[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fHeaHocrLrQCeqlkkNET1yo-NiSKG09DO7jUTe3cNLhg":3},{"sections":4,"resultAnalysis":325,"id":326,"version":327,"newVersion":22,"label":328,"isPinned":46,"isShared":46,"sharingToken":329,"isRevision":22,"isBlockAnalysisShared":22,"nbReferences":330,"referenceId":9,"nbResponses":11,"parentId":9,"revisionDescription":9,"logoUrl":331,"description":332,"scheduleIntervalDays":9,"versionNumber":40,"dateCreation":333,"dateUpdate":334,"dateArchived":9,"archived":22,"type":335,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":335,"creator":336,"objectType":344,"objectTypeIndex":40,"objectTypeColor":345,"objectTypeIcon":346,"objectTypeText":344,"defaultOwners":347,"tags":356,"privacyHubs":9,"nbQuestions":366,"nbQuestionsRequired":11,"nbDatas":11,"deadLineDays":9},[5,49,75,100,125,150,175,200,225,250,275,300],{"id":6,"slug":7,"label":8,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":13,"questions":14,"sections":48},"ff479aaf-d896-49b2-84fb-56d1ea3ad81c","initial","Taking into account data protection issues",null,"Default",0,"SectionType_Default","\u003Cp>Integrating data protection from the start is a core principle of the UKGDPR. This section checks whether your practices systematically include compliance considerations when designing or updating products, services, or business processes.\u003C/p>",[15],{"id":16,"slug":17,"label":18,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":23,"displayConditions":9,"answers":24,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"70da60ba-e6bd-4418-a8a6-1b3fb9e34888","we-consider-data-protection-issues-in-the-design-and-implementation-of-systems-services-products-and-business-practices","We consider data protection issues in the design and implementation of systems, services, products and business practices.","Radio",7,"Unique choice list",false,[],[25,31,36,42],{"id":26,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":30},"9d2450a9-6616-4107-8077-c0b509e28b07","#acfc00","Yes",2,[],{"id":32,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":35},"938fed87-e4e4-45b8-90b1-917656978198","#dc3545","No",[],{"id":37,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":41},"e0bcc8b5-9d3b-4910-83da-38e3757b8c3b","#E7630A","In progress",1,[],{"id":43,"color":44,"rangeValue":9,"label":45,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":47},"b1f63406-7a23-4800-914e-524eb4d79180","#727a94","NA",true,[],[],{"id":50,"slug":51,"label":52,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":53,"questions":54,"sections":74},"83ba5509-d6d2-4578-aac8-db0999dc52e6","test","Data minimization","\u003Cp>The principle of minimization requires limiting the collection and use of personal data to what is strictly necessary. This section assesses whether your organization avoids unnecessary collection and respects the intended purpose of processing.\u003C/p>",[55],{"id":56,"slug":57,"label":58,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":59,"displayConditions":9,"answers":60,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"8ab6e0b6-45d3-464d-8280-4325fea97d89","we-only-process-the-personal-data-we-need-for-our-purposes-and-we-only-use-the-data-for-those-purposes","We only process the personal data we need for our purposes, and we only use the data for those purposes.",[],[61,64,67,70],{"id":62,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":63},"7c936206-cef3-4fd8-9eba-e599c6607a85",[],{"id":65,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":66},"33b950db-05ba-4b16-8b38-2ba0e9d51da4",[],{"id":68,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":69},"647a64fb-bacf-4cfd-9e1b-912c854b7ae4",[],{"id":71,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":73},"bd4fc949-7742-4554-a872-7747566a5137","Not applicable",[],[],{"id":76,"slug":77,"label":78,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":79,"questions":80,"sections":99},"ad13a293-1f65-4de0-89fa-d84dc0ccd835","la-protection-des-donnees-est-une-composante-essentielle-de-la-fonctionnalite","Essential nature of data protection in the functionality","\u003Cp>Data protection should not be treated as an “add-on” but as a fundamental part of your systems’ functionality. This section evaluates whether confidentiality and security are built into the very core of your tools.\u003C/p>",[81],{"id":82,"slug":83,"label":84,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":85,"displayConditions":9,"answers":86,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"dacf627a-68ff-404b-90b3-3ef01e41d724","we-make-data-protection-an-essential-component-of-the-basic-functionality-of-our-processing-systems-and-services","We make data protection an essential component of the basic functionality of our processing systems and services.",[],[87,90,93,96],{"id":88,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":89},"1b176b08-4fb4-47ce-8505-5951b09aeede",[],{"id":91,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":92},"25d4607b-13ef-412b-aba8-bc4c02a12c62",[],{"id":94,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":95},"c75945d0-1c74-4680-a354-251ee73d26d3",[],{"id":97,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":98},"91257432-b3c0-40f0-a059-61882ca51733",[],[],{"id":101,"slug":102,"label":103,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":104,"questions":105,"sections":124},"67794e2d-a04c-4539-a420-9bed9e485a23","ss","Anticipation of privacy risks and events","\u003Cp>Proactive risk management helps prevent harm to individuals. This section looks at whether your organization anticipates privacy risks and implements preventive measures rather than simply reacting to incidents.\u003C/p>",[106],{"id":107,"slug":108,"label":109,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":110,"displayConditions":9,"answers":111,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"d6da3a52-3384-4b76-9ae6-734ee26b50e9","we-anticipate-privacy-risks-and-events-before-they-occur-and-take-steps-to-prevent-harm-to-individuals","We anticipate privacy risks and events before they occur, and take steps to prevent harm to individuals.",[],[112,115,118,121],{"id":113,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":114},"3c801622-f589-4695-b349-e5c5b0b9fd43",[],{"id":116,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":117},"8c6e4369-60e2-497d-aeb4-5e0460ba1757",[],{"id":119,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":120},"8e8dabb6-da76-4d02-927c-5c0296f97d37",[],{"id":122,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":123},"b974045a-6492-4cd8-b5ce-937c3f5dede6",[],[],{"id":126,"slug":127,"label":128,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":129,"questions":130,"sections":149},"0b922347-cb45-49c2-915b-e8e5d1c6658a","test-1","Automatic nature of personal data protection","\u003Cp>Systems and settings should protect individuals’ privacy automatically, without requiring them to take extra steps. This section measures how far your organization has automated personal data protection.\u003C/p>",[131],{"id":132,"slug":133,"label":134,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":135,"displayConditions":9,"answers":136,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"06755d12-11c5-4dd3-a2f5-eb08b96803f5","we-ensure-that-personal-data-is-automatically-protected-in-any-computer-system-service-product-andor-business-practice-so-that-individuals-do-not-have-to-take-specific-steps-to-protect-their-privacy","We ensure that personal data is automatically protected in any computer system, service, product and/or business practice, so that individuals do not have to take specific steps to protect their privacy.",[],[137,140,143,146],{"id":138,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":139},"b6338b80-805a-49a2-9864-f35897a0d861",[],{"id":141,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":142},"d519c102-3674-4c4a-9e7f-178e7a4ebf3f",[],{"id":144,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":145},"312aece9-2a82-4097-9bd1-6a321ca0d42b",[],{"id":147,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":148},"e3e8c4e2-1579-4296-b2be-778cfc9739a1",[],[],{"id":151,"slug":152,"label":153,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":154,"questions":155,"sections":174},"0640697a-4229-4797-b957-5ec496ab1d9b","identites-et-coordonnees-des-personnes-responsables","Provision of the identity and contact information of responsible persons","\u003Cp>Transparency means that individuals know whom to contact. This section ensures you make the identity and contact details of those responsible for data protection (e.g., DPO or dedicated contact) easily accessible.\u003C/p>",[156],{"id":157,"slug":158,"label":159,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":160,"displayConditions":9,"answers":161,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"2a828221-e392-4883-942e-3674ae1304ba","we-provide-the-identity-and-contact-information-of-the-persons-responsible-for-data-protection-within-our-organization-and-to-individuals","We provide the identity and contact information of the persons responsible for data protection within our organization and to individuals.",[],[162,165,168,171],{"id":163,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":164},"ffc56a59-4ada-42d9-b5f5-5ede49ea73f0",[],{"id":166,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":167},"d29c0bf4-a314-4625-a7b0-4c2cee021498",[],{"id":169,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":170},"7a5472a8-244d-4e2b-bbca-0c2b189b7daa",[],{"id":172,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":173},"3e43dcb2-f840-4d75-8db6-aba45e2b8924",[],[],{"id":176,"slug":177,"label":178,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":179,"questions":180,"sections":199},"d1390ce8-bbaa-4eff-bff3-1784fe244b60","clarte-et-comprehension-de-ce-qui-est-fait-avec-les-donnees-personnelles","Clarity and understanding of what is done with personal data","\u003Cp>The UK GDPR requires that information be clear and easy to understand. Public-facing documents should avoid legal or technical jargon. This section verifies whether your organization follows a plain language policy.\u003C/p>",[181],{"id":182,"slug":183,"label":184,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":185,"displayConditions":9,"answers":186,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"c9a6ce4b-08fc-4677-a262-25988b93aae2","we-adopt-a-plain-language-policy-for-all-public-documents-so-that-individuals-can-easily-understand-what-we-do-with-their-personal-data","We adopt a \"plain language\" policy for all public documents so that individuals can easily understand what we do with their personal data.",[],[187,190,193,196],{"id":188,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":189},"6a209a01-0a79-4738-a299-1ab55d38893a",[],{"id":191,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":192},"80b88165-d67a-447c-976c-12d77da3aa06",[],{"id":194,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":195},"83402841-f945-453b-b174-69911b3ff3e2",[],{"id":197,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":198},"0bcb09ac-dda6-4522-a7ff-70dc21105bad",[],[],{"id":201,"slug":202,"label":203,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":204,"questions":205,"sections":224},"86f6d084-43cf-4839-b027-c8d483b806f2","fourniture-doutils","Provision of control tools to individuals","\u003Cp>Beyond being informed, individuals must have practical means of control. This section explores whether you provide tools allowing people to manage their preferences and verify how your policies are applied.\u003C/p>",[206],{"id":207,"slug":208,"label":209,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":210,"displayConditions":9,"answers":211,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"cf18edf9-b9a5-44d6-b402-e5dacb36f529","we-provide-individuals-with-tools-to-determine-how-we-use-their-personal-data-and-whether-our-policies-are-being-properly-applied","We provide individuals with tools to determine how we use their personal data and whether our policies are being properly applied.",[],[212,215,218,221],{"id":213,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":214},"2967fc89-0043-44ae-85df-82de6283b90d",[],{"id":216,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":217},"a3d5cca0-94db-43a4-ba69-afbc180176de",[],{"id":219,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":220},"37a639f3-0014-4b8c-b87a-525b1980ad1e",[],{"id":222,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":223},"fbad73b3-ebd0-47ed-8a09-b2a20acaa1ec",[],[],{"id":226,"slug":227,"label":228,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":229,"questions":230,"sections":249},"3efa8be0-c8ef-4b6f-ad61-ae768da459ad","valeurs-par-defaut-en-matiere-de-confidentialite-controle-et-preferences","Default values for privacy, control and preferences","\u003Cp>The “privacy by default” principle requires that the most protective settings be enabled automatically. This section checks whether your systems respect user preferences and provide clear, user-friendly options and controls.\u003C/p>",[231],{"id":232,"slug":233,"label":234,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":235,"displayConditions":9,"answers":236,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"cd1fd310-bf9e-4c60-8707-2b5d9046784f","we-provide-strong-privacy-defaults-user-friendly-options-and-controls-and-respect-user-preferences","We provide strong privacy defaults, user-friendly options and controls, and respect user preferences.",[],[237,240,243,246],{"id":238,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":239},"34080d06-5807-407d-a2fc-75dbae67d1f1",[],{"id":241,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":242},"fd9b4c6d-5ed0-4bb2-b328-13623eb545a1",[],{"id":244,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":245},"3ff023ca-0bd2-458a-afa4-ea1f59d85420",[],{"id":247,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":248},"e2295096-51ba-4d54-997f-e8c01ef0ee3f",[],[],{"id":251,"slug":252,"label":253,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":254,"questions":255,"sections":274},"7ecd99a4-2fc1-46d6-b360-62b5752d6afd","garanties-offertes-par-les-sous-traitants","Guarantees offered by subcontractors","\u003Cp>Your choice of subcontractors makes you accountable. This section evaluates whether you only work with processors who can demonstrate sufficient guarantees regarding data protection measures.\u003C/p>",[256],{"id":257,"slug":258,"label":259,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":260,"displayConditions":9,"answers":261,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"0e79f5bf-1dca-445e-8218-34bc42e9986e","we-only-use-subcontractors-who-offer-sufficient-guarantees-regarding-their-technical-and-organizational-measures-for-data-protection-by-design","We only use subcontractors who offer sufficient guarantees regarding their technical and organizational measures for data protection by design.",[],[262,265,268,271],{"id":263,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":264},"5ee9272b-177f-4ad0-b794-7f2c49eb2ffe",[],{"id":266,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":267},"6d1d4b84-3a80-43dd-b984-b1a29a40e5a0",[],{"id":269,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":270},"df4d29a5-c684-4132-a36c-9dc4c2b10d34",[],{"id":272,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":273},"6aec4c5b-d90d-454c-bfce-74f9fa9b0e82",[],[],{"id":276,"slug":277,"label":278,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":279,"questions":280,"sections":299},"70d513ad-c0af-4d05-9275-2f103672252f","garanties-dautres-systemes-services-ou-produits","Warranties for other systems, services or products","\u003Cp>Beyond subcontractors, any external system, service, or product you use must also respect data protection by design. This section looks at the criteria you use when selecting such solutions.\u003C/p>",[281],{"id":282,"slug":283,"label":284,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":285,"displayConditions":9,"answers":286,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"db13a0f3-1ca0-4c81-b844-a34b1a277988","when-we-use-other-systems-services-or-products-in-our-processing-activities-we-ensure-that-we-only-use-those-whose-designers-and-manufacturers-take-into-account-data-protection-issues","When we use other systems, services or products in our processing activities, we ensure that we only use those whose designers and manufacturers take into account data protection issues.",[],[287,290,293,296],{"id":288,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":289},"41a5dfe9-1f03-444c-a4dd-7c1030899552",[],{"id":291,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":292},"c89c919a-de8c-4405-971a-29ac4baf4ac8",[],{"id":294,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":295},"c1ef9706-4b87-497e-a515-9bc0b7c9224d",[],{"id":297,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":298},"defc1949-4e6e-4ac7-9ec4-f8cd9567cbe3",[],[],{"id":301,"slug":302,"label":303,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":304,"questions":305,"sections":324},"171acd73-50b1-43d3-b91d-ba61e6747aee","utilisation-de-technologies-ameliorant-la-confidentialite","Use of privacy-enhancing technologies","\u003Cp>Privacy Enhancing Technologies (PETs) are a powerful way to strengthen compliance. This section examines whether you make use of PETs to embed privacy in your processing activities.\u003C/p>",[306],{"id":307,"slug":308,"label":309,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":310,"displayConditions":9,"answers":311,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":46,"native":22},"91ef5207-0c8e-49df-9b42-0e48fdb7e30c","we-use-privacy-enhancing-technologies-pets-to-help-us-comply-with-our-data-protection-obligations-by-design","We use privacy enhancing technologies (PETs) to help us comply with our data protection obligations by design.",[],[312,315,318,321],{"id":313,"color":27,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":314},"741026c3-d6a3-44ab-87f4-779e159f7008",[],{"id":316,"color":33,"rangeValue":9,"label":34,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":317},"561e5995-3899-4203-8bbb-c86cf2eb0116",[],{"id":319,"color":38,"rangeValue":9,"label":39,"slug":9,"description":9,"score":40,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":320},"3aebe4ba-9c6d-471c-9737-6dfbeed35535",[],{"id":322,"color":44,"rangeValue":9,"label":72,"slug":9,"description":9,"score":9,"nonApplicable":46,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":323},"c39c5034-b5d8-4a82-a1a7-6e31f3a63c15",[],[],[],"84fc9ef9-e53e-40a4-aa82-08db045c00d1","1.0","Checklist privacy by design & by default (ICO)","kWgmBlQwUYRpabpxcjy5JlstHhrdpFVxfIbhmAgQGbI6Pv3nQAeWeec2cviB",3,"https://static.dastra.eu/tenant-3/audit/AP5Qdv1JE6q7Xv/icon-audit500x-150.png","Privacy by design & by default checklist from the ICO, the UK Data Protection Authority.","2023-02-01T21:28:46.9607688","2025-09-10T22:55:28.4228941","Standard",{"id":337,"displayName":338,"familyName":339,"givenName":340,"email":341,"active":46,"color":342,"avatarUrl":343,"tenantId":11},69,"Dastro Naute","Naute","Dastro","contact@dastra.eu","#784000","https://static.dastra.eu/tenant-3/avatar/69/assistant-150.png","Asset","#7617d6","ds-icon-asset",[348],{"id":349,"displayName":350,"familyName":351,"givenName":352,"email":353,"active":46,"color":354,"avatarUrl":355,"tenantId":11},31,"Jérôme de Mercey","de Mercey","Jérôme","jerome.demercey@dastra.eu","#99C691","https://static.dastra.eu/tenant-10/avatar/31/Zuh7XFZe5EnnTo/design-sans-titre-2-150.png",[357],{"id":358,"label":359,"type":360,"typeIndex":361,"typeColor":362,"typeIcon":363,"typeText":364,"color":365},"ec674609-8b1a-4145-a815-7e0c2a6573ff","ICO","AuditTemplate",9,"#83d162","ds-icon-audit","Questionnaire template","#0CB8AE",12]