Resources GDPR COMPLIANCE CHECKLIST: FOR NON-EU SaaS STARTUPS  
GDPR Docs

GDPR COMPLIANCE CHECKLIST: FOR NON-EU SaaS STARTUPS  

March 2026 min read

If your SaaS startup is based outside the EU but serves EU customers, tracks EU website visitors, or processes EU personal data in any way, the GDPR almost certainly applies to you. Non-compliance carries fines of up to 4% of global annual revenue, and regulators have proven willing to enforce against non-EU companies. TikTok (EUR 530M), Uber (EUR 290M), and Clearview AI (EUR 30.5M) are recent examples.

This document gives you everything you need to build a compliance program from scratch: how to determine if the GDPR applies, what to do first (appoint an EU Representative, map your data flows, pick your legal bases), how to handle international transfers with SCCs and Transfer Impact Assessments, and how to operationalize data subject rights, breach notification, and privacy by design. Every recommendation is tied to a specific GDPR article or EDPB guideline. A 50-item master checklist at the end lets you track progress across 10 compliance categories.

 

1. Why the GDPR Applies to Your Non-EU Startup

The General Data Protection Regulation (GDPR) has one of the broadest territorial scopes of any data protection law in the world. Under Article 3(2), the GDPR applies to organizations outside the EU/EEA that process personal data of individuals located in the EU when the processing relates to either (a) offering goods or services to those individuals, or (b) monitoring their behavior within the EU.

This means that a SaaS startup headquartered in, for example, the United States, India, or Singapore can be fully subject to the GDPR even without any physical presence in Europe, provided it deliberately targets EU customers or tracks their online behavior. (EDPB Guidelines 3/2018 on the Territorial Scope of the GDPR (Article 3), adopted 12 November 2019.)

1.1 The Targeting Criterion Explained

The EDPB Guidelines 3/2018 clarify that the GDPR does not apply merely because a website is accessible from the EU. Instead, regulators look for evidence of intentional targeting. Factors that indicate targeting include: offering content in an EU language (other than English, which is used globally), accepting payment in euros or other EU currencies, referencing EU customers or users, using an EU-specific top-level domain (e.g., .de, .fr), offering delivery to EU countries, and running marketing campaigns directed at EU audiences.

For SaaS startups, common triggers include: displaying pricing in euros, localizing the product interface for EU languages, running Google or Meta ads targeting EU countries, offering customer support during EU business hours, and including EU-specific legal terms such as a VAT number field during checkout.

1.2 The Monitoring Criterion

If your SaaS platform tracks the online behavior of individuals in the EU, you may also fall within scope under Article 3(2)(b). Monitoring includes tracking through cookies, device fingerprinting, analytics tools, behavioral profiling for personalization, location tracking, and any form of online behavioral analysis. The EDPB references Recital 24 of the GDPR, which specifically mentions internet tracking and profiling as activities that constitute monitoring.

Warning: If you use analytics tools like Google Analytics, Mixpanel, Hotjar, or Segment on users in the EU, you are likely monitoring their behavior and fall within scope. The CNIL (French DPA) has specifically taken enforcement action against the use of Google Analytics for transfers to the US.

1.3 Enforcement Is Real: Non-EU Companies Have Been Fined

Regulatory enforcement against non-EU companies is no longer theoretical. Major fines have been imposed on companies headquartered outside Europe:

Company / Case

Fine & Violation

Clearview AI (USA)

EUR 30.5 million (Dutch DPA, 2024). Scraped facial images from the internet without consent, built biometric database in violation of GDPR.

Uber Technologies (USA)

EUR 290 million (Dutch DPA, 2024). Transferred European drivers' personal data to the US without valid transfer mechanisms for over two years.

TikTok / ByteDance (China)

EUR 530 million (Irish DPC, 2025). Failed to protect EU user data from access by engineers in China; inadequate transfer impact assessments.

Meta Platforms (USA)

EUR 1.2 billion (Irish DPC, 2023). Transferred EU Facebook user data to the United States without compliant safeguards.

(CMS GDPR Enforcement Tracker. As of March 2025, cumulative GDPR fines exceeded EUR 5.65 billion across 2,245 published decisions.)

2. Appoint an EU Representative (Article 27)

If your startup is not established in the EU but processes personal data of EU individuals under Article 3(2), you are required under Article 27 GDPR to designate a representative in the EU. This representative serves as a point of contact for data subjects and supervisory authorities. The representative must be established in one of the EU/EEA Member States where data subjects whose personal data you process are located.

The representative is not a substitute for a Data Protection Officer (DPO), nor does their appointment shift your compliance obligations. The representative's name and contact details must be provided to data subjects (e.g., in your privacy policy) and to supervisory authorities upon request. (EDPB Guidelines 3/2018, Section 4 on obligations of non-EU controllers/processors.)

Practical Tip: Several specialized firms offer "EU Representative as a Service" (e.g., in Ireland, the Netherlands, or Germany). Costs typically range from EUR 100 to 500 per month for startups, depending on data volume. Your EU representative's details must appear in your privacy notice and be accessible on your website.

2.1 Exemptions from the Representative Requirement

The obligation to appoint a representative does not apply if: (a) processing is occasional, does not include large-scale processing of special category data or data relating to criminal convictions, and is unlikely to result in a risk to individuals; or (b) the controller is a public authority or body. For most SaaS companies processing EU customer data on an ongoing basis, the exemption will not apply.

3. Establish a Lawful Basis for Processing (Article 6)

Every processing activity must rely on one of the six lawful bases listed in Article 6(1) of the GDPR. For SaaS companies, the three most commonly relevant bases are: consent (Article 6(1)(a)), contractual necessity (Article 6(1)(b)), and legitimate interest (Article 6(1)(f)). Choosing the wrong legal basis is one of the most common causes of enforcement action.

Legal Basis

When to Use / SaaS Examples

Consent (Art. 6(1)(a))

Marketing emails, newsletter sign-ups, non-essential cookies and tracking, sharing data with third-party advertising partners. Must be freely given, specific, informed, and unambiguous. Must be as easy to withdraw as to give.

Contract (Art. 6(1)(b))

Processing necessary to deliver the SaaS service itself: account creation, billing, core feature functionality, customer support. Cannot be stretched to cover analytics or marketing.

Legitimate Interest (Art. 6(1)(f))

Fraud prevention, network security, product improvement analytics (with proper balancing test). Requires a documented Legitimate Interest Assessment (LIA). Not available for special category data.

Warning: The EDPB has issued Guidelines 2/2019 clarifying that Article 6(1)(b) cannot be used to justify all processing merely because a contract exists. For example, behavioral advertising is not "necessary" for the performance of a SaaS contract. LinkedIn was fined EUR 310 million in 2024 partly for relying on an invalid legal basis for targeted advertising.

4. Implement Data Subject Rights (Articles 12 to 22)

The GDPR grants individuals a comprehensive set of rights over their personal data. As a non-EU SaaS company, you must build the technical and organizational infrastructure to handle these requests. Under Article 12, you must respond to data subject requests within one calendar month of receipt, free of charge (with limited exceptions). The response period can be extended by two additional months for complex requests, but you must inform the data subject within the first month.

Right

Practical Implementation for SaaS

Right of Access (Art. 15)

Build a data export feature or internal process to compile all personal data held about a user, including logs, support tickets, and metadata.

Right to Rectification (Art. 16)

Allow users to update their profile information; have a process for correcting data in backend systems.

Right to Erasure (Art. 17)

Implement account deletion that cascades to backups, logs, and third-party sub-processors within a defined retention schedule.

Right to Restriction (Art. 18)

Ability to "freeze" data processing on a specific user's data while a dispute or request is being resolved.

Right to Data Portability (Art. 20)

Provide user data in a structured, machine-readable format (e.g., JSON or CSV export).

Right to Object (Art. 21)

Allow users to opt out of processing based on legitimate interest, especially for direct marketing.

Automated Decision-Making (Art. 22)

If you use algorithmic scoring, AI-based decisions, or automated profiling with legal or significant effects, you must provide meaningful information, human review, and the right to contest.

SaaS Implementation Tip: Build a self-service "Privacy Dashboard" in your app where users can view their data, download an export, request deletion, and manage consent preferences. This reduces manual DSAR handling overhead and demonstrates "privacy by design" under Article 25. Log all requests with timestamps for accountability under Article 5(2)

5. Create a GDPR-Compliant Privacy Notice (Articles 13 to 14)

Your privacy notice is one of the most visible elements of GDPR compliance and the first thing a regulator will examine. Articles 13 and 14 specify mandatory disclosures that must be provided in clear, plain language. The notice must be easily accessible (not buried in a Terms of Service document) and provided at the point of data collection.

5.1 Mandatory Content

Your privacy notice must include all of the following:

       Identity and contact details of the controller (your company) and your EU Representative (Article 27).

       Contact details of the Data Protection Officer (if applicable).

       The purposes of processing and the legal basis for each purpose.

       Categories of personal data collected.

       Recipients or categories of recipients (including sub-processors and third-party integrations).

       Details of any international transfers, including the transfer mechanism used (e.g., SCCs, adequacy decision) and how to obtain a copy.

       Retention periods or the criteria used to determine them.

       A clear list of data subject rights and how to exercise them.

       The right to lodge a complaint with a supervisory authority.

       Whether providing personal data is a statutory or contractual requirement.

       Information about automated decision-making and profiling, if applicable.

Warning: WhatsApp was fined EUR 225 million in 2021 for spreading required transparency information across multiple confusing documents instead of providing it clearly. Ensure your privacy notice is a single, cohesive, readable document. 

6. International Data Transfers (Chapter V, Articles 44 to 49)

For a non-EU SaaS startup, virtually all processing of EU personal data involves an international transfer. Chapter V of the GDPR requires that personal data transferred outside the EEA maintains a level of protection essentially equivalent to that guaranteed within the EU. Failure to implement a valid transfer mechanism is one of the most heavily fined violations. Uber was fined EUR 290 million in 2024 for operating without one.

6.1 Transfer Mechanisms

The GDPR provides several lawful bases for international transfers, in order of preference:

Adequacy Decisions (Article 45)

The European Commission can determine that a third country provides an adequate level of data protection. If your country has an adequacy decision, transfers do not require additional safeguards. Countries with adequacy decisions as of 2026 include: Andorra, Argentina, Canada (PIPEDA), Faroe Islands, Guernsey, Israel, Isle of Man, Japan, Jersey, New Zealand, Republic of Korea, Switzerland, the United Kingdom, Uruguay, and the United States (under the EU-US Data Privacy Framework for certified organizations). (European Commission adequacy decisions list.)

Standard Contractual Clauses (Article 46(2)(c))

SCCs are the most widely used transfer mechanism. The European Commission adopted modernized SCCs in June 2021 (Implementing Decision 2021/914), which are modular and cover four scenarios: controller-to-controller (C2C), controller-to-processor (C2P), processor-to-processor (P2P), and processor-to-controller (P2C). For a non-EU SaaS company receiving data from EU customers, Module 1 (C2C) or Module 2 (C2P) will typically apply.

Critical requirement: SCCs cannot be used on a standalone basis without a Transfer Impact Assessment (TIA). Following the Schrems II ruling (CJEU Case C-311/18), you must assess whether the laws of the destination country undermine the protections in the SCCs, and if so, implement supplementary measures. (EDPB Recommendations 01/2020 on supplementary measures, adopted 18 June 2021.)

Transfer Impact Assessments (TIAs)

A TIA involves: (1) identifying the transfer and the data involved; (2) identifying the transfer mechanism relied upon; (3) assessing whether the laws of the third country impinge on the effectiveness of the safeguards, focusing particularly on government surveillance and access laws; (4) identifying and adopting supplementary measures where necessary; and (5) re-evaluating at appropriate intervals. The EDPB Recommendations 01/2020 provide a six-step methodology and annex of possible supplementary measures, including technical measures (encryption with EU-held keys), contractual measures (commitments to challenge disproportionate access requests), and organizational measures (transparency reporting, internal policies).

US-Specific: The EU-US Data Privacy Framework

On 10 July 2023, the European Commission adopted an adequacy decision for the EU-US Data Privacy Framework (DPF). US companies that self-certify through the DPF (administered by the International Trade Administration of the US Department of Commerce) can receive EU personal data without SCCs. However, the DPF applies only to certified organizations, and your certification must be current. If your SaaS startup is US-based, DPF certification is the simplest transfer mechanism, but it is subject to potential legal challenge (as the two predecessor frameworks, Safe Harbor and Privacy Shield, were both invalidated by the CJEU).

Warning: The DPF adequacy decision may face legal challenge. NOYB (the privacy advocacy group led by Max Schrems) has indicated intent to challenge it. Maintain SCCs as a fallback mechanism.

7. Sub-Processor Management (Article 28)

Most SaaS products rely on a chain of sub-processors: cloud infrastructure (AWS, GCP, Azure), email services (SendGrid, Mailgun), analytics (Mixpanel, Amplitude), payment processors (Stripe), customer support tools (Zendesk, Intercom), and more. Article 28 of the GDPR imposes strict requirements on the use of processors and sub-processors.

Key obligations include:

       Execute a written Data Processing Agreement (DPA) with every processor, containing all mandatory clauses from Article 28(3).

       Obtain prior specific or general written authorization from the controller before engaging sub-processors.

       If using general authorization, maintain a public list of sub-processors and notify controllers of intended changes, giving them the opportunity to object.

       Ensure each sub-processor is bound by equivalent data protection obligations.

       Ensure sub-processors located outside the EEA have a valid transfer mechanism in place.

SaaS Best Practice (Sub-Processor Page): Maintain a public "Sub-Processors" page on your website listing every third-party service that processes EU personal data. Include company name, purpose of processing, location, and transfer mechanism used. Provide an email subscription for sub-processor change notifications. Examples of companies doing this well: Notion, Slack, HubSpot, Stripe.

8. Data Protection by Design and by Default (Article 25)

Article 25 requires that data protection be embedded into the design of processing activities (by design) and that the most privacy-protective settings be applied as default (by default). This is not merely a policy statement; it requires concrete technical and organizational measures. (EDPB Guidelines 4/2019 on Article 25 Data Protection by Design and by Default, adopted 20 October 2020.)

Practical implementation for SaaS products:

       Data minimization: Collect only the personal data strictly necessary for each feature. Audit every form field and API parameter.

       Pseudonymization: Replace direct identifiers with pseudonyms in analytics pipelines and log systems.

       Encryption: Encrypt personal data at rest (AES-256) and in transit (TLS 1.2+). For transfers to third countries, consider client-side encryption where the decryption key is held in the EU.

       Access controls: Implement role-based access with least-privilege principles. Log all access to personal data.

       Default settings: User profiles should be private by default, data sharing should be opt-in, and marketing preferences should be off by default.

       Retention limits: Implement automatic data purging after defined retention periods. Do not retain data indefinitely "just in case."

9. Records of Processing Activities (Article 30)

Article 30 requires controllers and processors to maintain written records of their processing activities. While there is a limited exemption for organizations with fewer than 250 employees, the exemption does not apply if processing is not occasional, involves special category data, or is likely to result in a risk to rights and freedoms. Most SaaS companies processing EU customer data will not qualify for the exemption.

Your records must include:

       Name and contact details of the controller, DPO, and EU representative.

       Purposes of each processing activity.

       Categories of data subjects and personal data.

       Categories of recipients.

       Details of transfers to third countries, including the transfer mechanism.

       Retention periods.

       A general description of technical and organizational security measures.

Template Approach: Use a spreadsheet or dedicated tool (e.g., OneTrust, DataGrail, or even a simple Notion database) to maintain your ROPA. Review and update at least quarterly, or whenever you launch a new feature that processes personal data. Make the ROPA available to supervisory authorities upon request.

10. Data Protection Officer (Articles 37 to 39)

Appointing a DPO is mandatory under Article 37 if your core activities involve: (a) regular and systematic monitoring of data subjects on a large scale, or (b) large-scale processing of special categories of data. Many SaaS companies that provide analytics, marketing automation, health-tech, or ad-tech services will meet the first criterion.

Even if not legally required, appointing a DPO (or a privacy lead with equivalent responsibilities) is a strong signal to regulators and customers of your commitment to compliance. The DPO can be an internal employee or an external service provider, but must have expert knowledge of data protection law and practice, must operate independently, and must not have a conflict of interest. (EDPB Guidelines on Data Protection Officers, WP 243 rev.01, adopted 5 April 2017.

11. Data Breach Notification (Articles 33 to 34)

Under Article 33, in the event of a personal data breach, you must notify the relevant supervisory authority within 72 hours of becoming aware of the breach, unless the breach is unlikely to result in a risk to the rights and freedoms of individuals. If the breach is likely to result in a high risk to individuals, you must also notify the affected data subjects under Article 34, without undue delay.

Your notification must include:

       The nature of the breach, including approximate number of data subjects and records affected.

       Contact details of the DPO or other contact point.

       Likely consequences of the breach.

       Measures taken or proposed to address the breach and mitigate its effects.

Incident Response Plan (Essential Elements): Pre-drafted notification templates for both DPA and data subject communications. A clear internal escalation chain: who determines if a breach is notifiable? Contact information for your lead supervisory authority (determined by your EU representative's location). A breach register documenting all incidents, even those not notified, per Article 33(5). Regular tabletop exercises to test your response time against the 72-hour deadline.

Warning: Meta was fined EUR 251 million in December 2024 partly for failing to properly document a 2018 breach and not including all required information in its initial notification to the Irish DPC.

12. Data Protection Impact Assessments (Article 35)

A DPIA is required before any processing that is likely to result in a high risk to the rights and freedoms of individuals. Article 35(3) identifies three situations where a DPIA is always required: (a) systematic and extensive profiling with significant effects; (b) large-scale processing of special category data; and (c) systematic monitoring of publicly accessible areas on a large scale.

The EDPB has also published criteria for identifying high-risk processing: if a processing activity meets two or more of nine criteria (evaluation/scoring, automated decision-making, systematic monitoring, sensitive data, large scale, data matching, vulnerable data subjects, innovative use, and transfer outside the EEA), a DPIA is likely required. (EDPB Guidelines on DPIA, WP 248 rev.01. Also see national DPA DPIA "blacklists" of processing operations that always require a DPIA.)

A DPIA must contain:

       A systematic description of the processing operations and purposes.

       Assessment of the necessity and proportionality of the processing.

       Assessment of risks to data subjects.

       Measures to address identified risks.

13. Cookie Consent and ePrivacy Compliance

While cookie regulation falls primarily under the ePrivacy Directive (2002/58/EC) as implemented by EU Member States, the GDPR defines how consent must be obtained. For SaaS companies with web-facing products, this means implementing a cookie consent management platform (CMP) that: clearly categorizes cookies (strictly necessary, functional, analytics, marketing); does not pre-check optional categories; provides a genuine "Reject All" option as prominent as "Accept All"; does not use dark patterns to push users toward consent; and logs and stores proof of consent.

Warning: The CNIL fined Google EUR 150 million and Facebook EUR 60 million in 2022 for making it significantly easier for users to accept cookies than to refuse them.

14. Key EDPB Guidelines Reference Table

The European Data Protection Board issues guidelines that, while not legally binding, represent the authoritative interpretation of the GDPR by EU regulators. Below is a reference table of the most relevant guidelines for non-EU SaaS companies.

Guideline

Relevance

Guidelines 3/2018: Territorial Scope (Art. 3)

Defines when GDPR applies to non-EU entities.

Guidelines 05/2021: Art. 3 / Chapter V Interplay

Clarifies what constitutes an international transfer.

Recommendations 01/2020: Supplementary Measures

Post-Schrems II guidance on SCCs and TIAs.

Guidelines 2/2019: Art. 6(1)(b) Online Services

Limits on using "contract" as legal basis for online services.

Guidelines 4/2019: Art. 25 DPbD & DPbDefault

Practical measures for privacy by design.

Guidelines 07/2020: Controller / Processor

Defines roles and responsibilities.

Guidelines 02/2024: Article 48 (Third Country Authorities)

Handling government access requests from non-EU authorities.

WP 243: Data Protection Officers

When a DPO is required and their role.

WP 248: DPIA Guidelines

When and how to conduct DPIAs.

15. Master GDPR Compliance Checklist for Non-EU SaaS Startups

Use this checklist to assess your current compliance status. Each item maps to a specific GDPR article or EDPB guideline discussed in this document. Check off items as you complete them. Items marked with an asterisk (*) are particularly high priority based on enforcement trends.

A. Scope & Governance

     Determined whether GDPR applies to your organization under Article 3(2) (targeting/monitoring criteria).

     * Appointed an EU Representative under Article 27 and published their details in your privacy notice.

     Appointed or assessed the need for a Data Protection Officer under Article 37.

     Designated an internal privacy lead/owner responsible for GDPR compliance.

     Established a GDPR compliance budget and roadmap.

B. Legal Basis & Documentation

     Mapped all processing activities involving EU personal data (ROPA under Article 30).

     * Identified and documented a lawful basis (Art. 6) for each processing activity.

     Where relying on consent, ensured it meets GDPR standards: freely given, specific, informed, unambiguous, and easy to withdraw.

     Where relying on legitimate interest, completed and documented a Legitimate Interest Assessment (LIA).

     Identified processing activities involving special category data (Art. 9) and ensured explicit consent or other Art. 9(2) condition.

C. Transparency & Privacy Notice

     * Published a GDPR-compliant privacy notice containing all Article 13/14 mandatory information.

     Privacy notice is written in clear, plain language and is easily accessible.

     Privacy notice discloses identity of controller, EU representative, DPO (if any), purposes, legal bases, recipients, transfers, retention, and rights.

     Separate, age-appropriate notice if your product may be used by children (under 16, or under 13 in some Member States).

D. Data Subject Rights

     Built technical capability to respond to data access requests (Art. 15) within one month.

     Implemented data portability (Art. 20): export in structured, machine-readable format (JSON, CSV).

     * Implemented right to erasure (Art. 17): account deletion cascades to backups, logs, and sub-processors.

     Implemented right to restriction (Art. 18): ability to freeze processing on a per-user basis.

     Implemented right to object (Art. 21): opt-out mechanism for direct marketing and legitimate interest processing.

     If using automated decision-making with significant effects, implemented Art. 22 safeguards (human review, explanation, right to contest).

     Established a process for handling DSARs, including identity verification, logging, and response tracking.

E. International Data Transfers

     * Identified all cross-border data flows involving EU personal data.

     * Implemented a valid transfer mechanism for each flow: adequacy decision, SCCs (2021 version), DPF certification, or BCRs.

     Completed a Transfer Impact Assessment (TIA) for each transfer relying on SCCs, following EDPB Recommendations 01/2020.

     If US-based: self-certified under the EU-US Data Privacy Framework (if relying on DPF).

     Implemented supplementary technical measures where TIA identifies risk (e.g., encryption with EU-held keys).

     Maintain SCCs as a fallback mechanism even if relying on an adequacy decision or DPF.

     Schedule periodic re-assessment of TIAs (at least annually or upon legal changes).

F. Sub-Processor & Vendor Management

     * Executed Data Processing Agreements (DPAs) with all processors/sub-processors per Article 28.

     Published a public sub-processor list with company names, purposes, locations, and transfer mechanisms.

     Established a sub-processor change notification process (email subscription or equivalent).

     Verified that each sub-processor has its own GDPR compliance measures and valid transfer mechanisms.

     Included audit rights in DPAs and conduct or review processor audits/certifications (e.g., SOC 2, ISO 27701).

G. Security & Privacy by Design

     * Encrypt personal data at rest (AES-256) and in transit (TLS 1.2+).

     Implement role-based access control with least-privilege principles.

     Pseudonymize or anonymize personal data in analytics and development environments.

     Default privacy settings: profiles private, sharing opt-in, marketing off by default.

     Conduct regular penetration testing and vulnerability assessments.

     Implement logging and monitoring of access to personal data.

     Define and enforce data retention schedules with automated purging.

H. Data Breach Response

     * Documented incident response plan with 72-hour DPA notification workflow.

     Pre-drafted notification templates for supervisory authority and data subjects.

     Established internal escalation chain for breach detection and classification.

     Maintain a breach register (Art. 33(5)) documenting all incidents, including non-notifiable ones.

     Conduct regular breach response tabletop exercises.

     Identified lead supervisory authority based on EU representative's location.

I. DPIAs & Risk Management

     Identified processing activities that require a DPIA under Article 35.

     Completed DPIAs for all high-risk processing activities before launch.

     DPIAs include: description, necessity/proportionality assessment, risk assessment, and mitigation measures.

     Consulted the DPO (if appointed) during the DPIA process.

     Established a process for prior consultation with the supervisory authority (Art. 36) if residual risk remains high.

J. Cookies & Consent Management

     Implemented a Cookie Consent Management Platform (CMP) on all web properties.

     Cookie banner categorizes cookies (necessary, functional, analytics, marketing) with no pre-checked boxes.

     "Reject All" option is as prominent and accessible as "Accept All."

     No non-essential cookies fire before user provides affirmative consent.

     Consent records are logged and stored for accountability purposes.

16. GDPR Penalty Framework

Understanding the penalty structure helps prioritize compliance efforts:

Tier

Maximum Fine & Applicable Violations

Tier 1 (Art. 83(4))

Up to EUR 10 million or 2% of total worldwide annual turnover, whichever is higher. Applies to: violations of controller/processor obligations (Arts. 8, 11, 25 to 39, 42, 43), including failure to maintain records, failure to notify breaches, failure to conduct DPIAs, and failure to appoint a DPO.

Tier 2 (Art. 83(5))

Up to EUR 20 million or 4% of total worldwide annual turnover, whichever is higher. Applies to: violations of core principles (Art. 5), lawfulness of processing (Art. 6), consent conditions (Art. 7), special category data (Art. 9), data subject rights (Arts. 12 to 22), and international transfer rules (Arts. 44 to 49).

In practice, supervisory authorities consider: the nature, gravity, and duration of the infringement; whether it was intentional or negligent; actions taken to mitigate damage; degree of cooperation with the authority; any previous infringements; and the categories of personal data affected. Proactive compliance efforts, including DPIAs, DPO appointment, and incident response readiness, are taken into account as mitigating factors.

17. Recommended Next Steps

Phase 1: Foundation (Weeks 1 to 4)

       Conduct a data mapping exercise to identify all EU personal data flows.

       Appoint an EU Representative (Article 27).

       Draft and publish a GDPR-compliant privacy notice.

       Execute DPAs with all processors and sub-processors.

Phase 2: Infrastructure (Weeks 5 to 12)

       Implement data subject rights workflows (access, deletion, portability, objection).

       Put in place SCCs (or verify DPF certification) for all international transfers.

       Complete Transfer Impact Assessments.

       Implement cookie consent management.

Phase 3: Maturity (Ongoing)

       Conduct DPIAs for high-risk processing activities.

       Build and test incident response plan with 72-hour notification capability.

       Train all employees who handle personal data.

       Schedule quarterly ROPA reviews and annual TIA re-assessments.

       Monitor EDPB guidance and enforcement developments for changes that affect your compliance posture.