Article 34 GDPR Guide

Stop Guessing When to Notify Data Subjects After a Breach: Get the Exact Framework

Updated 2026-05-18
Key Takeaways: Priverion is a Swiss-hosted GRC platform that helps privacy teams manage GDPR Article 34 breach notifications across multi-entity corporate groups.

Get the step-by-step Article 34 decision framework, notification templates, and multi-entity coordination checklist that privacy teams at 50+ organizations use to handle breach notifications without the guesswork, panic, or regulatory exposure.

No spam. Instant access to the checklist and templates.

Or keep reading for the full Article 34 breakdown
Trusted by 50+ privacy teams across 14 countries
Healthcare
Aviation
Energy
Legal
Technology
Zurzach logo
AXA logo
Open Medical logo
Glencore logo
Pilatus logo
Liferay logo
CareerFairy logo
Voicepoint logo
Kellerhals Carrard logo
Aclaris logo
Avantec logo
Diakonie Bethanien logo
Liferay logo
CareerFairy logo
Zurzach logo
Voicepoint logo
Open Medical logo
Kellerhals Carrard logo
AXA logo
Aclaris logo
Avantec logo
Diakonie Bethanien logo

What privacy professionals say

Results From Privacy Teams Like Yours

60% less admin time

"We reduced compliance administration time by 60% within six months. Our DPO now spends time on risk assessments and strategic decisions instead of chasing documentation across spreadsheets."

Head of Data Protection, Aircraft manufacturer

Aviation manufacturing, multi-entity privacy program

200+ hours saved

"We saved over 200 hours on compliance documentation and finished ISO 27001 readiness three months ahead of schedule. The audit-ready evidence packages were available on demand, eliminating the scrambling before supervisory authority requests."

Compliance Lead, Medtec

Healthcare technology, ISO 27001 certified

24/7 breach coordination

"We manage DPO support and breach response coordination across multiple entities from one unified platform. The jurisdictional blind spots we had with email-based processes are gone, and every notification decision is tracked per entity."

Group DPO, Trapeze

Technology, multi-entity privacy management

Based on customer-reported outcomes. Aircraft manufacturer and Medtec data from first 12 months post-implementation. Trapeze data from ongoing engagement.

Article 34 Framework

The Complete Article 34 Breakdown: When, What, and How to Notify Data Subjects

Article 34 is one of the most misjudged provisions in the GDPR. Notify when you shouldn't, and you trigger unnecessary panic. Fail to notify when you should, and you face enforcement action. Here is the framework for getting it right.

Step 1

Determine Whether the Breach Meets the "High Risk" Threshold

Article 34(1) is triggered only when a breach "is likely to result in a high risk to the rights and freedoms of natural persons." This is a higher bar than Article 33's notification to the supervisory authority, which applies to any breach that is not unlikely to result in risk.

Factors that typically push a breach into "high risk" territory:

  • Special category data is involved (health, biometric, racial/ethnic origin, political opinions)
  • Financial data that could enable fraud (bank accounts, credit card numbers)
  • Large volume of affected individuals
  • Data that could lead to identity theft, discrimination, or physical harm
  • Vulnerable data subjects are affected (children, patients, employees)
  • The data was not encrypted or pseudonymised at the time of the breach

The key question is not "how bad was the breach?" but "how likely is it that affected individuals will suffer real harm?" Your risk assessment must document the reasoning, as supervisory authorities will ask for it.

Step 2

Check the Three Exceptions That Eliminate the Notification Obligation

Article 34(3) provides three exceptions. If any of these apply, you are not required to notify data subjects, but you must still document why the exception applies.

Exception (a): Appropriate protection measures were in place

You applied technical and organisational measures that render the personal data unintelligible to any person not authorised to access it. The most common example is encryption: if the breached data was encrypted with a strong algorithm and the key was not compromised, this exception likely applies.

Exception (b): Subsequent measures eliminate the risk

You took immediate action after the breach that ensures the high risk to data subjects is no longer likely to materialise. For example, you identified and contained the breach before any data was actually accessed, or you remotely wiped a lost device before it was unlocked.

Exception (c): Disproportionate effort

If individual notification would involve disproportionate effort (for example, you cannot identify or contact all affected individuals), you must instead make a public communication or take a similar measure that informs data subjects equally effectively. This is the exception most frequently misapplied; supervisory authorities interpret "disproportionate effort" narrowly.

Step 3

Draft the Notification Content

Article 34(2) references Article 33(3)(b), (c), and (d). Your notification to data subjects must include four elements, communicated "in clear and plain language":

  • The nature of the breach: Describe what happened in terms the recipient can understand. Avoid legal jargon and technical language. "An unauthorised third party accessed your account information" is better than "a security incident involving credential exposure occurred."
  • DPO contact details: The name and contact details of your data protection officer or other contact point where they can obtain more information.
  • Likely consequences: Be honest and specific. "This may mean your email address and password are available to unauthorised parties, which could be used to access other accounts if you use the same password" is more useful than "there may be a risk to your personal data."
  • Mitigation measures: Describe what you have done and what you recommend they do: password resets, account monitoring, credit freezes, contact points for questions.
Step 4

Choose the Right Communication Channel

The GDPR does not prescribe a specific channel, but the notification must actually reach affected individuals. Consider:

  • Direct email: Most common for online breaches. Ensure you are sending to verified addresses and can evidence delivery.
  • Postal mail: Appropriate for breaches involving offline data or when email addresses are not available.
  • Dedicated incident page: Useful as a supplement but typically insufficient as the sole notification method.
  • In-app notification: Can work for active users of a digital service but misses inactive accounts.

Document your channel selection rationale. If a supervisory authority asks why you chose email over post for a breach affecting elderly patients, you need a defensible answer.

Step 5

Execute the Notification and Preserve the Audit Trail

Article 34 says "without undue delay." Unlike Article 33's 72-hour deadline, there is no fixed clock, but supervisory authorities expect action as soon as you have enough information to provide meaningful guidance.

What your audit trail must capture:

  • Timestamp of the risk assessment decision
  • Names and roles of people involved in the decision
  • The rationale for or against notification (including exception analysis)
  • Draft versions and final content of the notification
  • Channel selection and delivery evidence
  • Follow-up communications and data subject inquiries

This is where spreadsheet-based processes collapse. When a supervisory authority requests your breach file six months later, you need every decision, timestamp, and communication in one place, not scattered across email threads, shared drives, and individual notebooks.

Step 6

Handle Multi-Entity Complexity

For organisations managing multiple subsidiaries across jurisdictions, Article 34 notification becomes exponentially more complex:

  • Which entity is the data controller for the affected data subjects?
  • Do different jurisdictions have additional local requirements beyond GDPR Article 34?
  • Must notifications be sent in the local language of each affected jurisdiction?
  • Who approves the notification content: the group DPO, the local DPO, or legal counsel in each jurisdiction?
  • How do you prevent conflicting communications from different subsidiaries about the same incident?

This is the exact scenario Priverion was designed for. Cross-entity data mapping identifies which subsidiaries hold affected data, incident management coordinates the response across entities, and audit-ready evidence packages capture the complete decision trail, per entity, per jurisdiction.

Key Capabilities

The Tools That Turn Article 34 Obligations Into a Repeatable Process

Breach notification to data subjects fails when it depends on memory, spreadsheets, and ad hoc email chains. These capabilities replace guesswork with a structured, auditable workflow, especially when you are managing incidents across multiple entities.

Incident Management with Built-In Risk Scoring

When a breach is reported, the platform walks your team through a structured assessment, capturing breach type, data categories, volume of affected individuals, and vulnerability factors. AI-assisted risk scoring helps you determine whether the Article 34 "high risk" threshold is met, so your DPO makes an informed decision instead of a gut call under pressure.

Result: Aircraft manufacturer reduced compliance admin time by 60% in their first 6 months, freeing their DPO to focus on risk assessments and strategic decisions rather than chasing documentation.

Aircraft manufacturer, first 6 months post-implementation

Cross-Entity Breach Coordination

When a breach touches data subjects across multiple subsidiaries and jurisdictions, you need a single source of truth, not a chain of forwarded emails. Priverion gives group-wide visibility into every active incident, maps affected entities automatically through your cross-entity data mapping, and tracks notification decisions per jurisdiction so nothing slips through the cracks.

Result: Trapeze manages 24/7 DPO support and breach response coordination across multiple entities from a unified platform, eliminating the jurisdictional blind spots that manual processes create.

Trapeze, multi-entity privacy program management

Audit-Ready Evidence Packages

Article 34 compliance does not end when you hit send on the notification. Supervisory authorities expect documentation of your risk assessment, the rationale behind your notification decision, the content of the communication, and proof of delivery. Priverion generates complete evidence packages, with timestamped audit trails, in minutes, not the weeks of scrambling that spreadsheet-based processes demand.

Result: Medtec saved 200+ hours in compliance documentation preparation, with audit-ready evidence available on demand for supervisory authority requests.

Medtec, ISO 27001 preparation timeframe

An honest note: Priverion does not cover cookie consent banners, ethics hotlines, or ESG reporting. We go deep on privacy program management (incident response, ROPA, DPIAs, vendor risk, and DSRs) so your breach workflows actually work when it matters.

200+

Hours saved on compliance documentation

Medtec recovered 200+ hours during ISO 27001 preparation by replacing manual documentation with automated workflows, first 12 months

60%

Less compliance admin time

Based on Aircraft manufacturer's results, entity-based pricing with no per-user or per-module expansion fees

3 mo.

Ahead of schedule on ISO 27001 readiness

Medtec accelerated their ISO 27001 certification timeline by three months using Priverion's audit-ready evidence packages

Free Resource

Get the Article 34 Breach Notification Kit

Step-by-step checklist, risk assessment decision tree, two notification templates (direct and public communication), and multi-entity coordination workflow. Built for DPOs and compliance leads.

No spam. We will send you the templates and nothing else unless you opt in.

Competitor-Aware

Why mid-market teams are leaving OneTrust for Priverion

OneTrust was serving a broad buyer profile including Fortune 500 organizations with larger dedicated GRC teams. You need enterprise-grade compliance without enterprise complexity or enterprise invoices.

The OneTrust experience

Modular pricing that compounds

Per-user, per-module billing means your costs grow unpredictably every time you add a subsidiary, a team member, or a new compliance need. Budget requests become quarterly negotiations.

US-hosted infrastructure

In a post-Schrems II landscape, storing your privacy compliance data with a US-based vendor creates the exact cross-border transfer risk you're trying to manage. The irony writes itself.

Built for the Fortune 500

200+ integrations, ESG modules, ethics hotlines: features that add complexity to your admin console but not to your privacy program. Your DPO doesn't need a platform that requires its own team to operate.

Months-long implementation

Enterprise deployments routinely stretch beyond six months with dedicated project teams, external consultants, and extended onboarding cycles before you see any compliance value.

Opaque AI processing

Unclear data processing for AI features raises questions about where your compliance data flows, a difficult conversation to have with your supervisory authority.

The Priverion experience

Predictable, all-inclusive pricing

Pricing based on number of companies and organizational size, not per-user or per-module. Add team members across all subsidiaries without watching your invoice grow. Your CFO will appreciate the predictability.

Guaranteed Swiss data sovereignty

Swiss-built, Swiss-hosted, all data processing within Swiss infrastructure. European data residency isn't a marketing checkbox; it's a legal requirement for cross-border data transfers that simplifies your DPIA for the tool itself.

Purpose-built for group-wide privacy

ROPA, DPIAs, vendor assessments, incident management, DSR handling, and cross-entity data mapping: everything a multi-entity privacy program needs, nothing it doesn't. We don't cover ESG, ethics hotlines, or cookie consent. That focus is deliberate.

Operational in weeks, not months

Aircraft manufacturer achieved a 60% reduction in compliance admin time within their first 6 months, including implementation. No dedicated project teams or external consultants required.

Aircraft manufacturer case study, first 6 months post-deployment

Transparent AI with human oversight

AI-assisted DPIA drafting, risk scoring, and regulatory mapping, all processed within Swiss infrastructure. Every AI output is reviewed by your team before becoming a compliance record. No customer data is used for model training. AI assists, humans decide.

Switching is simpler than you think. Most teams are fully migrated in under 8 weeks.

Book a 30-min walkthrough
FAQ

Frequently Asked Questions About Article 34 Breach Notification

When does Article 34 GDPR require notification to data subjects?

Article 34 requires notification when a personal data breach is likely to result in a high risk to the rights and freedoms of natural persons. This is a higher threshold than Article 33 notification to the supervisory authority, which applies to all breaches except those unlikely to result in any risk. The key determination is whether affected individuals are likely to suffer real harm: identity theft, financial loss, discrimination, or reputational damage.

What must an Article 34 notification contain?

The notification must describe the nature of the breach in clear and plain language, provide the name and contact details of the DPO or other contact point, describe the likely consequences of the breach, and describe the measures taken or proposed to address the breach and mitigate its effects. Avoid legal jargon; supervisory authorities have fined organisations for notifications that were technically compliant but incomprehensible to the average person.

When is Article 34 notification NOT required?

Notification is not required when: (a) you applied appropriate technical and organisational protection measures to affected data, such as encryption where the key was not compromised; (b) you took subsequent measures ensuring the high risk is no longer likely to materialise; or (c) it would involve disproportionate effort, in which case a public communication or similar measure is required instead. All three exceptions must be documented in your breach file.

How quickly must data subjects be notified under Article 34?

Article 34 states notification must happen "without undue delay" but does not specify a fixed timeframe like Article 33's 72-hour rule. In practice, supervisory authorities expect communication as soon as the high-risk determination is made and you have enough information to provide meaningful guidance to affected individuals. Delays of weeks without justification have resulted in enforcement action.

What is the difference between Article 33 and Article 34 GDPR?

Article 33 governs notification to the supervisory authority (72-hour deadline, applies to most breaches). Article 34 governs notification to affected data subjects (no fixed deadline but "without undue delay"), and applies only when the breach is likely to result in high risk to individuals' rights and freedoms. Many organisations conflate the two, leading to either over-notification (creating unnecessary panic) or under-notification (creating regulatory exposure).

How do you manage Article 34 notifications across multiple subsidiaries?

Multi-entity breach notification requires a centralised incident management platform that maps affected entities, tracks notification decisions per jurisdiction, and maintains a single audit trail. Manual coordination via email chains across subsidiaries creates gaps that supervisory authorities will identify during investigations. Priverion's cross-entity data mapping and incident management workflow was designed specifically for this scenario.

Stop managing breach response in spreadsheets

See what group-wide privacy management looks like when it actually works

In 30 minutes, we will walk through your specific multi-entity setup: how automated ROPA recertification, AI-assisted DPIAs, and cross-subsidiary data mapping work for organizations like yours. All built on Swiss infrastructure, with pricing that does not punish you for growing.

60%

less compliance admin time

Aircraft manufacturer, first 6 months

200+

hours saved on audit prep

Medtec, ISO 27001 readiness

Weeks

to go live, not months

Average across all customer deployments

Book a 30-Minute Walkthrough

No sales pitch. No pressure. Just your compliance challenges mapped to a working solution.

The Privacy Compliance Briefing

Monthly insights on GDPR enforcement, Swiss FADP updates, and automation strategies for DPOs and compliance teams.

No spam. Unsubscribe anytime.

Get the Free Breach Kit
About this page — references, definitions, and FAQs

Key Takeaways — GDPR Breach Notification to Data Subjects

GDPR Article 34 requires controllers to notify data subjects without undue delay when a personal data breach is likely to result in a high risk to their rights and freedoms. This threshold is higher than the Article 33 supervisory authority notification. Three exceptions under Article 34(3) — encryption, subsequent risk elimination, and disproportionate effort — may remove the obligation, but each must be documented. Effective breach notification programmes require pre-drafted templates, clear escalation paths, and auditable decision logs across every entity in a corporate group.

Definitions

What is a Personal Data Breach under the GDPR?

Personal data breach is defined in Article 4(12) GDPR as "a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed." (GDPR Article 4 — gdpr-info.eu)

What is Article 34 GDPR?

Article 34 GDPR governs the communication of a personal data breach to the data subject. It states: "When the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall communicate the personal data breach to the data subject without undue delay." (GDPR Article 34 — gdpr-info.eu)

What is the "High Risk" Threshold?

The high risk threshold under Article 34 is assessed by considering the severity and likelihood of harm to data subjects. The EDPB Guidelines 01/2021 on Examples regarding Personal Data Breach Notification provide practical case studies illustrating when breaches cross this threshold. (EDPB Guidelines 01/2021)

What is Article 33 GDPR?

Article 33 GDPR requires controllers to notify the competent supervisory authority of a personal data breach within 72 hours of becoming aware of it, unless the breach is unlikely to result in a risk to the rights and freedoms of natural persons. (GDPR Article 33 — gdpr-info.eu)

Statistics and Industry Data

According to the EDPB Annual Report 2023, European data protection authorities received over 130,000 personal data breach notifications in 2023, continuing a year-on-year upward trend since the GDPR took effect in 2018. (EDPB Annual Report 2023)

The ENISA Threat Landscape 2024 report found that ransomware and data exfiltration attacks remain the leading causes of personal data breaches across the EU, with healthcare and public administration among the most targeted sectors. (ENISA Threat Landscape)

According to the IAPP-EY Privacy Governance Report 2023, 73% of organisations reported that their privacy teams are involved in breach response, yet only 38% have fully automated breach notification workflows. (IAPP-EY Privacy Governance Report)

The EDPB Guidelines 9/2022 on personal data breach notification under GDPR clarify that the 72-hour Article 33 deadline begins when the controller has a "reasonable degree of certainty" that a breach has occurred, and that Article 34 notification should follow "without undue delay" once the high-risk assessment is complete. (EDPB Guidelines 9/2022)

Frequently Asked Questions

When does Article 34 GDPR require notification to data subjects?

Article 34(1) requires notification when a personal data breach is likely to result in a high risk to the rights and freedoms of natural persons. This is a higher threshold than Article 33's supervisory authority notification, which applies unless the breach is "unlikely to result in a risk." The controller must assess severity, likelihood of harm, data sensitivity, and the number of affected individuals. (GDPR Article 34)

What are the three exceptions to notifying data subjects under Article 34(3)?

Article 34(3) provides three exceptions: (a) the controller applied appropriate technical and organisational measures (e.g., strong encryption) that render the data unintelligible; (b) the controller took subsequent measures that ensure the high risk is no longer likely to materialise; (c) individual notification would involve disproportionate effort, in which case a public communication must be made instead. Each exception must be documented. (GDPR Article 34)

What must a breach notification to data subjects contain?

Under Article 34(2), the notification must describe in clear and plain language: the nature of the breach, the DPO or contact point's name and details, the likely consequences, and the measures taken or proposed to address the breach and mitigate its effects. (GDPR Article 34)

What is the deadline for notifying data subjects under Article 34?

Article 34 requires notification "without undue delay" but does not specify a fixed deadline like Article 33's 72-hour window. In practice, supervisory authorities expect controllers to notify as soon as they have sufficient information to provide meaningful guidance to affected individuals. Delays must be justified and documented.

How does Article 34 differ from Article 33 GDPR?

Article 33 governs notification to the supervisory authority within 72 hours for any breach that is not unlikely to result in risk. Article 34 governs notification to data subjects and applies only when the breach is likely to result in high risk. Article 34 has no fixed deadline but requires action "without undue delay." Article 34 also includes three specific exceptions not present in Article 33. (Article 33 | Article 34)

Can encryption prevent the obligation to notify data subjects?

Yes. Under Article 34(3)(a), if the breached data was protected by strong encryption and the encryption key was not compromised, the data is considered unintelligible to unauthorised persons. In this case, the high risk to data subjects is effectively neutralised and notification is not required. However, the controller must document that the encryption was adequate and the key remained secure. (EDPB Guidelines 9/2022)

What happens if a controller fails to notify data subjects when required?

Failure to comply with Article 34 can result in administrative fines of up to €10 million or 2% of annual global turnover, whichever is higher, under Article 83(4)(a) GDPR. Beyond fines, failure to notify can lead to reputational damage, loss of customer trust, and civil liability claims from affected data subjects. (GDPR Article 83)

How should multi-entity organisations coordinate Article 34 notifications?

Corporate groups with multiple legal entities acting as separate controllers must coordinate breach response across jurisdictions. Each entity must independently assess whether Article 34 applies based on its own processing activities and the data subjects it controls. A centralised breach management platform — such as Priverion — enables group-wide visibility, consistent risk assessment methodology, and per-entity audit trails that satisfy supervisory authority scrutiny.

Comparison: Article 33 vs. Article 34 GDPR

CriterionArticle 33 — Supervisory AuthorityArticle 34 — Data Subjects
Trigger thresholdBreach not unlikely to result in riskBreach likely to result in high risk
DeadlineWithin 72 hours of awarenessWithout undue delay (no fixed clock)
RecipientCompetent supervisory authorityAffected data subjects directly
Content requirementsArticle 33(3)(a)–(d): nature, DPO, consequences, measuresArticle 34(2) referencing 33(3)(b)–(d): nature, DPO, consequences, measures
ExceptionsOnly if breach is unlikely to result in riskThree exceptions under Article 34(3): encryption, subsequent measures, disproportionate effort
Penalty for non-complianceUp to €10M or 2% global turnoverUp to €10M or 2% global turnover
Documentation requirementMust document all breaches per Article 33(5)Must document risk assessment and exception analysis

Authoritative Sources and Further Reading