Data Breach Notification Timelines Under GDPR: What Businesses Must Know

Contents
gdpr breach notification

Introduction

Data breaches are no longer rare events. Phishing attacks, ransomware incidents, accidental disclosures, and system misconfigurations occur daily across organisations of every size. Under the General Data Protection Regulation (GDPR), the way an organisation responds to a breach often matters as much as the breach itself. Regulators do not expect zero incidents, but they do expect timely, structured, and accountable action.

One of the most misunderstood aspects of GDPR is the data breach notification timeline, particularly the widely referenced “72-hour rule.” Many organisations interpret this as a simple reporting deadline. In reality, it is part of a broader regulatory expectation around preparedness, decision-making, and evidence-based response. Missing timelines, providing incomplete notifications, or delaying internal escalation have become common reasons for enforcement actions.

This article explains GDPR data breach notification timelines in clear, business-oriented terms. It focuses on what triggers notification, when the clock starts, what must be reported, and how organisations can realistically meet expectations without panic or over-reporting in CERT-In Cybersecurity Compliance. The aim is to help leaders, compliance teams, and IT decision-makers move from reactive response to controlled, inspection-ready incident governance.

What GDPR Considers a Data Breach

Under GDPR, a data breach is defined broadly. It is not limited to hacking or cyberattacks. Any incident that leads to accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data qualifies as a personal data breach.

This includes:

  • Ransomware encrypting systems containing personal data
  • Emails sent to the wrong recipients
  • Lost or stolen devices
  • Misconfigured cloud storage
  • Insider misuse or unauthorised access

Understanding this broad definition is critical, because notification obligations depend on whether such an event has occurred, not on whether data was stolen or misused.

The GDPR 72-Hour Rule Explained

GDPR Cybersecurity requires organisations to notify the relevant supervisory authority without undue delay and, where feasible, not later than 72 hours after becoming aware of a personal data breach, unless the breach is unlikely to result in a risk to individuals’ rights and freedoms.

Key points to understand:

  • The clock starts when the organisation becomes aware of the breach
  • 72 hours is a maximum, not a target
  • Notification may still be required even if all facts are not yet known

The rule is designed to encourage early engagement with regulators, not perfect reporting.

When Does the Clock Start? “Becoming Aware”

One of the most common compliance failures relates to misunderstanding when the organisation is considered “aware” of a breach.

An organisation is considered aware when it has a reasonable degree of certainty that a security incident has occurred that has compromised personal data. This does not require full investigation or confirmation of impact.

Delaying internal escalation, waiting for forensic certainty, or ignoring early indicators does not stop the clock. Regulators frequently examine:

  • When alerts were raised
  • When staff first suspected a breach
  • How long escalation took

This makes internal detection and escalation processes critical to compliance.

Risk Assessment: Is Notification Always Required?

Not every data breach must be reported to the supervisory authority. Notification is required unless the breach is unlikely to result in a risk to the rights and freedoms of natural persons.

A documented cyber risk assessment should consider:

  • Type of personal data involved
  • Volume of data affected
  • Ease of identification of individuals
  • Potential consequences for individuals
  • Whether data was encrypted or protected

This assessment must be defensible and documented, even if the decision is not to notify.

Notifying the Supervisory Authority

When notification is required, GDPR specifies minimum information that should be provided:

  • Nature of the personal data breach
  • Categories and approximate number of individuals affected
  • Categories and approximate number of records affected
  • Likely consequences of the breach
  • Measures taken or proposed to address the breach

If full information is not available within 72 hours, organisations may submit an initial notification followed by supplementary information later. Failure to notify at all is treated far more seriously than notifying with partial information.

Notification to Affected Individuals

GDPR also requires notification to affected individuals when the breach is likely to result in a high risk to individuals’ rights and freedoms.

Examples include:

  • Exposure of financial data
  • Identity documents compromised
  • Credentials or sensitive personal data leaked

Notification to individuals may not be required if:

  • Data was encrypted and unreadable
  • Effective measures removed the high risk
  • Notification would involve disproportionate effort, with public communication used instead

All decisions must be documented.

Common Mistakes Organisations Make

Regulators frequently observe the same failures:

  • Delayed internal escalation
  • Waiting for certainty before notifying
  • No documented risk assessment
  • Poor incident timelines
  • Inconsistent communication
  • Lack of breach registers

These issues usually indicate governance weaknesses rather than technical failure.

The Importance of a Breach Register

GDPR requires organisations to document all personal data breaches, whether notification is required or not. This breach register is often one of the first items regulators request during inspections in directive nis2 .

A breach register should include:

  • Incident description
  • Date of occurrence and discovery
  • Risk assessment outcome
  • Notification decisions
  • Remediation actions taken

The absence of a breach register is frequently cited as a compliance failure.

Incident Response and Notification Readiness

Meeting GDPR timelines requires preparation. Organisations that perform well typically have:

  • Defined incident response roles
  • Clear escalation paths
  • Pre-approved notification templates
  • Legal, IT, and compliance coordination
  • Management awareness of timelines

GDPR expects readiness, not improvised response.

How Regulators Assess Breach Notifications

Regulators assess more than whether notification occurred. They examine:

  • Speed of detection
  • Quality of decision-making
  • Clarity of communication
  • Evidence of risk assessment
  • Steps taken to prevent recurrence

A well-handled breach may result in minimal regulatory impact, while a poorly handled minor breach can escalate into enforcement action.

Fines and Enforcement Related to Notification Failures

Many GDPR fines result not from the breach itself, but from:

  • Late notification
  • Incomplete information
  • Failure to notify

This reinforces the importance of governance and execution over technical perfection.

How Infodot Helps with GDPR Breach Notification Readiness

Infodot embeds incident response and notification readiness into daily IT and security operations.

Infodot helps by:

  • Designing practical incident response workflows
  • Establishing escalation and decision models
  • Supporting detection and monitoring
  • Maintaining breach registers and evidence
  • Assisting with notification coordination
  • Reducing response time and confusion
  • Supporting post-incident improvement

This enables organisations to meet GDPR expectations confidently, even under pressure.

Conclusion

GDPR data breach notification timelines are not just deadlines. They reflect regulatory expectations around awareness, decision-making, and protection of individuals.

The 72-hour rule rewards preparedness, transparency, and accountability. Organisations that invest in detection, governance, and response readiness consistently perform better during incidents and face lower regulatory risk.

Breaches may be inevitable. Regulatory failure does not have to be.

Frequently Asked Questions

What qualifies as a GDPR data breach?
Any accidental or unlawful loss, alteration, unauthorised disclosure, or access to personal data.

Does every data breach need to be reported?
No. Only breaches likely to result in risk to individuals’ rights and freedoms.

What is the GDPR 72-hour rule?
Notification must occur within 72 hours of becoming aware of a reportable breach.

When does the 72-hour clock start?
When the organisation has reasonable certainty a breach has occurred.

Can we wait until investigation is complete?
No. Initial notification is required even with incomplete information.

Who decides whether a breach is reportable?
The organisation, based on a documented risk assessment.

What information must be included?
Nature of breach, affected individuals, impact, and mitigation measures.

Do we need to notify affected individuals?
Yes, if there is high risk to their rights and freedoms.

When is individual notification not required?
If data was encrypted, risk mitigated, or public communication is sufficient.

Are ransomware incidents reportable?
Yes, if availability or integrity of personal data is affected.

Does encryption remove notification duties?
It may reduce risk, but assessment must be documented.

What if a vendor caused the breach?
The controller remains responsible.

How are late notifications treated?
Unjustified delays are compliance failures.

What if we decide not to notify?
The decision must be documented and retained.

Is accidental email disclosure a breach?
Yes.

Do near misses need reporting?
No, but they should be logged internally.

Does the timeline apply outside business hours?
Yes.

Can over-reporting cause issues?
Yes, it may indicate weak risk assessment.

Do small organisations have different timelines?
No.

What is a breach register?
A record of all personal data breaches.

How long should records be kept?
As long as needed to demonstrate compliance.

Can notification be delegated to lawyers?
Responsibility cannot be delegated.

Are breach drills required?
Not explicitly, but preparedness is expected.

What if breach impact changes later?
Updated information must be submitted.

Are insider breaches treated differently?
No.

Is system downtime without data loss a breach?
Possibly, if availability affects individuals’ rights.

Do backups affect assessment?
Yes, but they do not remove obligations.

Can insurance replace notification duties?
No.

What is management’s role?
Oversight, decisions, and ensuring timely notification.

Are cross-border breaches different?
Yes, lead supervisory authority coordination may apply.

Most common GDPR breach failure?
Late detection and notification.

Can notification harm reputation?
Transparency usually reduces long-term damage.

How detailed should risk assessments be?
Clear, reasoned, and documented.

Does GDPR specify formats?
No, but regulators provide guidance.

How can readiness be improved?
Clear processes, monitoring, escalation, and evidence management.