Data Privacy: The Complete Guide for Compliance and Security Teams
2026-03-08
By Emre Salmanoglu

Data Privacy: The Complete Guide for Compliance and Security Teams

Learn how to implement data privacy controls that satisfy GDPR, ISO 27001, SOC 2, NIS2, and DORA. Covers data classification, consent management, DPIAs, data subject rights, and compliance evidence.

data privacy
GDPR
data protection
privacy by design
compliance

What Is Data Privacy?

Data privacy is the discipline that ensures personal information is collected, processed, stored, and shared in compliance with legal requirements and individual rights. It governs the rules around how organisations handle personal data — from collection consent to deletion — and provides individuals with control over their information.

In the regulatory landscape of GDPR, CCPA, and emerging privacy laws worldwide, data privacy has become a board-level concern requiring dedicated processes, technologies, and governance structures.

Data Privacy Principles

PrincipleDescriptionGDPR Article
Lawfulness, fairness, transparencyProcess data legally, fairly, and transparentlyArt. 5(1)(a)
Purpose limitationCollect data for specified, explicit, legitimate purposesArt. 5(1)(b)
Data minimisationCollect only what is necessaryArt. 5(1)(c)
AccuracyKeep personal data accurate and up to dateArt. 5(1)(d)
Storage limitationRetain data only as long as necessaryArt. 5(1)(e)
Integrity and confidentialityProtect data with appropriate securityArt. 5(1)(f)
AccountabilityDemonstrate compliance with all principlesArt. 5(2)

Lawful Bases for Processing

Legal BasisWhen to UseExamples
ConsentIndividual freely gives informed agreementMarketing emails, cookies, analytics
ContractProcessing necessary to fulfil a contractOrder processing, service delivery
Legal obligationProcessing required by lawTax reporting, regulatory filings
Vital interestsProtecting someone's lifeEmergency medical data sharing
Public interestProcessing for public benefitPublic health, archiving
Legitimate interestsBusiness need balanced against individual rightsFraud prevention, network security

Data Subject Rights

RightGDPR ArticleResponse TimeKey Requirements
AccessArt. 151 monthProvide copy of all personal data
RectificationArt. 161 monthCorrect inaccurate data
ErasureArt. 171 monthDelete data when no longer needed
RestrictionArt. 181 monthLimit processing while disputes resolved
PortabilityArt. 201 monthProvide data in machine-readable format
ObjectArt. 211 monthStop processing for legitimate interests
Automated decisionsArt. 221 monthRight not to be subject to automated decisions

Privacy Impact Assessment (DPIA)

PhaseActivitiesOutput
ScreeningDetermine if DPIA is required (high-risk processing)DPIA necessity assessment
DescriptionDocument the processing activity, data flows, purposesProcessing description
Necessity assessmentEvaluate proportionality and data minimisationNecessity and proportionality analysis
Risk identificationIdentify risks to individuals' rights and freedomsRisk register
Risk mitigationDetermine measures to address identified risksMitigation plan
DPO consultationSeek Data Protection Officer guidanceDPO opinion
DocumentationRecord assessment, decisions, and residual risksDPIA report

Data Retention Framework

Data CategoryTypical RetentionLegal BasisDeletion Method
Customer contractsDuration + 6 yearsLegal obligation (statute of limitations)Secure deletion
Employment recordsDuration + 7 yearsLegal obligation (tax, employment law)Secure deletion
Marketing consentUntil withdrawnConsentImmediate removal
Website analytics26 monthsLegitimate interestAutomatic purge
Security logs1-5 yearsLegitimate interest / legal obligationAutomatic purge
Backup data90 days rollingLegitimate interestAutomatic rotation

International Data Transfers

MechanismUse CaseComplexity
Adequacy decisionTransfers to countries with adequate protectionLow
Standard Contractual Clauses (SCCs)Most common mechanism for third-country transfersMedium
Binding Corporate Rules (BCRs)Intra-group transfers in multinationalsHigh
DerogationsExplicit consent, contract necessityCase-by-case
EU-US Data Privacy FrameworkTransfers to certified US companiesMedium

Compliance Requirements

Framework Mapping

RequirementGDPRISO 27001SOC 2NIS2
Privacy policyArt. 13-14A.5.34P1.1Art. 21
Consent managementArt. 6-7A.5.34P3.1
Data subject rightsArt. 15-22A.5.34P4.1-P8.1
Records of processingArt. 30A.5.34P1.2
DPIAArt. 35A.5.34Art. 21(2)(a)
Data breach notificationArt. 33-34A.5.24CC7.3Art. 23
International transfersArt. 44-49A.5.34P5.1
Data protection officerArt. 37-39

Audit Evidence

Evidence TypeDescriptionFramework
Privacy policyPublished, current privacy noticeAll frameworks
Records of processing (RoPA)Complete inventory of processing activitiesGDPR, ISO 27001
Consent recordsEvidence of valid consent collection and managementGDPR
DPIA reportsCompleted assessments for high-risk processingGDPR, NIS2
Data subject request logRecords of requests received and responsesGDPR
Data processing agreementsContracts with processors under Article 28GDPR
International transfer mechanismsSCCs, BCRs, or adequacy documentationGDPR
Retention scheduleDocumented retention periods with legal basisAll frameworks

Common Mistakes

MistakeRiskFix
Relying on consent for everythingConsent fatigue, invalid consent, withdrawal riskUse appropriate legal basis — consent is one of six options
No data inventoryCannot comply with RoPA or data subject rightsCreate and maintain comprehensive data mapping
Ignoring retention periodsStoring data indefinitely increases breach impactImplement automated retention and deletion policies
Privacy policy as checkbox exerciseNon-compliance, enforcement actionEnsure policy reflects actual practices
No DPIA processMissing risk assessments for high-risk processingImplement DPIA screening and assessment process
Treating privacy as IT-onlyMissing business process and legal dimensionsCross-functional privacy programme with legal, IT, and business

How Orbiq Supports Data Privacy Compliance

Orbiq helps you demonstrate data privacy controls:

  • Evidence collection — Centralise privacy policies, DPIAs, RoPA, and consent records
  • Continuous monitoring — Track privacy control effectiveness and compliance rates
  • Trust Center — Share your privacy posture via your Trust Center
  • Compliance mapping — Map privacy controls to GDPR, ISO 27001, SOC 2, and NIS2
  • Audit readiness — Pre-built evidence packages for auditor and DPA review

Further Reading