GDPR Breach Response Checklist — Article 33/34 72-Hour Notification

Last updated: 2026-04-21 — ComplianceStack Editorial Team

13 items
🎯

Generate Your Personalized GDPR Checklist

Tell us about your organization and we'll tailor this 13-item checklist to your situation — highlighting your gaps, marking what you already have, and calculating your readiness score. Free. Instant. Downloadable.

Free · Instant · No account required
Reference Checklist Progress 0 of 13 reviewed

GDPR Articles 33 and 34 impose strict breach notification obligations. When a personal data breach occurs, controllers must notify the competent supervisory authority within 72 hours of becoming aware — unless the breach is 'unlikely to result in a risk' to individuals. If the breach is likely to result in a 'high risk', controllers must also notify affected individuals without undue delay. In 2024, supervisory authorities across the EU issued over €1.2 billion in fines, with breach notification failures consistently among the top citation categories. The 72-hour clock starts the moment any person in the organization becomes aware of the incident — not when the investigation is complete. This 18-item checklist covers every step from initial detection to post-incident review.

Generate Your Personalized Checklist

Tell us about your breach response (72-hour) and we'll filter this checklist to what applies to you — with a readiness score and priority gaps highlighted.

Checked items will be marked ✅ complete in your personalized checklist.

📄 Reference Checklist

Generic — use the generator above for a personalized version
Priority Legend:
● Critical ● High ● Medium ● Ongoing

GDPR Reference Checklist for Breach Response (72-Hour)

SEO Reference

Use the generator above for your personalized checklist. The complete reference checklist is below.

GDPR Compliance Checklist for Breach Response (72-Hour)

1

Activate your incident response team and declare a personal data breach incident

Critical Immediate

The moment you become aware of a potential personal data breach, activate your incident response procedure and assign a lead investigator. Do not wait for confirmation of the full scope — the 72-hour clock starts from 'becoming aware', which courts have interpreted broadly. Awareness of a potential breach (e.g., ransomware detected on a server containing personal data) starts the clock even before the full scope is known.

GDPR Article 33(1); EDPB Guidelines 01/2021 on data breach notification
2

Determine whether the incident constitutes a 'personal data breach' under Article 4(12)

Critical 1-4 hours

A personal data breach is 'a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed.' This covers confidentiality breaches (unauthorised disclosure), integrity breaches (alteration), and availability breaches (loss of access). A locked laptop that was not accessed is still a potential breach. An email sent to the wrong recipient is a breach.

GDPR Article 4(12); Article 32(1)(b); EDPB Guidelines 01/2021 §8-22
3

Assess whether the breach poses a risk to the rights and freedoms of individuals

Critical 2-6 hours

GDPR Article 33(1) notification is required unless the breach is 'unlikely to result in a risk' to individuals. Risk factors: sensitivity of the data (health, financial, identity documents), volume of records affected, ability to reverse the breach, nature of individuals affected (children, employees, customers), and the attacker's likely intent. Document the risk assessment in detail — if you conclude no risk exists, that reasoning must withstand regulatory scrutiny.

GDPR Article 33(1); EDPB Guidelines 01/2021 §71-74
4

Notify the competent supervisory authority within 72 hours of becoming aware

Critical 2-4 hours

Use the supervisory authority's official notification form (each EU member state has its own portal). Required information under Article 33(3): description of the breach (nature, categories, approximate number of records and individuals), DPO or contact point details, likely consequences of the breach, and measures taken or proposed. If the full information is not available within 72 hours, notify with what you have and indicate information will follow ('without undue delay').

GDPR Article 33(1)(3)(4); EDPB Guidelines 01/2021 §87-103
5

If the 72-hour deadline cannot be met, prepare a justification for the delay

Critical 1-2 hours

Article 33(1) allows notification beyond 72 hours 'accompanied by reasons for the delay.' The justification must be specific and documented — not a general statement that the investigation was ongoing. Regulators have fined organisations for unjustified late notifications even where the breach itself caused minimal harm. Common acceptable reasons include: complex technical investigation requiring third-party forensics, difficulty identifying affected individuals, or a multi-country incident requiring coordination.

GDPR Article 33(1) (phased notification); EDPB Guidelines 01/2021 §104-111
6

Assess whether the breach is likely to result in a 'high risk' requiring individual notification

Critical 2-4 hours

Article 34 requires notification to affected individuals when the breach is 'likely to result in a high risk to the rights and freedoms of natural persons.' High risk indicators: financial harm (account credentials, payment card data), identity theft risk (national ID numbers, passports), physical safety risk, discrimination risk (health data, racial/ethnic origin, sexual orientation). The threshold is lower than for Article 33 — 'high risk' vs. 'risk.'

GDPR Article 34(1); EDPB Guidelines 01/2021 §74-86
7

Notify affected individuals without undue delay if high risk is determined

Critical 1-2 days

Article 34(2) requires notification to include: plain language description of the breach, DPO or contact point details, likely consequences, measures taken, and recommended steps for individuals to protect themselves. Use clear, direct language. Do not minimise the breach or use legal jargon. The notification must be direct — website notices or press releases are only acceptable if direct contact is impossible.

GDPR Article 34(1)(2)(3); EDPB Guidelines 01/2021 §74-86
8

Contain the breach and prevent further unauthorised access or data loss

Critical Hours to days

Parallel to notification obligations, take immediate containment steps: isolate affected systems, revoke compromised credentials, suspend compromised accounts, preserve forensic evidence (do not wipe systems before imaging), and engage cybersecurity incident response if needed. Document every containment action with timestamps — regulators expect to see evidence of prompt action.

GDPR Article 32(1)(b); Article 33(3)(d) (measures taken or proposed)
9

Record the breach in your Article 33(5) breach register

Critical 2-4 hours

All personal data breaches must be documented in an internal breach register regardless of whether notification was required. Required elements: breach description, date/time of discovery and occurrence (if known), affected data categories and volume, identities of affected individuals, likely consequences, remediation measures, and notification decisions with justifications. Maintain records for at least 3 years (practice: match to statute of limitations).

GDPR Article 33(5); EDPB Guidelines 01/2021 §88
10

Verify notification obligations with processors who reported the breach

High 1-2 hours

Article 33(2) requires processors to notify controllers 'without undue delay' after becoming aware of a breach — in practice, this means processors should notify within 24-36 hours to give controllers time to meet the 72-hour obligation. Review your Article 28 processor agreements to confirm they include this requirement. If a processor fails to notify you timely, document this and include it in your supervisory authority notification.

GDPR Article 33(2); Article 28(3)(f) (processor contract requirements)
11

Assess cross-border breach notification obligations for multi-country incidents

High 1-2 hours

In cross-border processing, the 'lead supervisory authority' concept under Article 60 determines which authority receives notification. The lead authority is in the Member State of the controller's EU establishment. However, affected authorities in Member States of the affected individuals must also be informed. For breaches affecting individuals in multiple Member States, the lead authority coordinates — but notify the lead authority within 72 hours and flag the cross-border nature.

GDPR Articles 56 and 60 (lead supervisory authority); Article 33(1)
12

Consider notification exemptions under Article 34(3)

High 1-2 hours

Individual notification is not required if: (a) you implemented appropriate encryption or other measures that render the data unintelligible to unauthorised parties, (b) you took subsequent measures to ensure high risk to individuals is no longer likely, or (c) direct notification would involve disproportionate effort — in which case a public communication or equivalent measure suffices. Document the basis for any exemption claimed.

GDPR Article 34(3)(a)(b)(c)
13

Conduct a post-incident review and update security measures to prevent recurrence

Medium 1-2 weeks

After containment, conduct a root cause analysis. Update your Article 30 ROPA if the breach revealed undocumented processing. Update your DPIA if one exists for the affected system. Implement remediation measures. Brief senior management and, where applicable, the board. Document all post-incident actions. Supervisory authorities routinely review whether the controller improved controls after the breach.

GDPR Article 32(1); Article 35(11) (DPIA review); Article 5(2) (accountability)

See How Your Breach Response (72-Hour) Scores on GDPR

Run a free gap analysis to find out which items you have covered and where the risks are.

Gap Analyzer →   Training Tracker →

Common Mistakes That Trigger Enforcement

Waiting until the full investigation is complete before notifying the supervisory authority
The 72-hour clock starts at awareness, not at conclusion of investigation. GDPR Article 33(4) explicitly contemplates phased notifications — notify with what you know and supplement as more information becomes available. Late notification without documented justification is an independent violation subject to fines of up to €10M or 2% global turnover.
Concluding 'no notification required' without a documented risk assessment
The Article 33(1) exemption for breaches 'unlikely to result in a risk' requires a documented assessment. Supervisory authorities have fined organisations who skipped notification without adequate documentation of why no risk existed. The assessment must be contemporaneous — not post-hoc after a regulator investigates.
Using a generic notification template that does not describe the specific breach
Article 33(3) requires specific information about the nature of the breach, the categories of data, the approximate number of individuals and records, and the likely consequences. Generic notifications — 'we experienced a cybersecurity incident' — do not satisfy this requirement and typically result in requests for additional information and extended supervisory scrutiny.
Not having processor notification obligations in Article 28 agreements
If your processors are not contractually required to notify you within 24-36 hours, you will miss the 72-hour window whenever a processor-side breach occurs. This is both an Article 33 violation (late notification) and an Article 28(3)(f) violation (inadequate processor agreement).

Frequently Asked Questions

When does the 72-hour clock start for GDPR breach notification?

The clock starts when the controller 'becomes aware' of the breach (Article 33(1)). EDPB Guidelines 01/2021 clarify that 'awareness' means a reasonable degree of certainty that a security incident has occurred that has led to the compromise of personal data. This does not require confirmation of the full scope — awareness of a potential breach (such as detection of ransomware on a server containing personal data, or an email sent to the wrong recipient) starts the clock. Controllers cannot delay the start of the clock by delaying their internal investigation. However, a processor's knowledge is not automatically imputed to the controller — the clock starts when the controller itself becomes aware.

What information must be included in a supervisory authority notification?

Article 33(3) requires: (a) a description of the nature of the breach including, where possible, categories and approximate number of data subjects and personal data records concerned; (b) the name and contact details of the DPO or other contact point; (c) a description of the likely consequences of the breach; and (d) a description of the measures taken or proposed to address the breach, including measures to mitigate its possible adverse effects. If all information is not available within 72 hours, Article 33(4) allows phased notification — submit what you have and supplement promptly.

Do all personal data breaches need to be reported to the supervisory authority?

No. Article 33(1) requires notification only when the breach is 'likely to result in a risk to the rights and freedoms of natural persons.' Low-risk breaches — such as an encrypted laptop that was lost but cannot be accessed — do not require supervisory authority notification. However, all personal data breaches, including those below the notification threshold, must be documented in the internal breach register under Article 33(5). EDPB guidance makes clear that the default should lean toward notification when in doubt, because the consequences of failing to notify an at-risk breach are far greater than notifying a borderline one.

✉ Save This Checklist

Enter your email and we'll send you a clean copy — plus updates when requirements change.

We also offer a free personalized gap analysis for your specific situation.

Related Resources

Assess Risk Now →