Phase 3: Technical & Organizational Measures
Implement the technical controls and organizational processes required by GDPR. This includes data security measures (Article 32), breach detection and response (Articles 33-34), data subject rights fulfillment processes, privacy by design integration into development workflows, and staff training.
🎯 Objectives
- ✓ Implement appropriate technical security measures per Article 32
- ✓ Build and test the data breach detection, assessment, and notification process
- ✓ Operationalize data subject rights fulfillment (DSAR, erasure, portability, etc.)
- ✓ Integrate Privacy by Design into software development and project management
- ✓ Deliver GDPR awareness training to all staff and specialized training to key roles
Technical Security Implementation (Article 32)
🎓 Beginner's Note
Article 32 does not prescribe specific technologies. It requires measures appropriate to the risk. A small company processing mailing lists needs basic security (encryption, passwords, access control). A health data processor needs much more (network segmentation, encryption everywhere, strict access controls, audit trails). The key principle is: the more sensitive the data and the higher the risk, the stronger the security must be.
💡 Consultant Tips
- ● Prioritize encryption: TLS 1.2+ for all data in transit, AES-256 for data at rest in databases and file storage
- ● Implement role-based access control (RBAC) — no one should have more access than they need
- ● Enable audit logging for all access to personal data — you will need this for breach investigation
- ● Ensure backups are encrypted and that backup data is included in your DSAR and erasure processes
- ● Conduct regular penetration testing and vulnerability scanning
Data Breach Response Process (Articles 33-34)
🎓 Beginner's Note
Data breach response is one of the most time-critical GDPR requirements. The 72-hour notification deadline to the supervisory authority is extremely tight — weekends and holidays count. You do not need to have full details within 72 hours; you can provide information in phases. But you MUST notify within the deadline. Many organizations have been fined not for the breach itself but for failing to notify on time.
💡 Consultant Tips
- ● Create a Breach Response Team with named roles: Incident Commander, Technical Lead, Legal Advisor, Communications Lead, DPO
- ● Develop a breach severity classification matrix: Low (no notification), Medium (SA notification), High (SA + individual notification)
- ● Pre-draft notification templates for the supervisory authority and individuals
- ● Practice with tabletop exercises — simulate a breach scenario and walk through the response
- ● The 72-hour clock starts when you BECOME AWARE of the breach, not when you fully understand it
Data Subject Rights Fulfillment System
🎓 Beginner's Note
Fulfilling data subject rights at scale is an operational challenge that many organizations underestimate. A single DSAR can require searching dozens of systems, compiling data, redacting third-party information, and formatting for delivery — all within 30 days. If your client is a consumer-facing business, expect a steady stream of requests. If they are a B2B company, volume will be lower but each request may be more complex.
💡 Consultant Tips
- ● Use a rights management tool or ticketing system to track requests (OneTrust, TrustArc, or even a well-structured Jira workflow)
- ● Create standard operating procedures (SOPs) for each right with clear timelines and responsibilities
- ● Build automated data extraction capabilities for DSARs where possible
- ● Implement a deletion workflow that covers ALL systems (including backups — consider a suppression list approach for backups)
- ● Set up SLA monitoring with escalation at day 14 and day 25 of the 30-day deadline
Privacy by Design Integration
🎓 Beginner's Note
Privacy by Design means thinking about privacy BEFORE you build something, not after. It is like building a house with fire safety in mind from the architectural plans, rather than trying to bolt on fire escapes after the house is built. In practice, this means: do you really need that data field? Is the default setting the most private? Can you use pseudonymized data instead of real data? Can you auto-delete after the retention period?
💡 Consultant Tips
- ● Add a Privacy by Design checklist to the project initiation phase
- ● Integrate DPIA screening into the project approval workflow
- ● Train developers on privacy principles: data minimization, purpose limitation, storage limitation, pseudonymization
- ● Create secure coding guidelines for handling personal data (input validation, output encoding, parameterized queries)
- ● Review system architecture for privacy: default settings, data separation, retention automation
Staff Training Program
🎓 Beginner's Note
Training is one of the most impactful things you can do. The majority of data breaches are caused by human error: sending an email to the wrong person, leaving a laptop on a train, falling for a phishing attack. Good training reduces these incidents. It also creates a culture of privacy awareness where employees think twice before collecting unnecessary data or sharing personal data inappropriately.
💡 Consultant Tips
- ● Tier your training: General Awareness (all staff, 30-60 min), Role-Specific (key departments, 2-3 hours), Advanced (privacy team, multi-day)
- ● Use real examples and scenarios relevant to the organization — not generic GDPR theory
- ● Include practical exercises: recognizing a DSAR, identifying a breach, handling a consent withdrawal
- ● Make training mandatory and track completion — regulators expect documented evidence of training
- ● Refresh training annually and supplement with ongoing communications (newsletter, intranet updates)
Data Retention Automation
🎓 Beginner's Note
Retention automation is where GDPR compliance gets real in the technical sense. It is one thing to have a policy that says 'delete customer data after 3 years.' It is another thing to actually make that happen across 15 different systems, including backups. Start simple: identify the top 5 data stores, implement automated deletion, and expand from there. Perfect is the enemy of good.
💡 Consultant Tips
- ● Start with the biggest data stores and highest-risk data categories
- ● Implement automated retention in databases (scheduled jobs, TTL fields, archive-and-delete workflows)
- ● Address email retention — this is often the biggest challenge (years of unmanaged email with personal data)
- ● Do not forget paper records, archived systems, and backup tapes
- ● Maintain legal hold processes that can pause deletion when litigation is anticipated