Compliance & Privacy AnalystRegulatory Compliance3 promptsBeginner → Advanced3 single promptsFree to use

Regulatory Compliance AI Prompts

3 Compliance & Privacy Analyst prompts in Regulatory Compliance. Copy ready-to-use templates and run them in your AI workflow. Covers beginner → advanced levels and 3 single prompts.

AI prompts in Regulatory Compliance

3 prompts
IntermediateSingle prompt
02

Data Breach Response Playbook

Build a data breach response playbook for this organization. Organization: {{organization}} Applicable regulations: {{regulations}} (GDPR, CCPA, HIPAA, state breach notification...

Prompt text
Build a data breach response playbook for this organization. Organization: {{organization}} Applicable regulations: {{regulations}} (GDPR, CCPA, HIPAA, state breach notification laws) Data types held: {{data_types}} Under GDPR Article 33, personal data breaches must be reported to the supervisory authority within 72 hours of becoming aware. Under Article 34, affected data subjects must be notified without undue delay when the breach is likely to result in a high risk to their rights and freedoms. 1. Breach classification: Define what constitutes a reportable breach: - Confidentiality breach: unauthorized disclosure of personal data - Integrity breach: unauthorized alteration of personal data - Availability breach: accidental or unauthorized loss or destruction of personal data NOT every breach requires notification — assess risk: - Is personal data involved? (If only non-personal data: not a personal data breach) - What is the risk to data subjects? (Low / Medium / High) - High risk triggers mandatory data subject notification 2. The 72-hour clock: - Clock starts: when the organization 'becomes aware' — i.e. when a responsible person has a reasonable degree of certainty that a breach has occurred - Suspicion is NOT awareness — but do not delay investigation to avoid starting the clock - If full information is not available within 72 hours: report what you know and supplement later - Document the exact time of awareness 3. Incident response phases: Phase 1 — Detect and contain (Hours 0–4): - Incident confirmed by IT/security team - Contain the breach: revoke compromised credentials, isolate affected systems, preserve evidence - Notify the Privacy/DPO team immediately - Do NOT delete potentially breached data — preserve for forensics - Assign an incident lead Phase 2 — Assess (Hours 4–24): - Determine: what data was affected? How many data subjects? What categories of data? - Determine: how did the breach occur? What is the root cause? - Assess risk to data subjects using ENISA risk methodology: - Nature of data (special category = higher risk) - Volume of records affected - Ease of identification of data subjects - Severity of consequences (financial loss, discrimination, physical harm, reputational damage) - Risk level: Low → No notification required. Medium → Regulator notification only. High → Regulator + data subject notification. Phase 3 — Notify (Hours 24–72 for regulator; as soon as possible for data subjects): Supervisory authority notification (GDPR Art. 33) must include: - Description of the breach (nature, categories, approximate number of data subjects and records) - Name and contact of the DPO - Likely consequences of the breach - Measures taken or proposed to address the breach and mitigate effects Data subject notification (GDPR Art. 34) must include: - Plain-language description of the breach - Name and contact of the DPO - Likely consequences for the data subject - Steps taken to address the breach - Steps the data subject should take to protect themselves 4. Notification templates: Regulator notification summary: 'On [date] at [time], [Organization] became aware of a [type] breach affecting approximately [N] data subjects. The breach involved [data categories]. The breach occurred due to [brief cause]. We have taken the following immediate steps: [actions]. We estimate the impact as [risk level] because [reasons]. We will provide further updates as our investigation progresses.' Data subject notification: 'We are writing to inform you of an incident involving your personal data. On [date], [description of what happened in plain language]. The data involved included [specific data types]. We have taken the following steps to address the incident: [actions]. To protect yourself, we recommend: [specific steps]. If you have questions, contact our Data Protection Officer at [contact].' 5. Post-breach requirements: - Internal breach log: maintain a record of ALL breaches, including those below notification threshold (GDPR Art. 33(5)) - Root cause analysis: within 30 days - Regulatory follow-up: respond to any supervisory authority inquiries within stated deadlines - Remediation tracking: document all corrective actions and their completion dates Return: breach classification matrix, 72-hour timeline with actions, risk assessment framework, notification templates, and post-breach logging requirements.
BeginnerSingle prompt
03

Data Subject Rights Request Handler

Design a workflow and response template for handling Data Subject Access Requests (DSARs) and other data subject rights requests. Regulation: {{regulation}} (GDPR, CCPA, PIPEDA,...

Prompt text
Design a workflow and response template for handling Data Subject Access Requests (DSARs) and other data subject rights requests. Regulation: {{regulation}} (GDPR, CCPA, PIPEDA, etc.) Organization type: {{org_type}} Systems holding personal data: {{systems}} Data subjects have enforceable rights over their personal data. Failure to respond correctly and within deadlines is a common basis for regulatory complaints and fines. 1. Rights covered and deadlines: GDPR rights: - Right of access (Art. 15): receive a copy of all personal data held, plus metadata Deadline: 1 month from receipt of request (extendable to 3 months for complex requests) - Right to rectification (Art. 16): correct inaccurate or incomplete data Deadline: 1 month - Right to erasure / right to be forgotten (Art. 17): delete personal data when certain conditions apply Deadline: 1 month - Right to restriction (Art. 18): restrict processing while accuracy is contested or objection is pending Deadline: 1 month - Right to data portability (Art. 20): receive data in machine-readable format (applies to consent/contract basis only) Deadline: 1 month - Right to object (Art. 21): object to processing based on legitimate interests or direct marketing Deadline: immediately for direct marketing; 1 month for other objections - Rights related to automated decision-making (Art. 22): not be subject to solely automated decisions with significant effects CCPA rights (California): - Right to know: what data is collected, used, disclosed, sold - Right to delete - Right to opt-out of sale of personal information - Right to non-discrimination for exercising rights Deadline: 45 days (extendable by 45 days with notice) 2. Request intake and verification: - Intake channel: dedicated email address, web form, or in-product request - Identity verification: must verify the requester is who they claim to be - For low-risk requests: email verification sufficient - For access requests returning sensitive data: stronger verification required (government ID) - Do NOT ask for more information than necessary to verify identity - Acknowledgment: send within 3 working days confirming receipt and expected response date - Clock starts: from receipt of the valid request (if identity verification is needed, clock starts when verification is complete) 3. Data search procedure: For an access request: search must be comprehensive - List all systems that may hold personal data for this individual - Search procedure per system (who runs it, how, how long it takes) - Format for compiling results - Review results before sending: remove data about third parties, apply legal professional privilege redactions if applicable 4. Response templates: Acknowledgment: 'We have received your [request type] request dated [date]. We will respond by [deadline date]. If we need to verify your identity, we will contact you within [X] working days. Reference number: [REF].' Exemption response (when a right does not apply): 'We have reviewed your request. We are unable to [action] because [specific exemption applies — e.g. the data is required to comply with a legal obligation / the data concerns third parties / processing is necessary for a legal claim]. You have the right to lodge a complaint with [supervisory authority].' 5. Refusal grounds (legitimate): - Request is manifestly unfounded or excessive → can charge a reasonable fee or refuse - Exemptions: legal obligation, vital interests, public interest, legal claims, freedom of expression, research - Must always: state the reason for refusal, inform the requester of their right to complain 6. Logging and audit: - Log every request: date received, type, identity verified (Y/N), date responded, outcome - Retain logs for at least 3 years - Never log the personal data provided in the response Return: rights and deadline reference table, intake and verification workflow, system search procedure, response templates, and audit logging design.

Recommended Regulatory Compliance workflow

1

Consent Management Audit

Start with a focused prompt in Regulatory Compliance so you establish the first reliable signal before doing broader work.

Jump to this prompt
2

Data Breach Response Playbook

Review the output and identify what needs follow-up, cleanup, explanation, or deeper analysis.

Jump to this prompt
3

Data Subject Rights Request Handler

Continue with the next prompt in the category to turn the result into a more complete workflow.

Jump to this prompt

Frequently asked questions

What is regulatory compliance in compliance & privacy analyst work?+

Regulatory Compliance is a practical workflow area inside the Compliance & Privacy Analyst prompt library. It groups prompts that solve closely related tasks instead of leaving users to search through one flat list.

Which prompt should I start with?+

Start with the most general prompt in the list, then move toward the more specific or advanced prompts once you have initial output.

What is the difference between a prompt and a chain?+

A single prompt gives you one instruction and one output. A chain is a multi-step sequence designed to build on earlier results and produce a more complete workflow.

Can I use these prompts outside MLJAR Studio?+

Yes. They work in other AI tools too. MLJAR Studio is still the best fit when you want local execution, visible code, and notebook-based reproducibility.

Where should I go next after this category?+

Good next stops are Governance and Controls, PII and Data Discovery, Privacy Impact and Risk depending on what the current output reveals.

Explore other AI prompt roles