Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

What is a GDPR-Compliant Privacy Notice & How to Automate it with Securiti?

Get Free GDPR Assessment
Published October 17, 2022
Contributors

Anas Baig

Product Marketing Manager at Securiti

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Listen to the content

Transparency is considered a key data protection principle in most data privacy laws. It is critical to ensure organizations remain accountable to their customers, users, and employees. It keeps organizations on their toes regarding their data processing activities and mandates them to keep their data subjects informed about how they collect and use their data as well as any consequences in relation to their data processing.

The EU's GDPR grants individuals the ‘Right to be Informed’ in Articles 12, 13 & 14, which is based on the principle of transparency. The principle of Transparency is also enshrined in Article 5(1)(a) of the GDPR, which requires the data processing to be lawful, fair, and transparent. Transparency can be achieved via providing a privacy notice to data subjects informing them how their data will be processed.

What is GDPR-Compliant Privacy Notice?

A privacy notice is a public statement addressed to data subjects outlining how an organization manages data subjects’ personal information and adheres to data protection legal requirements. In view of the transparency principle of the GDPR, a GDPR-compliant privacy notice must be:

  • In a clear, visible, understandable, and readily available format,
  • Written in easy and understandable language, especially for any information intended for children,
  • Delivered promptly, and
  • Provided free of charge.

As a good business practice, a privacy statement or policy should be posted on the homepage of the website or the mobile application. A privacy notice, on the other hand, may be promptly delivered to the data subject at or just before the point of collection of personal data from them.

When Collecting Personal Information Directly from an Individual

The following information must be disclosed in an organization’s privacy notice if it is directly collecting data from an individual:

  • The name and contact information for the company's representative, data protection officer, and other representatives,
  • The purpose and the legal basis of the processing,
  • The legitimate interests of the organization (or of the third party) where the processing is based on legitimate interests,
  • Any recipient or categories of recipients of an individual’s personal data,
  • The specifics of any overseas transfer of personal data and any possible risks to personal data,
  • The period for which data will be stored or, if that is not possible, the criteria used to determine that period,
  • The information about data subject rights and how they can exercise those rights,
  • The right to revoke consent at any time (where the data processing is based on the data subject’s consent),
  • The data subject’s right to complain to a supervisory authority, and
  • The existence of automated decision-making, including profiling.

The same information must be included in an organization's privacy notice even if it obtained an individual’s data indirectly (via another organization). When personal data is not directly obtained from the data subject, the organization must also inform the data subject of the source of personal data and whether the data came from publicly available sources.

Primary Elements of Transparency Under GDPR

The GDPR does not define the term transparency in the official text. The definition and application of the concept of transparency in the context of data processing are explained in Recital 39 of the GDPR:

“It should be transparent to natural persons that personal data concerning them are collected, used, consulted, or otherwise processed and to what extent the personal data are or will be processed. The principle of transparency requires that any information and communication relating to the processing of those personal data be easily accessible and easy to understand and that clear and plain language be used. That principle concerns, in particular, information to the data subjects on the identity of the controller and the purposes of the processing and further information to ensure fair and transparent processing in respect of the natural persons concerned and their right to obtain confirmation and communication of personal data concerning them which are being processed.”

The GDPR privacy notice should ensure the following aspects:

Concise, Transparent, Intelligible, and Easily Accessible

Concise and Transparent

To minimize information overload, data controllers must convey information and communications in a "concise and transparent" manner. Instead of having to browse through a lot of information in an online setting in search of specific issues, a layered privacy notice will allow a data subject to navigate to the specific piece of the privacy notice they want to access right away.

Intelligible

The information must be "intelligible," which implies that it must be understandable to the typical member of the intended audience.

Easily Accessible

The "easily accessible" requirement states that the data subject should not have to look for the information; it should be immediately apparent to them where and how to access it, for example, by giving it to them directly, linking to it, clearly directing them there, or by providing the information as the response to a natural language question.

Clear and Plain Language

Best practices for clear writing should be observed when presenting written material (including when delivering written information verbally, visually, or by audio/visual means, even for persons with vision impairments).

Information should be delivered in the most straightforward manner possible, avoiding complicated sentence and language patterns, to comply with the criterion for clear and plain language. The information should be specific and unambiguous; it shouldn't be expressed in ambiguous or abstract words or allow for several interpretations.

Providing Information to Children and Other Vulnerable People

When a data controller is directing their advertising at children or knows that their products/services target and are used by children frequently, it should make sure that the language's vocabulary, tone, and style are age-appropriate and can be easily understood by children and other vulnerable people.

In Writing or by Other Means

Under Article 12.1, the default position for providing information to, or communications with, data subjects is that the information is in writing. Data controllers are not limited to using digitally layered privacy statements and notices as their only written, electronic strategy. Other electronic tools may include, such as privacy dashboards, 3D touch or hover-over notices, and contextual pop-up notices.

The Information May be Provided Orally

When a data subject requests information, Article 12.1 expressly specifies that they may receive it verbally as long as their identity can be established in another way. To put it another way, the methods should go beyond relying solely on a person's assertions that they are a certain named person and allow the controller to confirm a data subject's identity confidently.

The oral communication of information required by Articles 13 and 14 does not always entail oral communication between individuals (i.e., in person or by telephone). It is possible to deliver automated oral information in addition to written information.

Free of Charge

Data controllers are typically prohibited from charging data subjects for the provision of information under Article 12.5. This element of transparency also means that no information provided in accordance with the standards for transparency may be contingent upon any financial transaction, such as the payment for or purchase of products or services.

How to Create a Privacy Notice

The privacy notice of GDPR should include the following:

  • Who is processing the data?
  • What legal basis allows the business to collect users' personal data?
  • What are the purposes and intentions of collecting users' personal data?
  • What types of personal data would be collected from users, and who will be data recipients?
  • How long will the business store the personal data of users?
  • Will the personal data obtained from users be transferred across borders?
  • Will the personal data obtained from users be used for automated decision-making?
  • Will the personal data obtained from users be shared with any third parties?
  • How can data subjects exercise their rights?
  • Who are the businesses’ data controllers, and their contact information?
  • Who are the businesses’ data protection officers, and what is their contact information?

While providing information on the data storage period, organizations must keep in consideration that they cannot keep the data longer than it is necessary for the stated purposes. Moreover, it is not sufficient to generically state that personal data will be kept as long as necessary for legitimate purposes. In fact, where relevant, the different storage periods should be stipulated for different categories of personal data and/or different processing purposes, including, where appropriate, archiving periods.

What are the Exceptions to the Obligation to Provide Information to Data Subjects?

  1. If a data controller has obtained personal information directly from a data subject, it is only exempt from Article 13 duties "where and to the extent that the data subject already knows the information."
  2. In the case of personal data not directly collected from the data subject, the right to information may be limited if the provision of such information proves impossible or would involve disproportionate effort from the controller.
  3. In the case of personal data not directly collected from the data subject, the right to information will not be exercised in so far as the obligation is likely to render impossible or seriously impair the achievement of the objectives of that processing. In such a situation, the data controller must take appropriate measures to protect the data subject’s rights and freedoms and legitimate interests.
  4. The right to information may be limited based on a legal requirement or on the grounds of professional secrecy.

Automate Privacy Notices with Securiti

As the global digital landscape witnesses a drastic transition, businesses must become even more privacy-conscious of their operations and adopt proactive measures to ensure compliance with international data privacy laws. Businesses must honor data subject rights and ensure their customer's data's utmost security and privacy.

Regulations of the law must be followed to operationalize compliance and avoid penalties for noncompliance. Securiti assists businesses in their compliance obligations through state-of-the-art robotic automation.

Securiti’s Privacy Notice Management enables businesses to build and publish a privacy notice on their website in minutes. Organizations can regularly update their privacy notices along with several other policies, such as cookie policy, terms, and conditions.

Additionally, Securiti’s Privacy Center enables organizations to easily comply with a myriad of complex and evolving global privacy regulations while building trust with users. Securiti’s Privacy Center takes care of all the complexity by building a fully functional Privacy Center in minutes which can be linked to the organization’s website and App.

Securiti can help you comply with the GDPR, privacy notice requirements, and other international privacy and security standards. Build your privacy notice today for free with Securiti.

Request a demo today and learn how Securiti can help your GDPR compliance efforts.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Data Security Governance View More

Data Security Governance: Key Principles and Best Practices for Protection

Learn about Data Security Governance, its importance in protecting sensitive data, ensuring compliance, and managing risks. Best practices for securing data.

A Comprehensive Overview of the NIS 2 Directive View More

A Comprehensive Overview of the NIS 2 Directive

Gain insights into the Network and Information System (NIS 2) Directive. Learn its scope, key obligations, noncompliance penalties, practical steps for applicable businesses, and...

View More

Top 10 Privacy Milestones That Defined 2024

Discover the top 10 privacy milestones that defined 2024. Learn how privacy evolved in 2024, including key legislations enacted, data breaches, and AI milestones.

View More

2025 Privacy Law Updates: Key Developments You Need to Know

Download the whitepaper to discover privacy law updates in 2025 and the key developments you need to know. Learn how Securiti helps ensure swift...

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New