Audits Records of Processing Activities (RoPA) against GDPR Article 30 requirements for controllers and processors. Verifies completeness of fields like purposes, data categories, recipients, transfers, retention, and security measures.
npx claudepluginhub mukul975/privacy-data-protection-skills --plugin gdpr-compliance-skillsThis skill uses the workspace's default tool permissions.
Article 30 of the GDPR mandates that every controller and processor maintain written records of processing activities under their responsibility. This skill provides a structured methodology for auditing RoPA entries against the exhaustive field requirements specified in Art. 30(1) for controllers and Art. 30(2) for processors, ensuring completeness, accuracy, and readiness for supervisory auth...
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Article 30 of the GDPR mandates that every controller and processor maintain written records of processing activities under their responsibility. This skill provides a structured methodology for auditing RoPA entries against the exhaustive field requirements specified in Art. 30(1) for controllers and Art. 30(2) for processors, ensuring completeness, accuracy, and readiness for supervisory authority review.
Each processing activity record maintained by the controller must contain:
| Field | GDPR Reference | Description |
|---|---|---|
| Controller identity and contact details | Art. 30(1)(a) | Name, address, and contact details of the controller, joint controller, and DPO |
| Purposes of processing | Art. 30(1)(b) | Specific, explicit, and legitimate purposes for each processing activity |
| Categories of data subjects | Art. 30(1)(c) | Identification of all data subject groups (employees, customers, patients, minors) |
| Categories of personal data | Art. 30(1)(c) | Types of personal data processed per activity (identifiers, financial, health, biometric) |
| Categories of recipients | Art. 30(1)(d) | All recipients including processors, joint controllers, and third-country recipients |
| International transfers | Art. 30(1)(e) | Transfers to third countries or international organisations with safeguard documentation |
| Retention periods | Art. 30(1)(f) | Envisaged time limits for erasure of different categories of data |
| Technical and organisational measures | Art. 30(1)(g) | General description of Art. 32 security measures protecting the data |
| Field | GDPR Reference | Description |
|---|---|---|
| Processor identity and contact details | Art. 30(2)(a) | Name and contact details of the processor(s), each controller on behalf of which the processor acts, and the DPO |
| Categories of processing | Art. 30(2)(b) | Categories of processing carried out on behalf of each controller |
| International transfers | Art. 30(2)(c) | Transfers to third countries or international organisations with safeguard documentation |
| Technical and organisational measures | Art. 30(2)(d) | General description of Art. 32 security measures |
Article 30(5) provides a limited exemption for organisations with fewer than 250 employees, but this exemption does not apply when:
In practice, most organisations with any regular customer or employee data processing will not qualify for this exemption.