Personal Data Protection Checklist

 

Personal Data Protection Checklist

Attachment 3

Audit Unit:            Year:           Date Filled:  Year   Month   Day

No.       Audit ItemsSubject Audit Results
1Are paper reports containing personal data handled and used exclusively by designated personnel?All□ OK   □ NG   □ Not Applicable
2When transferring paper personal data, is a confidential transfer method employed?All□ OK   □ NG   □ Not Applicable
3Is access to personal data restricted based on role? Non-designated personnel shall not have access or viewing rights.All□ OK   □ NG   □ Not Applicable
4Are personnel handling personal data trained annually on information security and privacy protection?All□ OK   □ NG   □ Not Applicable
5When personnel handling personal data are transferred, are all relevant storage media and data handed over according to regulations?All□ OK   □ NG   □ Not Applicable
6When personnel leave the company or end their contract, are their accounts deactivated and employee IDs collected according to regulations?All□ OK   □ NG   □ Not Applicable
7Is there an application and approval process for accessing personal data?All□ OK   □ NG   □ Not Applicable
8Are access records, including the identity of the user and their actions, maintained when personal data is accessed?All□ OK   □ NG   □ Not Applicable
9Do personal computers handling personal data have user accounts and passwords?All□ OK   □ NG   □ Not Applicable
10Are individual user accounts assigned to personnel handling personal data?All□ OK   □ NG   □ Not Applicable
11After using personal data, is the application promptly closed?All□ OK   □ NG   □ Not Applicable
12Are paper documents containing personal data managed by designated personnel and stored in physically secure environments?All□ OK   □ NG   □ Not Applicable
13When personnel handling personal data leave or transfer positions, is the password reset for the relevant systems and user accounts updated if necessary?IT Department□ OK   □ NG   □ Not Applicable
14Are computers storing sensitive personal data isolated from external networks (e.g., firewalls)?IT Department□ OK   □ NG   □ Not Applicable
15Are computers storing personal data equipped with antivirus software, updated daily, and scanned weekly?IT Department□ OK   □ NG   □ Not Applicable
16Is the use of P2P software and Tunnel tools for file sharing prohibited?IT Department□ OK   □ NG   □ Not Applicable
17Are information devices storing personal data located in physically secure areas (e.g., access-controlled offices, server rooms)?IT Department□ OK   □ NG   □ Not Applicable
18Are backup mechanisms in place for storage media containing personal data?IT Department□ OK   □ NG   □ Not Applicable
19When external parties update or maintain computers storing personal data, is a designated staff member present to ensure data security?IT Department□ OK   □ NG   □ Not Applicable
20When computers or devices storing personal data are decommissioned or repurposed, is the personal data deleted?IT Department□ OK   □ NG   □ Not Applicable

Instructions:

"OK" indicates the department has performed the action in compliance with requirements; "NG" indicates the action was performed but did not meet operational requirements; "Not Applicable" indicates the department has no related action or process.

Approved:               Reviewed:               Auditor:      


                                                                  AM19-03