GDPR Compliance: Complete Guide for 2026 (Articles 28, 32, 33, 34)
2026-03-18
By Anna Bley

GDPR Compliance: Complete Guide for 2026 (Articles 28, 32, 33, 34)

GDPR compliance guide for 2026: checklist, Articles 28/32/33/34 requirements, latest fines (€7.1B total), and how to demonstrate compliance as a data controller and processor.

GDPR
Data Protection
Privacy
Compliance

GDPR Compliance: Complete Guide for 2026

Regulation (EU) 2016/679 has been enforceable since May 25, 2018. Total fines now exceed €7.1 billion — with €1.2 billion issued in 2025 alone. For B2B companies operating in the EU, GDPR compliance is not optional: it governs how you collect, process, store, and protect personal data of every EU and EEA resident your business touches.

This guide covers everything you need to know: who must comply, the 2026 compliance checklist, the critical obligations under Articles 28, 32, 33, and 34, what happens when you fail, and how to demonstrate compliance to customers and regulators.

Jump to:


What Is GDPR Compliance?

GDPR compliance means that your organization processes personal data of EU/EEA residents in accordance with Regulation (EU) 2016/679 — the General Data Protection Regulation. The regulation applies whenever personal data (any information relating to an identified or identifiable natural person) is collected, stored, used, or transferred.

Compliance has four pillars:

  1. Lawfulness: Every processing activity requires a legal basis (consent, contract, legal obligation, vital interests, public task, or legitimate interests under Article 6)
  2. Transparency: Data subjects must know what data is collected, why, and for how long (Articles 12–14)
  3. Security: Appropriate technical and organizational measures protect personal data (Article 32)
  4. Accountability: Organizations must be able to demonstrate compliance at any time (Article 5(2))

For B2B SaaS and technology companies, compliance is particularly complex because most companies occupy two roles simultaneously: data controller (responsible for your own customer data) and data processor (handling data your customers entrust to your platform). Each role carries distinct obligations.


Who Must Comply with GDPR?

GDPR applies to any organization that:

  • Is established in the EU or EEA, regardless of where the data is processed
  • Is established outside the EU but offers goods or services to EU/EEA residents, or monitors the behavior of individuals in the EU (the "targeting criterion" under Article 3(2))

There is no minimum size threshold. A five-person SaaS startup with EU customers must comply. A US enterprise serving a single EU client must comply.

Specific obligations depend on your role:

RoleDefinitionKey obligations
ControllerDetermines the purposes and means of processingLegal basis, privacy notices, data subject rights, DPA with processors, DPIAs
ProcessorProcesses data on behalf of a controllerDPA with controller, security measures, breach notification to controller, sub-processor rules
BothMost B2B SaaS companiesAll of the above in each direction

GDPR Compliance Checklist for 2026

Regulators in 2026 expect demonstrable, operational compliance — not just policies. Here is what needs to be in place:

1. Data Mapping and Records of Processing Activities (Article 30)

Maintain a complete inventory of every processing activity: what data is collected, from whom, for what purpose, on what legal basis, how long it is retained, and which processors receive it. Article 30 makes these records of processing activities (RoPAs) mandatory for most organizations.

2. Legal Basis for Every Processing Activity (Article 6)

Document the lawful basis for each processing activity before it begins. Consent must be freely given, specific, informed, and unambiguous — and withdrawable at any time. Legitimate interests require a balancing test. Processing without a documented lawful basis triggers the upper fine tier.

3. Privacy Notices (Articles 12–14)

Provide clear, plain-language privacy information to data subjects at the time of collection. The EDPB's 2026 coordinated enforcement action focuses specifically on Articles 12–14 transparency obligations, making this a priority for supervisory authorities across all EU member states this year.

4. Data Subject Rights Mechanisms (Articles 15–22)

Implement processes to respond to access requests (Article 15), rectification (Article 16), erasure (Article 17), restriction (Article 18), portability (Article 20), and objection (Article 21) within one month. The EDPB's 2025 coordinated action focused on the right to erasure — organizations without working deletion workflows were penalized.

5. Data Processing Agreements with All Processors (Article 28)

Every third-party vendor that processes personal data on your behalf requires a signed DPA. This includes cloud providers, analytics tools, CRM platforms, payment processors, and any subcontractors. See Article 28 requirements in detail below.

6. Technical and Organizational Security Measures (Article 32)

Implement encryption, pseudonymization, access control, multi-factor authentication, and regular security testing. Document these measures as Technical and Organizational Measures (TOMs). See Article 32 requirements below.

7. Data Protection Impact Assessments for High-Risk Processing (Article 35)

Conduct a DPIA before starting any processing "likely to result in a high risk" to individuals. High-risk categories include large-scale processing of sensitive data, systematic profiling, and new technologies. DPIAs must identify risks and document the mitigating measures adopted.

8. Data Protection Officer Appointment (Article 37)

Appoint a DPO if your core activities involve large-scale systematic monitoring of individuals or large-scale processing of special categories of data. Public authorities must always appoint a DPO.

9. Breach Detection and Notification Readiness (Articles 33–34)

Have a tested incident response process that can detect breaches quickly, assess their risk level, and notify the supervisory authority within 72 hours. See Articles 33–34 in detail below.

10. International Data Transfer Safeguards (Articles 44–49)

Personal data may only be transferred outside the EU/EEA to countries with an adequacy decision, or under appropriate safeguards (Standard Contractual Clauses, Binding Corporate Rules). Following the TikTok €530M fine in May 2025 for unlawful transfers to China, supervisory authorities are actively scrutinizing cross-border data flows.


Where an ISMS Contributes — and Where the GDPR Goes Further

A good ISMS (Information Security Management System) provides the structure for technical and organizational measures required by the GDPR. But the GDPR imposes two additional requirement layers that an ISMS as an internal governance system cannot address on its own:

  1. Operational breach notification obligations under Articles 33 and 34 — within tight external deadlines
  2. Binding obligations in the processor relationship under Article 28 — contractual, ongoing, and auditable

Article 32: Security of Processing

Article 32 requires "appropriate technical and organizational measures" to ensure a level of security appropriate to the risk. Relevant measures include:

  • Pseudonymization and encryption of personal data
  • Ability to ensure ongoing confidentiality, integrity, availability, and resilience of systems
  • Ability to restore availability and access to personal data in a timely manner following a physical or technical incident
  • A process for regularly testing, assessing, and evaluating the effectiveness of technical and organizational measures

When assessing the appropriate level of security, organizations must take account of risks presented by processing — "in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed."

An ISMS supports Article 32. However, Articles 28, 33, and 34 impose requirements with an interface character that an ISMS as an internal solution cannot address.


Articles 33 and 34: Personal Data Breach Notification

The GDPR introduces a two-tier notification regime for personal data breaches.

Notification to the Supervisory Authority (Article 33)

In case of a personal data breach, the controller must notify the competent supervisory authority without undue delay and, where feasible, not later than 72 hours after becoming aware of it — unless the breach is unlikely to result in a risk to the rights and freedoms of natural persons.

Where notification is not made within 72 hours, reasons for the delay must be provided.

Content of the notification under Article 33(3):

ElementDescription
Nature of the breachDescription of the nature of the breach, where possible including categories and approximate number of data subjects and records concerned
Contact detailsName and contact details of the data protection officer or other contact point
Likely consequencesDescription of the likely consequences of the breach
Measures takenDescription of measures taken or proposed by the controller to address the breach and mitigate effects

Article 33(4) explicitly allows for phased notification: Where information cannot be provided at the same time, it may be provided in phases without undue further delay.

Processor obligation: Under Article 33(2), the processor must notify the controller without undue delay after becoming aware of a breach. The GDPR does not specify a concrete deadline — however, EDPB guidelines recommend notification as quickly as possible to enable the controller to meet the 72-hour deadline.

Documentation obligation: Under Article 33(5), the controller must document all breaches — including the facts, effects, and remedial actions taken. This documentation must enable the supervisory authority to verify compliance. Daily breach notifications across the EU exceeded 400 per day in 2025 for the first time since the regulation came into force.

Communication to Data Subjects (Article 34)

When the breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller must communicate the breach to the affected data subjects without undue delay.

The communication must describe in clear and plain language the nature of the breach and at least include:

  • Name and contact details of the data protection officer
  • Likely consequences of the breach
  • Measures taken or proposed to address the breach and mitigate effects

Exceptions to the communication obligation (Article 34(3)):

ExceptionExplanation
Technical protection measuresThe controller has implemented appropriate measures (e.g., encryption) that render data unintelligible to unauthorized persons
Subsequent measuresSubsequent measures ensure that the high risk is no longer likely to materialize
Disproportionate effortIn this case, a public communication or similar measure is made instead

The supervisory authority may, under Article 34(4), require the controller to communicate to data subjects if it considers that a high risk exists.


Article 28: Data Processing Agreements

The GDPR establishes binding requirements for working with processors.

Selection of Processors (Article 28(1))

The controller may only use processors that "provide sufficient guarantees to implement appropriate technical and organizational measures in such a manner that processing will meet the requirements of this Regulation and ensure the protection of the rights of the data subject."

This wording establishes a due diligence obligation in selection — not only at contract signing but on an ongoing basis.

Contractual Requirements (Article 28(3))

Processing by a processor must be governed by a contract or other legal act that binds the processor to the controller.

Minimum contents of the data processing agreement:

RequirementLegal basis
Processing only on documented instructions from the controllerArt. 28(3)(a)
Confidentiality commitment by authorized personnelArt. 28(3)(b)
Implementation of all measures required under Article 32Art. 28(3)(c)
Compliance with conditions for sub-processorsArt. 28(3)(d)
Assistance with data subject rightsArt. 28(3)(e)
Assistance with obligations under Articles 32–36 (security, notifications, impact assessments)Art. 28(3)(f)
Deletion or return of data after contract terminationArt. 28(3)(g)
Making available all information to demonstrate compliance, enabling audits and inspectionsArt. 28(3)(h)

Sub-processing (Article 28(2) and (4))

The processor may not engage another processor without prior specific or general written authorization from the controller.

In case of general written authorization, the processor must inform the controller of any intended changes and give them the opportunity to object.

When another processor is engaged, the same data protection obligations must be imposed. The original processor remains liable to the controller for the sub-processor's compliance.

Demonstrating Compliance (Article 28(5))

Adherence to approved codes of conduct (Article 40) or an approved certification mechanism (Article 42) may be used as an element to demonstrate sufficient guarantees.

Why Due Diligence Is Not a One-Off Exercise

The GDPR speaks of selecting a suitable processor — but the controller's obligations do not end at contract signing:

  • Article 28(3)(h) obligates the processor to make available all information necessary to demonstrate compliance and allow for audits and inspections
  • Article 32(1)(d) requires a process for "regularly testing, assessing and evaluating" the effectiveness of measures
  • Accountability under Article 5(2) requires the controller to be able to demonstrate compliance with data protection principles at any time

In practice, this means: An organization that engages a processor once and never checks again will struggle to demonstrate due diligence in case of damage. Initial due diligence becomes a recurring necessity.


Penalties (Article 83)

The GDPR provides for a two-tier penalty system:

ViolationFineLegal basis
Obligations of controllers and processors (Art. 8, 11, 25–39, 42, 43)Up to EUR 10 million or 2% annual turnoverArt. 83(4)
Processing principles, data subject rights, transfers to third countries (Art. 5–7, 9, 12–22, 44–49)Up to EUR 20 million or 4% annual turnoverArt. 83(5)
Non-compliance with an order by the supervisory authorityUp to EUR 20 million or 4% annual turnoverArt. 83(6)

The higher amount applies in each case.

Relevance for data processing and breach notification:

  • Violations of Article 28 (processing) and Article 32 (security) fall under the lower tier (up to EUR 10 million / 2%)
  • Violations of Article 33 (notification to authority) and Article 34 (communication to data subjects) also fall under the lower tier
  • However, failure to notify may additionally be considered a violation of Article 5 (accountability) — which can trigger the upper tier

When setting fines, Article 83(2) requires consideration of, among other factors: the nature, gravity, and duration of the infringement; intentional or negligent character; measures taken to mitigate damage; previous infringements; and cooperation with the supervisory authority.


GDPR Fines and Enforcement in 2025–2026

GDPR enforcement has accelerated sharply. Total fines since May 2018 now exceed €7 billion, with 2025 generating over €1.1 billion in penalties (374 individual fines) — and daily breach notifications exceeding 400 for the first time.

Major Enforcement Actions in 2025

TikTok — €530 million (May 2025) Ireland's Data Protection Commission fined TikTok €530 million for illegally transferring European Economic Area user data to servers in China, in violation of Chapter V transfer rules. Engineers in China were routinely able to access sensitive information belonging to EU residents, and TikTok failed to carry out adequate risk assessments regarding Chinese state surveillance laws.

Meta — €479 million (2025) A Madrid court found Meta had unlawfully processed user data, giving it an unfair advantage in the online advertising market and benefiting 87 Spanish media companies' legal claims.

Vodafone Germany — €45 million (2025) Germany's Federal Commissioner for Data Protection (BfDI) issued two fines: €15 million for poor internal data protection controls and €30 million for security flaws in handling customer data through customer portals and hotlines.

Capita plc (UK) — £14 million The UK Information Commissioner's Office fined Capita £14 million following a cyber-attack that exposed the personal data of 6.6 million people.

2026 Enforcement Priority: Transparency (Articles 12–14)

Following the EDPB's 2025 coordinated enforcement action on the right to erasure (Article 17), the EDPB announced on 14 October 2025 that the 2026 coordinated enforcement action will focus on transparency and information obligations under Articles 12 to 14 GDPR. Organizations without clear, complete, and accessible privacy notices face heightened supervisory scrutiny in 2026.

Enforcement is no longer reactive. Regulators are proactively auditing organizations, particularly for dark patterns in consent UIs, unlawful cross-border transfers, and inadequate breach notification procedures.


GDPR Compliance Software: What to Look For

The complexity of GDPR compliance — spanning data mapping, consent management, DPA tracking, breach notification, and continuous evidence collection — has created a mature market for compliance software. Key capabilities to evaluate:

CapabilityWhy it matters
Data mapping / RoPA automationMaintaining Article 30 records manually is error-prone at scale
DPA and subprocessor managementArticle 28 requires monitoring processors continuously, not once
Consent managementConsent logs must be auditable; cookie flows must not use dark patterns
Breach response workflows72-hour deadline requires pre-built notification templates and escalation paths
Continuous evidence collectionArticle 5(2) accountability requires always-available proof, not point-in-time snapshots
Data subject rights managementDSAR workflows must respond within one month
Cross-border transfer trackingPost-TikTok enforcement, transfer impact assessments need regular review

The leading platforms serve different segments: OneTrust and TrustArc for large enterprise privacy operations; Sprinto and Drata for continuous compliance automation; specialist tools for consent management (Cookiebot, Usercentrics). Orbiq's Trust Center addresses the specific challenge of demonstrating GDPR compliance externally — to customers, prospects, and auditors — through a centralized, always-current documentation hub.


ISMS and Trust Center: Two Sides of the Same Coin

GDPR requirements cannot be met with a single system. Governance requires structure — an ISMS is indispensable for this. However, Articles 28, 33, and 34 additionally require operational capabilities:

  • Breach notification within 72 hours — to supervisory authorities and, where applicable, data subjects
  • Documentation of all breaches — including those not subject to notification
  • Structured assessment and monitoring of processors
  • Demonstrable due diligence in selecting and continuously monitoring service providers

The Two Directions of a Trust Center

A Trust Center not only supports inbound assessment of your own service providers — it also solves a practical problem on the outbound side: Organizations acting as processors must provide their customers with the information required under Article 28(3)(h).

In practice, this means: Every potential or existing customer can — and will — request evidence. A Trust Center consolidates this documentation in one professional location:

DocumentPurposeGDPR Reference
Data Processing Agreement (DPA)Standard contract for signatureArt. 28(3)
Technical and Organizational Measures (TOMs)Evidence of security measuresArt. 32
List of Sub-processorsTransparency about sub-processorsArt. 28(2)
Certifications (ISO 27001, SOC 2)Evidence of sufficient guaranteesArt. 28(5), Art. 42
Audit reports and penetration test summariesIndependent assessment of measuresArt. 28(3)(h)
Security policiesDocumentation of internal processesArt. 32
Records of processing activitiesOverview of data processingArt. 30
Data Protection Impact Assessments (where applicable)Risk assessment for critical processingArt. 35

Without a Trust Center, this communication runs through email, individual requests, and manual processes — time-consuming, error-prone, and difficult to scale. With a Trust Center, reactive document searches become proactive demonstration of compliance.

The Dual Perspective

Many organizations are simultaneously controllers (vis-a-vis data subjects) and processors (vis-a-vis their customers). A Trust Center addresses both roles:

As a Controller (Inbound):

  • Assessment and monitoring of your own processors
  • Collection and maintenance of DPAs, TOMs, and certificates from service providers
  • Documentation of due diligence in selection

As a Processor (Outbound):

  • Provision of all evidence to customers in one place
  • Scalable response to security questionnaires and audits
  • Proactive transparency instead of reactive document searches

Organizations that connect both worlds are well-positioned: An ISMS for internal governance, a Trust Center for external communication — in both directions. This transforms compliance effort into a functioning system and documentation into true resilience. See also our guide on continuous monitoring for how to maintain always-current compliance evidence.


Sources & References

  1. Regulation (EU) 2016/679 (GDPR) – Full Text — Official Journal of the European Union. The complete text of the General Data Protection Regulation.
  2. GDPR Enforcement Tracker — CMS Law. Running total of GDPR fines issued across EU member states.
  3. DLA Piper GDPR Fines and Data Breach Survey: January 2026 — Annual survey of GDPR enforcement trends and fine volumes.
  4. EDPB 2026 Coordinated Enforcement Action Announcement — EDPB announcement (14 October 2025) of focus on Articles 12–14 transparency obligations for 2026.
  5. gdpr-info.eu – Article 28 (Processor) — Requirements for data processing agreements.
  6. gdpr-info.eu – Article 32 (Security of Processing) — Technical and organizational measures.
  7. gdpr-info.eu – Article 33 (Notification to Supervisory Authority) — 72-hour deadline for data breaches.
  8. gdpr-info.eu – Article 34 (Communication to Data Subject) — Communication in high-risk cases.
  9. gdpr-info.eu – Article 83 (General conditions for imposing administrative fines) — Penalty framework.
  10. EDPB – Guidelines 9/2022 on personal data breach notification — Guidelines on personal data breach notification (Version 2.0, March 2023).
  11. TikTok €530M fine — Ireland DPC (May 2025) — Ireland DPC enforcement action for unlawful data transfers to China.
  12. Surfshark Research: GDPR fines exceeded €1B in 2025 — Annual analysis of GDPR enforcement volume.

Related Reading

GDPR Compliance: Complete Guide for 2026 (Articles 28, 32, 33, 34) | EU Regulations