Compliance and Data ProtectionNovember 29, 2025Serdar4 min read

IT Checklist for KVKK Compliance: 12 Concrete Items

IT Checklist for KVKK Compliance: 12 Concrete Items

Summary: KVKK IT compliance is summarized in 12 concrete items: data inventory, access control, log retention, backups, encryption, VERBIS filing, incident response, and vendor agreements. The status of each item must be backed by written evidence (policy, log, contract).

KVKK (Personal Data Protection Law) is a mandatory compliance area for SMEs too. The law and secondary regulations describe technical and administrative measures; but when translated into IT practice, a clear checklist is needed. This guide explains 12 practical items for KVKK compliance.

Why Does KVKK IT Compliance Matter?

In case of a breach, administrative fines and reputational loss are at stake. Even if customer and employee data are otherwise managed, notification obligations apply during a data leak. Typical SME gaps:

  • No personal-data inventory exists
  • Where which data is kept is unclear
  • Access logs missing
  • Backups unencrypted
  • Employee training never done
  • No technical response capability for data-deletion requests
  • The data-breach notification process never tested

These 12 controls practically close those gaps.

12 Control Items

1. Personal Data Inventory

Which data is processed? Employee, customer, supplier, and prospect records are listed. For each record type, the source, purpose, retention period, and deletion/destruction procedure are documented.

2. Data Flow Map

Where is data collected, where does it go, and where is it stored? Flows between CRM, accounting, email, and the file server are visualized.

3. Access Control

Each user accesses only the data needed for their job. Role-based access is set up; access of departed staff is removed immediately.

4. MFA Requirement

MFA should be mandatory on systems containing critical data (accounting, HR, CRM).

5. Encryption (At Rest and In Transit)

BitLocker on laptops, disk encryption on servers, HTTPS/TLS in transit. Encrypted delivery is considered for sensitive data in email attachments.

6. Backup and Deletion Procedure

Backups should be encrypted; when a deletion request comes, a procedure to delete from backups too should exist. Data past retention is destroyed automatically or manually.

7. Log Retention

Access, change, and deletion of personal data are logged. Logs are kept for at least 2 years; protected against tampering.

8. Third-Party Management

Data processor agreements must be signed with cloud services, shipping firms, and accounting advisors. A DPA (data processing agreement) similar to GDPR is used.

9. Data Breach Notification Process

A 72-hour notification to the Authority and informing affected individuals procedure must be in writing. Tested with a drill.

10. Employee Training

All staff should receive KVKK awareness training at least once a year. Training is also part of new-hire onboarding.

11. Physical Security

Physical measures like server room locks, file cabinet keys, and visitor logs should be documented and audited.

12. Periodic Audit

An internal audit should be done at least once a year; gaps should turn into action plans.

Control Table

Item Owner Frequency
Inventory Data Controller + IT Annual update
Access IT On every change
MFA IT Continuous monitoring
Encryption IT Annual audit
Backup IT Monthly testing
Logging IT Continuous
Third party Legal + Data Controller Annual
Breach procedure Management + IT Annual drill
Training HR + Data Controller Annual
Physical security Management Twice a year
Audit Independent internal Annual

Common Mistakes

  • Inventory done once and never updated
  • Personal data in backups skipped in deletion
  • Managers excluded from employee training
  • A verbal plan instead of a written breach procedure
  • Third-party contracts left incomplete
  • Short log retention
  • A minimum-only approach for compliance, missing the chance to reduce real security risk

Real-World Examples

Example 1: Inventory Work at an Accounting Firm

For the first time, an accounting firm concretely identified where data was kept for KVKK compliance. A few sensitive-data leftovers were noticed on old computers; a regular destruction procedure was set up.

Example 2: Access Cleanup at a Manufacturing Site

At a manufacturing site, the accounts of departed staff were still active. The annual audit caught this. An "account closure verification" step was added to the offboarding flow; a rule was set so HR does not approve until IT confirms.

Example 3: Breach Drill at a Consulting Firm

A consulting firm ran a drill on a hypothetical leak scenario. The pressure of the 72-hour notification window was visible; a ready-made notification template was created.

How Does Yamanlar Bilişim Support This Process?

Yamanlar Bilişim addresses the IT side of KVKK compliance through the 12-control framework. All steps from inventory to breach drills are applied tailored to your business.

Main areas where Yamanlar Bilişim can support:

  • Personal-data inventory and flow map
  • Access-control policy and role design
  • MFA and identity-security setup
  • Disk and transit encryption
  • Backup and deletion procedure
  • Log collection and compliance reports
  • Data breach notification plan and drill
  • Employee training program

FAQ

Frequently Asked Questions

How high is the KVKK administrative-fine risk for an SME?

If a deficiency is found after a complaint or audit, serious fines can be applied. With proactive compliance, the risk drops to a minimum.

How often should the personal-data inventory be updated?

A full annual review; plus an update whenever a new system or workflow change happens.

Do I have to delete personal data from backups when a deletion request comes?

In principle yes; in practice there are certain exceptions. Restricting access until the backup cycle completes is an acceptable approach.

Can I use overseas cloud services?

Cross-border transfer can require special procedures and explicit consent. Legal advice should be obtained.

How is employee training documented?

Training attendance lists, training content, and date records should be kept. Provided to the auditor on request.

Share:
Last updated: May 1, 2026
S

Author

Serdar

Yamanlar Bilişim Expert

Writes content on IT infrastructure, cybersecurity, and digital transformation at Yamanlar Bilişim. Get in touch for any questions.

Professional Support

Get help on this topic

Let's design the Compliance and Data Protection solution you need together. Our experts get back to you within 1 business day.

support@yamanlarbilisim.com.tr · Response time: 1 business day