Guides GDPR accountability implementation (Art. 5(2), 24) with checklists for policies, DPIAs, RoPA, training records, breach logs. Use for compliance evidence portfolios and audits.
npx claudepluginhub mukul975/privacy-data-protection-skills --plugin gdpr-compliance-skillsThis skill uses the workspace's default tool permissions.
The accountability principle under Art. 5(2) requires controllers to not only comply with data protection principles but to demonstrate that compliance. Art. 24 operationalises this by requiring appropriate technical and organisational measures that can prove compliance, reviewed and updated where necessary. This skill provides a complete framework for building and maintaining the accountabilit...
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
The accountability principle under Art. 5(2) requires controllers to not only comply with data protection principles but to demonstrate that compliance. Art. 24 operationalises this by requiring appropriate technical and organisational measures that can prove compliance, reviewed and updated where necessary. This skill provides a complete framework for building and maintaining the accountability evidence portfolio.
| Document | GDPR Reference | Purpose |
|---|---|---|
| Data Protection Policy | Art. 24(2) | Top-level commitment to data protection principles, approved by senior management |
| Data Protection Strategy | Art. 24(1) | Multi-year plan for embedding data protection across the organisation |
| Data Protection Governance Charter | Art. 24(1), 38 | Defines roles, responsibilities, reporting lines, and decision-making authority |
| DPO Appointment and Terms of Reference | Art. 37-39 | Formal appointment, independence, resources, and reporting line |
| Data Protection Training Framework | Art. 39(1)(b) | Training curriculum, frequency, target audiences, and assessment criteria |
| Document | GDPR Reference | Purpose |
|---|---|---|
| Records of Processing Activities (RoPA) | Art. 30 | Comprehensive record of all processing activities with mandatory fields |
| Lawful Basis Register | Art. 6, 9 | Documented lawful basis assessment for each processing activity |
| Data Protection Impact Assessments | Art. 35 | Risk assessments for high-risk processing with mitigation measures |
| Legitimate Interest Assessments | Art. 6(1)(f) | Three-part test documentation for each LI-based processing activity |
| Data Processing Agreements Register | Art. 28 | Inventory of all processor relationships with DPA status |
| International Transfer Records | Art. 46-49 | Transfer mechanisms, TIAs, and safeguard documentation |
| Consent Records | Art. 7 | Evidence of valid consent: who, when, what, and how |
| Document | GDPR Reference | Purpose |
|---|---|---|
| Personal Data Breach Register | Art. 33(5) | Log of all breaches including those not reported to the supervisory authority |
| Breach Notification Records | Art. 33-34 | Records of notifications to supervisory authorities and data subjects |
| Data Subject Rights Request Log | Art. 15-22 | Log of all DSARs with response timelines and outcomes |
| Complaints Register | Art. 77 | Record of data subject complaints and resolutions |
| Document | GDPR Reference | Purpose |
|---|---|---|
| Audit Reports | Art. 24(1) | Internal and external audit findings and remediation tracking |
| Training Completion Records | Art. 39(1)(b) | Evidence that staff have completed required data protection training |
| Policy Review Records | Art. 24(1) | Version history and approval records for all policies |
| DPO Annual Reports | Art. 38(3), 39 | Annual report to board on data protection posture |
| Risk Register | Art. 24(1), 32 | Data protection risks with likelihood, impact, and treatment plans |
Organise accountability evidence in a centralised repository:
Accountability Portfolio/
├── 01-Governance/
│ ├── data-protection-policy-v3.2.pdf
│ ├── governance-charter.pdf
│ ├── dpo-appointment-letter.pdf
│ └── board-minutes-dp-reporting.pdf
├── 02-Processing-Records/
│ ├── ropa-export-2026-01.xlsx
│ ├── lawful-basis-register.xlsx
│ └── consent-records/
├── 03-Risk-Assessments/
│ ├── dpias/
│ ├── lias/
│ └── transfer-impact-assessments/
├── 04-Processor-Management/
│ ├── dpa-register.xlsx
│ ├── due-diligence-reports/
│ └── signed-dpas/
├── 05-Incidents/
│ ├── breach-register.xlsx
│ ├── breach-notification-records/
│ └── dsar-log.xlsx
├── 06-Training/
│ ├── training-programme.pdf
│ └── completion-records/
├── 07-Audits/
│ ├── audit-reports/
│ └── remediation-tracker.xlsx
└── 08-Annual-Reports/
└── dpo-annual-report-2025.pdf
Assess accountability maturity across five levels:
| Level | Description | Indicators |
|---|---|---|
| 1 — Ad Hoc | No systematic accountability | Policies absent, no RoPA, no DPO, no training |
| 2 — Reactive | Basic compliance efforts triggered by incidents or complaints | Some policies exist, RoPA incomplete, training ad hoc |
| 3 — Defined | Systematic framework established with documented procedures | All Tier 1-2 documents exist, DPO appointed, annual training |
| 4 — Managed | Framework actively maintained with metrics and monitoring | Regular audits, DSAR tracking, breach register maintained, board reporting |
| 5 — Optimised | Continuous improvement with proactive risk management | Privacy by design embedded, automated monitoring, predictive risk assessment |