Framework

GDPR
Article 32 security testing, DPIAs, and breach notification evidence

The General Data Protection Regulation (Regulation EU 2016/679) and the UK GDPR set the security baseline for any organisation processing personal data of EU or UK individuals. Run Article 32 security control assessments, coordinate vulnerability assessments and penetration tests, manage Data Protection Impact Assessments, log personal data breaches against the 72-hour clock, and produce supervisory authority evidence from one platform.

No credit card required. Free plan available forever.

GDPR in context: a principles-led regime that demands evidenced security

The General Data Protection Regulation (Regulation EU 2016/679) applied from 25 May 2018 and replaced the 1995 Data Protection Directive. The UK GDPR retains the substance of the EU GDPR alongside the Data Protection Act 2018 following the end of the Brexit transition period. The regulation is principles-led: lawfulness, fairness, and transparency, purpose limitation, data minimisation, accuracy, storage limitation, integrity and confidentiality, and accountability. Article 5(2) makes the controller responsible for, and able to demonstrate, compliance with each principle. Fines reach up to 20 million euro or 4 percent of total worldwide annual turnover, whichever is higher, for the most serious infringements.

For most security and risk teams the operational question is not whether GDPR applies; it is how to evidence the security side of the regulation, in particular Article 32, without rebuilding the artefact pack at every audit, supervisory inquiry, or DPIA. GDPR favours continuous accountability over snapshots, which is why the linkage between the records of processing activities, the asset inventory, the testing programme, and the breach register matters more than any individual document.

Who is in scope, and where the territorial test bites

Article 3 sets the territorial scope through two routes: establishment in the EU (or the UK, under UK GDPR) and targeting of data subjects from outside. Both routes apply regardless of the legal form of the entity, and the EDPB guidance on Article 3 turns the targeting test into a list of evidenced indicators rather than a subjective judgement.

Establishment in the EU or the UK

Any processing of personal data in the context of the activities of an establishment of a controller or a processor in the EU (Article 3(1) GDPR) or the UK (UK GDPR) is in scope, regardless of where the processing actually takes place. The establishment test is functional and looks at the stable arrangements rather than the legal form, so a sales office, a fulfilment subsidiary, or a regional team can be enough to bring a parent group into scope.

Targeting EU or UK data subjects from outside (Article 3(2))

Controllers and processors not established in the EU or the UK still fall in scope where they offer goods or services to data subjects in the territory, or where they monitor their behaviour as far as that behaviour takes place in the territory. The European Data Protection Board guidance on Article 3 sets out the targeting indicators (currency, language, top-level domain, marketing focus) so the test is evidenced rather than inferred.

Joint controllers and processors

Where two or more controllers jointly determine the purposes and means of processing, Article 26 requires a transparent arrangement allocating responsibilities, made available to data subjects in essence. Processors are bound by Article 28 contractual clauses and are directly liable under Article 82 for breaches of processor-specific obligations and for processing outside the controller instructions.

Public authorities, special categories, and large-scale processing

Public authorities, organisations whose core activities consist of large-scale regular and systematic monitoring of data subjects, and organisations whose core activities consist of large-scale processing of special category or criminal offences data must designate a Data Protection Officer under Article 37. The DPO is independent, reports to the highest management level, and is the privileged contact for the supervisory authority.

Article 32: appropriate technical and organisational measures

Article 32 is the security article. It requires controllers and processors to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, taking into account the state of the art, the costs of implementation, the nature, scope, context and purposes of processing, and the risk of varying likelihood and severity for the rights and freedoms of natural persons. The four illustrative measures named in the article are not a closed list; the supervisor expects an evidenced control set that fits the risk profile of each processing activity.

  • Pseudonymisation and encryption of personal data, with controller-held keys where appropriate, and tested key management procedures
  • Ongoing confidentiality, integrity, availability, and resilience of processing systems and services, evidenced by configuration baselines, change control, and capacity planning
  • Ability to restore availability and access to personal data in a timely manner in the event of a physical or technical incident, evidenced by tested backup and recovery procedures
  • A process for regularly testing, assessing, and evaluating the effectiveness of the technical and organisational measures, evidenced by vulnerability assessments, penetration tests, and continuous monitoring
  • Access control aligned to least privilege, multi-factor authentication on administrative and remote access, and documented joiner-mover-leaver workflows
  • Logging, monitoring, and detection coverage proportionate to the sensitivity and volume of personal data, with retention periods justified against the storage limitation principle
  • Secure software development practices, vulnerability handling, and patch management for systems supporting the processing activity
  • Supplier due diligence, contractual security clauses (Article 28), and ongoing monitoring of processors and sub-processors handling personal data

The fourth illustrative measure (regular testing, assessing, and evaluating the effectiveness of the measures) is the article that pulls vulnerability assessments and penetration tests directly into GDPR. The penetration testing workflow and the vulnerability assessment workflow are designed for this kind of programme: scope, log findings against assets, track remediation against deadlines, and re-test before closure. Programmes operating under ISO 27001 or NIS2 already hold most of the underlying evidence; the GDPR-specific work is mapping it back to Article 32 and to the affected processing activity.

Article 35: when a Data Protection Impact Assessment is mandatory

A DPIA is required prior to the processing where a type of processing, in particular using new technologies, is likely to result in a high risk to the rights and freedoms of natural persons, taking into account the nature, scope, context and purposes of the processing. Article 35(3) gives three illustrative cases that always require a DPIA, and the EDPB and national supervisory authority guidance translates the high risk concept into reasoned triggers.

  • Systematic and extensive evaluation of personal aspects relating to natural persons based on automated processing, including profiling, on which decisions are based that produce legal or similarly significant effects
  • Processing on a large scale of special categories of personal data (Article 9) or personal data relating to criminal convictions and offences (Article 10)
  • Systematic monitoring of a publicly accessible area on a large scale, including CCTV across multiple locations
  • Use of innovative or novel technologies, including AI-driven decisioning, biometric authentication, and large-scale tracking
  • Processing that prevents data subjects from exercising a right or using a service or contract
  • Cross-border processing combined with high risk indicators identified by the relevant supervisory authority list

A DPIA is a structured exercise, not a long-form essay. Capture the description of the processing, the necessity and proportionality assessment against the lawful basis, the risks to data subjects with likelihood and severity reasoning, and the mitigations including the security testing results from the same workspace. Where high residual risk remains after mitigation, the controller must consult the supervisory authority under Article 36 before commencing the processing. For a structured method to keep the underlying risk model consistent, the cybersecurity risk assessment guide and the threat modelling guide cover the threat enumeration and risk treatment side that the DPIA reuses.

Articles 33 and 34: the 72-hour breach notification clock

A personal data breach is a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored, or otherwise processed. Once the controller becomes aware of the breach, the 72-hour clock to notify the competent supervisory authority starts running unless the breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the breach is likely to result in a high risk, affected data subjects must also be informed without undue delay.

  • Detection: confirm a personal data breach has occurred (a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data)
  • Awareness: the 72-hour clock starts when the controller has reasonable certainty a security incident has affected personal data, not at the moment of detection
  • Initial notification: notify the competent supervisory authority within 72 hours of awareness, including categories and approximate numbers of affected data subjects and records, the nature of the breach, the likely consequences, and the measures taken or proposed
  • Phased notification: where information is not available within the deadline, the notification may be provided in phases, with the supervisory authority informed of the delay and the reasons
  • Communication to data subjects: where the breach is likely to result in a high risk, communicate to affected data subjects without undue delay using clear and plain language
  • Internal register: regardless of whether external notification is required, the controller must document every breach (facts, effects, remedial action) under Article 33(5) and retain the register for supervisory inspection
  • Processor obligation: a processor becoming aware of a breach must notify the controller without undue delay so the controller can meet the 72-hour timeline

Hitting the deadline is a function of pre-built templates, a clear handoff between detection and reporting, and a single source of truth for the incident record. The incident response workflow keeps triage, classification, containment, and recovery tied to the same record the supervisory notification references, so the technical timeline and the supervisor narrative tell the same story. For coordinated disclosure of vendor and product vulnerabilities that escalate into personal data breaches, pair the workflow with the vulnerability disclosure programme setup guide.

Article 30: the records of processing activities (ROPA)

The ROPA is the structural backbone of an accountability-first programme. Every processing activity in scope is described once, links to the lawful basis, the categories of data and data subjects, the recipients, the retention periods, the cross-border transfers, and the security measures. Each Article 32 testing cycle and each personal data breach attaches to the processing activity it concerns, so the picture stays coherent across audits and across years.

  • Name and contact details of the controller, the joint controller (where applicable), the controller representative, and the Data Protection Officer
  • Purposes of the processing, including the lawful basis under Article 6 and, where applicable, the additional condition under Article 9 or 10
  • Description of the categories of data subjects and the categories of personal data
  • Categories of recipients to whom the personal data have been or will be disclosed, including recipients in third countries or international organisations
  • Where applicable, transfers of personal data to a third country or international organisation, including the identification of the country and the documented appropriate safeguards under Articles 46 to 49
  • Where possible, the envisaged time limits for erasure of the different categories of personal data, evidencing the storage limitation principle
  • Where possible, a general description of the technical and organisational security measures referred to in Article 32(1)

International transfers: adequacy, SCCs, BCRs, and the TIA

After the Schrems II ruling (CJEU C-311/18, July 2020), every transfer of personal data to a third country requires not only a transfer mechanism but also a documented assessment of whether the destination country regime undermines the essential guarantees of EU law. The EDPB Recommendations 01/2020 set out a six-step methodology, and the 2021 modular SCCs embed the obligation directly into the contract. The UK regime mirrors the substance with the IDTA and the UK Addendum.

Adequacy decision (Article 45)

The European Commission has decided that the third country, a territory, one or more specified sectors within that country, or the international organisation in question ensures an adequate level of protection. As of mid 2026, adequacy decisions cover countries and frameworks including the United Kingdom, Switzerland, Japan, the Republic of Korea, the EU-US Data Privacy Framework, and others; check the current list before relying on adequacy. Adequacy decisions remove the need for additional transfer mechanisms but do not waive other GDPR obligations.

Standard Contractual Clauses (Article 46)

The 2021 modular SCCs cover four scenarios: controller to controller, controller to processor, processor to processor, and processor to controller. Pick the right module, complete the annexes (parties, description of transfer, technical and organisational measures, sub-processors), and run a Transfer Impact Assessment to evaluate the destination country regime. The UK has its own International Data Transfer Agreement (IDTA) and a UK Addendum to the EU SCCs that perform the same function.

Binding Corporate Rules (Article 47)

BCRs are intra-group transfer rules approved by the lead supervisory authority through the consistency mechanism. They cover transfers within a corporate group and require the rules to be legally binding, enforceable by data subjects, and accompanied by training, monitoring, and complaint-handling procedures. BCR approval is multi-year work; the operational benefit is that internal transfers stop being a recurring contracting exercise once BCRs are in place.

Derogations for specific situations (Article 49)

Limited derogations apply where the transfer is necessary for the performance of a contract with the data subject, important reasons of public interest, the establishment, exercise, or defence of legal claims, or the protection of vital interests, among others. Article 49 derogations are intended for occasional transfers and the EDPB guidance is restrictive on routine reliance on them; document each derogation use, the necessity, and the data subject information.

Each cross-border flow gets a TIA in the workspace, with the destination country regime evaluated, the supplementary measures recorded (encryption with controller-held keys, pseudonymisation, contractual restrictions), and the position re-assessed after material legal changes in the destination. Treat the TIA as a living document tied to the processor record, not a PDF saved at contract signature.

UK GDPR: the parallel regime, the adequacy clock, and reform

The UK GDPR mirrors the EU GDPR in substance, with UK-specific changes and the Data Protection Act 2018 alongside. The Information Commissioner Office is the UK supervisory authority. UK organisations subject to both regimes typically run a single security programme and surface the regime-specific obligations (representative under Article 27, national supervisory authority, transfer mechanism choice) where they actually differ.

  • The UK left the EU on 31 January 2020 and left the GDPR transition period on 31 December 2020. The UK GDPR retains the substance of the EU GDPR with UK-specific changes, sits alongside the Data Protection Act 2018, and is enforced by the Information Commissioner Office (ICO)
  • The UK is the subject of an EU adequacy decision, currently extended to 27 December 2026 under the European Commission decision, which permits transfers from the EEA to the UK without additional safeguards during the period; UK organisations transferring to the EEA can continue to do so on the basis the EU is treated as adequate under UK GDPR
  • For UK-to-third-country transfers, the ICO requires the IDTA or the UK Addendum to the EU SCCs alongside a Transfer Risk Assessment, which mirrors the substance of the EU TIA
  • UK GDPR breach notification mirrors Article 33 (72 hours to the ICO) and Article 34 (high-risk breaches to data subjects); fines reach the higher of GBP 17.5 million or 4 percent of total worldwide annual turnover
  • The Data (Use and Access) Bill, the UK Government data reform legislation in progress through 2025 to 2026, may further diverge UK GDPR from EU GDPR in specific areas (legitimate interests, automated decision-making, research processing, ICO governance); track the final adopted text against the existing position

Articles 24 to 28: accountability, data protection by design, and the controller and processor relationship

Article 24 puts accountability on the controller, Article 25 introduces data protection by design and by default, and Article 28 sets out the controller and processor relationship and the mandatory clauses of the data processing agreement. The DPA covers the subject matter, duration, nature and purpose of processing, the type of personal data, the categories of data subjects, the obligations and rights of the controller, processing only on documented instructions, confidentiality undertakings, security measures, sub-processor authorisation, assistance with data subject requests, security obligations, breach notification, DPIA and prior consultation, deletion or return of personal data on termination, and audit rights.

Tie the DPA register to the supplier security programme and to the Article 32 testing results so the supervisor sees a coherent picture rather than parallel paperwork. For consultants delivering GDPR readiness and Article 32 testing to multiple clients, the security consultants workspace bundles client-scoped engagements with the branded client portal and AI-generated reports, so each engagement deliverable looks as polished as the underlying work.

GDPR alongside ISO 27001, SOC 2, NIS2, DORA, and HIPAA

GDPR sits next to, not on top of, the security frameworks most organisations already operate. Annex A of ISO 27001 provides the operational vocabulary for Article 32 controls. SOC 2 Trust Services Criteria around security, availability, and confidentiality are direct evidence for Article 32 obligations. NIS2 Article 21 measures and DORA ICT risk management overlap heavily with Article 32 for in-scope EU entities, and the breach notification timelines need to be reconciled (24-hour, 72-hour, one-month under NIS2; 72-hour under GDPR; both with their own thresholds). For US health entities, HIPAA Security Rule risk analysis methodology gives an evidenced approach the GDPR risk assessment can borrow directly. Healthcare and life sciences organisations carrying both EU and US exposure commonly consolidate the underlying control set under the HITRUST CSF, which inherits requirements from GDPR Article 32 alongside HIPAA, ISO 27001, and PCI DSS on a single requirement set. Where personal data is processed in a public cloud on behalf of customers, the ISO 27018 framework page covers the public cloud PII processor obligations that map closely to the Article 28 and Article 32 clauses GDPR places on processors, and that many cloud providers publish attestations against. For controllers and processors building a certifiable privacy management system on top of an ISO 27001 ISMS, the ISO 27701 framework page covers the PIMS extension whose Annex D supplies the official cross-walk to GDPR Articles 5 to 49, and which is the most direct way to evidence the technical and organisational measures GDPR Articles 25, 28, 30, 32, 33, 34, and 35 require.

Evidence the supervisory authority (and your DPO) actually want

Programmes that fail review usually fail because the artefacts are scattered across drives, ticket systems, and screenshots, with no clear line from a processing activity to the controls protecting it. Build the evidence pack as the work happens, retain raw scanner output and test reports alongside the summary, and tie every artefact back to the processing activity, the asset, an Article 32 obligation, and an owner. The supervisor narrative writes itself when the underlying record is consistent.

  • Records of processing activities maintained per Article 30, with the processing inventory linked to the supporting systems and the technical and organisational measures
  • Risk assessments and DPIAs for high-risk processing, with the description of processing, necessity and proportionality, risks to data subjects, and mitigations including security testing results
  • Article 32 testing pack: external scan output, authenticated scan output, penetration test reports, code review reports, and re-test evidence per cycle
  • Personal data breach register (Article 33(5)) with classification rationale, supervisory notifications, data subject communications, and lessons-learned actions
  • Data processing agreements per Article 28 with processors and sub-processors, including the categories of data, security measures, sub-processor authorisation, and audit rights
  • Transfer impact assessments and the chosen transfer mechanism (adequacy, SCCs with module, BCRs, derogations) per cross-border flow, with supplementary measures where required
  • Data subject rights handling records: requests, identity verification, response timelines (one month, extendable by two months for complex requests), and supporting evidence
  • DPO appointment, independence, and reporting records (where Article 37 applies), and management body engagement evidence

Where SecPortal fits in the GDPR workflow

SecPortal is the operating layer for the security side of the GDPR programme, not a replacement for the Data Protection Officer, the supervisory authority, or the privacy function. The platform handles scope, scans, findings, control mapping, breach records, engagement evidence, and the report output, so the Article 32 work runs as a structured workflow rather than a long email thread.

  • Compliance tracking that maps every finding to GDPR Article 32 obligations alongside ISO 27001 Annex A, SOC 2 Trust Services Criteria, NIS2 Article 21 measures, NIST 800-53 control families, PCI DSS requirements, and DORA articles for organisations under multiple regimes
  • Engagement management for Article 32 testing programmes (vulnerability assessments, penetration tests, code reviews, scenario exercises) with scope, status, evidence, and re-test all on one record
  • Findings management with CVSS 3.1 scoring, 300+ templates, and Nessus or Burp Suite imports so existing tooling feeds the same workflow as the GDPR evidence pack
  • 16-module external scanning and 17-module authenticated scanning to evidence boundary and configuration controls between manual tests, with each scan result tied to the processing system it covers
  • Continuous monitoring with scheduled scans (daily, weekly, monthly) so the supervisory authority sees coverage rather than a one-off snapshot
  • Attack surface management to keep the in-scope asset boundary and the cross-border data flow inventory defensible as the estate changes
  • AI report generation that turns risk findings, test results, and remediation actions into board, DPO, and supervisor-ready narratives without manual rewriting

GDPR is a multi-year programme, not a one-off project. The first year of compliance focuses on the ROPA, the lawful basis review, the DPIA backlog, the Article 32 baseline, and the breach playbook. Subsequent years tighten the supplier register, deepen the testing programme, and integrate the privacy and security functions so the DPO and the security lead read from the same record. Running the work as a managed workflow pays off most over time: historical findings, classified breaches, processor records, and remediation timelines stay linked, so each supervisory engagement is a refresh rather than a rebuild.

For programmes that want continuous detection and trend evidence between manual tests, the continuous monitoring capability and external scanning capability produce the cadence and coverage record GDPR Article 32 testing programmes are expected to keep.

Key control areas

SecPortal helps you track and manage compliance across these domains.

Article 32: technical and organisational measures (TOMs)

Article 32 requires controllers and processors to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, taking into account the state of the art, the costs of implementation, the nature, scope, context and purposes of processing, and the risk to data subjects. The four illustrative measures are pseudonymisation and encryption of personal data, the ability to ensure ongoing confidentiality, integrity, availability, and resilience of processing systems and services, the ability to restore the availability and access to personal data in a timely manner, and a process for regularly testing, assessing, and evaluating the effectiveness of those measures. Tie every confirmed vulnerability finding back to one of those obligations and to the affected processing activity.

Article 35: Data Protection Impact Assessment (DPIA)

A DPIA is mandatory where a type of processing is likely to result in a high risk to the rights and freedoms of natural persons, including systematic and extensive profiling with significant effects, processing of special categories or criminal offences data on a large scale, and systematic monitoring of publicly accessible areas on a large scale. Capture the description of the processing, the necessity and proportionality assessment, the risk to data subjects, and the mitigations including security testing results. Consult the Data Protection Officer and, where high risk remains after mitigation, consult the supervisory authority under Article 36.

Articles 33 and 34: personal data breach notification

A controller becoming aware of a personal data breach must notify the competent supervisory authority not later than 72 hours after becoming aware, unless the breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the breach is likely to result in a high risk, the controller must communicate the breach to affected data subjects without undue delay. Processors must notify their controller without undue delay. Document the facts, effects, and remedial action for every breach in an internal register, regardless of whether external notification is required.

Article 30: records of processing activities (ROPA)

Controllers and processors with 250+ employees, and any organisation whose processing is not occasional, includes special category or criminal offences data, or is likely to result in a risk to data subject rights, must maintain records of processing activities. Capture purposes of processing, categories of data subjects and personal data, recipients, transfers to third countries, retention periods, and the general description of the technical and organisational security measures. Link the ROPA entry to the DPIA, the asset inventory, and the security findings against the systems supporting that processing.

Articles 24 to 28: controller, processor, and accountability

Article 24 makes the controller accountable for compliance and able to demonstrate it. Article 25 introduces data protection by design and by default, requiring privacy considerations to be embedded into processing activities and to default settings. Article 28 governs the controller and processor relationship, including the mandatory written contract clauses (purpose, duration, nature, type of personal data, controller obligations, processor obligations, sub-processor authorisation, audit rights, and assistance with data subject requests, security, breach notification, DPIA, and prior consultation). Track the data processing agreements alongside the supplier register.

Articles 44 to 49: international data transfers

Personal data may only be transferred outside the EEA where an adequate level of protection is ensured. Map the transfer mechanism (adequacy decision, Standard Contractual Clauses with the relevant module, Binding Corporate Rules, derogations) for every cross-border flow, run a Transfer Impact Assessment after the Schrems II ruling and the EDPB guidance to evaluate the destination country regime, and document supplementary measures (encryption with controller-held keys, pseudonymisation, contractual restrictions) where the legal regime requires them. Re-assess after material legal or factual changes in the destination country.

Run a defensible GDPR programme without spreadsheet sprawl

Bring Article 32 testing, DPIAs, breach records, the ROPA, and supplier evidence into one workflow. Start free.

No credit card required. Free plan available forever.