2026-05-06·14 min read·

GDPR Articles 33 & 34: The 72-Hour Data Breach Notification Rule — A SaaS Developer's Complete Response Playbook

Post #869 in the sota.io EU Cyber Compliance Series

When a personal data breach occurs in your SaaS application, the GDPR clock starts immediately. Under Article 33, the controller must notify the competent supervisory authority within 72 hours of becoming aware of the breach. Under Article 34, when that breach is likely to result in a high risk to the rights and freedoms of natural persons, you must also notify the affected individuals — without undue delay, and without waiting for the supervisory authority to respond.

This is not a theoretical requirement. The largest fines under GDPR enforcement in 2024 and 2025 included violations related to late or missing breach notifications. The Swedish DPA fined a healthcare provider for failing to report a breach involving patient records within the 72-hour window. The Irish DPC imposed a penalty for a breach notification that omitted required content, rendering it legally deficient even though it was filed on time.

For SaaS developers, the challenge is practical: a breach can occur at any layer of your stack — at the infrastructure level, in your application code, in a third-party dependency, or through a misconfigured access control. Your 72-hour window counts from the moment you first become aware, regardless of where in your organization awareness first arose.

This guide explains what constitutes a reportable breach, what the 72-hour obligation actually requires (and what it does not), the full content required in an Article 33 notification, when you must also notify individuals under Article 34, and how processor chains (your upstream infrastructure provider, your DPA) affect the flow of obligations.


What Counts as a Reportable Breach

Article 4(12) GDPR defines a personal data breach as "a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed."

Three categories of breach exist, and each triggers different risk assessments:

CategoryDefinitionExample
Confidentiality breachUnauthorised or accidental disclosure of personal dataDatabase credentials leaked; customer email list accessed by an attacker
Integrity breachUnauthorised or accidental alteration of personal dataAttacker modifies user records; corrupt write poisons a user profile table
Availability breachAccidental or unauthorised loss of access to personal dataRansomware encrypts your database; cloud storage bucket permanently deleted

The GDPR does not require that a breach involve malicious actors. Accidental exposure counts. Sending a bulk email with recipients in CC instead of BCC is a personal data breach under Article 4(12) if it discloses email addresses of data subjects. Misconfiguring a cloud storage bucket to public is a breach the moment it occurs — even if no one accessed the data before you corrected it.

The notification threshold is not harm — it is risk. Article 33(1) requires notification unless "the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons." This is an affirmative determination that must be documented. If you cannot demonstrate that risk is unlikely, you must notify.


The 72-Hour Clock: When It Starts and What Stops It

When the Clock Starts

The 72-hour window begins "from the moment the controller becomes aware." The EDPB Guidelines 01/2021 clarify that a controller "should be regarded as having become aware when that controller has a reasonable degree of certainty that a security incident has occurred that has led to personal data being compromised."

This means:

What does not stop the clock:

The EDPB is explicit: you may notify with information available at the time and supplement later. Waiting until your investigation is complete is a violation of Article 33 if the investigation takes more than 72 hours.

"Without Undue Delay" vs. 72 Hours

Article 33(1) says notification should happen "without undue delay and, where feasible, not later than 72 hours after having become aware." The 72-hour limit is the outer boundary. If you have the information required to file a complete notification within 6 hours, you must not wait 71 hours.

The 72-hour window is also not extended by weekends or public holidays. A breach discovered at 23:00 on a Friday gives you until 23:00 on Monday — but your supervisory authority's portal and emergency contact procedures must accommodate this.


Content Required in an Article 33 Notification

Article 33(3) specifies five mandatory content elements. A notification that omits any of these is legally deficient and may constitute a separate violation.

Required ElementDetails
Nature of the breachThe category (confidentiality/integrity/availability), approximate number of data subjects affected, approximate volume of personal data records concerned, and the categories of personal data (health data, financial data, email addresses, etc.)
Contact detailsName and contact details of the Data Protection Officer (if appointed) or other point of contact who can provide additional information
Likely consequencesDescription of the likely consequences of the personal data breach
Measures taken or proposedDescription of the measures taken or proposed to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects
Date and time of awarenessWhen the controller became aware of the breach

Note on phased notification: Article 33(4) explicitly permits phased notification. If you cannot provide all required information within 72 hours, you may submit an initial notification with available information and supplement it "without undue delay" thereafter. The initial notification must include at minimum: the nature of the breach, contact details of the DPO or point of contact, and the fact that a full notification is forthcoming. Document each supplement with a timestamp.

A notification filed at hour 71 with incomplete information is preferable to a notification filed at hour 73. File first; supplement as your investigation develops.


Article 34: When You Must Also Notify Individuals

Notifying the supervisory authority (Article 33) and notifying affected individuals (Article 34) are separate obligations triggered by separate risk thresholds.

Article 34 threshold: "high risk to the rights and freedoms of natural persons."

This is a higher bar than Article 33. The factors that elevate a breach to "high risk" include:

ScenarioArticle 33 Required?Article 34 Required?
Internal employee accidentally emails a report to wrong colleague (1 person, non-sensitive)Likely No (unlikely risk)No
500 user email addresses exposed due to misconfigured endpointYesProbably No (low risk, email only)
200 user health records exposed to unauthorized attackerYesYes
SaaS password hash database leaked (bcrypt, modern salt)YesAssess: bcrypt hashes alone = low risk; if passwords are weak or reused = elevated
Payment card numbers (full PAN) in plaintext in leaked log filesYesYes
Encrypted backup stolen (AES-256, key not compromised)Yes, if personal data involvedLikely No (encryption = low risk if key secure)

Content of an Article 34 Individual Notification

Article 34(2) requires the notification to use clear, plain language and to contain:

  1. The nature of the personal data breach
  2. Contact details of the DPO or point of contact
  3. The likely consequences of the breach
  4. Measures taken or proposed to address the breach, including measures to mitigate possible adverse effects
  5. Recommended protective actions for the individual (e.g., change your password, monitor your bank account, place a fraud alert)

What Article 34 does not require: Notification to individuals in three cases (Article 34(3)):


The Controller-Processor Chain: Who Notifies Whom

Most SaaS developers operate in a controller-processor chain. As a SaaS company, you are typically the processor for your enterprise customers (who are controllers). Simultaneously, you are the controller for your own employees' personal data and for any data you collect directly from end users in a B2C context.

Article 33(2): The processor must notify the controller "without undue delay" after becoming aware of a personal data breach. The GDPR does not specify a time limit for processor-to-controller notification, but the EDPB and most DPAs expect this to happen within 24 to 36 hours, giving the controller sufficient time to assess and file their 72-hour notification.

Your Data Processing Agreement (DPA) under Article 28 should specify:

If your DPA does not contain these provisions, you have an Article 28 gap — separate from any Article 33 obligation.

When you are the controller: If you are a B2C SaaS and the breach affects your own users' personal data, you are the controller and you file the Article 33 notification directly to your lead supervisory authority.

Lead supervisory authority: For SaaS companies with cross-border processing in the EU, the lead supervisory authority is the DPA of the Member State where your main EU establishment is located (Article 56 GDPR). If you are established only in one Member State, that DPA is your authority. If you have no EU establishment, any Member State DPA where your users are located can act.

Your structureWho you notify
EU-based SaaS, main establishment GermanyBundesdatenschutzbehörde (BfDI) for cross-border, state DPA for purely national processing
EU-based SaaS, main establishment IrelandData Protection Commission (DPC) Ireland
Non-EU SaaS with EU representative (Art.27)DPA of the Member State where the representative is located
Processor for an EU controllerController directly (not the DPA)

The Encryption Safe Harbour

If personal data was breached but was properly encrypted at rest and in transit, and the encryption key was not compromised, the practical risk to data subjects is substantially reduced. Article 34(3)(a) explicitly recognises this: you are not required to notify individuals if you "have implemented appropriate technical and organisational protection measures, and those measures were applied to the personal data affected by the personal data breach, in particular those that render the personal data unintelligible to any person who is not authorised to access it."

This does not eliminate your Article 33 obligation to notify the supervisory authority. The supervisory authority still needs to know that a breach occurred. The encryption safe harbour only affects the Article 34 obligation to notify individuals.

Standards that satisfy the safe harbour:

Standards that do not satisfy the safe harbour:

Document your encryption implementation in your Records of Processing Activities (ROPA) under Article 30. When a breach occurs and you invoke the encryption safe harbour, you will need to demonstrate to the supervisory authority that the encryption was adequate and that the keys were not compromised.


Building an Incident Response Workflow for the 72-Hour Window

The breach notification obligation fails in practice when it is addressed only at the legal level without a corresponding engineering and operations workflow. The 72-hour window is short enough that a process that requires board approval before a DPA notification is filed will regularly fail.

A minimal GDPR-compliant incident response workflow for SaaS developers includes:

1. Detection and First Awareness (T=0)

Define what constitutes "becoming aware" for your organisation. This should be written into your internal policies. Suggested definition: "Any team member who identifies evidence sufficient to reasonably conclude that a personal data breach may have occurred must immediately escalate to the incident response lead."

This prevents the ambiguity of who in the organisation was "aware" and at what time.

2. Initial Triage (T=0 to T+2 hours)

Within two hours of the first report:

If risk cannot be ruled out: activate formal incident response. If plainly no personal data is involved: document the determination and close.

3. Notification Decision (T+2 to T+12 hours)

Determine whether the preliminary risk assessment supports the "unlikely to result in a risk" exemption from Article 33(1). This decision must be documented. If you proceed to a determination that notification is required:

4. Authority Notification (before T+72 hours)

File the Article 33 notification via your lead DPA's breach notification portal. Most EU DPAs maintain dedicated portals:

DPAPortal
CNIL (France)notifications.cnil.fr
BfDI (Germany)datenmissbrauch.de / bfdi.bund.de
DPC (Ireland)forms.dpc.ie
AEPD (Spain)sedeagpd.gob.es
AP (Netherlands)autoriteitpersoonsgegevens.nl
UODO (Poland)uodo.gov.pl

Keep confirmation receipts. These are your evidence that the notification was filed within the window.

5. Individual Notification (if Article 34 applies)

If your breach assessment concludes that a high risk to individuals exists, draft individual notifications. These should:

6. Post-Incident Documentation

Article 33(5) requires the controller to document "any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial action taken." This documentation must be sufficient to allow the supervisory authority to verify compliance. Retain it for at least three years.


GDPR Breach Notification Penalties in Practice

The GDPR penalty for breach notification violations falls under the lower tier: up to €10 million or 2% of global annual turnover under Article 83(4). This is distinct from the higher-tier penalties under Article 83(5) for violations of fundamental processing obligations (up to €20 million or 4% of global turnover).

However, regulators frequently issue penalties that combine Article 33/34 violations with underlying processing violations — for example, a breach of a sensitive data database that should not have been retained in the first place. The notification fine may be lower than the retention or security fine, but both apply.

Factors that mitigate fines in breach notification cases:

Factors that aggravate fines:


Checklist: GDPR Data Breach Notification Compliance

Before a breach occurs:

During a breach:

After a breach:


GDPR Articles 33 and 34 are among the most operationally demanding compliance obligations for SaaS developers precisely because they require a fast, accurate response at the moment of maximum uncertainty. A breach is inherently chaotic. The 72-hour clock does not care that your engineering team is still investigating, that your legal team is on a different continent, or that the full scope remains unclear.

The organisations that consistently meet the 72-hour window are those that have built the workflow before they needed it: a clear definition of "becoming aware," a pre-prepared notification template, a documented relationship with their lead supervisory authority, and a post-incident documentation habit that protects them in any follow-on regulatory review.

If you are operating a SaaS that processes EU personal data and have not yet run a tabletop exercise against a fictional breach scenario, that exercise is the most valuable 90 minutes you can spend on GDPR compliance this quarter.

EU-Native Hosting

Ready to move to EU-sovereign infrastructure?

sota.io is a German-hosted PaaS — no CLOUD Act exposure, no US jurisdiction, full GDPR compliance by design. Deploy your first app in minutes.