SOC 2 Privacy Readiness Checklist
Use this checklist to prepare for a SOC 2 audit focused on the “Privacy” Trust Services Criteria (TSC). For each control, ensure you have the proper evidence and corresponding policy in place.
SOC 2 Control | Evidence to Provide | Relevant Policy |
P1.1 Notice & Policy | Screenshot of a public-facing privacy policy. | Privacy Policy |
P1.2 Communication | Screenshots of emails or in-app notifications to users. | Privacy Policy |
P2.1 Explicit Consent | User consent forms, opt-in records, signed agreements. | Privacy Policy |
P2.2 Choice Options | Website screenshots showing opt-in/opt-out options. | Privacy Policy |
P3.1 Data Minimization | Data mapping document, data flow diagrams. | Data Minimization Policy |
P3.2 Lawful Collection | Records of data collection methods and legal basis. | Privacy Policy, Data Handling Policy |
P4.1 Purpose Limitation | Internal process document on data use. | Data Use Policy |
P4.2 Retention Schedule | Data retention schedule document, data classification. | Data Retention Policy |
P4.3 Secure Disposal | Logs of data deletion or media sanitization. | Data Disposal Policy |
P5.1 Access & Review | Logs of access requests, DSAR tracking spreadsheet. | Data Subject Access Request (DSAR) Policy |
P5.2 Identity Verification | Documentation on authentication methods for data access. | Identity Verification Policy |
P5.3 Right to Correct | Ticket logs of data correction requests from users. | DSAR Policy |
P6.1 Third-Party Consent | User agreements allowing for third-party disclosure. | Third-Party Disclosure Policy |
P6.2 Written Agreements | Vendor contracts with data privacy addendums. | Vendor Risk Management Policy |
P6.3 Disclosure Records | Records or logs of data disclosures to third parties. | Data Disclosure Log |
P7.1 Security Controls | Screenshots of logical access controls (RBAC, MFA) | Access Control Policy, MFA Policy |
P7.2 Encryption | Documentation of encryption at rest & in transit. | Encryption Policy |
P7.3 Incident Response | Incident response plan, log of privacy-related incidents. | Incident Response Plan |
P8.1 Data Accuracy | Process flow document for data validation, quality checks. | Data Quality Policy |
P8.2 Data Completeness | Documented procedures for data completeness checks. | Data Quality Policy |
P8.3 Data Relevance | Records of data quality reviews. | Data Quality Policy |