- Official EDPB guidance on awareness, risk assessment, and notification practice.
References and citations
- Official controller-processor clauses that include breach-assistance mechanics.
- Primary source for Articles 33 and 34.
Breach notification under GDPR depends on timekeeping discipline, risk logic, and evidence quality.
Use controller awareness, phased notifications, and Article 34 exception analysis to keep the workflow defensible.
Structured answer sets in this page tree.
Cited legal and guidance references.
GDPR breach response works only if controller and processor obligations are separated clearly and the timeline is documented from the first signal forward. The processor must notify the controller without undue delay. The controller then decides whether the incident is a personal data breach, whether it is likely to result in a risk to rights and freedoms, whether supervisory-authority notification is required within 72 hours, and whether Article 34 communication to affected individuals is necessary. The evidence file has to show that logic, not just the final conclusion.
The 72-hour clock is tied to controller awareness, so the workflow needs a precise awareness rule and a record of who made the call.
Do not confuse first suspicion, processor escalation, and controller awareness.
Assessment Autopilot can take EU GDPR 72-hour Breach Notification from operationalizing response workflows and review cycles to a reusable workflow inside Sorena. Teams working on EU GDPR can keep owners, evidence, and next steps aligned without copying this guide into separate documents.
Start from EU GDPR 72-hour Breach Notification and turn the guidance into owned tasks, evidence requests, and review checkpoints.
Review your current process, evidence gaps, and next steps for EU GDPR 72-hour Breach Notification.
Article 34 is about likely high risk, which is a narrower and more serious threshold than Article 33 risk.
You need explicit reasoning for both the communication decision and any exception relied upon.
Many breach failures are really Article 28 failures. The processor contract does not just allocate risk, it determines how fast the controller can make a lawful notification decision.
Make the breach workflow visible in vendor diligence and contracts.