conduct regular security assessments
  • Patch systems promptly

Applies to: GDPR (Article 32), HIPAA Security Rule, CCPA (reasonable security), GLBA Safeguards Rule


5. Control Third-Party Access

Requirement: Vendors and partners who access your PII must also protect it.

Checklist:

  • Inventory all third parties with access to PII
  • Execute Data Processing Agreements (DPAs) with processors
  • Verify vendor security practices before sharing data
  • Include data protection clauses in contracts
  • Monitor third-party compliance
  • Have a process for vendor offboarding and data return/deletion

Why it matters: You’re responsible for PII even when a vendor mishandles it. Third-party breaches are your breaches.


6. Enable Data Subject Rights

Requirement: Individuals have rights over their personal data.

Checklist:

  • Implement a process for access requests (right to know)
  • Enable data portability (provide data in machine-readable format)
  • Allow data correction (right to rectification)
  • Enable data deletion (right to erasure / right to delete)
  • Respond to requests within required timeframes (30-45 days typically)
  • Verify identity before fulfilling requests

Applies to: GDPR (Articles 15-22), CCPA (Sections 1798.100-1798.125), all state privacy laws


7. Provide Privacy Notices

Requirement: Tell people what data you collect and how you use it.

Checklist:

  • Publish a clear, accessible privacy policy
  • Disclose categories of PII collected
  • Explain purposes for data collection
  • List third parties with whom data is shared
  • Describe data subject rights and how to exercise them
  • Update notices when practices change

Applies to: GDPR (Articles 13-14), CCPA, GLBA, all state privacy laws


8. Conduct Privacy Impact Assessments

Requirement: Assess privacy risks before launching new projects or processing activities.

Checklist:

  • Identify when PIAs are required (high-risk processing, new systems, new vendors)
  • Document data flows and potential risks
  • Evaluate necessity and proportionality
  • Identify mitigation measures
  • Obtain approval before proceeding
  • Review assessments periodically

Applies to: GDPR (Article 35), recommended under CCPA and other frameworks


9. Implement Breach Notification Procedures

Requirement: Report breaches to authorities and affected individuals within required timeframes.

Checklist:

  • Define what constitutes a reportable breach
  • Establish an incident response team
  • Document breach detection and escalation procedures
  • Know notification deadlines (72 hours for GDPR, varies by state)
  • Prepare notification templates
  • Maintain a breach register

Key deadlines:

  • GDPR: 72 hours to supervisory authority
  • HIPAA: 60 days to HHS (if 500+ individuals)
  • State laws: Varies (some require notification “without unreasonable delay”)

10. Train Your Workforce

Requirement: Employees who handle PII must understand their obligations.

Checklist:

  • Provide privacy training to all employees who handle PII
  • Include role-specific training for high-risk roles
  • Cover phishing awareness and social engineering
  • Document training completion
  • Refresh training annually
  • Update training when regulations or practices change

Why it matters: Human error causes most breaches. Training is your first line of defense.


11. Maintain Documentation

Requirement: Document your compliance program.

Checklist:

  • Maintain records of processing activities
  • Document policies and procedures
  • Keep consent records
  • Log data subject requests and responses
  • Retain breach investigation records
  • Document security assessments and audits

Why it matters: If regulators ask, you need to prove compliance. “We do it” isn’t enough—you need documentation.


12. Monitor and Audit Continuously

Requirement: Compliance is ongoing, not one-time.

Checklist:

  • Conduct regular compliance audits
  • Monitor for new regulations and requirements
  • Scan for new data stores and shadow IT
  • Review access logs and detect anomalies
  • Update risk assessments when the environment changes
  • Report compliance status to leadership

What Regulations Apply to You?

If you…These regulations likely apply
Do business with EU residentsGDPR
Operate in CaliforniaCCPA/CPRA
Handle health informationHIPAA
Provide financial servicesGLBA
Process children’s dataCOPPA
Operate in Virginia, Colorado, Connecticut, Utah, etc.State privacy laws

The First Step: Know What You Have

Every item on this checklist depends on one thing: knowing what PII exists in your systems.

You can’t secure data you haven’t found. You can’t fulfill deletion requests for data you don’t know exists. You can’t notify the right people after a breach if you don’t know whose data was exposed.

Data discovery isn’t just the first step—it’s the foundation of PII compliance.


Next Steps

  1. Audit your current state against this checklist
  2. Identify gaps where you’re not meeting requirements
  3. Prioritize based on risk and regulatory exposure
  4. Scan your systems to find PII you don’t know you have
  5. Document everything as you implement controls

PII compliance isn’t a destination—it’s an ongoing process. But it starts with visibility into your own data.

Back to Blog

Related Posts

View All Posts »

Scan Your Data Before It Enters the LLM

Your LLM is only as clean as your training data. Once PII gets baked into model weights, there is no delete button. Here is how to catch it before that happens.