This checklist is based on our experience with a range of customers who’ve been required to meet stringent client data protection security audits.