How-To

Third-Party Vendor Risk Assessment: A GDPR Requirement You Can't Ignore

ยท6 min read

Under GDPR Article 28, you are responsible for every third-party processor that handles personal data on your behalf. If a vendor you use suffers a data breach, you must notify the supervisory authority and affected individuals. A proper vendor risk assessment isn't optional โ€” it's a core GDPR requirement.

What Is a Vendor Risk Assessment?

A vendor risk assessment evaluates the data protection practices of third-party services that process personal data on your behalf. This includes your hosting provider, analytics service, CRM, email platform, payment processor, chat widget, and any other service that touches user data.

Which Vendors Need Assessment?

Any third-party that processes personal data from your users needs evaluation. Common categories:

CategoryExamplesData Processed
HostingAWS, Vercel, CloudflareIP addresses, access logs, all site data
AnalyticsGoogle Analytics, Mixpanel, HotjarPage views, behavior, demographics
EmailSendGrid, Mailchimp, PostmarkEmail addresses, engagement data
PaymentsStripe, PayPal, AdyenPayment details, billing addresses
ChatIntercom, Crisp, ZendeskNames, emails, conversation content
AdvertisingGoogle Ads, Meta Pixel, LinkedInBrowsing behavior, conversion events
CDNCloudflare, Fastly, AkamaiIP addresses, geo-location data
CRMHubSpot, Salesforce, PipedriveContact info, interaction history

The Assessment Framework

For each vendor, evaluate the following areas:

1. Data Processing Agreement (DPA)

  • Does the vendor provide a GDPR-compliant DPA?
  • Does it specify processing purposes and duration?
  • Does it list sub-processors and require notification of changes?
  • Does it include breach notification obligations (within 72 hours)?

2. Data Location and Transfers

  • Where is data stored? (EU, US, other)
  • If outside the EU, what transfer mechanisms are used? (Standard Contractual Clauses, adequacy decision)
  • Post-Schrems II: Are supplementary measures in place for US transfers?

3. Security Measures

  • Is data encrypted at rest and in transit?
  • Does the vendor have SOC 2, ISO 27001, or equivalent certification?
  • What access controls are in place?
  • How are security incidents handled?

4. Data Retention and Deletion

  • How long does the vendor retain data after contract termination?
  • Can you request data deletion, and how quickly is it executed?
  • Are backups also purged?

5. Sub-Processors

  • Does the vendor use sub-processors?
  • Is there a list of current sub-processors?
  • Are you notified when sub-processors change?
  • Do sub-processors have their own DPAs?

Risk Scoring Matrix

FactorLow RiskMedium RiskHigh Risk
Data typeAnonymized, aggregatedPseudonymized personal dataDirectly identifiable, sensitive data
Data locationEU/EEA onlyAdequacy countriesUS or non-adequate countries
CertificationsSOC 2 + ISO 27001One certificationNo certifications
DPA qualityComprehensive, customizableStandard but adequateMissing or incomplete
Breach historyNo known breachesMinor breaches, well-handledMajor breaches or poor response

Automated Vendor Discovery

You don't always know which vendors are on your website. Marketing teams add tracking pixels, developers add libraries, CMS plugins load external scripts โ€” all without a central inventory.

PrivacyChecker automatically discovers all third-party services on your website, identifies the vendors behind them, and flags those processing personal data without proper security measures.

Vendor Assessment Checklist

StepActionDocument
1Scan website for all third-party servicesVendor inventory
2Request DPA from each vendorDPA register
3Verify data transfer mechanismsTransfer impact assessment
4Check security certificationsRisk assessment
5Review sub-processor listsSub-processor register
6Document findings and risk levelVendor risk register
7Schedule annual reassessmentReview calendar

Start with a free scan to discover all third-party vendors on your website. Pro+ includes a Vendor Risk module that automatically assesses the privacy and security posture of detected third-party services.

Check your website now โ€” free

Run a complete privacy audit in under 60 seconds. Get your score, find issues, and learn how to fix them.

Start Free Audit