One of the most critical aspects of GDPR compliance is knowing how to handle data breaches. The regulation imposes strict notification requirements that catch many organizations off guard. Understanding the rules around breach detection, assessment, and notification is essential for any business that processes personal data of EU residents.
What Qualifies as a Data Breach Under GDPR?
GDPR defines a personal data breach as a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data. This definition is broader than many organizations expect. A data breach is not limited to cyberattacks or hacking incidents.
Common examples of data breaches include:
- An employee sending personal data to the wrong email recipient
- A lost or stolen laptop containing unencrypted customer records
- A ransomware attack that locks access to patient files
- An unauthorized employee accessing personnel records
- A database misconfiguration exposing user data to the public internet
- Accidental deletion of records without a backup
The key point is that breaches are not always malicious. Accidental incidents count just as much as deliberate attacks under GDPR.
The 72-Hour Notification Rule
Article 33 of GDPR requires data controllers to notify the relevant supervisory authority of a personal data breach without undue delay and, where feasible, within 72 hours of becoming aware of it. If notification is not made within 72 hours, it must be accompanied by reasons for the delay.
The 72-hour clock starts ticking from the moment the organization becomes “aware” of the breach — not when it occurred. An organization is considered aware when it has a reasonable degree of certainty that a security incident has compromised personal data.
What the Notification Must Include
The notification to the supervisory authority must contain:
- The nature of the breach, including the categories and approximate number of data subjects and records affected
- The name and contact details of the Data Protection Officer (DPO) or other contact point
- A description of the likely consequences of the breach
- A description of the measures taken or proposed to address the breach, including measures to mitigate its effects
If you cannot provide all information at once, GDPR allows you to provide it in phases, as long as there is no undue delay.
When to Notify Affected Individuals
Article 34 requires that data subjects be notified when a breach is likely to result in a high risk to their rights and freedoms. This is a higher threshold than notification to the supervisory authority. Not every breach requires individual notification.
You do not need to notify individuals if:
- You had appropriate technical and organizational measures in place (such as encryption) that render the data unintelligible to unauthorized persons
- You have taken subsequent measures that ensure the high risk is no longer likely to materialize
- Individual notification would involve disproportionate effort — in which case, a public communication or similar measure is acceptable
Building a Breach Response Plan
Waiting until a breach occurs to figure out your response is a recipe for failure. Every organization should have a documented breach response plan that covers the following stages:
1. Detection and Identification
Establish monitoring systems and train staff to recognize potential breaches. The faster you detect a breach, the more time you have within the 72-hour window. Many organizations lose precious hours because employees do not know what constitutes a breach or who to report it to internally.
2. Containment
Once a breach is identified, act immediately to contain it. This might mean isolating affected systems, revoking compromised credentials, or blocking unauthorized access points. The goal is to prevent further data loss while preserving evidence for investigation.
3. Assessment
Evaluate the scope and severity of the breach. Determine what data was affected, how many individuals are impacted, and what the potential consequences are. This assessment drives your notification decisions — both to the supervisory authority and to affected individuals.
4. Notification
Based on your assessment, notify the supervisory authority within 72 hours if the breach is likely to result in a risk to individuals’ rights and freedoms. If the risk is high, also notify affected individuals directly and without undue delay.
5. Recovery and Remediation
Restore affected systems and data from backups. Implement additional security measures to prevent similar breaches. Update your security protocols based on lessons learned.
6. Documentation
Article 33(5) requires you to document all breaches, regardless of whether they are reportable. This documentation must include the facts of the breach, its effects, and the remedial action taken. Supervisory authorities may audit these records at any time.
Common Pitfalls in Breach Handling
Organizations frequently make critical errors when responding to breaches:
- Delayed internal escalation — Employees discover issues but do not report them promptly, eating into the 72-hour window before leadership is even aware.
- Over-notifying or under-notifying — Some organizations notify individuals for every minor incident (creating notification fatigue), while others fail to notify when genuinely required.
- Poor record-keeping — Without detailed documentation, you cannot demonstrate compliance to supervisory authorities during an investigation.
- No regular testing — A breach response plan that has never been tested is unlikely to work smoothly under pressure. Conduct tabletop exercises at least annually.
- Ignoring processor obligations — Data processors must notify the controller without undue delay after becoming aware of a breach. Ensure your contracts with processors include clear breach notification clauses.
The Role of Encryption and Pseudonymization
Encryption plays a pivotal role in breach management under GDPR. If breached data was properly encrypted and the encryption keys were not compromised, the breach may not need to be reported to data subjects — because the data is unintelligible to the unauthorized party.
Similarly, pseudonymization — replacing identifying information with artificial identifiers — can reduce the risk to data subjects in the event of a breach. While pseudonymized data is still personal data under GDPR, it is significantly less useful to an attacker without access to the additional information needed to re-identify individuals.
Both encryption and pseudonymization are explicitly mentioned in GDPR as appropriate technical measures. Investing in these technologies is not just good security practice — it directly reduces your regulatory exposure in the event of a breach.
Conclusion
Data breaches are inevitable — what matters is how you prepare for and respond to them. GDPR’s breach notification requirements are demanding but manageable with proper planning. Build a response plan now, train your staff to recognize and report incidents, invest in encryption and access controls, and document everything. The 72-hour clock waits for no one, and the organizations that handle breaches well are those that prepared before the breach occurred.