Why does the General Data Protection Regulation (GDPR) require breach reporting within 72 hours?

A personal data breach under the General Data Protection Regulation (GDPR) is any security incident that results in personal data being lost, altered, accessed, or disclosed without permission, whether intentionally or unintentionally.

Why does the General Data Protection Regulation require breach reporting within 72 hours?

The General Data Protection Regulation requires organisations to respond promptly to personal data breaches. Article 33 mandates notifying the supervisory authority within 72 hours of a breach that is likely to risk individuals’ rights and freedoms. This ensures timely reporting, transparency, and reduced harm.

Understanding “Personal Data Breach”

A personal data breach under the General Data Protection Regulation (GDPR) is any security incident that results in personal data being lost, altered, accessed, or disclosed without permission, whether intentionally or unintentionally.

There are three main types of breaches:

  • Confidentiality breach – occurs when personal data is accessed or disclosed without authorisation.
  • Integrity breach – occurs when personal data is altered or tampered with
  • Availability breach – occurs when personal data is lost or cannot be accessed.

However, not all breaches need to be reported. Organisations must judge whether a breach could risk individuals’ rights and freedoms. Notification is only required if there is a risk.

When does the 72-hour reporting period begin?

Under the General Data Protection Regulation, the 72-hour time limit begins when the organisation becomes aware of a data breach. This means the moment it is reasonably certain that a security incident has occurred, and personal data may be involved. It does not need a full investigation or final proof.

This is important because organisations need to act fast. Once a breach is detected, they should immediately begin reviewing what happened. Deliberately postponing confirmation to avoid reporting can result in regulatory action and penalties.

Threshold for Notification Based on Risk

Not every breach has to be reported. Under Article 33 of the General Data Protection Regulation, notification is required only if the breach is likely to cause a risk to individuals’ rights and freedoms. This may include risks like identity theft, financial loss, discrimination, damage to reputation, or exposure of sensitive data.

If the risk is assessed as “high,” Article 34 obliges organisations to notify affected individuals without undue delay. However, where the breach is unlikely to pose any risk, notifying the authority is not required, though the organisation must still maintain an internal record of the incident.

Key Elements of the Breach Notification

When reporting a breach to the supervisory authority under the General Data Protection Regulation, organisations must provide key details such as:

  • Nature of the breach – a description of the incident, including the categories and number of individuals and data impacted.
  • Contact details – information of the Data Protection Officer (DPO) or another contact person
  • Likely impact on individuals – possible effects of the breach on individuals
  • Steps taken – actions already taken or planned to fix the issue and reduce harm

If all the details are not available immediately, organisations can still report within 72 hours and share the remaining information later as it becomes available.

Justification for Delayed Notification

If an organisation does not report a breach within 72 hours under the General Data Protection Regulation, it must explain the reason for the delay. Delays are carefully reviewed by the Supervisory authorities, particularly where the organisation lacked adequate systems to identify or respond to breaches.

Frequent delays or failure to report without a valid reason can result in fines under Article 83. These fines can be up to €10 million or 2% of the organisation’s global annual turnover, whichever is higher.

Role of Data Processors

Under the General Data Protection Regulation, the primary responsibility for reporting a breach lies with the data controller. However, data processors also have an important role. As per Article 33(2), processors must inform the controller as soon as they become aware of a breach.

Because controllers depend on processors for this information, it is important to have clear reporting processes in place. These are usually defined in data processing agreements to ensure timely communication and proper handling of breaches.

Operational Challenges

Putting the 72-hour breach reporting requirement under the General Data Protection Regulation into practice can be difficult for organisations:

  • Late detection – Absence of real-time monitoring can delay breach detection.
  • Risk assessment difficulty – Expertise is required to determine the level and impact of risk.
  • Cross-border issues – global organisations must identify the correct supervisory authority and ensure consistent reporting.
  • Limited information – early assessments are often based on incomplete data.

To manage these challenges, organisations should have strong incident response plans. This includes clear processes, defined escalation roles, and effective communication steps to handle breaches effectively.

Best Practices for Compliance

To meet the 72-hour reporting requirement under the General Data Protection Regulation, organisations can follow these simple practices:

  • Create a breach response plan – clearly define roles, responsibilities, and timelines for handling breaches.
  • Train employees regularly – help staff identify and report possible breaches quickly.
  • Use monitoring tools – implement security systems to detect unusual activity or unauthorised access.
  • Keep records of breaches – maintain a proper log of all incidents.
  • Involve legal and DPO early – include legal and privacy teams in assessing risk and deciding on reporting.
  • Test response plans – drills and simulations are planned to ensure the organisation is prepared.

Comparison with India’s DPDP Act

India’s Digital Personal Data Protection Act, 2023, also requires organisations to report data breaches, but it differs in key ways from the General Data Protection Regulation.

Under the DPDP Act, organisations must report all personal data breaches to the Data Protection Board and to affected individuals, no matter the level of risk. In contrast, GDPR requires reporting only when there is a risk to individuals’ rights and freedoms. Also, the DPDP Act does not set a strict 72-hour deadline and instead requires reporting “as soon as possible.”

This shows that Indian law follows a stricter and more direct approach, while GDPR allows more flexibility based on risk.

Supervisory authorities across the European Union actively enforce breach reporting rules under the General Data Protection Regulation. Common issues include late reporting, poor risk assessment, and not informing affected individuals when required. Regulators now expect organisations not only to meet deadlines but also to show that their incident response systems work effectively.

Recent trends show stricter checks on sectors that handle sensitive data, such as healthcare, finance, and technology. Authorities also place strong importance on transparency and cooperation during breach investigations.

Conclusion

The 72-hour breach reporting rule under the General Data Protection Regulation is an important part of data protection. It requires organisations to act quickly, assess risks carefully, and stay transparent with regulators. Although the timeline is strict, it helps reduce harm to individuals and build trust in digital systems.

For organisations, compliance is not just about following the law but also about having strong processes in place. A clear breach response plan, supported by good governance and technology, is necessary to meet this requirement. As regulations continue to evolve, organisations should treat breach readiness as a key part of their data protection strategy, not just a one-time task.

 

 

 

 

 

 

 

 

Subscribe to Data Privacy Education

Sign up now to get access to the library of members-only issues.
Jamie Larson
Subscribe