GDPR Breach Notification Guide

Never Miss the 72-Hour GDPR Breach Window . Here's Exactly When the Clock Starts

Getting it wrong has cost companies millions. See how privacy teams at multi-entity organizations automate breach detection, assessment, and notification to stay compliant under Article 33 , every time.

Book a Free Breach Readiness Assessment

30 minutes. No commitment. See your gaps before regulators do.

Or read the full Article 33 guide below

Trusted by privacy teams managing 50+ entities across Europe

Swiss-hosted -- ISO 27001 aligned

4.8/5 customer satisfaction, Q1 2025

Trusted by 50+ privacy teams across 14 countries
Healthcare
Aviation
Energy
Legal
Technology
Zurzach logo
AXA logo
Open Medical logo
Glencore logo
Pilatus logo
Liferay logo
CareerFairy logo
Voicepoint logo
Kellerhals Carrard logo
Aclaris logo
Avantec logo
Diakonie Bethanien logo
Liferay logo
CareerFairy logo
Zurzach logo
Voicepoint logo
Open Medical logo
Kellerhals Carrard logo
AXA logo
Aclaris logo
Avantec logo
Diakonie Bethanien logo

"Before Priverion, a breach at one subsidiary could take days to reach the group DPO. Now, every incident is captured centrally within minutes , we went from hoping we'd meet the 72-hour window to knowing we would."

Markus Lehner

Head of Data Protection, Zurzach Care Group -- Managing privacy across 14 care facilities

"We cut our compliance admin time by 60% in the first six months. The automated escalation alone saved us during two incidents that would have been late notifications under our old process."

Stefan Bucher

Compliance Lead, Aircraft manufacturer -- Based on customer survey, Q1 2025

Key Capabilities for Breach Response

What a 72-Hour Window Actually Demands From Your Organization

Knowing the rules is not the hard part. Executing them under pressure , across subsidiaries, time zones, and escalation chains , is where organizations break down. Here is what operationally competent breach response requires.

Centralized Incident Intake Across Every Entity

When a breach surfaces in subsidiary number 23 on a Saturday evening, it cannot sit in someone's inbox until Monday. You need a single intake point that captures incidents from any entity, any employee, any time zone , and immediately routes them to the right people with the right context. Without centralized intake, "awareness" gets delayed by organizational friction, not by genuine investigation.

100% incident capture rate across all entities

Zurzach Care , achieved full coverage across their care group within 90 days of deployment

Automated Escalation and Severity Assessment

The moment an incident is logged, it needs to be assessed: Does it involve personal data? What categories? How many data subjects? Is the risk high enough to require data subject notification under Article 34? AI-assisted risk scoring helps your team make these determinations in minutes instead of hours , turning a judgment call into a structured, documented decision that holds up under regulatory scrutiny.

60% reduction in compliance admin time

Aircraft manufacturer , measured over first 6 months of Priverion deployment

Multi-Jurisdiction Notification Workflows

A breach affecting customers in Germany, France, and Austria may require notification to multiple supervisory authorities , each with slightly different forms, portals, and expectations. If your group does not have a lead supervisory authority under the one-stop-shop mechanism, your DPO is suddenly coordinating parallel notifications under the same ticking clock. Pre-configured templates and jurisdiction-specific workflows turn a coordination nightmare into a managed process.

24/7 DPO support across multiple entities

Trapeze Group , ongoing operational support for cross-entity privacy management

Audit-Ready Evidence Packages on Demand

Regulators do not just ask whether you notified on time. They ask how you determined the breach was notifiable, what your assessment process looked like, who was involved, and what evidence informed each decision. If those answers live in email threads and Slack messages, you are building your defense from fragments. A structured incident record , with timestamped decisions, risk scores, and approval trails , is your proof that "awareness" was handled properly.

200+ hours saved in audit preparation

Medtec , during ISO 27001 certification preparation using Priverion

Vendor Breach Coordination and Processor Tracking

When a processor discovers a breach, Article 33(2) requires them to notify you "without undue delay." But if your vendor agreements are inconsistent or your processor inventory is scattered across legal drives, you cannot even verify whether notification obligations were met. Centralized vendor risk assessments , including contractual breach notification terms , ensure you know exactly which processors owe you what, and how quickly.

100% vendor risk assessment coverage

Zurzach Care , complete third-party risk coverage across all care facilities

Swiss Data Sovereignty for Breach Records

Your breach documentation contains some of the most sensitive data your organization will ever generate: details of security failures, affected data subject categories, internal assessment notes. Storing this in a US-hosted platform creates a secondary cross-border transfer risk on top of the breach itself. All Priverion data , including incident records and evidence packages , is processed and stored within Swiss infrastructure, under Swiss data protection law.

Swiss-built and Swiss-hosted

All data processing within Swiss infrastructure , European data residency guaranteed

See how Priverion automates breach detection and notification for multi-entity organizations , in 30 minutes.

Book a Free Breach Readiness Assessment

200+

Hours saved on ROPA management

Medtec reclaimed 200+ hours during ISO 27001 preparation by replacing manual record-keeping with automated recertification workflows.

60%

Lower cost vs. legacy enterprise platforms

Based on published pricing comparisons with OneTrust for multi-entity organizations managing 10+ subsidiaries. No per-user fees, no per-module expansion.

3 mo

Ahead of schedule on ISO 27001 readiness

Medtec accelerated their ISO 27001 certification timeline by three months using Priverion's audit-ready evidence packages and automated documentation.

Competitor-Aware

Why mid-market privacy teams are leaving OneTrust

You don't need a platform built for Fortune 50 companies , and priced like one. You need enterprise-grade compliance that matches how your organization actually works.

The OneTrust experience

Per-module pricing

Need ROPA, DPIA, vendor risk, and DSR management? That's four separate line items. Budget requests become negotiations , and costs escalate unpredictably as you add users or entities.

US-hosted infrastructure

In a post-Schrems II world, hosting your compliance data with a US-headquartered vendor creates the exact transfer risk your privacy program is supposed to mitigate. EU data center options don't resolve the jurisdictional question.

Complexity built for Fortune 50

Hundreds of features you'll never use. Months-long implementation timelines. Your team spends more time learning the tool than managing privacy , exactly the problem software was supposed to solve.

200+ shallow integrations

A long connector list looks impressive in a demo. In practice, shallow integrations break, require constant maintenance, and rarely deliver the data depth your privacy workflows actually need.

Multi-entity as an afterthought

Group-wide visibility requires workarounds and custom configuration. Managing 12 subsidiaries shouldn't feel like managing 12 separate deployments.

The Priverion experience

All-in-one platform pricing

ROPA, DPIA, vendor risk, DSR, incident management, AI Register , included. Pricing based on number of companies and organizational size, not per-user or per-module. No expansion traps, no surprise invoices at renewal.

Swiss-built, Swiss-hosted

All data processing within Swiss infrastructure , one of the few jurisdictions with an EU adequacy decision. European data residency isn't a checkbox for us. It's our identity. Your compliance data stays outside US jurisdiction, full stop.

Operational in weeks, not months

Aircraft manufacturer achieved a 60% reduction in compliance admin time within their first 6 months. A simpler UX means your team spends time managing privacy , not learning software.

Aircraft manufacturer , first 6 months post-implementation

Deep integrations that matter

We integrate deeply with the systems that drive privacy workflows . HR, procurement, IT asset management , rather than offering 200 shallow connectors that create maintenance overhead and deliver surface-level data.

Group-wide by design

Multi-entity management is our core architecture, not a bolt-on. AXA achieved 100% ROPA recertification across all entities , fully automated. One dashboard, every subsidiary, complete visibility.

AXA , automated ROPA recertification across all group entities

The Complete Guide: GDPR 72-Hour Breach Notification Under Article 33

Article 33 of the GDPR requires controllers to notify supervisory authorities of personal data breaches "without undue delay and, where feasible, not later than 72 hours after having become aware of it." Those 23 words have generated more regulatory guidance, enforcement actions, and compliance anxiety than almost any other provision in the regulation.

The critical question is not "how fast do we need to notify?" . it is "when does the clock actually start?"

What "Awareness" Means Under Article 33

The 72-hour window does not begin when the breach occurs. It begins when the controller "becomes aware" of the breach. The European Data Protection Board (EDPB) has clarified this in its Guidelines 9/2022 on personal data breach notification:

A controller should be regarded as having become "aware" when that controller has a reasonable degree of certainty that a security incident has occurred that has led to personal data being compromised.

EDPB Guidelines 9/2022, paragraph 72

This means the clock does not start the moment someone in your organization suspects something might be wrong. It starts when you have a "reasonable degree of certainty" that personal data has been compromised. However , and this is where organizations get into trouble , you cannot delay awareness by choosing not to investigate.

The "Should Have Known" Standard

Regulators have consistently held that organizations cannot plead ignorance if they failed to implement reasonable detection measures. If a breach was detectable through standard monitoring and your organization missed it because monitoring was inadequate, regulators will treat the moment the breach should have been detected as the moment of awareness.

This principle was tested in several notable enforcement actions:

  • The Dutch DPA fined Booking.com for late notification, finding that awareness occurred when individual hotels reported unauthorized access , not when Booking.com's central team completed its internal investigation weeks later.
  • The UK ICO found that Marriott's awareness was delayed because the company inherited Starwood's compromised systems and failed to conduct adequate due diligence, effectively inheriting the breach awareness timeline.
  • The Spanish AEPD has consistently held that a controller's awareness begins when any employee with authority to act on the information receives it , not when the DPO is formally notified.

When Does the Clock Start for Processors?

Article 33(2) places a separate obligation on processors: they must notify the controller "without undue delay after becoming aware of a personal data breach." No 72-hour deadline is specified for processors, but "without undue delay" has been interpreted narrowly.

For controllers, this creates a cascading timeline. If your processor becomes aware on Monday and notifies you on Wednesday, your 72-hour clock starts on Wednesday , but if the processor's delay was unreasonable, the supervisory authority may still scrutinize the overall timeline.

This is why contractual breach notification terms matter. If your vendor agreements specify "48-hour processor notification" but your processor inventory is scattered across shared drives, you cannot verify whether those terms were honored , or even which processors are relevant to the breach.

What Counts as "Without Undue Delay"?

The 72 hours is a maximum, not a target. The GDPR says "without undue delay and, where feasible, not later than 72 hours." This means:

  • If you can notify in 24 hours, you should. Waiting until hour 71 when you had sufficient information at hour 12 is itself a compliance failure.
  • If you genuinely cannot complete your assessment within 72 hours, you can submit a phased notification , but you must provide reasons for the delay and submit initial information within the 72-hour window.
  • Weekends and holidays do not pause the clock. If awareness occurs at 11 PM on a Friday, you have until 11 PM on Monday.

What Information Must the Notification Contain?

Article 33(3) specifies minimum content for breach notifications:

  • The nature of the personal data breach, including categories and approximate number of data subjects and records
  • The name and contact details of the DPO or other contact point
  • A description of likely consequences of the breach
  • A description of measures taken or proposed to address the breach, including mitigation

For multi-entity organizations, this creates a coordination challenge. If the breach affects data subjects across multiple subsidiaries in different jurisdictions, you may need to file with multiple supervisory authorities , unless you have a lead authority under the one-stop-shop mechanism.

The Multi-Entity Coordination Problem

The 72-hour clock is challenging enough for a single organization. For enterprise groups managing compliance across 10, 20, or 50+ entities, it becomes exponentially harder:

  • Which entity is the controller , the subsidiary where the breach occurred, or the parent company?
  • If multiple entities share a data processing system, does awareness at one entity constitute awareness for all?
  • Who has authority to file the notification , the local DPO, the group DPO, or legal?
  • Which supervisory authority receives the notification when affected data subjects span multiple member states?

These questions cannot be answered during a breach. They must be resolved in advance, documented in your incident response plan, and tested through regular tabletop exercises.

78% of multi-entity organizations still manage RoPAs in spreadsheets. If your processing records are fragmented across subsidiaries, determining the scope of a breach , which data categories, which data subjects, which jurisdictions , takes days instead of hours. The 72-hour clock does not wait for your spreadsheets to be reconciled.

Based on Priverion analysis of privacy program maturity across enterprise prospects, 2023-2024

When Notification Is Not Required

Not every breach triggers the 72-hour clock. Article 33(1) includes an important qualifier: notification is required "unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons."

This risk assessment is where many organizations struggle. The EDPB has provided examples:

  • An encrypted laptop is stolen, and the encryption key was not compromised , likely no risk, likely no notification required
  • A brief power outage causes temporary inability to access patient records , risk depends on context (emergency care vs. routine records)
  • An email containing personal data is sent to the wrong recipient, who confirms deletion without reading , low risk, but still a breach that must be documented internally

Even when notification to the supervisory authority is not required, Article 33(5) requires you to document the breach, its effects, and the remedial action taken. This documentation must be available for supervisory authority review upon request.

Making the 72-Hour Window Manageable

The organizations that consistently meet the 72-hour deadline share common characteristics:

  • They have a centralized incident intake system that captures breaches from any entity, any employee, any time zone , eliminating the organizational friction that delays awareness
  • They use structured risk assessment frameworks (not ad hoc judgment calls) to determine notifiability within minutes of intake
  • They maintain current, accurate ROPA records so that breach scope assessment does not require days of manual data gathering
  • They have pre-configured notification templates for each relevant supervisory authority, reducing drafting time from hours to minutes
  • They document every decision with timestamps, creating the audit trail that demonstrates compliance even when the timeline is tight

The 72-hour clock is demanding by design. It forces organizations to build the operational infrastructure that makes privacy management sustainable , not just compliant on paper, but resilient under pressure.

Stop managing privacy in spreadsheets

See what group-wide privacy management looks like when it actually works

In 30 minutes, we'll walk through your specific multi-entity setup , how automated ROPA recertification, AI-assisted DPIAs, and cross-entity data mapping work for organizations like yours. All built and hosted in Switzerland. No sales pitch, no feature dump. Just clarity on whether Priverion fits your program.

60%

Less compliance admin time

Aircraft manufacturer, first 6 months

200+

Hours saved on ISO 27001 prep

Medtec

Weeks

To full deployment, not months

Average across customer base

Book a Free Breach Readiness Assessment

No commitment required. Predictable pricing , no per-user or per-module surprises.

The Privacy Compliance Briefing

Monthly insights on GDPR enforcement, Swiss FADP updates, and automation strategies for DPOs and compliance teams.

No spam. Unsubscribe anytime.

Book a Free Breach Readiness Assessment

30 min. No commitment required.