GDPR Compliance
GDPR & Regulatory Compliance
Version 1.0 — October 2025
This document outlines Conformo’s compliance with EU GDPR, eIDAS, and Italian privacy regulations.
Table of Contents
- Compliance Overview
- GDPR Compliance
- eIDAS Compliance
- Italian Privacy Law
- Data Processing
- User Rights
- Cookie Policy
- Data Protection Officer
- Implementation Checklist
Compliance Overview
Conformo is designed to help Italian SMEs achieve GDPR compliance while being fully compliant itself.
Applicable Regulations:
- GDPR: EU General Data Protection Regulation (2016/679)
- eIDAS: EU Electronic Identification and Trust Services (910/2014)
- Italian Privacy Code: Legislative Decree 196/2003 (as amended)
- Italian Cookie Law: Implementation of EU Directive 2009/136/EC
GDPR Compliance
Legal Basis for Processing
Article 6 GDPR - Lawfulness of Processing:
- Consent (Art. 6(1)(a))
- User registration and account creation
- Marketing communications
- Optional features (2FA, analytics)
- Contract Performance (Art. 6(1)(b))
- Service delivery
- User authentication
- Account management
- Legal Obligation (Art. 6(1)(c))
- Tax compliance
- Audit logs (where required by law)
- Data retention for legal purposes
- Legitimate Interest (Art. 6(1)(f))
- Fraud prevention
- Security monitoring
- Service improvement
Data Minimization (Article 5)
Principle: Collect only data necessary for specified purposes.
Implementation:
- Required fields limited to essentials
- Optional fields clearly marked
- No unnecessary data collection
- Regular data audits
Data Collected: | Data Field | Purpose | Legal Basis | Retention | |————|———|————-|———–| | Email | Authentication, communication | Contract | Account lifetime | | Password (hashed) | Authentication | Contract | Account lifetime | | Name | Personalization, legal | Contract | Account lifetime | | Company Name | Service delivery | Contract | Account lifetime | | Business Info | Service customization | Contract | Account lifetime | | IP Address | Security, fraud prevention | Legitimate interest | 90 days | | Auth Logs | Security, compliance | Legal obligation | 90 days | | Session Data | Authentication | Contract | Session end |
Privacy by Design (Article 25)
Implemented Measures:
- ✅ Data encryption (in transit and at rest)
- ✅ Pseudonymization where possible
- ✅ Access controls (RBAC)
- ✅ Audit logging
- ✅ Secure defaults
- ✅ Minimal data collection
- ✅ Regular security updates
User Rights Implementation
Right to Access (Article 15)
Implementation:
- User profile page shows all personal data
- API endpoint for data export
- Response time: Within 30 days
Right to Rectification (Article 16)
Implementation:
- User profile editing
- Contact form for corrections
- Update processed within 5 business days
Right to Erasure (Article 17)
Implementation:
- Account deletion feature
- Complete data removal (except legal retention)
- Confirmation email sent
- Processing within 30 days
Code: Account deletion endpoint
// DELETE /api/user/account
// Removes all personal data except legally required records
Right to Data Portability (Article 20)
Implementation:
- Export data in JSON format
- Machine-readable format
- Includes all personal data
- Available via user dashboard
Right to Object (Article 21)
Implementation:
- Opt-out of marketing communications
- Withdraw consent for optional features
- Object to legitimate interest processing
Data Breach Notification (Article 33-34)
Procedure:
- Detection: Security monitoring and alerts
- Assessment: Impact and severity evaluation
- Notification:
- Supervisory authority within 72 hours
- Affected users without undue delay
- Documentation: Breach record maintained
- Remediation: Security improvements
Breach Record Template:
- Date and time of breach
- Nature of breach
- Categories and number of affected users
- Data categories affected
- Likely consequences
- Measures taken
- Notification timeline
eIDAS Compliance
Electronic Identification (eIDAS Regulation)
Current Status: Not yet implemented
Planned Implementation:
- SPID integration (Sistema Pubblico di Identità Digitale)
- CIE integration (Carta d’Identità Elettronica)
- eIDAS node connection for EU recognition
Electronic Signatures
Current Status: Not required for current features
Future Considerations:
- Advanced Electronic Signatures (AdES)
- Qualified Electronic Signatures (QES)
- Timestamps for legal documents
Trust Services
Implementation:
- ✅ TLS certificates from trusted CA
- ✅ Secure email delivery
- Timestamping for audit logs
- Long-term document preservation
Italian Privacy Law
Legislative Decree 196/2003 (Privacy Code)
Key Requirements Met:
- Information Notice (Art. 13)
- Privacy policy page created
- Clear, concise information
- Available before data collection
- In Italian language
- Consent (Art. 23)
- ✅ Explicit consent for registration
- ✅ Separate consent for marketing
- ✅ Granular consent options
- ✅ Easy withdrawal
- Security Measures (Art. 31-35)
- ✅ Technical safeguards (encryption, access control)
- ✅ Organizational measures (policies, training)
- ✅ Regular security assessments
- ✅ Incident response plan
- Data Processor Agreement (Art. 28 GDPR)
- Contract with service providers (Vercel, SendGrid, Neon)
- Data processing terms documented
- Sub-processor approval
Garante per la Protezione dei Dati Personali
Italian Data Protection Authority Requirements:
- Register processing activities (if required)
- Appoint DPO if required (criteria: public authority, large-scale monitoring, special categories)
- Conduct DPIA for high-risk processing
- Maintain processing register
Current Assessment: DPO not required (small-scale processing, no special categories)
Data Processing
Processing Activities Record
Controller: Conformo (GrewingM)
Processing Activity 1: User Authentication
- Purpose: Account management and access control
- Legal Basis: Contract performance (Art. 6(1)(b))
- Data Categories: Email, password hash, name, login timestamps
- Recipients: None (internal processing only)
- Retention: Account lifetime + 30 days post-deletion
- Security: Encryption, access control, audit logs
Processing Activity 2: Audit Logging
- Purpose: Security monitoring, fraud prevention, compliance
- Legal Basis: Legal obligation (Art. 6(1)(c)) + Legitimate interest (Art. 6(1)(f))
- Data Categories: User ID, IP address, user agent, timestamps, actions
- Recipients: Administrators only
- Retention: 90 days
- Security: Access control, encryption, admin-only access
Processing Activity 3: Email Communications
- Purpose: Account verification, password reset, transactional emails
- Legal Basis: Contract performance (Art. 6(1)(b))
- Data Categories: Email, name, language preference
- Recipients: SendGrid (email service provider)
- Retention: Email logs 90 days
- Security: TLS encryption, API authentication
Processing Activity 4: Business Information
- Purpose: Service customization, compliance guidance
- Legal Basis: Contract performance (Art. 6(1)(b))
- Data Categories: Company name, VAT number, employee count, business type, province
- Recipients: None (internal processing only)
- Retention: Account lifetime
- Security: Database encryption, access control
Data Processors
Third-Party Processors:
- Vercel (Hosting)
- Service: Application hosting and deployment
- Location: EU/US (Privacy Shield alternative)
- Agreement: Standard Contractual Clauses
- Security: SOC 2 Type II, ISO 27001
- Neon (Database)
- Service: PostgreSQL database hosting
- Location: EU region
- Agreement: DPA in place
- Security: Encryption at rest and in transit, SOC 2
- SendGrid (Emails)
- Service: Transactional email delivery
- Location: US (Privacy Shield alternative)
- Agreement: Standard Contractual Clauses
- Security: TLS, API authentication, bounce handling
International Data Transfers
EU to Third Countries:
- ✅ Standard Contractual Clauses with US providers
- ✅ Adequate security measures
- ✅ Data transfer impact assessment
- Document transfer mechanisms
User Rights
How Users Exercise Rights
Profile Management (/profile):
- View all personal data
- Update information
- Change password
- Enable/disable 2FA
Data Export (/profile/export):
- Download all data in JSON
- Machine-readable format
- Complete data portability
Account Deletion (/profile/delete):
- Permanent account removal
- Data erasure (except legal retention)
- Confirmation required
Consent Management (/profile/consent):
- Marketing opt-in/opt-out
- Cookie preferences
- Granular consent control
Response Timeline
- Access Request: 30 days
- Rectification: 5 business days
- Erasure: 30 days
- Data Export: Immediate (self-service)
- Objection: 5 business days
Cookie Policy
Cookie Types
Strictly Necessary (No consent required):
- Session cookies (authentication)
- Security cookies (CSRF protection)
- Load balancing cookies
Functional (Consent required):
- Language preference
- Remember me (optional login)
- UI preferences
Analytics (Consent required):
- Usage statistics
- Error tracking
- Performance monitoring
Marketing (Consent required):
- Not currently used
Cookie Banner Implementation
Requirements:
- Inform before setting non-essential cookies
- Granular consent (accept all, reject all, customize)
- Easy withdrawal of consent
- Cookie policy link
- No pre-ticked boxes
Cookie Banner Example:
<CookieBanner>
<p>Utilizziamo cookie per migliorare la tua esperienza.</p>
<button>Accetta tutti</button>
<button>Rifiuta</button>
<button>Personalizza</button>
<a href="/cookie-policy">Informativa Cookie</a>
</CookieBanner>
Data Protection Officer
DPO Requirements (Article 37 GDPR)
Required When:
- Public authority or body
- Core activities require large-scale, regular, systematic monitoring
- Core activities involve large-scale processing of special categories
Conformo Assessment: DPO not required
- Not a public authority
- Small-scale processing
- No special category data
Alternative: Privacy contact point designated
Privacy Contact
Email: privacy@conformo.ai (to be configured) Response Time: 5 business days Responsibilities:
- Handle data subject requests
- Privacy inquiries
- Breach notifications
- Regulator communication
Implementation Checklist
Essential (High Priority)
- Privacy policy page
- Terms of service acceptance
- Email verification
- Secure password storage (bcrypt)
- Data encryption (TLS)
- Access controls (RBAC)
- Audit logging
- Cookie consent banner
- Data export functionality
- Account deletion functionality
- Privacy policy content
- Terms of service content
Important (Medium Priority)
- Cookie policy page
- Consent management UI
- Data processing agreements with vendors
- Processing activities register
- DPIA for high-risk processing
- Breach notification procedure
- User data dashboard
- Retention policy automation
Nice to Have (Low Priority)
- Privacy-friendly analytics
- Anonymization for old logs
- SPID/CIE integration (eIDAS)
- Multi-language privacy notices
- Privacy seal/certification
- Third-party privacy audits
Compliance Maintenance
Regular Reviews
Quarterly:
- Review privacy policy
- Check data processing agreements
- Audit user consent records
- Review security incidents
Annually:
- Complete privacy impact assessment
- Update processing activities register
- Review retention policies
- Vendor compliance review
- Security audit
- Staff training
Documentation
Maintain Records Of:
- Processing activities
- Data breaches
- User consent
- Data subject requests
- DPIAs
- Security incidents
- Training records
References
Last Updated: October 2025
Version: 1.0
Next Review: January 2026
Maintained by: Conformo Privacy Team