SOC 2: Privacy
Controls governing personal data notice, consent, purpose limitation, rights handling, and retention.
Back to SOC 2 categoriesControls and Detailed Requirements
P1.1Privacy Notice and Purpose Specification
Provide clear privacy notices describing what personal information is collected, why it is processed, and how it is used, shared, retained, and protected.
P2.1Consent and Choice Management
Capture and honor user consent preferences where required, and ensure processing activities align with selected choices and stated legal basis.
P3.1Collection and Use Limitation
Limit personal data collection and processing to what is necessary for defined business purposes, and prevent unauthorized secondary use.
P4.1Data Subject Rights Intake and Verification
Provide mechanisms to receive rights requests and verify requester identity before disclosing or modifying personal data.
P4.2Data Subject Rights Fulfillment
Execute rights requests such as access, correction, deletion, restriction, and portability within required timelines and maintain fulfillment evidence.
P5.1Privacy Incident and Breach Handling
Maintain incident response workflows specific to personal data events, including legal review, notification criteria, and post-incident corrective actions.
P6.1Personal Data Accuracy and Quality
Maintain controls to keep personal data accurate, complete, and up to date for its intended purpose, including correction workflows and periodic quality checks.
P6.2Monitoring and Enforcement of Privacy Controls
Monitor privacy control performance and perform periodic evaluations to identify deviations, process breakdowns, and required corrective actions.
P6.3Privacy Policy and Procedure Governance
Maintain current privacy policies and operating procedures, assign ownership, and require periodic review and approval to reflect legal and operational changes.
P7.1Privacy Retention and Disposal
Define and enforce retention timelines for personal data, and ensure secure disposal when retention obligations expire.
P8.1Third-Party Privacy Risk Management
Assess and monitor third parties that process personal data, ensuring contracts, due diligence, and oversight address privacy obligations and cross-border transfer risks.
P8.2Privacy Program Review and Continuous Improvement
Review privacy program effectiveness through audits, metrics, and management review, and implement continuous improvements based on findings and evolving obligations.