AI governance is the process by which organizations and societies regulate artificial intelligence to ensure its ethical, fair, and abides by legal application. 

With artificial intelligence (AI) shaping critical aspects of life and business, governance stands as a guardian of values and norms in the burgeoning digital age. This article will guide you through the importance, approaches, and impact of AI governance, providing insight into its role in our increasingly AI-driven world.

Key takeaways

Understanding AI governance

AI governance. This term encompasses the complex set of regulations, policies, and standard practices that guide the ethical, responsible, and lawful employment of AI technologies. The objective within this domain is two-fold: 

  1. Maximize the benefits offered by AI, while simultaneously 
  2. Addressing a multitude of challenges, including data security breaches and moral dilemmas.

As AI prevalence increases across various sectors, it becomes paramount to uphold public confidence by ensuring transparency and accountability in how AI systems operate. The evolution of AI will inevitably be shaped by a confluence of factors, such as advances in technology, prevailing societal norms/values, and ongoing international partnerships.

Defining AI governance

The continuum of AI governance ranges from less structured to highly formalized systems, designed specifically to tackle the ethical implications associated with AI technologies. Governance that is informal typically originates from a company’s core values and might include ethics committees that operate without strict frameworks.

On the other hand, ad hoc governance presents itself as a more defined system set up to address particular challenges linked to AI by creating explicit policies, practices, and protocols for governance.

AI governance aims and objectives

AI governance aims to ensure that AI’s benefits are widely accessible, that AI initiatives resonate with societal values, and that responsible AI is promoted. Upholding principles such as fairness, transparency, and accountability is essential for integrating ethical considerations into business goals within every application of artificial intelligence.

The scope of governance around AI technologies

Governance of AI is an extensive field that includes ethical, legal, societal, and institutional dimensions. It devises strategies to guarantee that AI operations conform to organizations’ objectives while adhering to ethical norms. The governance approach differs across regions, from the thoroughgoing EU AI Act to emerging structures in the U.S., yet it converges on a unified objective: preemptively handling risks and safeguarding public well-being.

As AI technologies progress swiftly and have widespread effects internationally, it is imperative to adopt a judicious method for governing AI. Such governance must encourage creativity while simultaneously mitigating hazards and maintaining social values.

Why we really need AI governance 

AI governance is not merely a set of guidelines; it’s a necessity in the modern era, where AI systems profoundly influence various aspects of our daily lives. The need for AI governance stems from the potential risks and ethical dilemmas posed by autonomous systems. Without proper governance, AI could exacerbate social inequalities, invade privacy, or make unaccountable decisions with far-reaching consequences.

Let’s look at some of the key reasons AI governance is considered essential:

The establishment of AI governance is based on a foundation of legal frameworks and regulations designed to oversee the creation and implementation of artificial intelligence (AI) systems. Across the globe, there exists a varied regulatory environment for AI, highlighted by national approaches such as that adopted by Singapore and legislation like the European Union’s Artificial Intelligence Act that steers how AI is utilized.

With the advancement in AI technology comes an increase in the complexity surrounding compliance with laws and regulations, bringing up new challenges, including algorithmic accountability and consideration of what roles legal professionals will play going forward.

Understanding AI regulation

Regulation of AI is encompassed by both global and domestic structures. Legislation such as the GDPR exerts influence on AI by enforcing rigorous protections for personal data and privacy across the European Union. The EU, along with organizations like UNESCO, has crafted policies and ethical guidelines that emphasize human-centered principles in the development of AI.

The rapid escalation in data acquisition and analysis has raised apprehensions regarding individual privacy, necessitating stringent management and compliance with regulatory standards such as those established by the GDPR.

Below, we’ve listed some of the key Al regulations and regulatory proposals in 2024.

Name: AI Bill of Rights

Region: U.S. 

Description: Focuses on ensuring fairness, privacy, and transparency in AI systems.

More Info: Link


Name: Algorithmic Accountability Act

Region: U.S.

Description: Mandates impact assessments for AI systems used in critical sectors such as finance and healthcare.

More Info: Link


Name: Digital Services Oversight and Safety Act

Region: U.S.

Description: Mandates transparency reports, algorithmic audits, and accountability measures to protect consumers and ensure safe use of digital services.

More Info: Link


Name: DEEP FAKES Accountability Act

Region: U.S.

Description: Requires creators and distributors of deepfake technology to include watermarks indicating altered media.

More Info: Link


Name: NIST’s AI Risk Management Framework

Region: U.S.

Description: Emphasizes a risk-based approach to ensure AI technologies are trustworthy, fair, and secure.

More Info: Link


Name: Artificial Intelligence and Data Act (AIDA)

Region: Canada

Description: Aims to regulate the use of AI for protecting personal data and ensuring ethical use.

More Info: Link


Name: Pan-Canadian Artificial Intelligence Strategy

Region: Canada

Description: Enhances investments in AI research while emphasizing ethical standards and inclusivity.

More Info: Link


Name: European Union’s Artificial Intelligence Act

Region: EU

Description: Comprehensive framework categorizing AI systems into risk levels (unacceptable, high, limited, minimal) and imposing strict requirements on high-risk systems.

More Info: Link


Image of a European Union flag in front of an office building
Recommended Reading
Understanding the EU AI Act

Unpack key provisions and future impacts of the European Union’s new Artificial Intelligence Act

The EU AI Act: Key provisions and future impacts icon-arrow-long

Name: Digital Services Act (DSA)

Region: EU

Description: Addresses the accountability of online platforms, including AI-driven services, focusing on transparency and user safety.

More Info: Link


Name: National AI Strategy

Region: UK

Description: Focuses on maintaining leadership in AI innovation while promoting ethical AI and robust safety standards.

More Info: Link


Name: AI White Paper

Region: UK

Description: Proposes flexible regulatory frameworks to encourage innovation while ensuring AI technologies are trustworthy and transparent.

More Info: Link


Name: AI Development Plan

Region: China

Description: Emphasizes becoming a global leader in AI by 2030, with a focus on innovation, data protection, and international collaboration.

More Info: Link


The interplay between AI governance and laws

The governance of AI is deeply intertwined with legal structures. Legislation dictates the application of AI, while simultaneously, AI systems are deployed to manage and comply with multifaceted legal regulations. In America, government-led efforts and directives from entities such as the Federal Trade Commission bolster governance related to AI, illustrating how closely linked law and governance truly are.

Incorporating AI into strategies for governance, risk management, and compliance is crucial for adeptly maneuvering through these complex regulatory environments.

Legal regulations provide both limitations and inspiration for AI development, driving the creation of solutions that not only comply with but surpass legislative expectations. The EU AI Act and GDPR stand as exemplary examples of regulations that encourage the production of AI systems that are secure, reliable, and safe. AI systems are crafted to ensure adherence to legal norms, showcasing a harmonious relationship between innovation in technology and compliance with the law.

It is crucial to maintain a balance between rapid technological advancement and rigorous adherence to ethical and legal principles to foster sustainable innovation in artificial intelligence.

Establishing responsible AI practices in your business

Organizations must embed ethical considerations within their AI governance frameworks to guarantee the responsible application of AI’s potential. This requires not merely the creation of ethical guidelines but also adherence to legal standards and risk management pertaining to AI deployment. Achieving this lays down a solid base for fostering responsible AI development.

The role of AI ethics boards

Corporate AI ethics boards focused on AI play a critical role in maintaining the integration of ethical considerations within these evaluation metrics. They do so by implementing Key Performance Indicators (KPIs), which include measures like rate of bias detection and scores related to adherence to ethics.

Ethics boards focused on corporate AI have a crucial role in upholding ethical standards, which include:

Crafting ethical guidelines

Established on the foundation of universal principles, ethical guidelines for AI dictate that developers and regulators create AI systems that promote fairness, transparency, and privacy protection. These ethical AI practices are not static. Rather, they’re integrated into all stages of the life cycle of an AI system—including design, deployment, and ongoing supervision.

Ensuring high-quality data governance practices to prevent historical biases from infiltrating datasets is a critical component in fostering non-discriminatory ethical practices throughout the development of AI. Constructing centers dedicated to excellence in AI demonstrates a forward-thinking approach towards managing governance over these intelligent systems. Such hubs unite various experts to carefully consider both costs and ramifications brought about by increasing automation levels.

Ensuring compliance and risk management

Navigating the intricate landscape of AI regulations and data protection statutes is a crucial component of governing AI, essential to mitigating legal exposure and cultivating ethical practices in managing data.

Employing artificial intelligence for predictive analytics within risk management — key for detecting potential system malfunctions or regulatory non-compliance — underscores the importance of utilizing high-grade training datasets. This ensures biases are minimized, guaranteeing that decisions made by AI align with human ethical standards.


AI pentesting offering
Thoropass's AI pentesting offering ensures secure and ethical use of AI

Manage AI-related risk and ensure compliance with new and emerging AI frameworks with AI pentesting.

Join the waitlist icon-arrow-long

Incorporating human oversight

Within the realm of AI governance, ensuring that human oversight is integral acts as a safeguard to keep AI systems in check and accountable, especially when there are instances of mistakes or harm. Having an established process for appeals and human evaluation of decisions made by AI is crucial not just for retaining control over results but also for shielding institutions from the reputational harm that could stem from biases or inaccurate information.

Implementing effective AI governance strategies

To ensure responsible AI systems are managed effectively, a strategic approach to AI governance is essential. This includes the establishment of robust structures for responsible AI governance that offer specialized knowledge, attention to detail, and clear responsibilities—alongside ongoing evaluation of data quality and results.

The commitment to shaping society beneficially via artificial intelligence is embodied by the AI Governance Alliance. Its role in promoting innovation throughout various sectors underlines this dedication.

Continuous monitoring and adaptation of AI systems

Consistent supervision is crucial in the realm of AI governance to spot any discrepancies in performance, maintain accountability logs, and uphold adherence to regulatory standards. 

To prevent declines in functionality and certify that the desired results are achieved, it’s essential that organizations conduct ongoing surveillance, refinement, and verification of their AI models. The implementation of artificial intelligence for automated oversight concerning compliance can be an effective strategy to meet intricate regulatory requirements including privacy laws such as GDPR.

Assessing both the economic returns and supplementary benefits yielded by artificial intelligence offers quantifiable indicators that gauge fiscal prudence as well as extra gains provided by these services.

Conclusion: Effective and ethical AI management is key

As we navigate the complexities of AI governance, it is clear that while challenges abound, the roadmap for ethical and effective AI management is being charted with a focus on trust, transparency, and legal adherence. 

By implementing robust governance frameworks and engaging in continuous dialogue and innovation, we can ensure that AI serves the greater good, reflecting our highest values and standards.

More FAQs

The concept of AI governance encompasses a structured set of guidelines and practices aimed at the ethical, responsible, and lawful deployment of artificial intelligence. By emphasizing principles such as fairness and transparency, AI governance addresses risks while enhancing benefits to ensure that the application of AI resonates with societal values and objectives.

Human oversight is a central component of AI governance, and it is necessary to maintain accountability, ensure ethical decision-making, and uphold trust in AI systems.

Diverse teams that make up AI ethics boards play a pivotal role in AI governance by maintaining ethical standards, evaluating the conformity of AI systems to established ethical guidelines, and guaranteeing they meet societal expectations for oversight.

By involving stakeholders, AI governance is enhanced through the promotion of transparency, consideration of a variety of viewpoints, and the establishment of more inclusive and accountable policies for AI development.


Wondering about the differences between GDPR (General Data Protection Regulation) and CCPA (California Consumer Privacy Act)? You’re not alone. Grasping the similarities and differences between these two compliance standards is critical for any business handling personal data, as compliance is not a one-size-fits-all solution.

In this blog post, we’ll provide a comprehensive and strategic comparison of how GDPR and CCPA define personal data, enforce user rights, and stipulate compliance, helping you identify key actions for your data governance strategy. Step into this guide to succinctly discern the implications for your organization amid the GDPR vs CCPA debate.

Key takeaways

Common ground: The goals and scope of GDPR and CCPA

At their core, both the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are committed to bolstering individuals’ data privacy. 

However, they also present unique characteristics: 

Grasping how CCPA vs GDPR aligns and diverges is key for entities aiming to maintain adherence to these regulations.

Though their reach may vary, both GDPR and CCPA share an underlying objective: To significantly raise standards around user privacy protections. These frameworks compel organizations not just to secure personal data, but also affirmatively respect people’s rights.

GDPR versus CCPA at-a-glance

GDPR

Became effective: May 25, 2018

Protects: Any data subject in the EU (or other GDPR countries)

Targets: Data controllers. All businesses and their entities (website and mobile application) that personally process data of people in the European Union(EU), including not-for-profits and e-commerce are considered to be a data controller.

User rights (high level):

Cookie opt-in/opt-out:

Possible fines: The penalty for non-compliance with the GDPR may be up to either:

Required oversight: Requires the hiring of a Data Protection Officer (DPO) to oversee compliance and act as a liaison for audit purposes.

Enforced by: EU Commission and Member State(s)


Flags of GDPR countries in the European Union on display
Recommended reading
The role of a Data Protection Officer: A complete guide

Understand the role of a DPO and the benefits they bring to your organization

The role of a Data Protection Officer in GDPR compliance—a complete guide icon-arrow-long

CCPA

Became effective: Jan 1, 2020

Protects: Consumers who are residents of the California region

Targets: Businesses operating in California that also:

User rights (high level):

Cookie opt-in/opt-out:

Possible fines: Fines range from $2500 per unintentional violation to $7500 per intentional violation with no maximum penalty outlined by the law.

Required oversight: CCPA has no equivalent requirement for oversight

Enforced by: California Attorney General 

Let’s look at the key differences in greater detail.

Defining personal data and information under GDPR and CCPA

The GDPR and the CCPA both aim to protect personal privacy but adopt different scopes when it comes to what constitutes personal data and information. The GDPR broadly includes various types of data within its protective scope, while the CCPA specifically targets information pertinent to consumers, devices, and households in a narrower fashion.

Personal data under GDPR

Under the GDPR, personal data encompasses any information that can identify or be associated with a natural person who is either identified or identifiable. 

This expansive interpretation includes not only conventional identifiers like names and IP addresses but also captures information from wearable technologies and locational details—thereby sweeping an extensive array of informational content into its regulatory orbit. 

The notion of personal data incorporates sensitive elements concerning multiple facets of individual identity, such as:

The broad characterization at the heart of GDPR’s strategy provides a foundational architecture designed to acknowledge the complex dimensions through which identity is reflected and address the diverse processes by which personal data may be handled and put at risk.

Personal Information under CCPA

Under the CCPA, personal information extends beyond mere data points. It encompasses details that characterize a particular consumer, their device, or household. The legislation defines this type of information in broad terms but with precision, encompassing any data that:

This definition serves as an expansive definition of what constitutes personal information.

Reflective of its purpose to safeguard consumers within and outside individual contexts, the CCPA targets protection at both singular levels and across wider living situations involving interactions with various devices. It casts a wide net over several types of data—from biometric particulars to internet search histories—effectively enveloping the routine online activities engaged by California residents within its sphere of safety.

Entities affected: Data controllers vs businesses

Within the landscape of data protection regulations, entities have unique roles: Companies are subject to the CCPA, and data controllers operate under GDPR guidelines. Each operates with different sets of instructions and complies with various requirements dictated by their governing laws.

Data controllers under GDPR

Under the GDPR, entities known as data controllers hold authority over collecting and processing personal data belonging to EU residents. These can be organizations of different kinds—including businesses and public authorities—that shape how personal data is processed. The responsibility they shoulder includes guaranteeing that all handling of personal information adheres to the stringent regulations set out by the GDPR from its initial collection through to final processing.

Not only must these data controllers comply with regulations themselves, but they are also responsible for ensuring their appointed data processors operate within the parameters of GDPR compliance. This dual level of accountability reflects the regulation’s broad strategy in protecting individuals’ personal information, advocating a cooperative model where every party involved shares a commitment to uphold privacy standards.

Businesses under CCPA

The California Consumer Privacy Act (CCPA) applies to for-profit entities operating within the state that meet certain thresholds. To fall under its jurisdiction, a business must either:

Businesses meeting any one of these criteria are required to comply with CCPA mandates.

Through this strategic targeting, the CCPA ensures accountability among those enterprises that have significant influence over consumer privacy and pushes them toward adopting data handling practices that are both transparent and respectful of consumers’ private information.

User rights granted by GDPR and CCPA

While there is an overlap in certain respects between both the CCPA and GDPR regarding user rights, both directives have exclusive provisions that align with their respective objectives for safeguarding privacy.

Common rights in GDPR and CCPA

The rights to be informed and data portability are shared passports in the GDPR and CCPA world, allowing individuals to travel through the data landscape with insight and agency. 

These common rights empower users to not only receive information about the processing of their personal data, but also to transfer it from one service provider to another, promoting a fluid data ecosystem that respects user autonomy.

Alongside these rights, both regulations mandate that organizations provide timely responses to user requests, ensuring that the dialogue between data subjects and entities is both efficient and constructive.

Distinct rights in GDPR and CCPA

Although the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) share some similarities, each regulation provides unique rights that mirror their separate goals. 

The GDPR’s provision to challenge automated decision-making and profiling underscores the European Union’s dedication to creating digital environments with a human focus. In contrast, the CCPA offers individuals the right to opt out of both selling and sharing their personal information, which marks an era of increased consumer power in how personal data is commercially utilized.

These specific rights illustrate each law’s underlying philosophy toward protecting user privacy, from GDPR’s defense mechanisms against algorithmic control to CCPA’s protections designed as a defense against unwarranted trading of personal data. They capture what lies at the core of each framework—respecting individual autonomy over one’s own information in relation to data protection practices.

The foundations of GDPR and CCPA are robustly established in the realm of data processing and consent, but they diverge in their respective approaches. The GDPR mandates unequivocal prior consent before any data processing can take place, whereas the CCPA advocates for an opt-out approach, granting individuals the liberty to withdraw from specific uses of their data.

The General Data Protection Regulation (GDPR) mandates that consent is an essential condition for legal data processing, and it cannot be treated as a mere formality. It’s imperative that organizations obtain explicit consent, ensuring the individual consciously engages in granting permission. Consent must adhere to several strict criteria.

Users should navigate through this process with language that is both accessible and straightforward.

To obtain user consent, the GDPR delineates six lawful grounds under which personal data may be processed. This creates a comprehensive framework wherein personal data handling can occur within legal boundaries if it strictly complies with the demanding provisions of the regulation.

CCPA: Opt-out options and default data processing

Unlike the GDPR, which requires prior consent, the CCPA permits the default handling of personal information but ensures that consumers have access to options for opting out. This reflects a strive to balance facilitating business activities with protecting consumer rights by granting California residents the autonomy to withdraw from data collection as they desire.

Under CCPA regulations, explicit permission is not necessary to store cookies. A straightforward mechanism for users to opt-out must be in place. This showcases a sophisticated stance on data processing that considers both consumer interests and business necessities.

Enforcement and penalties

Both the GDPR and the CCPA are equipped with their own arsenal of punitive measures designed to thwart non-compliance and uphold individuals’ data rights. The GDPR threatens tougher consequences, including higher fines for breaches, while the penalties associated with the CCPA also underscore the necessity of complying with its requirements.

GDPR: National data protection authorities and fines

The responsibility for implementing the GDPR’s rules lies with national data protection authorities throughout the EU. These regulators carry the authority to ensure compliance and have at their disposal formidable punitive measures that can significantly impact even well-established companies, imposing fines up to €20 million or 4% of a firm’s annual global turnover, depending on which amount is higher.

Such severe penalties underscore a stern warning to companies across the globe: Take data protection seriously. The scale of potential sanctions under the GDPR underscores how committed the EU is to maintaining premier privacy protections for its Citizens.

CCPA: California attorney general and penalties

The California Privacy Protection Agency is empowered by the CCPA to enforce the state’s data protection laws, demonstrating a rigorous commitment to safeguarding consumer data rights. Companies that fail to comply with these regulations may be subject to fines as high as $7,500 for each deliberate infraction.

The CCPA enables consumers directly affected by violations of data protection rules not only to rely on the California Privacy Protection Agency but also to pursue legal action themselves. This mechanism ensures individuals can vindicate their data rights and demand accountability from corporations mishandling their information.

Preparing for compliance: Best practices and solutions

Navigating the complexity of data protection rules demands strategic planning and actionable measures. Adopting best practices, including Privacy by Design and utilizing compliance management tools, can act as navigational aids to steer companies through the intricacies of GDPR and CCPA compliance with assurance.

When organizations embrace these best practices and implement solutions, they are positioned to:

Thus, achieving compliance transcends mere adherence to a legal requirement. It becomes an intelligent investment in the longevity and success of a company’s future.

Your path to GDPR and CCPA compliance with Thoropass

Okay, that may have been a scary read. If we’ve got your attention, let us now offer some reassurance. 

Chat with our compliance experts: A free 15-minute AMA 

Let’s chat. Connect with a compliance expert to find out how GDPR and/or CCPA applies to your business — no strings attached. Book a chat here.

Our 5-step approach makes GDPR  or CCPA/CPRA a cinch (okay, not quite a cinch, but as easy as it can get!)

Learn more here!

More FAQs

GDPR is applicable to any entity involved in processing personal data of residents from the EU, whereas CCPA emphasizes granting transparency and control over personal information specifically for those residing in California, targeting businesses that function within the state.

Organizations handling personal data of residents from the EU are required to adhere to GDPR standards, and profit-oriented companies in California that either exceed $25 million in yearly revenue or deal with the personal information of more than 100,000 individuals residing in California must conform to CCPA regulations.

No, the GDPR and CCPA do not share identical definitions for personal data and information. The GDPR articulates that it encompasses any information pertaining to an identified or identifiable natural person. On the other hand, under the CCPA, personal data is described as information that can be associated with a particular consumer, device, or household.

Organizations that fail to adhere to GDPR regulations may face penalties as steep as €20 million or 4% of their annual global turnover. Similarly, under the CCPA, intentional violations can incur fines of up to $7,500 for each instance. Consumers have the right to seek statutory damages.

Ensuring compliance with these regulatory standards is imperative for organizations in order to prevent significant monetary sanctions.


Businesses need clear action items to comply with GDPR. Our GDPR compliance checklist delivers exactly that. Straight to the point, you’ll find the necessary steps to safeguard personal data and adhere to the regulation, offering peace of mind as a concise, step-by-step guide that fits real-world applications.

Key takeaways

Understanding GDPR: Key concepts and terminology

The General Data Protection Regulation (GDPR) is a pivotal legislative framework in the European Union governing the collection and handling of personal data. It encompasses a variety of information types, including:

Such information is considered ‘personal data’ under GDPR when it can be linked to an identifiable person.

In the context of GDPR, the term ‘data controller’ refers to the entity that determines the purposes and methods of processing personal data. This can be any organization or individual, including governmental bodies or agencies. Conversely, ‘data processors’ are entities that manage data on behalf of the controllers. Data controllers bear specific responsibilities to protect vulnerable groups, such as children, from potential risks when engaging with online commercial services.

Special safeguards are mandated for ‘sensitive personal data,’ which includes details like:

The GDPR insists on keeping all personal data up-to-date and accurate to respect and protect individual rights and freedoms. It empowers individuals with several rights regarding their data, including but not limited to accessing their data, correcting inaccuracies, and requesting erasure—which are key to managing personal data responsibly.

Seven steps to building an effective compliance strategy

Developing a robust strategy for GDPR compliance is critical to fully adhere to data protection laws. Steps that should be considered include:

Adhering to these steps can help you craft a well-rounded strategy for achieving GDPR compliance.

The cornerstone of any successful GDPR compliance plan is establishing a legitimate basis for processing personal data. It’s imperative for organizations to have documented justification as part of their commitment to complying with the regulation under GDPR efforts. Implementation of effective cybersecurity measures such as encryption alongside organizational controls are crucial elements in fostering sound decision-making practices around adherence to regulations on protecting personal information.

Ensuring that consent and communication protocols adhere to GDPR standards is crucial for compliance. Important considerations include:

Individuals whose personal data is being collected need to receive transparent information about how their information will be processed and secured right at the point of collection. This includes insights into automated decision-making procedures. Clear-cut authorization from data subjects is mandatory for utilizing their information in activities such as digital marketing or email campaigns, with adherence to verification norms like double opt-ins.

User experience needs to take precedence when designing mechanisms for gaining consent. They should offer clear access while enabling an efficient closed-loop system tailored specifically per request. Documenting each instance of given consent forms is necessary to demonstrate compliance efforts by chronicling precisely what was agreed upon during the consenting process.

2. Technical and organizational measures

The GDPR mandates that data protection should be integrated as a standard practice. From the outset of designing systems to their final implementation, adequate technical and organizational measures are required. One such measure is ensuring only authorized individuals have access to personal data through comprehensive access controls, including user authentication protocols and role-based permissions.

It’s also fundamental for organizations to maintain regular backups of data, which serve dual purposes: Safeguarding against loss of information and enabling swift restoration following an incident. These backups ought to be securely kept and subjected to frequent reliability checks. To safeguard privacy during personal data processing, techniques like encryption and pseudonymization are advocated within GDPR guidelines. Such methods render the data less directly identifiable while increasing its security.

For adherence to GDPR provisions, organizations must put in place expedited processes for detecting personal data breaches quickly. These procedures include timely reporting mechanisms as well as efficient investigative responses when issues arise. Conducting periodic evaluations on risks posed by third-party partners is crucial in upholding compliance standards under the GDPR framework.

3. Upholding the rights of data subjects

Upholding the rights of data subjects is a fundamental aspect of adhering to the General Data Protection Regulation (GDPR). This regulation empowers individuals with the authority over their personal data, allowing them to request access, rectification, erasure, and portability of their information. 

Organizations are required to fulfill data subject access requests by providing details in a format that is straightforward and easy for the individual to understand. These details must include what types of personal data are being processed, why it’s collected, who it might be shared with, and how long it will be kept.

In dealing with these access requests from data subjects, organizations have an obligation to respond promptly within a 30-day time frame while also confirming the requester’s identity so as not to risk unauthorized disclosure or alteration of personal information. 

Should an organization find a request baseless or unduly burdensome after careful evaluation, it may decline such demands. Organizations are required to provide a clear explanation when denying such requests. They must develop and implement procedures that ensure compliance with the GDPR framework and are prepared to promptly and accurately verify the identities of those making inquiries.

4. Appointing a Data Protection Officer (DPO)

The position of the Data Protection Officer (DPO) is central to the strategy for complying with GDPR. Even if not mandated by law, having a DPO can significantly contribute to consistent adherence and application of GDPR regulations within an entity. Thus, it’s vital for organizations to stay informed about the guidance provided by data protection authorities on achieving compliance with GDPR.

A multitude of duties falls upon a DPO, which include:

For effective execution of these roles, it’s imperative that a Data Protection Officer possesses advanced understanding and expertise in relation to laws surrounding personal data, as stipulated by the GPDR framework. This specialized knowledge base is essential not just for adhering fully to legal requirements, but also for safeguarding sensitive information held by organizations.

5. Staff training and awareness

Educating employees and creating awareness about GDPR regulations is a critical component of achieving compliance with the General Data Protection Regulation. By embedding data protection principles across all levels within an organization, it helps to:

When personnel are adequately informed about protocols for handling personal data, they gain clarity on their duties as well as insight into the hazards related to processing such sensitive information. The implementation of operational security policies plays an essential role in this educational process by highlighting how crucial secure practices are in preventing unauthorized access or damage to individuals’ personal details.

6. International data transfers and compliance

The General Data Protection Regulation (GDPR) extends its authority to cover international transfers of data. Transferring personal data to non-EEA countries is only allowed when the European Commission confirms through an adequate decision that the country in question upholds a comparable level of data protection. To remain compliant, organizations involved in such transfers must continuously verify that these adequacy decisions are still valid.


Flags of GDPR countries in the European Union on display
Recommended reading
Which countries are covered by GDPR?
Which countries are covered by GDPR icon-arrow-long

If there’s no existing adequacy decision, organizations have other mechanisms at their disposal, like Standard Contractual Clauses or Binding Corporate Rules for safeguarding transferred personal data. Standard Contractual Clauses address various transfer situations, including those from controller-to-controller and processor-to-processor exchanges. Alternatively, binding corporate rules enable large corporate groups to implement uniform global policies ensuring consistent protection of personal information across all affiliated companies.

Carrying out a comprehensive data protection impact assessment is critical for maintaining GDPR compliance with regard to cross-border transfers. This involves examining not just the details surrounding the transfer but also scrutinizing how well-protected individual rights are under the destination country’s legal framework. Under certain circumstances outlined by GDPR derogations, it might be possible to transfer personal data without standard protective measures. This includes instances where explicit consent has been given or, if necessary, for substantial public interest reasons.

7. Addressing data breaches and incident response

Should a data breach occur, the GDPR prescribes stringent protocols for reporting such incidents and responding to them. 

Organizations have an obligation to inform relevant supervisory authorities within 72 hours after they become aware of any data breaches. This notification must detail the specifics of the incident, explain why there might be a delay if it wasn’t reported within this timeframe, and should include information on which personal data records were impacted and how many data subjects were affected.

When a breach is considered to represent a high risk to individuals’ privacy rights and freedoms (data subjects), organizations must adhere to several additional directives.

Conducting a GDPR audit

An essential step in GDPR compliance is conducting a GDPR audit. Organizations should carry out an information audit to understand the data they hold and map the data flow within the company to verify compliance. The audit process should review how the organization handles data subject information, focusing on:

In addition to internal processes, the audit must also assess all third-party relationships, including data processors and vendors, to ensure that data exchange is in compliance and that data processing agreements are in place. 

After completing the audit, organizations should review the findings, document data protection impact assessments for high-risk data processing activities, and maintain comprehensive audit trails for accountability, including how they process data.

Monitoring and maintaining GDPR Compliance

Maintaining GDPR compliance is an ongoing endeavor, necessitating:

It’s advisable for entities to carry out audits related to GDPR compliance on a yearly basis or more frequently should there be substantial adjustments involving data protection protocols, breach prevention strategies, or integration of new technological systems. 

Upholding meticulous records of all processing endeavors and robust practices in managing data are pivotal for exhibiting adherence to regulations, which can be corroborated through consistent auditing and systematic record-keeping.

Get expert guidance on data privacy and GDPR

Navigating the complexities of GDPR compliance and data privacy can be challenging for organizations. Seeking expert guidance can help businesses ensure they meet GDPR and protect their customers’ personal data. Connect with a compliance expert to find out how GDPR applies to your business—no strings attached. Book a chat with an expert here.

Our 5-step approach makes GDPR much easier to navigate:

Conclusion: GDPR is an ongoing journey, not a destination

Adhering to GDPR standards is an evolving process rather than a final goal. This process necessitates continuous alertness, perpetual learning, sturdy procedures, and a deep-rooted culture of data privacy. In our modern digital era, protecting personal information goes beyond fulfilling legal obligations. It reflects your organization’s dedication to those it serves.

More FAQs

GDPR is a comprehensive data protection and privacy regulation enacted by the EU. It applies to organizations worldwide that target or collect data related to people in the EU.

To become GDPR certified, you need to demonstrate a reasonable level of security by using internationally recognized standard security controls. There are no specific requirements or official certification for GDPR.

To be GDPR compliant, organizations need to keep records of processing activities, maintain an up-to-date data mapping, and collect and process personal data of users fairly, securely, and lawfully, disclosing details about data handling to users. Compliance also includes the lawful purpose for data collection.

Non-compliance with GDPR can result in penalties of up to €20 million or 4% of global revenue, whichever is higher. It is crucial for businesses to ensure compliance with GDPR regulations to avoid such severe penalties.

The key principles of GDPR are grounded in lawfulness, fairness, transparency, purpose limitation, data minimization, accuracy, storage limitation, integrity, confidentiality, and accountability. These principles form the foundation of the regulation and guide its implementation in data protection.


As an organization navigating the complexities of GDPR, it’s essential to be well-versed in the rights of data subjects. These rights are the cornerstone of GDPR, designed to empower individuals with the control and management of their personal data. 

This blog post will clarify these data subject rights, ensuring that your organization is compliant and respectful of the privacy and autonomy of the individuals whose data you handle.

Key takeaways

Empowering individuals through data control: The eight fundamental rights

Under GDPR, EU citizens have eight fundamental rights that grant them increased control over their personal data. These essential provisions range from ensuring individuals are well informed about the use of their information to granting them the ability to object to certain forms of data processing, and they constitute the foundation for organizations’ compliance with GDPR.

By championing these rights, the GDPR has transformed individuals into proactive stakeholders in terms of their own data protection rather than being simply bystanders. This pivotal transformation within data protection law emphasizes a new dynamic characterized by heightened transparency, accountability, and reverence for individual personal information between entities and individuals.

1. The right to be informed (GDPR Articles 12 to 14)

Under the GDPR, individuals possess a foundational right to be informed. Organizations are mandated to deliver clear, succinct, and comprehensible information regarding the collection, utilization, and processing of personal data. The provision of this information should be straightforwardly accessible and typically comes at no expense to the individual.

This right encompasses situations involving automated decision-making methods like profiling or any type of automated processing. Organizations must convey significant details about such processes’ underlying rationale, along with their potential outcomes and planned impacts. This requirement ensures that individuals can grasp and contest decisions generated exclusively through automatic means without human intervention.

2. The right to rectification (GDPR Article 16)

Individuals have the right under the GDPR to rectify any personal data that is inaccurate or incomplete held by organizations. This vital entitlement allows individuals to keep their personal records precise and current, promoting data accuracy and integrity.

It is incumbent upon data controllers to manage and refresh their information continuously. They must routinely scrutinize and correct personal data as necessary so that it remains both accurate and comprehensive. Adhering to this practice is essential for maintaining continual compliance with GDPR.


Recommended reading
Step-by-step guide to GDPR compliance
Navigate GDPR certification: Your step-by-step compliance guide icon-arrow-long

3. The right to be forgotten/right to erasure (GDPR Article 17)

The right to erasure, also known as the right to be forgotten, is a fundamental aspect of the GDPR. This allows individuals under specific circumstances to seek the removal of their personal data. These instances might include when the purpose for which the data was originally collected no longer applies, an individual has retracted consent, or there’s a lack of a lawful basis for its processing.

Should an individual put forward a legitimate erasure request, it becomes incumbent upon data controllers to undertake appropriate measures aimed at notifying other controllers about eliminating any links, copies, or duplicates of said data. This action honors and upholds an individual’s decision regarding how widely their personal information should remain accessible within various databases managed by different controllers.

4. The right to data portability (GDPR Article 20)

The right to data portability, a notable element of the GDPR, empowers individuals to obtain their personal data from a controller in a structured, widely accepted, and machine-readable format. They have the authority to request this information be transferred directly to an alternate controller.

This provision grants individuals increased control over their personal data by simplifying the process of transferring it between service providers. To ensure ease of transfer for users exercising their right to data portability, controllers must supply this data in organized formats like CSV, XML, or JSON that are readily usable by other controllers.

5. The right to restrict processing (Article 18)

Under specific conditions, individuals are entitled to exercise their right to limit the processing of their personal data. This restriction can be applied in situations where:

This right to restrict processing stands as an essential element within GDPR. It empowers individuals with control over how their personal information is processed and safeguards their rights concerning the privacy and protection of their data.

6. The right to withdraw consent (GDPR Article 7)

Under the GDPR, individuals maintain the fundamental right to retract their consent for data processing whenever they choose. This retraction is pivotal in affirming an individual’s authority over how their personal data is handled.

It should be noted that even after consent has been withdrawn, any previous processing of personal data that took place while consent was given remains legitimate. The lawfulness of the prior data handling activities is not retroactively altered by withdrawing consent.

7. The right to access (GDPR Article 15)

Under the GDPR, individuals are endowed with a significant right known as the right to access. This enables them to:

Entities must furnish this information when asked, usually without imposing any fee. Such a mandate augments transparency around processing activities and gives individuals enhanced power to oversee how organizations handle and process their personal information.

8. The right to object (GDPR Article 21)

Under Article 21, individuals are empowered with the ability to object to processing personal data on certain legal bases or for particular reasons. This prerogative is applicable in instances such as when personal data is utilized for direct marketing purposes, during the performance of duties serving the public interest, or while exercising official authority granted to a controller.

Should an individual exercise this right to object, it becomes incumbent upon organizations to halt any processing of that person’s data unless they can establish overriding lawful grounds justifying their actions. The provision bolsters people’s autonomy over how their information is handled and ensures greater alignment between the organizational use of personal data and the privacy expectations and interests of individuals.

Ensuring compliance and handling disputes

Maintaining GDPR compliance and effectively managing data subject disputes are key elements of data protection. This involves:

Violations related to consent can result in substantial fines under the GDPR, making it crucial for organizations to have robust systems in place for managing data subject requests and disputes. By proactively managing these elements, organizations can ensure GDPR compliance, protect the rights of data subjects, and safeguard their reputation.

Role of the Data Protection Officer (DPO)

Maintaining adherence to GDPR requirements is a critical responsibility of your organization’s Data Protection Officer (DPO). It’s incumbent upon the DPO to verify that personal data pertaining to employees, clients, and other individuals concerned with data privacy are handled in accordance with prevailing data protection legislation.e


Recommended reading
A complete guide to DPOs in GDPR compliance
The role of a data protection officer in GDPR compliance icon-arrow-long

Fulfilling this pivotal role demands from the DPO:

Managing data subject requests efficiently

Effective handling of data subject requests is essential for adherence to GDPR mandates. The process includes:

Integrating automated tools for detecting and categorizing information can improve an organization’s capacity to promptly address data subject requests. By optimizing this procedure, organizations can maintain GDPR compliance while promoting a respect-driven approach toward managing the rights of data subjects.

Resolving data subject disputes

Addressing disputes with a data subject requires a legal obligation to provide clear reasons for any refusal to comply with a data subject’s request and inform the person of their rights to file a complaint or seek legal recourse. It is imperative that organizations maintain clarity in their communications and effectively convey information to ensure transparency with the data subject.

When an organization does not adhere to the specified time frame for responding to Data Subject Access Requests (DSAR), it risks enforcement measures and potential financial penalties under GDPR regulations. As such, it’s vital that organizations establish comprehensive mechanisms for managing conflicts about data subjects’ rights.

How Thoropass can help with GDPR compliance

Grasping the intricacies of GDPR rights is vital for both individuals and entities. Such rights grant individuals dominion over their personal data while obligating organizations to be responsible for how they handle data processing.

Connect with our compliance experts to find out how GDPR applies to your business — no strings attached. Book a chat here.

Our 5-step approach makes GDPR a cinch (okay, not quite a cinch, but as easy as it can get!)

More FAQs

GDPR’s fundamental rules encompass doctrines like legality, fairness, and transparency. They also include concepts of restricting the use of data to its intended purposes, minimizing the amount of collected data, maintaining accuracy in stored information, limiting how long data is kept, and upholding both integrity and confidentiality.

The objective behind these principles is to safeguard personal privacy rights as well as secure individuals’ data from misuse or unauthorized access.

Under the GDPR, data subjects are entitled to several rights regarding their personal information—there are eight rights. These include the right to request correction of their data, deletion, portability, or to impose limitations on or voice objections against its processing. In the article above, we outlined the eight fundamental rights of data subjects.

Under the GDPR, organizations are required to maintain transparency by clearly communicating with individuals about how their personal data is collected, processed, and utilized. This information should be readily available and typically provided at no charge to the individual.

This obligation guarantees that individuals comprehend the handling and utilization of their data.

A Data Protection Officer (DPO) is tasked with overseeing an organization to adhere to data protection regulations when handling personal data. The Data Protection Officer (DPO) plays a critical role that differs from that of a data controller. While a data controller is responsible for determining the purposes and means of processing personal data, the DPO is tasked with ensuring that the organization processes the personal data of its staff, customers, providers, or any other individuals (also referred to as data subjects) in compliance with the applicable data protection rules.

Should an organization not adhere to the mandated timeframe for addressing a Data Subject Access Request (DSAR), it may face penalties and enforcement measures as per GDPR regulations.

It is essential for organizations to comply with the specified deadline in order to avoid any fines associated with non-compliance.


A GDPR data breach can be devastating. Understanding and reacting appropriately is vital. If you or your organization is faced with handling such a scenario, this guide clarifies the steps required by GDPR, the deadlines to observe, and the strategies to mitigate repercussions. 

Key takeaways

Understanding GDPR data breaches

So, what exactly is a GDPR data breach? It’s more than just loss or theft of data. The GDPR defines a personal data breach as a security incident that results in:

A personal data breach can profoundly affect individuals’ privacy and data protection. Remember: The data at stake here is personal, sensitive, and valuable. It’s the kind of information that can be exploited for identity theft, fraud, and other cybercrimes. 

Personal data and GDPR

Under the GDPR, personal data is any information related to an identified or identifiable living individual. In other words, if it can be used to directly or indirectly identify a person, it’s personal data. 

The GDPR defines a “personal data breach” in Article 4(12) as: “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed.”

Even if the personal data transmitted has been de-identified, encrypted, or pseudonymized, it still falls under the realm of GDPR as long as it can be used to re-identify an individual. It’s like a jigsaw puzzle: Even if the pieces are scattered, they hold value as long as they can be assembled to form a picture.

However, data that has been rendered fully anonymous, ensuring the individual is not identifiable, is not classified as personal data according to GDPR. To continue the simile: That’s less like a jigsaw and more like a shredded document that can’t be put back together.

Furthermore, GDPR’s application to personal data is technology-agnostic, encompassing both automated and manual processing across all forms of storage. This includes everything from digital databases to physical personal data records. So, whether it’s names, addresses, email addresses, ID card numbers, or online identifiers, it’s all personal data under GDPR, and the personal data records concerned are subject to the same regulations.

Common causes of data breaches

Let’s explore some common causes of data breaches. Understanding these causes can help you strengthen your organization’s defenses.

Weak and stolen credentials, application vulnerabilities, and malware are often used in cyberattacks to bypass security and gain unauthorized access to data. 

But that’s not all: Social engineering tactics are employed to deceive individuals into providing access to sensitive data, leading to breaches. Even within an organization, excessive permissions and insider threats can result in data being copied, altered, or stolen by those with authorized access.

User error, often related to improper configuration of systems, is another prevalent cause of data breaches due to mistakes in handling sensitive information. 

Finally, let’s not forget physical attacks, such as unauthorized entry to secure facilities, which represent a distinct threat to data security.

The 72-hour Rule: Reporting a data breach under GDPR

Under GDPR, organizations must report certain types of personal data breaches to the relevant supervisory authority within 72 hours of becoming aware of the breach. This is known as the 72-hour rule. 

But it goes further than mere reporting: Organizations are obliged to begin an investigation urgently, allocate sufficient resources, and report the breach within this 72-hour period, even if full details are not yet available. 

Remember, these rules apply to any entity established in the EU or those that process the personal data of EU residents. So, whether you’re in the heart of Europe or halfway across the world, if you’re dealing with the personal data of EU residents, the 72-hour rule applies to you. The European Data Protection Board is crucial in ensuring compliance with these regulations.


Flags of GDPR countries in the European Union on display
Recommended reading
Which countries are covered by GDPR?
Which countries are covered by GDPR icon-arrow-long

An efficient system is crucial to detect and report breaches promptly. This system should include clear procedures for staff to follow in the event of a data breach, ensuring swift action to mitigate any potential harm.

Read more: Understanding the GDPR breach notification timeline: A step-by-step guide

When to notify data protection authorities

Not all breaches are created equal. Data breaches should be assessed on a case-by-case basis to determine the risk to the rights and freedoms of individuals. As indicated by Article 4(12), the GDPR only applies when there is a personal data breach.

In the event of a personal data breach, the following steps should be taken:

These steps are necessary to ensure accountability under GDPR.

Consequences of late or inadequate reporting of a personal data breach

Failing to notify the relevant supervisory authority of a notifiable breach can result in a significant fine. It’s not just a slap on the wrist. The stakes are high, with organizations potentially being fined up to £8.7 million or 2% of their global turnover for failing to report a data breach in compliance with GDPR.

But it’s more than just financial penalties. Non-compliance can also result in supervisory authorities enforcing compliance through various measures.  Specifically, not reporting a data breach within the 72-hour timeframe can incur additional fines and penalties. Therefore, punctuality and thoroughness in reporting are crucial in managing a GDPR data breach.

Crafting an effective data breach response plan

When a data breach occurs, it’s easy to panic. But with a comprehensive data breach response plan, you can confidently navigate the situation. Such a plan is essential to:

Developing an Incident Response Plan (IRP) that addresses all phases of a data breach is fundamental to managing data breaches effectively under GDPR. This includes establishing robust breach detection, investigation, and internal reporting procedures. Upon identifying a breach, immediate steps include containment and assessment of the potential adverse consequences for individuals.

An effective data breach response plan also encompasses steps such as communication protocols, which guide the organization during a breach incident. Remember, this plan must be regularly reviewed and updated to maintain relevance with the current GDPR requirements and to cope with new security threats. It’s not a one-time effort but a continuous process of improvement.

Roles and responsibilities

In the event of a data breach, it’s all hands on deck. Everyone has a role to play. Designating a Data Protection Officer enhances an organization’s compliance readiness and data protection capabilities.

Data controllers are responsible for working with processors to ensure timely breach notification. In case of a data breach, processors are mandated to inform the data controller without undue delay. The responsibilities within a breach response team can include:

Communication and documentation

The GDPR mandates that all organizations keep a record of any personal data breaches, detailing the facts, effects, and remedial actions taken. 

Documenting breaches enables supervisory authorities to verify compliance with GDPR. Lack of such documentation can result in scrutiny and consequences for non-compliance. Therefore, records of data breaches must be clear and comprehensive, allowing for verification of the breach’s nature, response actions taken, and the decision-making process.

Effective GDPR data breach communication involves:

Informing data subjects about a data breach

When a data breach occurs, it isn’t just the supervisory authorities that need to know. Organizations must also inform data subjects—the people whose personal data has been compromised—about a data breach when it is likely to result in a high risk to their rights and freedoms. It’s about respecting the rights of individuals and giving them the information they need to protect themselves.

Article 34(1) of the GDPR states: “When the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall communicate the personal data breach to the data subject without undue delay.”

Notifying data subjects about a data breach must be done without delay. The notice should include:

If direct notification to data subjects would involve disproportionate effort, alternate methods like public communication may be used, as long as they inform data subjects in an equally effective manner. It’s all about communication that is timely, clear, and respectful.

When to notify data subjects

But when exactly should you notify data subjects? Data subjects must be notified if the breach will likely result in a high risk to their rights and freedoms. The GDPR underscores the need for a subjective assessment, focusing on the nature, severity, and potential consequences of the breach, to determine this level of risk.

Notifying data subjects is optional if the data breach is unlikely to result in a high risk to their rights and freedoms. The decision to notify data subjects (or not) hinges on evaluating the risk presented to the rights and freedoms of natural persons. It’s a delicate balancing act, weighing the severity of the breach against the potential impact on individuals.

Preventive measures to mitigate data breach risks

As the saying goes, prevention is better than cure. This is especially true for data breaches. Implementing robust security measures such as encryption and Data Loss Prevention (DLP) tools is essential to protect personal data in compliance with GDPR mandates. 

But it’s not just about technology. Organizations should also develop strong internal policies, including: 

Furthermore, Identity and Access Management (IDAM) practices should be implemented to strictly control access to personal data. And don’t forget about third-party risk management, which involves managing and monitoring risks associated with vendors who process personal data. It’s a multi-faceted approach that covers all bases.

Data security best practices

So, what are some data security best practices to protect personal data under GDPR? 

Regular Data Protection Impact Assessments help uphold GDPR’s ‘protection by design and by default’ principles by identifying and mitigating risks in specific data processing activities. 

Regular risk assessments

Regular risk assessments are like regular health check-ups—they can identify potential issues before they become serious problems. GDPR risk assessments are a systematic process for identifying, evaluating, and mitigating risks associated with processing personal data. 

Establishing a risk assessment framework with clear criteria and thresholds guides the assessment process and ensures a thorough analysis of risks. Each data processing activity should be regularly assessed against GDPR rules to identify areas of non-compliance and develop remediation plans. 

The risk assessment should focus on the potential negative consequences for individuals, assessing the severity and likelihood of adverse effects. 

How Thoropass can help with GDPR compliance

Every data breach is unique, and managing it requires a nuanced approach. It’s about staying vigilant, being prepared, and acting swiftly and effectively when a breach occurs. Connect with our compliance experts to find out how GDPR applies to your business — no strings attached. Book a chat here.

Our 5-step approach makes GDPR a cinch (okay, not quite a cinch, but as easy as it can get!)

More FAQs

You should notify the Attorney General’s Office before affected individuals in case of a data breach. If more than 1,000 individuals are affected, consumer reporting agencies must also be notified. Additionally, it’s important to notify law enforcement, other affected businesses, and the affected individuals.

A “breach” according to GDPR, is an accidental or unlawful loss, access, alteration, or disclosure of personal data records, whether malicious or unintentional.

The key components of a robust breach response plan include defining roles and responsibilities, conducting pre-planning exercises, establishing response teams, and regularly reviewing and updating the plan. These elements are crucial for an effective response to a breach.

 


The General Data Protection Regulation (GDPR) is a comprehensive data protection law that governs how organizations handle personal information within the EU.

GDPR certification demonstrates your organization’s commitment to protecting personal data, according to the EU’s strict standards. While it’s not mandatory, certification can significantly enhance your organization’s credibility. 

In this blog post, we’ll explore the key steps, the role of accredited certification bodies, and the strategic advantages of being GDPR-certified.

Key takeaways

Understanding GDPR certification

Being GDPR compliant is mandatory for those operating within the EU, but achieving GDPR certification is not. So why would you bother? While there isn’t a European Data Protection Seal at the EU level, certification demonstrates your organization’s commitment to data privacy and security. Certification, in turn, can be used to your advantage in marketing materials and beyond, enhancing trust with stakeholders and providing a competitive edge. 

So, what does it take to get certified? In short, certification involves a detailed evaluation by an accredited body, which assesses whether an organization’s data handling practices meet GDPR requirements. This process may include steps like: 

GDPR certification is valid for three years, after which organizations must renew to prove ongoing compliance. It is a tangible asset for organizations to validate their dedication to protecting personal data, potentially simplifying processes for data processors and increasing overall transparency.

The role of certification bodies

Certification bodies play a crucial role in the GDPR certification process. They are accredited by supervisory authorities to evaluate and certify that organizations meet the requirements of GDPR. Their assessments are thorough, examining an organization’s data protection policies and practices to ensure compliance with the regulation.

Art. 42 Certification

The Member States, the supervisory authorities, the Board and the Commission shall encourage, in particular at Union level, the establishment of data protection certification mechanisms and of data protection seals and marks, for the purpose of demonstrating compliance with this Regulation of processing operations by controllers and processors.

To become a certification body, an organization must demonstrate its independence, expertise, and the establishment of clear procedures to avoid conflicts of interest. The certifications they provide are valid for three years, after which an organization must renew its certification to continue demonstrating its commitment to GDPR compliance.

Certification bodies are important because they help organizations understand what is required for GDPR certification. They don’t just assess organizations but also guide them in maintaining high data protection standards, assuring stakeholders that the organization’s data handling is trustworthy.

The benefits of being GDPR-certified

There are numerous advantages to obtaining GDPR certification. It is a testament to an organization’s unwavering dedication to safeguarding data privacy, building trust with consumers and partners, and streamlining compliance efforts, especially for data processors. 

In a digital landscape fraught with security breaches, having GDPR certification is like reinforcing your ship; it mitigates the chances of data leaks and bolsters an organization’s standing as a sentinel of information security.

The perks of being GDPR-certified include:

GDPR certification serves as a beacon, directing organizations through the complex seas of data protection. It not only offers protection from the repercussions of non-compliance but also propels them to the forefront, marking them as entities that take the privacy rights of their clientele to heart.

Your path to GDPR compliance: A structured approach

Embarking on the journey to GDPR certification requires a structured and methodical approach. Before setting sail, organizations must first:

This structured approach is essential, as it allows for an in-depth readiness assessment that gauges the current state of compliance and involves key stakeholders in effectively addressing GDPR obligations.

Conducting a gap analysis

Before beginning the certification process, the first step is to check your organization’s current data protection practices and see where they might not fully meet GDPR standards. This check is called a gap analysis. 

Once you know the problems, you need to document them and prioritize the most important fix. The gap analysis helps you focus on the biggest issues and plan out how to tackle them one by one. With a clear list of what needs to be done, you can start working on fixing each issue, moving your organization closer to being fully compliant with GDPR.

Doing a gap analysis is more than just a paperwork exercise, however. It’s a strategic step that helps you prepare for getting certified. It gives you a clear picture of what needs to change, so when you make those changes, you know they’re the right ones that will help you meet all the GDPR requirements.

Implementing technical and organizational measures

As the journey to GDPR compliance continues, implementing technical and organizational measures becomes a pivotal step. From basic technical controls like Cyber Essentials to organizational measures such as visitor registration, each action is a strategic move to fortify your vessel against common data security failures.

Physical safeguards such as secure locks and alarm systems must be paired with organizational measures that ensure data is not only protected but respected. Organizations must also maintain a record of these measures, including data access requests, as required by Article 32(1) of the GDPR.

A business continuity plan is like your organization’s lifeboat, outlining how to manage incidents and establish recovery processes, ensuring that the organization can recover swiftly from any breach.

These measures are not static; they evolve with emerging technologies like artificial intelligence, requiring continuous adaptation and vigilance. They are the proof of an organization’s readiness to not only meet GDPR compliance but to exceed expectations, ensuring that personal data is not just stored but safeguarded with the utmost integrity.

Engaging a Data Protection Officer (DPO)

Navigating GDPR compliance is a complex endeavor that necessitates expertise and vigilance. Engaging a Data Protection Officer (DPO) is like having an experienced navigator on board, which is essential for charting the correct course and avoiding the pitfalls of non-compliance. 

It’s also important to note that depending on your organization’s nature, scale, and/or scope, a DPO may be a mandatory requirement under GDPR. 


Recommended reading
A complete guide to DPOs in GDPR compliance
The role of a data protection officer in GDPR compliance icon-arrow-long

Data protection officers guide your organization through the intricate processes of data protection, ensuring compliance with legal obligations. The DPO is responsible for:

The DPO is more than just an advisor; they are crucial to protecting data and ensuring compliance with privacy regulations.

The DPO’s independence is paramount, ensuring that their guidance is unbiased and solely focused on protecting the personal data entrusted to the organization. With a DPO at the helm, organizations can sail confidently, knowing their compliance journey is in expert hands.

Selecting the right certification mechanism

Choosing the appropriate certification mechanism is a critical step for organizations aiming to demonstrate their commitment to GDPR compliance. Organizations need to select certifications that are relevant to their specific industry and data processing activities. They must ensure that the certification bodies are accredited and independent to guarantee the validity of their certification.

Certifications from recognized accreditation bodies such as EuroPriSe and TRUSTe provide assurance of an organization’s dedication to GDPR compliance. International certifications from bodies like ANSI further enhance an organization’s credibility, indicating that their adherence to data protection standards is acknowledged worldwide.

The selection of a data protection certification mechanism is not merely about obtaining a certificate; it’s about engaging with a certification body that offers guidance and expertise. This ensures that the organization’s certification is a true reflection of its commitment to protecting data.

Get expert guidance on data privacy and GDPR

Navigating the complexities of GDPR compliance and data privacy can be challenging for organizations. Seeking expert guidance can help businesses ensure they meet GDPR and protect their customers’ personal data. Connect with a compliance expert to find out how GDPR applies to your business—no strings attached. Book a chat with an expert here.

Our 5-step approach makes GDPR much easier to navigate:

Summary: GDPR certification is a significant asset

GDPR certification is a significant asset for organizations. It is not merely a compliance exercise but a demonstration of an organization’s unwavering commitment to protecting personal data. 

GDPR certification is an important marker of trust and reliability, indicating that an organization values and protects the privacy of personal data. It provides a competitive edge, enhances reputation, and can simplify compliance processes for data processors. 

Organizations seeking to affirm their dedication to data security and privacy can use this guide as a roadmap to navigate the GDPR certification process. The path to GDPR certification is a collaborative effort, reflecting a shared commitment to elevating data protection standards across the industry.

More FAQs

GDPR requires that data processing be carried out in a lawful, fair and transparent manner with the purpose of the processing defined, data minimization applied, accuracy ensured, storage limited, integrity maintained and confidentiality respected.

No, GDPR certification is not mandatory as there are no specific requirements or official certification for GDPR compliance. Instead, demonstrating a reasonable level of security is necessary.

GDPR certifications can be issued by accredited certification bodies and competent supervisory authorities following a rigorous evaluation of an organization’s data protection measures. This helps ensure compliance with GDPR requirements.


Are you unsure about how to be GDPR compliant? This blog post will eliminate the guesswork by providing you with a straightforward plan to meet the EU’s data protection requirements. 

No matter the size or location of your business, if you handle EU residents’ data, it’s crucial to follow GDPR. Read on to discover a concise checklist that cuts through the noise and lays out the exact steps to achieve compliance efficiently.

Key takeaways

Understanding GDPR: The basics

The General Data Protection Regulation (GDPR) was enacted by the European Union (EU) to:

But, GDPR doesn’t just apply to companies within the EU. It also extends to organizations worldwide if they target or collect data related to people in the EU, including companies outside the EU processing personal data of EU residents. This means that even if your organization is based outside the EU, you may still be required to comply with GDPR.

Non-compliance with GDPR comes with severe penalties. Organizations can face fines reaching up to €20 million or 4% of global revenue, whichever is higher. This underlines the importance of understanding and adhering to GDPR regulations.

GDPR covers a broad range of personal data processing activities carried out by data processors, including:

So, whether you’re a small business owner or the CEO of a multinational corporation, if you’re processing personal data related to EU residents, you need to understand and comply with GDPR.

Determining if your organization needs to comply

Determining if your organization needs to comply with GDPR hinges on two key criteria: the Establishment Criterion and the Targeting Criterion. If your organization meets any of the following criteria, you must comply with GDPR:

However, the mere presence of an employee or agent in the EU does not automatically imply GDPR compliance obligations. Such obligations only arise if they constitute an ‘establishment’ with a stable arrangement. Non-EU processors may also still be subject to GDPR if they handle data in a manner that meets the Targeting Criterion.

It’s vital for entities to assess which of their processing activities fall within GDPR’s scope, recognizing that not all processing may be covered. The European Data Protection Board’s guidelines provide clarification on GDPR’s territorial scope but are not legally binding, indicating the need for ongoing interpretation by non-EU businesses.

Key principles of GDPR compliance

The GDPR is grounded in seven key data protection principles that lay the foundation for lawful data processing. These principles are:

  1. Lawfulness, fairness, and transparency
  2. Purpose limitation
  3. Data minimisation
  4. Accuracy
  5. Storage limitation
  6. Integrity and confidentiality (security)
  7. Accountability

To ensure lawfulness in processing personal data, organizations must:

Under the principle of purpose limitation, personal data must be collected only for explicit and legitimate purposes and not further processed in a manner incompatible with those purposes. Data minimisation complements this by ensuring that the data collected is adequate, relevant, and limited to necessary purposes.

Data accuracy is another critical component of GDPR compliance, requiring organizations to take every reasonable step to promptly correct or delete inaccurate customer data. Storage limitation dictates that personal data should only be retained for as long as necessary for the intended purposes. Additionally, data portability plays a significant role in ensuring that customers have control over their information, which can help prevent a personal data breach.

Integrity and confidentiality are vital to GDPR compliance, compelling organizations to safeguard data against unauthorized access, as well as accidental loss, destruction, or damage. This is achieved through robust security measures. Moreover, accountability mandates organizations to demonstrate compliance with all of these principles through appropriate documentation, such as conducting a data protection impact assessment and implementation.


Flags of GDPR countries in the European Union on display
Recommended reading
Which countries are covered by GDPR?
Which countries are covered by GDPR icon-arrow-long

How to be GDPR-compliant: 16 steps

Achieving GDPR compliance may seem a daunting task, but it becomes manageable when broken down into clear steps. Here’s a comprehensive checklist to guide you through the process:

1. Know the data your organization collects

It is critical to have a comprehensive understanding of the types of personal data your organization collects. This knowledge enables you to ensure that adequate measures are in place to protect the data, that it is collected for legitimate purposes, and that it complies with data minimization principles. Knowing the data also helps in accurately informing data subjects about the scope and reasons for data collection.

2. Establish legitimate and transparent data handling practices

GDPR mandates that organizations must have a legal basis, such as consent or necessity for the performance of a contract, for data collection and processing activities. Additionally, they must communicate transparently with data subjects about how their data will be used. This includes providing clear information about data collection methods, purposes, and rights of the data subjects, ensuring that the process is not only lawful but also fair and transparent.

3. Assess your data collection requirements

Organizations must assess the personal data they collect to ensure it is strictly necessary for the defined purposes, adhering to the GDPR principle of data minimisation. This evaluation helps in identifying and discontinuing the collection of any unnecessary data, thereby reducing the risk of data breaches and ensuring compliance with the regulation.

4. Ensure proper data security measures

It’s imperative to implement appropriate technical and organizational measures to ensure a high level of security for personal data. This includes encryption, regular cybersecurity assessments, and incident response plans to protect data against unauthorized or unlawful processing, accidental loss, destruction, or damage. By ensuring proper data security measures, organizations can prevent data breaches and maintain the trust of data subjects.

5. Clarify the purposes behind data gathering for data subjects

Transparency is key to GDPR compliance. Organizations must clearly explain to data subjects the reasons for collecting their data and the intended use. This information should be communicated in a straightforward and accessible manner, often through privacy notices or consent forms, to ensure that data subjects are fully informed and can exercise their rights effectively.

6. Implement a mandatory two-step confirmation for new email subscribers

A double opt-in process for email subscriptions is a best practice under GDPR as it confirms the data subject’s explicit consent to receive communications. This method involves sending an initial email to the user asking them to confirm their subscription, ensuring that consent is unambiguous and verifiable.

7. Maintain your privacy policy

An up-to-date privacy policy is crucial for GDPR compliance. This policy should accurately reflect current data processing practices and be easily accessible to data subjects. Regular reviews and updates to the privacy policy ensure that data subjects receive current and accurate information about their data rights and the organization’s data processing activities.

8. Document a record of GDPR compliance efforts

Maintaining records of processing activities is a proactive way to document your GDPR compliance efforts. This documentation should include details of data processing activities, decisions made regarding data handling, and any actions taken to protect personal data. It serves as evidence of your ongoing commitment to GDPR principles and can be invaluable during audits or inspections.

Achieving compliance with EU privacy cookie laws is a critical aspect of GDPR. To meet these requirements, organizations must provide clear and comprehensive information about the use of cookies on their websites. This includes obtaining explicit consent from website visitors before any cookies are placed, except for those strictly necessary for the website’s functionality. 

A cookie consent banner or pop-up that allows users to choose their cookie preferences is an essential tool for this. Additionally, organizations must ensure that the cookie policy is easily accessible and that users can revise their consent choices at any time.

10. Create a portal for data subject rights requests

A Data Subject Rights Request Portal is a dedicated online platform that facilitates the management of data subjects’ requests, such as access, rectification, erasure, and data portability, as outlined in GDPR. 

By providing a user-friendly portal, organizations can streamline the process of responding to these requests within the required timeframe. The portal should be secure, transparent, and maintain a log of all requests and actions taken, which is also helpful for demonstrating compliance with the accountability principle of GDPR.

11. Appoint a data protection officer (DPO)

Organizations engaged in large-scale data processing or special categories of data should appoint a Data Protection Officer (DPO). The DPO is responsible for overseeing the data protection strategy, ensuring compliance with GDPR, and acting as a point of contact for supervisory authorities and data subjects

12. Conduct frequent evaluations of third parties

If your organization shares data with third parties, it is important to regularly assess the risks involved and confirm that these third parties are GDPR compliant. This includes conducting due diligence on third-party data processors and ensuring that contractual agreements include obligations to adhere to GDPR standards.

13. Assess international data transfer protocols

International data transfers involve moving personal data outside the EU, which must be handled with strict adherence to GDPR regulations to ensure the continued protection of data subject rights. 

Organizations must review their data transfer mechanisms, such as Standard Contractual Clauses (SCCs), Binding Corporate Rules (BCRs), or adequacy decisions, to ensure they provide appropriate safeguards. Regular reviews and updates are necessary to stay abreast of any changes in the legal landscape, such as the Schrems II ruling, affecting international data transfers

14. Conduct regular staff GDPR training programs

Educating staff about GDPR and the importance of secure data processing is essential. Regular GDPR compliance training helps in raising awareness, understanding responsibilities, and ensuring that all employees are equipped to handle personal data appropriately and in line with GDPR requirements.

15. Instantly report data breaches

Under GDPR, organizations are required to report any data breaches to the relevant supervisory authority within 72 hours of becoming aware of the breach. Having an efficient system in place to detect and report breaches promptly is crucial. This system should include clear procedures for staff to follow in the event of a data breach, ensuring swift action to mitigate any potential harm.

16. Develop a comprehensive data breach response plan

Beyond reporting data breaches, an effective Incident Reporting & Breach Management Workflow is essential for GDPR compliance. Organizations must have a robust plan in place to detect, report, and investigate personal data breaches. 

This workflow should outline the steps to be taken by employees in the event of a breach, including immediate actions to secure data, assessment of the breach’s severity, and notification procedures to authorities and affected individuals when necessary. Regular training and simulations can help ensure that all staff members are prepared to respond effectively to data incidents.

Why is GDPR compliance important?

GDPR compliance is about more than just avoiding penalties. It can lead to streamlined and improved business process automation, as organizations reassess how they manage customer and client data during compliance efforts. Achieving GDPR compliance can also increase trust and credibility amongst customers, as it signifies a high level of data protection and security.

Moreover, following GDPR principles gives businesses a better understanding and control over their data, benefiting organizational functions and departments. Some of the benefits include:

Regular internal data audits recommended by GDPR can also lead to improved data management and ensure that businesses are staying compliant with the regulations as a data controller.

Nonetheless, the potential penalties for non-compliance are serious. Companies face severe penalties for GDPR non-compliance, including fines up to €20 million or 4% of the total global turnover of the preceding fiscal year, whichever is higher, for serious violations.

How Thoropass can help with GDPR compliance

Connect with our compliance experts to find out how GDPR applies to your business — no strings attached. Book a chat here.

Our 5-step approach makes GDPR a cinch (okay, not quite a cinch, but as easy as it can get!)

Conclusion: GDPR compliance is crucial

GDPR compliance is crucial for any organization that processes the personal data of EU residents. It ensures the protection of personal data, builds customer trust, and helps avoid severe penalties. 

By understanding the principles of GDPR, determining whether your organization needs to comply, and following a clear step-by-step checklist, you can effectively achieve and maintain GDPR compliance. Tools like Thoropass can further streamline the process, making GDPR compliance a less daunting task.

More FAQs

GDPR is a comprehensive data protection and privacy regulation enacted by the EU. It applies to organizations worldwide that target or collect data related to people in the EU.

To become GDPR certified, you need to demonstrate a reasonable level of security by using internationally recognized standard security controls. There are no specific requirements or official certification for GDPR.

To be GDPR compliant, organizations need to keep records of processing activities, maintain an up-to-date data mapping, and collect and process personal data of users fairly, securely, and lawfully, disclosing details about data handling to users. Compliance also includes the lawful purpose for data collection.

Non-compliance with GDPR can result in penalties of up to €20 million or 4% of global revenue, whichever is higher. It is crucial for businesses to ensure compliance with GDPR regulations to avoid such severe penalties.

The key principles of GDPR are grounded in lawfulness, fairness, transparency, purpose limitation, data minimization, accuracy, storage limitation, integrity, confidentiality, and accountability. These principles form the foundation of the regulation and guide its implementation in data protection.


GDPR, or the General Data Protection Regulation, sets the bar for privacy and data protection worldwide. Complying with GDPR means ensuring that personal data is processed lawfully, transparently, and securely.

GDPR came into effect in 2018, significantly changing how organizations manage personal data. GDPR empowers individuals (particularly EU citizens) to control their data. GDPR compliance is vital for organizations that process personal data, as it safeguards the data, ensures transparency in data handling, and adheres to recognized global data protection norms.

Key takeaways

Key components of GDPR

Understanding the key components of GDPR is central to achieving compliance. These key components include:

Under GDPR, it’s important to limit data collection to what is necessary for the purposes for which it is processed. Organizations that gather personal data must ensure its accuracy and timely updates to maintain data integrity and dependability.

Moreover, GDPR bestows individuals with the right to control their personal data, including access to data, data rectification, and the right to erasure. The roles of a Data Controller and a Data Processor are also crucial components of GDPR. The Data Controller is responsible for determining the methods and purposes of processing personal data, while the Data Processor is tasked with the maintenance and processing of personal data records.

Data protection principles

GDPR outlines seven principles that govern data protection:

  1. Lawfulness, fairness, and transparency
  2. Purpose limitation
  3. Data minimization
  4. Accuracy
  5. Storage limitation
  6. Integrity and confidentiality
  7. Accountability

These requirements apply to all types of personal data and play a crucial role in ensuring data privacy and GDPR compliance. They are designed to safeguard personal data, protect the rights of individuals, and ensure that their personal data is handled responsibly.

The concept of data protection by design and by default is integral to these principles. It involves integrating data protection into processing activities and business practices right from the design stage and throughout the entire data processing lifecycle. The objective is to ensure that organizations selectively gather, handle, and retain solely the essential personal data required to deliver an agreed-upon service and impose safeguards when necessary, such as obtaining consent prior to disclosing personal data to a third party.

In addition, organizations are required to implement suitable technical and organizational measures to guarantee a level of security commensurate with the associated risks. These measures should safeguard personal data from:

Data subject rights

Under GDPR, data subjects are endowed with eight specific rights:

  1. The right to be informed
  2. The right of access
  3. The right of rectification
  4. The right to erasure
  5. The right to restrict processing
  6. The right to data portability
  7. The right to object
  8. Rights related to automated decision-making and profiling

These rights empower individuals, giving them control over their personal data.

A formal request made by an individual to a company seeking information that the company holds about them is known as a Data Subject Access Request (DSAR). Organizations are obligated to respond to these requests within one month as per GDPR. Managing DSAR requests entails overseeing the complete request workflow, from initial intake to fulfillment, and ensuring adherence to GDPR’s privacy rights regulations.

Data processing requirements

Under GDPR, organizations must fulfill strict personal data processing requirements. To process personal data, it is necessary to obtain explicit consent from the data subject, which should be:

This consent indicates the data subject’s agreement to the processing of their personal data. 

Additionally, organizations are required to document processing activities in their records of processing activities and conduct a Data Protection Impact Assessment (DPIA) to evaluate the risk to individuals.

GDPR countries

GDPR applies to the processing of EU residents’ personal data by any organization (including U.S. and Canadian organizations), regardless of where data processing occurs.


Flags of GDPR countries in the European Union on display
Recommended reading
Which countries are covered by GDPR?
Which countries are covered by GDPR icon-arrow-long

European Union (EU) member states covered by GDPR

The General Data Protection Regulation (GDPR) is a data protection and privacy regulation that applies to the European Union (EU). The EU countries covered by GDPR include:

  • Austria
  • Belgium
  • Bulgaria
  • Croatia
  • Cyprus
  • Czech Republic
  • Denmark
  • Estonia
  • Finland
  • France
  • Germany
  • Greece
  • Hungary
  • Ireland
  • Italy
  • Latvia
  • Lithuania
  • Luxembourg
  • Malta
  • Netherlands
  • Poland
  • Portugal
  • Romania
  • Slovakia
  • Slovenia
  • Spain
  • Sweden

EEA countries also covered by GDPR

GDPR applies to the European Economic Area (EEA), which includes all EU countries listed above plus:

Learn more about GDPR countries here.

Assessing your organization’s GDPR compliance

To determine if your organization is subject to GDPR, you need to analyze its material and territorial scope. The material scope of GDPR encompasses the regulation of an organization’s processing activity. This involves ascertaining whether the controller or processor has an establishment in the EU/EEA and if the processing of data is conducted wholly or partly by automated means.

The territorial scope of GDPR is determined based on the following criteria:

Determining Data Controller/Data Processor applicability

After determining if your organization is subject to GDPR, you will then need to validate if the nature of your data processing activities related to personal data designates the organization as a Data Processor, Data Controller, or both. Organizations who are unsure of this designation should consult internal or third-party legal counsel to validate applicability.

Maintaining a data and asset inventory

The GDPR is applicable to all systems that maintain or transfer personal data of data subjects including (but not limited to) Cloud Service Providers (CSPs) (i.e. AWS, GCP, Azure, etc.), productivity suites (i.e. Microsoft Office 365, Google Workspace, etc.) HRIS tools (i.e. Rippling, Gusto, etc.) Your organization should maintain an accurate data and asset inventory that defines all locations where personal data resides or is transferred, including any personal data that is maintained for employees of the organization that reside in the EU.Appointing a Data Protection Officer (DPO)

The Data Protection Officer (DPO) plays a crucial role in GDPR compliance. They help an organization by:

According to Article 37 of the GDPR, a DPO must be appointed in the following cases:

The selection of a DPO usually involves evaluating their professional attributes, experience, and specialized expertise. Organizations may engage an external DPO or designate an internal candidate with a strong understanding of enterprise operations.

Managing third-party data under GDPR

Effective vendor risk management and compliance with cross-border data transfer regulations are required to manage third-party data under GDPR. GDPR mandates the evaluation of third-party data protection measures, the reduction of information security vulnerabilities, and the establishment of suitable contracts with third-party entities.

Organizations must establish procedures for incident reporting and breach management to adhere to the 72-hour notification deadline to authorities and to inform affected data subjects in cases where there is a significant risk to their rights and freedoms.

Vendor risk management

Vendor risk management under GDPR encompasses the evaluation and reduction of risks linked to third-party vendors to guarantee their adherence to GDPR. Organizations should undertake a thorough assessment of the risks posed by each vendor and verify the presence of sufficient controls to mitigate those risks. Additionally, auditing their data handling practices is essential to confirm compliance.


Recommended reading
Thoropass introduces industry's only fully customizable and customer-centric risk management solution
Thoropass introduces industry's only fully customizable and customer-centric risk management solution icon-arrow-long

Effective methods in vendor risk management for GDPR compliance involve identifying and mitigating information security threats, as well as preventing data breaches through the implementation of a robust vendor risk management strategy.

Cross-border data transfers

Cross-border data transfer is another aspect of managing third-party data under GDPR. Organizations are required to thoroughly examine and confirm the presence of suitable mechanisms for cross-border data transfer. 

The GDPR mandates an equivalent level of protection for personal data being transferred outside of the European Economic Area (EEA). An adequacy decision denotes the European Commission’s determination that a third country or international organization provides a sufficient level of data protection. Some suitable mechanisms for cross-border data transfer include:

By implementing these mechanisms, organizations can ensure that they are compliant with GDPR regulations regarding cross-border data transfer.

Standard Contractual Clauses (SCCs) impose obligations on the data exporter and the data importer, and grant rights to the data subjects. They are widely utilized as a safeguard for cross-border data transfer under GDPR.

Handling data breaches and noncompliance penalties

Organizations are required to promptly report data breaches to the appropriate supervisory authority within 72 hours, as stipulated by GDPR. 

Furthermore, in cases where a data breach is expected to present a significant risk to the rights and freedoms of individuals, organizations must also inform the affected data subjects. Failure to comply with these requirements can lead to substantial fines and penalties.

Breach notification requirements

In the event of a data breach, organizations are required to:

Failure to adhere to these requirements can result in substantial fines and penalties.

Learn more about GDPR breach management here.

Fines and penalties

Noncompliance with GDPR can result in significant fines and penalties.  Fines under GDPR are determined based on factors such as the severity of the breach and the number of affected data subjects. The fines are intended to be effective, proportionate, and dissuasive.

Learn more about GDPR penalties here.

Achieving and maintaining GDPR compliance

To achieve GDPR compliance, organizations should follow these steps.

Finally, organizations should train their staff on GDPR compliance, ensuring that everyone involved in data processing activities is aware of their responsibilities and obligations under the regulation.

Developing an action plan

A comprehensive action plan acts as a guide to GDPR compliance. It involves raising awareness, fostering alignment, and implementing essential steps such as information mapping, data audit, and privacy communications. Furthermore, the action plan enables organizations to build increased trust and credibility, and gain a deeper understanding of their data collection and usage practices.

A GDPR compliance action plan should include steps such as: 

Prioritizing actions in your GDPR compliance plan involves a two-step process outlined in a practical guide, and it is advisable to adhere to best practices, including appointing a data protection officer, classifying all data, and completing a privacy impact assessment.

Your path to GDPR Compliance with Thoropass

Okay, that may have been a scary read. If we’ve got your attention, let us now offer some reassurance. 

Chat with our compliance experts: A free 15-minute AMA 

Let’s chat. Connect with a compliance expert to find out how GDPR applies to your business — no strings attached. Book a chat here.

Our 5-step approach makes GDPR a cinch (okay, not quite a cinch, but as easy as it can get!)

Learn more here!

More FAQs

GDPR fines can be issued by national data protection authorities, with penalties up to €20 million or 4% of annual global turnover, whichever is higher. These fines serve as a stark reminder to organizations of the importance of GDPR compliance and the potential consequences of non-compliance.

Organizations must take steps to ensure that they are compliant with GDPR regulations or risk fines, loss of reputation, or other regulatory sanctions.

A legitimate interest is when a company/organization processes personal data to fulfill its legitimate interests or the interests of third parties, as long as this does not outweigh an individual’s rights and freedoms. Such activities include maintaining customer relationships, direct marketing, fraud prevention, and ensuring the security of IT systems.

These activities must be balanced against the individual’s rights and freedoms, and the company/organization must be able to demonstrate that the processing is necessary and proportionate. This means that the company/organization must be able to show that the processing is necessary for the legitimate interests pursued.

While GDPR does not directly apply to the United States, it may still impact U.S.-based organizations that handle the personal data of individuals within the EU/EEA. GDPR has extraterritorial reach, meaning that if a U.S. company offers goods or services to individuals in the EU/EEA or monitors their behavior, it may be subject to GDPR’s requirements.

To comply with GDPR, U.S.-based organizations may need to implement measures such as obtaining appropriate consent for data processing, ensuring data security, respecting individuals’ rights, and complying with data breach notification obligations, among other provisions. Many organizations have taken steps to align their practices with GDPR to facilitate international data transfers and maintain good data protection practices.

It’s important to note that the United States has its own data protection laws at the federal and state levels, such as the California Consumer Privacy Act (CCPA) and the Health Insurance Portability and Accountability Act (HIPAA), which regulate specific sectors or aspects of data protection. However, these laws are separate from GDPR and have their own scope and requirements.

Companies have various responsibilities under GDPR, including adhering to data protection principles, reporting breaches, and appointing a Data Protection Officer (DPO) if necessary. Organizations must ensure that they are processing personal data lawfully, fairly, and transparently and that they are taking the necessary steps to protect the data from misuse and exploitation.

The data controller must also ensure that they are collecting data for specified, explicit, and legitimate purposes.

An EU Representative should be assigned by your organization if the following criteria are met:
Your organization is not based in the EU, but provides goods or services and/or processes personal data of data subjects who reside in the EU

Your organization handles, processes, or stores personal data on a “large scale” OR your organization processes special categories of personal data*

Organizations who are unsure of this designation should consult internal or third-party legal counsel to validate applicability.

*Special categories of data under the GDPR are:

  • Racial or ethnic origin
  • Political opinions
  • Religious or philosophical beliefs
  • Trade union membership
  • Genetic data
  • Biometric data
  • Health-related data
  • Data concerning a person’s sex life or sexual orientation

Not all organizations need a DPO, but it depends on the scale and nature of data processing activities. According to Article 37 of the GDPR, a DPO must be appointed in the following cases:

  • Public authorities or bodies: This includes entities at the national, regional, or local level, such as government departments, agencies, or public organizations.
  • Organizations engaged in large-scale systematic monitoring of individuals: This involves activities where data processing is performed on a large scale, particularly when the processing includes tracking behavior online or offline.
  • Organizations engaged in large-scale processing of special categories of data or data relating to criminal convictions and offenses: Special categories of data (previously known as sensitive data) include information related to racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic data, biometric data, health data, or data concerning a person’s sex life or sexual orientation.
  • Other cases where required by member state law: Member states may introduce additional requirements for the appointment of a DPO based on their specific laws and regulations.

Public authorities and bodies, including the data protection authority, are also required to appoint a DPO. In some cases, it is often a best practice to have a DPO, or it may be required by a contractual obligation with a customer or vendor.


In the event of a data breach, the GDPR breach notification timeline is straightforward: you must notify the relevant authorities within 72 hours. 

This blog post outlines the critical steps you need to take to comply with GDPR requirements, ensuring you avoid the potential fines associated with delayed reporting.

Key takeaways

How is a “breach” defined according to GDPR?

GDPR has set a clear definition for a “breach” – it includes: 

Instances of personal data breaches can include everything from the accidental loss of a company laptop containing personal data to a full-scale cyber attack resulting in unauthorized access to customer databases.

The GDPR’s specific definition of a personal data breach aims to avoid overwhelming regulators with irrelevant breach reports. By focusing on personal data breaches, organizations can concentrate on reporting incidents that pose a significant risk to the data subjects concerned. Therefore, breaches unrelated to personal data, despite their severity, are not required to be reported under GDPR.

The 72-hour rule: Key aspects of GDPR breach notification timeline

A key aspect of GDPR’s breach guidelines is the 72-hour rule. GDPR mandates that organizations must notify relevant authorities of a personal data breach within 72 hours of becoming aware of it. This countdown begins when the IT security team discovers a personal data breach, triggering the data breach notification process.

Failure to adhere to this deadline without undue delay may result in hefty fines, with potential penalties reaching up to €10 million or 2% of the company’s global annual revenues.

The importance of timely reporting

Reporting breaches promptly is not merely a suggestion; it’s a requirement. 

Quick action can minimize potential harm to data subjects and ensure compliance with GDPR regulations. Without undue delay, delaying the reporting process can result in substantial penalties.

Prompt reporting is also instrumental in managing a data breach. It ensures compliance with legal requirements and helps mitigate the potential consequences of the breach.

Exceptions to the 72-Hour Rule

“In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons.”

GDPR

While the 72-hour rule is a strict guideline, there are specific instances where organizations may be exempt. One such instance is when the personal data affected by the breach is encrypted using cutting-edge algorithms, and the encryption key remains uncompromised.

Another exemption is when the personal data breach is not expected to pose a risk to the rights and freedoms of individuals. However, even in such cases, organizations are still required to provide a contact point for further information when reporting a breach.

Identifying and assessing personal data breaches

Identifying and assessing personal data breaches are crucial steps in managing a GDPR data breach. This involves recognizing the indicators of a breach, such as sudden file changes or abnormal system behavior, and understanding the common causes, which can range from weak or stolen credentials to third-party service provider risks.

Recognizing a personal data breach

Identifying a personal data breach necessitates an understanding that breaches extend beyond unauthorized access, encompassing accidental or unlawful destruction, loss, alteration, and disclosure of personal data. Several factors can lead to personal data breaches, including weak and stolen credentials, application vulnerabilities, malware, and third-party risks.

Organizations can implement continuous cybersecurity monitoring solutions to maintain ongoing surveillance for data breaches. These solutions offer the visibility needed to identify vulnerabilities and proactively address cybersecurity concerns. Upon discovering a breach, organizations should promptly contain it and evaluate the potential adverse consequences for individuals.

Assessing the risk to data subjects

Following the identification of a data breach, the next important step is to assess the risk to data subjects. This involves evaluating the likelihood of no risk, risk, or high risk to individuals. 

High-risk instances include the matching or combining of personal data from multiple sources and the utilization of personal data of children or vulnerable individuals for marketing or automated decision-making.

The risk assessment plays a vital role in the breach management process. It enables organizations to effectively contain and respond to the breach. This includes determining the potential impact on individuals, such as the possibility of identity theft, fraud, physical danger, distress, and public exposure, and assessing the likelihood of these consequences.


Continued reading
The 10 risks you should be monitoring at your organization

While you consider which methodology to adopt, understand the risks every business should be tracking to maintain their security posture.

Top 10 risks you should include in your infosec compliance risk register icon-arrow-long

Reporting a personal data breach to supervisory authorities

After identifying and assessing a personal data breach, organizations are required to report the breach to supervisory authorities. This involves selecting the appropriate authority based on the jurisdiction where the breach has the potential to impact EU citizens’ rights and freedoms and providing the necessary information for notification.

Selecting the appropriate supervisory authority

When selecting the appropriate supervisory authority, organizations should take into account the location of their main establishment within an EU member state. As a data controller, it’s important to remember that each European Economic Area (EEA) Data Protection Authority (DPA) is entrusted with overseeing and upholding the implementation of the General Data Protection Regulation (GDPR).

The role of these authorities, including the data protection officer, is vast. Their responsibilities encompass:

In reporting to supervisory authorities, organizations are required to provide particular information. This includes:

In fact, organizations are accountable for carrying out investigations in the event of a data breach. Having detailed documentation helps ensure accuracy and effectiveness in the notification process.

Information required for notification

In reporting to supervisory authorities, organizations are required to provide particular information. This includes:

In fact, organizations are accountable for carrying out investigations in the event of a data breach. Having detailed documentation helps ensure accuracy and effectiveness in the notification process.

“The notification shall at least:

  • describe the nature of the personal data breach, including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned;
  • communicate the name and contact details of the data protection officer or other contact point where more information can be obtained;
  • describe the likely consequences of the personal data breach;
  • describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.”
GDPR

Notifying affected data subjects

Following the notification of supervisory authorities, organizations are then required to inform the affected data subjects. This is required when the breach is likely to result in a high risk to the rights and freedoms of individuals, requiring direct and prompt notification of those affected.

Criteria for individual notification

Several factors determine the criteria for individual notification. These include the severity of the breach, which can be determined by assessing the impact of the breach and the likelihood of its consequences. The potential impact on data subjects is another important factor. 

“When the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall communicate the personal data breach to the data subject without undue delay.”

GDPR

When assessing the potential impact of a data breach on individuals, it’s crucial to consider the possible outcomes. These may include 

The next step is to evaluate the probability of these outcomes occurring.

Certain types of breaches, such as those related to medical or financial information or sensitive data like psychological or ethnic information, necessitate individual notification when personal data transmitted is compromised.

Content and delivery of data subject notification

The information included in the notification to data subjects is of utmost importance. It should include details about the personal data breach, its consequences, and the corrective measures implemented. The notification should be clear and simple, ensuring that individuals understand the situation and its potential ramifications. As per GDPR guidelines, a breach notification should be issued promptly, ideally within 72 hours of becoming aware of the breach.

The delivery of these notifications should also follow best practices. These include:

Developing a robust breach response plan

In addition to comprehending GDPR data breach guidelines, it is of equal importance for organizations to establish a solid breach response plan. This involves outlining the key components of the plan and ensuring it’s regularly reviewed and updated to maintain its effectiveness and compliance with GDPR regulations.

Key components of a response plan

A comprehensive data breach response plan includes several key components. This involves defining roles and responsibilities within the response team, preparing pre-planning exercises, and establishing response teams and members.

Designated roles within the team can include:

Each role plays a crucial part in managing the breach, ensuring a prompt and structured response to contain and manage the incident effectively.

The response plan should also include steps for reporting the breach to the relevant supervisory authority and formal documentation of roles and responsibilities.

Regular review and updating

Merely having a breach response plan is insufficient. Regular review and updates are necessary to maintain its effectiveness and compliance with GDPR regulations. This involves detecting, managing, and recording incidents and breaches, as well as assessing, reporting, and notifying individuals.

Regular review and updating of the plan ensure that it aligns with explicit protocols for incident response, stringent notification obligations, and reporting deadlines outlined in the current regulations. Routine assessments, such as during the annual audit plan process, serve to avert non-compliance and the possibility of substantial penalties.

Your path to GDPR Compliance with Thoropass

Okay, that may have been a scary read. If we’ve got your attention, let us now offer some reassurance. 

Chat with our compliance experts: A free 15-minute AMA 

Let’s chat. Connect with a compliance expert to find out how GDPR applies to your business — no strings attached. Book a chat here.

Our 5-step approach makes GDPR a cinch (okay, not quite a cinch, but as easy as it can get!)

Learn more here!

More FAQs

You should notify the Attorney General’s Office before affected individuals in case of a data breach. If more than 1,000 individuals are affected, consumer reporting agencies must also be notified. Additionally, it’s important to notify law enforcement, other affected businesses, and the affected individuals.

A “breach” according to GDPR, is an accidental or unlawful loss, access, alteration, or disclosure of personal data records, whether malicious or unintentional.

The key components of a robust breach response plan include defining roles and responsibilities, conducting pre-planning exercises, establishing response teams, and regularly reviewing and updating the plan. These elements are crucial for an effective response to a breach.


If you’ve visited a website or checked your email in the past few years, you’re undoubtedly familiar with GDPR. Companies informing you of privacy policy updates and websites prompting you to manage your cookie preferences are just some ways we experience the impact of the landmark data privacy law.

Despite being drafted and adopted by the European Union, GDPR has global implications. Beyond the impact on how your business manages prospect and customer data, comprehensive policies have gone on to influence data privacy laws worldwide — including in the United States. While there is no GDPR US equivalent at the federal level, individual states, such as California, have implemented similar policies.

Staying on top of local, federal, and international regulatory requirements is essential to your business staying compliant and avoiding hefty fines.

A brief overview of GDPR

The General Data Protection Regulation (GDPR), enacted by the European Union (EU) in 2016, is a comprehensive regulation that sets the standards for acquiring, managing and processing the personal data of EU citizens and their residents. Within the scope of GDPR, personal data is any information that links to an identifiable natural person or “data subject.”

The most important element of GDPR is that the regulation dictates no organization can collect, store, or use personal data without the explicit consent of the data subject.

The broad spectrum of personally identifiable information (PII)

Unlike similar US data protection laws, which limit regulated data to financial or health information, GDPR protects and regulates various sectors of information that can be tied to data subjects, including location information, IP addresses, and cookie data. All under the umbrella of personally identifiable information, if your business collects or processes this information, such as through lead capture forms or advertising pixels, you’re responsible for complying with GDPR.

The impact of non-compliance

Maintaining compliance with GDPR is not only in your customers’ best interests but in your business’s best interest. Horror stories of non-compliance and data breaches can be accompanied by hefty fines. Depending on the size of your business, fines can range between $11 and $21 million or 2 – 4% of your annual global turnover.

A pile of Euros representing a GDPR fine

What does GDPR mean for businesses in the US?

We know that GDPR has far-reaching impacts, including on businesses in the United States. While it can be easy to disregard GDPR requirements if you aren’t a multinational company, you would be careful not to. Even if you don’t intend to collect data from or sell to EU residents, if your digital properties, including websites, attract visitors from the EU or the European Economic Area (EEA), then GDPR applies.

Say a visitor from an EU member state arrives on your website and subscribes to your blog or downloads a research paper. Your retargeting efforts through Google or LinkedIn advertising may drop a tracking pixel on their browser. That user is now a data subject, and you’ve begun processing their data.

With the wealth of scenarios available for sensitive data collection, staying on top of best practices for GDPR compliance is vital for US businesses. But beyond the regulatory requirements, GDPR has an additional impact on privacy legislation worldwide, including in the United States.


GDPR logo
RECOMMENDED FOR YOU
What is Personally Identifiable Data?

Understanding what defines Personally Identifiable Data will help you evaluate whether GDPR applies to your business.

GDPR: What is Personally Identifiable Data? icon-arrow-long

Does the US have similar data protection laws?

While federal law has yet to address data security and data processing to the extent of GDPR, state laws serve as GDPR equivalents in the United States. As of 2022, five states, including Utah, Colorado, Virginia, Connecticut, and California, all feature some kind of consumer privacy law. Meanwhile, more than 15 states are considering similar legislation of their own.

Protecting the data of California residents

The California Consumer Privacy Act (CCPA), passed in 2018, was the first in the USA as a response to GDPR and data privacy violations in the state. It boasts similar data protection regulations, though admittedly on a finite scale.


A narrow road in a California suburb
RECOMMENDED FOR YOU
Complying with CCPA

A step by step guide to complying with the CCPA

How to comply with CCPA: A step-by-step guide icon-arrow-long

In January 2023, the California Privacy Rights Act (CRPA), an amendment to CCPA, went into effect. This afforded for new requirements, rights, and enforcement mechanisms for within CCPA including clear definition on who is impacted by the legislation and protections for “sensitive personal information.” Specifically: 

At a high level, both policies afford individuals more clarity into and control over their personal data and the processing of such data. Concerning GDPR, health and financial data fall under the larger umbrella of personally identifiable information. In the United States, similar data is regulated extensively through multiple federal laws.

A user logs into a website with personal information

Safeguarding patient health data

The Health Insurance Portability and Accountability Act (HIPAA), passed in 1996, regulates Protected Health Information (PHI). Organizations that handle PHI, including “covered entities” like healthcare providers or business associates such as billing or EHR companies, are responsible for complying with HIPAA regulations. If your business leverages or processes patient records, payment information, biometric data, or health plan information, you’re likely subject to HIPAA compliance.

Regulating payments and credit card transactions

Meanwhile, the Gramm-Leach-Bliley Act (GLBA), enacted in 1999, requires financial institutions to afford individuals greater access and transparency into the usage of their personal data. Maintaining GLBA compliance includes communicating how sensitive data such as a customer’s name, address, telephone number, or account and social security numbers are handled and shared. Similar to the CCPA and CPRA and GDPR, institutions need to offer the opportunity to opt out of their data being shared with third parties.


Picture of a credit card being inserted into a POS system
RECOMMENDED FOR YOU
What is PCI DSS?

If your organization processes and/or stores credit card information, PCI DSS will be essential for your business.

What is PCI DSS? icon-arrow-long

Similar to CCPA and GDPR, non-compliance with HIPAA and GLBA can significantly impact an institution, with per-offense fines upwards of $100,000 for GLBA or $50,000 for HIPAA. Repeat HIPAA offenses can scale fines up to $250,000, providing a clear incentive for maintaining compliance.

Two women process a credit card transaction at a store

Establishing rights with US government agencies

Since the CCPA regulates for-profit organizations, it’s mainly limited to data leveraged for commercial purposes. The Privacy Act of 1974 does regulate how the public sector manages your data.

Drafted in response to the onset of databases and computers that could now store a wealth of information, the Privacy Act guides federal agencies on data protection, maintenance, and dissemination. The act affords four rights that US citizens have concerning their personal data:

  1. Agencies are required to share records kept on an individual when requested
  2. Agencies must follow “fair information practices,” which define the scope and quality of data agencies can reasonably collect and manage.
  3. Agencies must adhere to restrictive guidelines for sharing personal data between agencies or with other individuals.
  4. Agencies can be sued for violating any of the above rights.

It’s important to note that the Privacy Act is not all-encompassing. Government agencies responsible for law enforcement, like the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA), are exempt from the legislation. Additionally, the act affords for “routine use” and other exemptions like for use in the US census.

What does the future hold for data protection laws in the United States?

Regarding the equivalent of GDPR in the United States, data protection is more a sum of its parts than a comprehensive approach. Legislation like the California Consumer Privacy Act or the Virginia Consumer Data Protection Act fills similar needs for privacy laws within the borders of individual states.

The existence of cross-border data transfers and a global economy drives the need for more US companies to achieve GDPR compliance, but it’s not a universal requirement.

The US’ approach to data protection and transparency policy has been patchwork over the past several years. However, 2022 saw significant fines levied by the Federal Trade Commission through privacy violations and renewed efforts from Congress to create a cohesive national policy on data privacy.

Federal Trade Commission stepping in on compliance violation

Specifically, the FTC ordered Epic Games to pay over $500 million in fines for violating the Children’s Online Privacy Protection Act (COPPA) through misleading user interface design or “dark patterns” that prompted thousands of unintentional purchases and privacy decisions made by children and teenagers. 

Moreover, a coalition of over 40 Attorneys General reached a landmark settlement with Google north of $350 million over their location data processing. The decisions mark a watershed moment in US information security regulation and how companies can be held financially responsible for violating specific privacy laws.

Comprehensive data privacy law potentially up for debate

The impact of existing legislation has reinvigorated conversations for a comprehensive equivalent to GDPR in the United States. In 2022, the American Data Privacy and Protection Act (ADPPA) passed through Congressional committee with bipartisan support. But it was never brought to a vote on the floor of the House of Representatives. The bill would preempt the California Consumer Privacy Act and remains an option for debate and decision in 2023.

How to account for disparate data privacy laws

The impact of non-compliance isn’t limited to fines and criminal penalties. The customer impact of data breaches looms large, and maintaining their trust can often hinge on your company’s ability to safeguard their information.

With so many legal guidelines, protocols, and regulations to follow, how can your business stay ahead of the data security curve?

Making the right hires for your team

In some cases, the path forward is quite plain. Depending on your business, GDPR may require hiring a Data Protection Officer or DPO. The responsibilities of a DPO include educating employees about compliance and data and conducting regular security audits. The DPO also serves as a primary point of contact to access company data for audit or otherwise.

A data protection officer works at their computer, smiling

Data Protection Officers and other security and compliance hires are essential to ensuring your business can monitor the ever-changing landscape of information security law. With clear visibility into your business’ data practices and information security, such roles can more seamlessly monitor, advise on, and maintain your compliance posture.

Working with a partner

While hiring team members to monitor and determine the business impact of these trends might not be in your startup’s roadmap, you should continuously evaluate how to approach security for your particular stage. That means being mindful of your security foundation, tools, and data practices to understand how changes in regulatory compliance might impact your business operations.

Not sure where to start? Start by talking with one of our experts.

Note: This blog post was originally published on March 15, 2023, and was updated on Feb 12, 2024.