In Effect Since May 25, 2018 - Compliance Required

GDPR: General Data Protection Regulation

If you collect, store, or process personal data of EU residents (emails, names, IP addresses, cookies), GDPR requires you to protect that data, respect individual rights, and report breaches within 72 hours.

72 hours
Breach reporting deadline
€20M fines
Maximum penalties
7+ years
Active enforcement

GDPR in Plain English

GDPR is the EU's privacy law that says if you collect any personal information about people in Europe, you must protect it properly and respect their rights. This includes obvious things like names and emails, but also less obvious data like IP addresses, cookies, and device IDs.

Applies to ANY organization processing EU personal data
Covers all personal data - from names to cookies to IP addresses
Requires explicit consent or other valid legal basis
Individuals have strong rights over their data
Privacy must be built into systems by design
Breaches must be reported within 72 hours

Your 8-Step Path to GDPR Compliance

Follow these steps to achieve full compliance. Each step builds on the previous one, creating a comprehensive compliance program.

Step 1 Beginner

1. Map Your Data Processing

Understand what personal data you collect, where it comes from, and how you use it

Key Actions

  • List all personal data you collect (names, emails, IPs, cookies, etc.)
  • Document where the data comes from (website forms, purchases, etc.)
  • Map how data flows through your systems
  • Identify who has access to personal data

Available Tools

Data Mapping Template Processing Register Data Flow Diagram

Real Examples

Customer emails from contact forms Payment data from checkout Website analytics cookies
Timeline: 2-4 weeks
Learn More
Step 2 Intermediate

2. Establish Legal Basis for Processing

Ensure you have valid legal grounds for collecting and using personal data

Key Actions

  • Identify legal basis for each type of data processing
  • Update privacy policies with clear legal basis statements
  • Implement consent mechanisms where needed
  • Document legitimate interests assessments

Available Tools

Legal Basis Checker Consent Manager Privacy Policy Generator

Real Examples

Consent for marketing emails Contract basis for order processing Legitimate interest for fraud prevention
Timeline: 3-6 weeks
Learn More
Step 3 Intermediate

3. Implement Data Subject Rights

Set up processes to handle individual requests about their personal data

Key Actions

  • Create procedures for access requests (right to know)
  • Set up data rectification and erasure processes
  • Implement data portability for data export
  • Establish objection and restriction handling

Available Tools

Rights Management System Request Forms Response Templates

Real Examples

Download my data button Delete my account process Unsubscribe from marketing
Timeline: 4-8 weeks
Learn More
Step 4 Advanced

4. Implement Privacy by Design

Build privacy protection into your systems and processes from the start

Key Actions

  • Review all systems for privacy-friendly defaults
  • Implement data minimization (collect only what you need)
  • Add privacy impact assessments to new projects
  • Set up automatic data retention and deletion

Available Tools

DPIA Template Privacy Checklist Retention Policy Builder

Real Examples

Default privacy settings Automatic account deletion Minimal data collection forms
Timeline: 6-12 weeks
Learn More
Step 5 Advanced

5. Secure Personal Data

Protect personal data with appropriate technical and organizational measures

Key Actions

  • Encrypt personal data in transit and at rest
  • Implement access controls and authentication
  • Set up regular security assessments
  • Train staff on data protection

Available Tools

Security Checklist Encryption Guide Training Materials

Real Examples

Database encryption Two-factor authentication Employee privacy training
Timeline: 4-8 weeks
Learn More
Step 6 Intermediate

6. Manage Third-Party Processors

Ensure vendors and partners also protect personal data properly

Key Actions

  • List all vendors who process personal data
  • Sign data processing agreements (DPAs) with each vendor
  • Assess vendor security and privacy practices
  • Monitor vendor compliance regularly

Available Tools

Vendor Assessment Form DPA Templates Compliance Monitor

Real Examples

Cloud provider DPA Email service agreement Analytics tool contract
Timeline: 3-6 weeks
Learn More
Step 7 Intermediate

7. Set Up Data Governance

Create oversight and accountability for data protection across your organization

Key Actions

  • Appoint a Data Protection Officer (if required)
  • Assign data protection responsibilities to staff
  • Create regular privacy compliance reviews
  • Document all data protection policies and procedures

Available Tools

DPO Assessment Governance Framework Policy Templates

Real Examples

Monthly privacy reviews Data protection training Incident response team
Timeline: 2-4 weeks
Learn More
Step 8 Intermediate

8. Prepare for Data Breaches

Create processes to detect, respond to, and report data breaches within 72 hours

Key Actions

  • Define what counts as a personal data breach
  • Create step-by-step breach response procedures
  • Set up 72-hour reporting to supervisory authorities
  • Prepare breach notification templates for data subjects

Available Tools

Incident Response Plan Breach Assessment Tool Notification Templates

Real Examples

Breach detection system Authority notification form Customer breach notice
Timeline: 2-3 weeks
Learn More

What GDPR Actually Requires You to Do

Lawful Basis

Have valid legal grounds for processing personal data

  • • Consent
  • • Contract necessity
  • • Legitimate interests

Data Subject Rights

Enable individuals to control their personal data

  • • Right to access
  • • Right to erasure
  • • Right to portability

Privacy by Design

Build privacy protection into systems by default

  • • Data minimization
  • • Privacy-friendly defaults
  • • Proactive protection

Breach Notification

Report data breaches within 72 hours

  • • Authority notification
  • • Data subject notification
  • • Breach documentation

Data Protection Officer

Appoint DPO when required by law

  • • Public authorities
  • • Large-scale monitoring
  • • Special category data

Documentation

Maintain records of processing activities

  • • Processing register
  • • Privacy policies
  • • Impact assessments

Common GDPR Questions

Who needs to comply with GDPR?

GDPR applies to any organization that processes personal data of EU residents:

  • EU companies processing personal data
  • Non-EU companies offering goods/services to EU residents
  • Non-EU companies monitoring EU residents' behavior
  • Size doesn't matter - applies to all organizations

What counts as personal data under GDPR?

Personal data is any information relating to an identified or identifiable person:

  • Names, email addresses, phone numbers
  • IP addresses, device IDs, location data
  • Photos, videos, audio recordings
  • Online identifiers, cookies, user IDs
  • Financial information, health records
  • Any data that can identify someone directly or indirectly

Do I need a Data Protection Officer (DPO)?

You must appoint a DPO if your organization:

  • Is a public authority or body
  • Engages in large-scale systematic monitoring
  • Processes large-scale special category data (health, biometric, etc.)
  • Note: Most small websites and apps don't need a DPO

What's the difference between controllers and processors?

Understanding your role determines your responsibilities:

  • Controller: Decides why and how personal data is processed (you set the rules)
  • Processor: Processes personal data on behalf of the controller (you follow their rules)
  • Joint controllers: Multiple organizations jointly decide processing purposes
  • Most businesses are controllers for their customer data

How long can I keep personal data?

GDPR requires data minimization and storage limitation:

  • Keep data only as long as necessary for the original purpose
  • Delete data when the legal basis no longer applies
  • Some data may need longer retention for legal compliance
  • Document your retention periods in a retention policy

What about international data transfers?

Transferring personal data outside the EU requires additional safeguards:

  • Adequacy decisions: EU approves certain countries as 'safe'
  • Standard Contractual Clauses (SCCs): Contractual protection
  • Binding Corporate Rules (BCRs): For multinational companies
  • US companies: Data Privacy Framework (replacing Privacy Shield)

Ready to Get GDPR Compliant?

GDPR has been in effect since 2018. If you're not compliant yet, start today with our free assessment.

Article Article 25 ·
View on EUR-Lex

🤝 Still Feeling Overwhelmed?

EU cybersecurity laws can be complex. Our free tools and guides work great for most people, but if you're dealing with something particularly challenging or have tight deadlines, we're here to help.