GDPR Data Breach Notification Checklist
Last updated: 2026-04-08 — ComplianceStack Editorial Team
The GDPR's 72-hour breach notification requirement is one of the most operationally demanding obligations in data protection law. GDPR fines for breach notification failures consistently exceed the fines for the underlying breach itself — because they evidence the absence of a functioning compliance program. The €405 million fine against Instagram in 2022 included failures in breach response. The Irish DPC has found that companies typically fail not on identifying the breach, but on the 72-hour clock and the quality of their initial notification. This checklist covers the 17 steps for building a breach response program that meets Article 33 and Article 34 requirements.
GDPR Compliance Checklist for Breach Notification
Establish a written data breach response policy with named roles and escalation paths
Before any breach occurs, document: who is the Incident Response Manager (IRM), who makes the decision to notify the DPA, who drafts the notification, who notifies affected individuals, and who communicates externally. Include escalation paths for weekends, holidays, and when primary contacts are unavailable. The policy should specify response SLAs at each stage to ensure the 72-hour clock is met.
Train staff to recognize and report potential breaches immediately to the DPO or privacy team
Most breaches are first noticed by non-privacy staff — a developer discovering an access log anomaly, a customer service agent receiving a complaint about unauthorized access, an employee noticing a lost device. Train all staff: what constitutes a personal data breach, who to report it to, and the importance of immediate reporting. A delay between discovery and internal notification is the most common reason organizations miss the 72-hour DPA notification window.
Define when you are "aware" of a breach for purposes of starting the 72-hour clock
The 72-hour clock starts when the controller becomes "aware" that a personal data breach has occurred. The EDPB defines awareness as having a reasonable degree of certainty that a security incident has occurred that has led to the compromise of personal data. A single employee noticing a potential anomaly does not start the clock; confirmation that personal data has been affected does. Document your awareness determination process and the time it was triggered.
Conduct initial breach triage within 4 hours of awareness: scope, type, and likely impact
Before notifying the DPA, gather enough information to complete the initial notification. Identify: the nature of the breach (confidentiality, integrity, availability), the categories and approximate number of records affected, the categories and approximate number of data subjects affected, the likely consequences, and the measures taken or proposed to address the breach. You do not need to have complete information — Article 33(4) permits phased notification as more information becomes available.
Notify the lead supervisory authority within 72 hours of becoming aware of the breach
Notification must include: a description of the breach nature; contact details of the DPO or other contact point; the likely consequences of the breach; and the measures taken or proposed to address the breach. For cross-border processing, notify the lead supervisory authority (based on your main establishment). If notification is delayed beyond 72 hours, you must explain the reasons for the delay. Submit through the DPA's official online portal (e.g., ICO online reporting, CNIL online form).
Assess whether the breach is "likely to result in high risk" to data subjects to determine if individual notification is required
Individual notification under Article 34 is required when the breach is likely to result in high risk to the rights and freedoms of natural persons. High risk factors include: financial fraud potential, identity theft possibility, special category data involved, large number of people affected, data concerning vulnerable individuals, and severity of damage possible. Document your risk assessment for every breach, even when you conclude individual notification is not required.
Notify affected individuals "without undue delay" when high risk is determined
The notification to affected individuals must: describe in clear and plain language the nature of the breach; provide DPO contact details; describe the likely consequences; and describe the measures taken or proposed to address the breach and mitigate its possible adverse effects. Send notifications through the most effective channel available — email if you have email addresses, post if not. Do not use the notification as an opportunity for marketing or to minimize the severity.
Document every breach in an internal breach register, including no-notification decisions
Article 33(5) requires controllers to document all personal data breaches, including those that do not require DPA notification. The breach register must include: the facts of the breach, its effects, and the remedial action taken. This register allows the DPA to verify compliance when it inspects. Maintain breach records for at least five years. Include a cross-reference to the DPA notification reference number where applicable.
Establish a processor-to-controller breach notification process with agreed timeframes
Article 33(2) requires processors to notify the controller "without undue delay" after becoming aware of a breach — typically interpreted as within 24-48 hours to give the controller time to meet the 72-hour DPA notification deadline. Include specific breach notification timeframes in all Article 28 DPAs. If a processor fails to notify you promptly and you miss the 72-hour window as a result, document the processor's delay in your notification to the DPA.
Implement technical monitoring to detect breaches promptly (SIEM, IDS, access anomaly alerts)
The EDPB has stated that organizations should implement technical and organizational measures to enable prompt detection of breaches. Controllers that take weeks to discover a breach that a monitoring system would have caught in hours demonstrate inadequate security under Article 32. Implement at minimum: failed login alerting, unusual access volume monitoring, bulk export detection, and privileged account activity logging. Connect these to a 24/7 response capability.
Maintain DPA contact information and notification templates ready for immediate use
Under the time pressure of the 72-hour clock, do not be searching for the DPA portal URL or drafting notification language from scratch. Maintain an up-to-date list of supervisory authority online reporting portals for each jurisdiction in which you operate. Pre-draft notification templates with guidance notes that can be quickly customized. Ensure DPO credentials for DPA portals are current and backed up.
Conduct root cause analysis within 30 days of every breach and implement remediation
Post-breach investigation must identify the root cause (phishing, misdelivery, unauthorized access, unpatched vulnerability, insider threat, etc.) and implement technical and organizational remediation. Document the root cause analysis and retain it. DPAs often request root cause documentation in follow-up inquiries. Companies that can demonstrate systematic remediation receive more favorable treatment than those that treat breaches as isolated incidents.
Update the breach register with final details and close out the incident formally
After the immediate response phase, update the breach register with: the final count of affected data subjects and records, the complete timeline from incident to awareness to notification, copies of all notifications sent (to DPA and individuals), the root cause finding, and the remediation actions taken with completion dates. Formal close-out creates a clean audit trail and documents that the incident was properly managed end-to-end.
Test your breach response program with tabletop exercises at least annually
Theoretical policies are not enough. Run at least one tabletop exercise per year simulating a realistic breach scenario — a ransomware attack encrypting your customer database, an employee accidentally emailing a spreadsheet of customer records to the wrong list, a processor notifying you of unauthorized access at 4pm on a Friday. Measure whether the team can meet the 72-hour clock, identify gaps, and remediate them before a real breach occurs.
Implement controls to prevent common breach types: phishing, misdelivery, and unauthorized access
EDPB and national DPA breach registers consistently identify the same top three breach types: phishing/credential theft, misdirected email (sending personal data to the wrong recipient), and unauthorized access (insider threats and hacked accounts). For phishing: MFA on all email accounts, phishing simulation training. For misdelivery: delayed send, auto-complete restrictions, large-list review gates. For unauthorized access: least-privilege access, quarterly access reviews.
Document the legal basis for any delay in individual breach notification and inform the DPA
Individual notification can be delayed if it would jeopardize an ongoing law enforcement investigation, or if the cost is disproportionate and a public communication is made instead. Both exceptions require documentation. If you delay individual notification, notify the DPA of the delay and the reasons in your Article 33 notification. Do not delay individual notifications for commercial reasons (e.g., protecting brand reputation) — this has been specifically cited in enforcement actions.
Verify that cyber liability insurance coverage includes GDPR notification costs
Breach notification costs — DPA notification, individual notification, legal fees, forensic investigation — are insurable expenses that cyber liability policies typically cover. Review your policy to confirm: notification costs are covered, the coverage limit is adequate for your breach exposure, the insurer has pre-approved the forensic investigators and counsel you plan to use, and the policy definition of "personal data" aligns with GDPR's broad definition. Notify your insurer within required timeframes after discovery.
See How Your Breach Notification Scores on GDPR
Run a free gap analysis to find out which items you have covered and where the risks are.
Gap Analyzer → Training Tracker →Common Mistakes That Trigger Enforcement
Frequently Asked Questions
Does every data breach require notification to the supervisory authority?
No. Under Article 33(1), DPA notification is required only for breaches that are likely to result in a risk to the rights and freedoms of natural persons. Breaches that are unlikely to result in any risk — for example, a laptop encrypted with full-disk encryption is lost but the data is inaccessible — do not require DPA notification, though they must be documented in your breach register under Article 33(5). In practice, most breaches involving unencrypted personal data will meet the "likely risk" threshold.
What happens if we miss the 72-hour notification deadline?
Missing the 72-hour deadline does not automatically result in a fine. Article 33(1) requires notification "without undue delay and, where feasible, not later than 72 hours" — and Article 33(1) allows for delayed notification with an explanation. If you cannot meet 72 hours, notify as soon as possible and include an explanation of the reasons for the delay. DPAs evaluate whether the delay was reasonable given the circumstances. Systematic late notifications — or deliberate suppression of notifications — receive the harshest treatment.
Are we required to notify data subjects in every breach?
No. Individual notification under Article 34 is required only when the breach is likely to result in HIGH risk to the rights and freedoms of data subjects — a higher threshold than the DPA notification threshold. Individual notification may not be required if: effective technical protection measures (like encryption) were applied to the data such that it is unintelligible to anyone who accessed it; you subsequently took steps to ensure the high risk is no longer likely to materialize; or contacting each individual would involve disproportionate effort, in which case a public communication or equivalent measure may be made instead.
✉ Save This Checklist
Enter your email and we'll send you a clean copy — plus updates when requirements change.
We also offer a free personalized gap analysis for your specific situation.
Related Resources
- Complete GDPR Framework Guide
- GDPR for SaaS Companies
- GDPR Tier 1 Fines
- GDPR Tier 2 Fines
- HIPAA Compliance Checklist for Dental Practices
- HIPAA Compliance Checklist for Mental Health Providers
- HIPAA Compliance Checklist for Pharmacies
- Free Compliance Gap Analyzer
- Employee Training Tracker
- 5-Minute Compliance Quiz