ForgeSDLC
Navigate
Home
Discover ForgeSDLC (101)
Practice (201)
Master (301)

This page is part of the ForgeSDLC knowledge base — an AI-assisted, human-directed methodology for taking product work from concept to production. For the core operating model and vocabulary, see Forge SDLC overview and What is ForgeSDLC?.

GDPR: General Data Protection Regulation

Purpose: Project-agnostic summary of the EU General Data Protection Regulation (Regulation (EU) 2016/679) — the most influential modern privacy law for personal data processing. Not legal advice; confirm applicability and interpretation with qualified counsel.

Audience: Teams mapping EU/EEA personal data processing to engineering and organizational controls. Cross-ref: ../COMPLIANCE.md, README.md.


Overview

The GDPR governs processing of personal data relating to individuals in the EU/EEA. It applies to controllers and processors, establishes lawful bases, data subject rights, accountability (including DPIAs and ROPA), cross-border transfers, and breach notification. It has shaped privacy law globally and heavily influences product design, consent UX, and vendor contracts.


Key definitions

Term Definition / notes
Personal data Any information relating to an identified or identifiable natural person.
Special category data Sensitive data (e.g. health, biometrics, racial/ethnic origin, political opinions, religious beliefs, sex life/orientation, genetic data) — stricter rules; often requires explicit consent or specific legal grounds (Art. 9).
Data subject The identified or identifiable person to whom personal data relates.
Controller Determines purposes and means of processing; primary accountability.
Processor Processes data on behalf of the controller under instructions and a contract (Art. 28).
Sub-processor Processor’s further delegate — requires controller authorization (general or specific) and flow-down obligations.
DPO Data Protection Officer — mandatory in some cases (Art. 37); advises, monitors compliance, cooperates with supervisory authorities.
Supervisory authority Independent public authority per Member State; leads investigations, guidance, and some cross-border cases.
BCR Binding Corporate Rules — approved intra-group transfer mechanism for multinational organizations.

Lawful bases (Art. 6)

Basis When appropriate Documentation Withdrawal
Consent Freely given, specific, informed, unambiguous; where no other basis fits or where required (e.g. some marketing, some special categories). Record of consent: what, when, how, version of notice; proof of granularity. Withdrawal must be as easy as giving consent; must not affect lawfulness before withdrawal; stop processing that relied solely on consent.
Contract Processing necessary for performance of a contract with the data subject or pre-contract steps. Identify the contract and the necessary processing purposes. N/A as such; if contract ends, retention/ other bases may apply.
Legal obligation Processing required to comply with EU/Member State law to which the controller is subject. Reference specific legal obligation. N/A.
Vital interests Protecting life of data subject or another person (typically emergencies). Document urgency and why other bases don’t apply. N/A.
Public task Official authority or tasks in the public interest (often public bodies). Legal basis in law. N/A for typical public-sector context.
Legitimate interests Processing necessary for controller’s or third party’s legitimate interests, unless overridden by data subject’s rights (balancing test). LIA: purpose, necessity, balancing, safeguards; not a default for intrusive processing. Right to object (Art. 21) may apply; must stop unless compelling legitimate grounds.

Lawful basis selection (decision tree)

flowchart TD A[New processing purpose] --> B{Required by law?} B -->|Yes| L[Legal obligation] B -->|No| C{Necessary for contract with user?} C -->|Yes| K[Contract] C -->|No| D{Protect life in emergency?} D -->|Yes| V[Vital interests] D -->|No| E{Public authority / public interest task?} E -->|Yes| P[Public task] E -->|No| F{Special category data?} F -->|Yes| G[Art. 9 ground required — often explicit consent or specific exception] F -->|No| H{Legitimate interest possible with LIA + safeguards?} H -->|Yes| I[Legitimate interests] H -->|No| J[Consent or do not process]

Data subject rights — implementation sketch

Right Implementation requirements SLA (typical reference) Technical considerations
Access Verify identity; provide copy of data and purposes, recipients, retention, sources. Without undue delay; often one month (extensions possible). Unified export across DBs, object storage, caches; redact others’ data.
Rectification Correct inaccurate data; complete incomplete data. Same as access timeline expectations. Propagation to derivatives, search indexes, vendors.
Erasure (“right to be forgotten”) Where grounds apply (e.g. withdrawal of consent, no overriding grounds). Same. Erasure pipeline: primary DB, replicas, backups (policy), logs (where feasible), third parties.
Restriction Limit processing in defined cases. Same. Feature flags, suspend automated processing, mark records “restricted.”
Portability Structured, machine-readable, for data provided by subject where processing is automated and based on consent or contract. Same. Standard formats (e.g. JSON); APIs.
Object To processing based on legitimate interests or direct marketing. Stop without undue delay for marketing; assess for other objections. Suppression lists; stop profiling segments.
Automated decision-making Rights related to solely automated decisions with legal/significant effects (Art. 22 context). Human review pathway; explain logic in appropriate cases. Don’t rely on “black box” for in-scope decisions without safeguards.

Technical implementation themes

  • Consent management: Granular purposes; record who consented, when, to what version; withdrawal in preference center and propagation to tags/SDKs/processors.
  • Privacy by design and by default: Data protection integrated from architecture; default to least data / least access.
  • Data minimization: Collect and retain only what is needed for specified purposes.
  • Pseudonymization: Replace identifiers where useful to reduce risk (not a substitute for lawful basis or transfers analysis alone).
  • Encryption: At rest and in transit; supports confidentiality and may factor into transfer risk assessments.
flowchart LR R[Consent request / notice] --> U[User choice granular per purpose] U --> REC[Record consent version + timestamp + channel] REC --> GATE[Processing gate: check valid basis] GATE --> P[Permitted processing] REC --> W[Withdrawal path] W --> STOP[Stop / restrict processing on that basis] STOP --> V[Verify downstream systems updated]

DPIA (Data Protection Impact Assessment)

When often required (indicative — verify Art. 35 and WP248/EDPB guidance):

Trigger theme Examples
Systematic monitoring Large-scale tracking, workplace monitoring, public area surveillance.
Large-scale processing Vast datasets or many data subjects for sensitive operations.
Special categories Health, biometrics, etc., at scale or with high risk.
Scoring / profiling Automated profiling with legal or similarly significant effects.
Automated decision-making Decisions with legal/significant effect without meaningful human input.

Process: Describe processing → assess necessity/proportionality → identify risks to rights → measures to mitigate → residual risk → DPO advice → supervisory authority consultation if high residual risk.

Template sections: Scope; data flows; purposes and lawful bases; categories of data and subjects; retention; recipients; transfers; technologies; security measures; necessity and proportionality; rights impact; risks; mitigations; sign-off.


Cross-border transfers

  • Adequacy decisions: Transfers to countries deemed adequate by the European Commission.
  • SCCs: Standard Contractual Clauses (current modules for controller-to-controller, controller-to-processor, etc.) with Transfer Impact Assessment (TIA) where local law may impinge on importer obligations.
  • BCRs: For corporate groups, after approval.
  • Schrems II: Court emphasis on effective protection; TIAs and supplementary measures (technical, organizational, contractual) when needed — encryption and key control may be relevant but are not automatic “fixes.”

Breach notification

  • Supervisory authority: Notify without undue delay and where feasible within 72 hours unless unlikely to result in risk to individuals (Art. 33).
  • Data subjects: If breach likely to result in high risk, communicate without undue delay unless exceptions (e.g. subsequent mitigation) (Art. 34).
  • Documentation: Internal record of breaches, facts, effects, remedial action (Art. 33(5)).

Records of Processing Activities (ROPA)

Contents (Art. 30): Controller/processor name and contact; DPO where applicable; purposes; categories of data subjects and personal data; categories of recipients; transfers and safeguards; retention; security measures. Processors: also categories of processing on behalf of each controller.

Maintenance: Living document updated when processing changes.

Exemptions: Organizations with fewer than 250 employees unless processing is not occasional, includes special categories, or is likely to result in risk to rights and freedoms — narrow in practice for many digital products.


Penalty framework

Up to €20 million or 4% of global annual turnover (whichever higher) for certain infringements; lower tier 2% / €10M for other violations. Fines depend on factors in Art. 83.

Example (illustrative; amounts/timing vary) Context
Meta Major fines tied to data protection / transfers / legal basis issues in EU.
Google CNIL and other authorities — consent, transparency, ads.
Amazon Luxembourg DPA — cookie/consent and processing practices.

GDPR vs CCPA / CPRA (high level)

Topic GDPR CCPA / CPRA
Scope EU/EEA-focused; broad extraterritorial effect for offering services/monitoring behavior. California consumers; business thresholds.
Default model Lawful basis required; consent in specific cases. Notice + opt-out of sale/share; “limit use” for sensitive data; opt-in for minors under 16.
Rights Access, rectification, erasure, restriction, portability, objection, etc. Know, delete, correct, opt-out, limit, portability (CPRA).
Penalties Administrative fines (tiers above). Statutory damages in private actions (some contexts); AG enforcement.
DPO Mandatory in prescribed cases. No DPO; CPRA requires some businesses to conduct risk assessments / cybersecurity reviews.

Technical controls mapping

GDPR theme Engineering implementation
Confidentiality / integrity Encryption, access control, secrets management.
Accountability / breach detection Audit logging, SIEM, anomaly detection.
Retention limitation TTL jobs, legal holds, backup rotation policies.
Erasure / portability Idempotent deletion APIs, export jobs, vendor APIs.
Minimization Schema review, feature flags, sampling for analytics.

Anti-patterns

  • Consent fatigue: Walls of popups without real choice or clarity.
  • Data hoarding: “Collect everything” without purpose or retention discipline.
  • Legitimate interest for everything without documented LIA and balancing.
  • No data map / ROPA — cannot demonstrate accountability or respond to rights.

External references


Keep project-specific compliance documentation in docs/security/compliance/, DPIAs in docs/security/, and compliance decisions in docs/adr/, not in this file.