Getting Started with GDPR
The General Data Protection Regulation (GDPR) has applied since May 25, 2018. It governs how organizations collect, process, store, and delete personal data of data subjects in the EU — regardless of where the organization itself is based. Non-compliance exposes organizations to fines of up to €20M or 4% of global annual turnover. Matproof’s GDPR framework maps accountability and governance controls to your policies, vendor assessments, and evidence library. It is designed to complement your GDPR documentation (RoPA, DPIAs) rather than replace dedicated privacy management tools.Activate GDPR under Settings → Frameworks → GDPR. Your control set focuses on organizational and technical measures under Article 32, accountability documentation, and vendor (processor) management.
Who Must Comply?
GDPR applies to you if:- You are established in the EU (regardless of where you process data)
- You are outside the EU but offer goods or services to data subjects in the EU
- You are outside the EU but monitor the behaviour of data subjects in the EU (e.g., analytics, tracking)
Key GDPR Roles
| Role | Definition | Your Obligation |
|---|---|---|
| Data Controller | Determines the purpose and means of processing | Primary accountability — must have lawful basis, honor data subject rights, maintain RoPA |
| Data Processor | Processes data on behalf of a controller | Must follow controller instructions, sign DPA, implement Article 32 measures |
| Sub-processor | Processor used by another processor | Controller must approve sub-processors; DPA chain must flow down |
Core GDPR Requirements at a Glance
| Article | Requirement | Matproof Module |
|---|---|---|
| Art. 5 | Data minimisation, purpose limitation, accuracy | Policies |
| Art. 13-14 | Privacy notices for data subjects | Policies |
| Art. 24 | Responsibility of the controller | Controls |
| Art. 25 | Data protection by design and by default | Controls |
| Art. 28 | Data Processing Agreements with processors | Vendor Risk |
| Art. 30 | Records of Processing Activities (RoPA) | Controls, Policies |
| Art. 32 | Technical and organisational measures (TOMs) | Controls, Evidence |
| Art. 33 | Breach notification to supervisory authority (72 hours) — only if the breach is likely to result in a risk to individuals’ rights and freedoms | Incidents |
| Art. 34 | Communication to data subjects when high risk | Incidents |
| Art. 35 | Data Protection Impact Assessments (DPIAs) | Controls |
| Art. 37 | Data Protection Officer (DPO) appointment where required | People, Settings |
Recommended Implementation Plan
This becomes the basis for your Records of Processing Activities (RoPA) — required under Article 30 for all organizations unless they have fewer than 250 employees AND their processing is occasional, does not pose risks to data subjects, and does not involve special category or criminal offence data. In practice, this exemption rarely applies — most organizations processing customer or employee data regularly must maintain a RoPA regardless of size.
Document your data flows in the Context Hub (Settings → Context Hub) so Matproof’s AI can generate relevant policies.
Document the lawful basis for each processing activity in your RoPA. This is what supervisory authorities ask for first.
Article 32 requires “appropriate technical and organisational measures” — but does not specify exactly what. In practice, supervisory authorities look for:
Article 28 requires a written Data Processing Agreement (DPA) with every third party that processes personal data on your behalf.
If you use sub-processors (your processor uses another company to process data), you must inform controllers and obtain approval. Document sub-processor chains in Vendor Risk.
GDPR Article 33 requires notifying your supervisory authority within 72 hours of becoming aware of a personal data breach.
The 72-hour clock starts when your organization becomes aware — not when you confirm the full scope.
GDPR grants data subjects: right of access (DSAR), right to rectification, right to erasure, right to portability, right to restrict processing, right to object, and right not to be subject to solely automated decision-making (Article 22).
Article 35 requires a Data Protection Impact Assessment (DPIA) before starting any processing that is “likely to result in a high risk” to individuals. This includes:
Breach Notification Quick Reference
| Step | Timeline | Action |
|---|---|---|
| Breach detected | T+0 | Contain breach, assess scope, notify DPO |
| Within 72 hours | T+72h | Notify lead supervisory authority (even if incomplete) |
| High risk to individuals | ASAP | Notify affected data subjects directly |
| Documentation | Ongoing | Log in breach register regardless of notification obligation |
Common Mistakes
1. Consent as the default lawful basis
Consent is one of the hardest lawful bases to maintain (it must be freely given, withdrawable, and documented). For B2B SaaS processing customer data, legitimate interests or contract is usually more appropriate for most processing activities.2. DPAs treated as a checkbox
Many organizations collect DPAs from processors but never review them. Article 28 requires DPAs to include specific provisions — collect them and verify the content.3. Ignoring employee data
GDPR applies to employee personal data too. Recruitment data, payroll, performance records, and monitoring activities all require a lawful basis and retention policy.Next Steps
- Incidents — 72-hour breach notification workflow
- Vendor Risk — DPA tracking and processor risk assessments
- People Module — employee data handling and access management
- Policy Management — privacy policy generation and acknowledgement tracking