Article 18: Right to restriction of processing
To meet the article 18: right to restriction of processing requirement, you need a repeatable way to (1) accept and authenticate restriction requests, (2) decide whether a valid restriction trigger applies, and (3) technically “freeze” the data across systems so it is stored but not used, shared, or changed except in narrowly allowed scenarios. Document each decision and prove the restriction actually took effect. (Regulation (EU) 2016/679, Article 18)
Key takeaways:
- Build a restriction workflow that results in an enforceable “processing hold” across core systems, not a policy promise.
- Treat restriction as a cross-functional control: Privacy + Legal + Security + Data/Engineering + Customer Support.
- Keep an evidence packet per request: identity check, trigger assessment, system actions taken, notifications, and release criteria.
Article 18 is operationally tricky because “restriction” is not the same as deletion, suppression, or objection handling. Restriction means you keep the personal data, but you stop most processing until the issue that triggered restriction is resolved. That forces you to translate a legal right into concrete data controls: system flags, workflow gates, downstream sharing blocks, and a way to prevent reprocessing by analytics, machine learning pipelines, marketing tools, support tooling, and third parties.
For a Compliance Officer, CCO, or GRC lead, the fastest path is to implement Article 18 as a defined intake-and-execution playbook tied to your data inventory and identity/DSAR tooling. Your auditors and customers will test whether (a) you can identify when restriction applies, (b) you can implement the restriction quickly and consistently across systems, and (c) you can prove what you did with timestamps and system outputs.
This page focuses on requirement-level execution: who owns what, what the workflow must do, what artifacts to retain, and where teams commonly fail. Source text is GDPR Article 18. (Regulation (EU) 2016/679, Article 18)
Plain-English interpretation (what Article 18 requires)
Article 18 gives a data subject the right to obtain restriction of processing from the controller when certain conditions apply. In practice, you must be able to pause most uses of the person’s data while keeping it stored, and you must do it based on defined triggers, not ad hoc judgment. (Regulation (EU) 2016/679, Article 18)
Restriction is best implemented as a “processing hold” with explicit allowed actions:
- Allowed by default: storage/retention (do not delete solely because you restricted).
- Disallowed by default: active use (profiling, marketing, analytics refreshes, model training, enrichment, automated decisioning), and disclosure/sharing except where allowed by law or the GDPR’s restriction rules. (Regulation (EU) 2016/679, Article 18)
Who it applies to (entity and operational context)
Applies primarily to controllers. Article 18 is phrased as a right the data subject can obtain “from the controller,” so your company must be ready to execute when you determine you act as controller for the processing at issue. (Regulation (EU) 2016/679, Article 18)
Operationally, processors still matter. Even if the legal obligation is on the controller, many controllers rely on processors and sub-processors to execute restrictions in hosted products, SaaS tools, analytics platforms, communications vendors, and managed services. You need contractual and operational paths to pass restriction instructions downstream, then validate completion.
High-friction contexts to map explicitly
- Multi-system identity: separate identifiers across CRM, product DB, billing, support, data warehouse.
- Event streaming and replication: Kafka-like pipelines, ELT jobs, feature stores.
- Third-party sharing: adtech, email service providers, customer support tools, payment providers, fraud tools.
- Human workflows: support agents exporting data, sales teams downloading lists.
Regulatory text
Excerpt (provided): “The data subject shall have the right to obtain from the controller restriction of processing where one of the following applies:” (Regulation (EU) 2016/679, Article 18)
What the operator must do with this text
- Define “restriction of processing” as a control state in your privacy program (example: “Restricted = store only; no active processing; no sharing; changes only with approval and logged exception”).
- Define the trigger events that can create that state (the specific “one of the following applies” conditions in Article 18). Your SOP should list each trigger and the evidence needed to validate it. (Regulation (EU) 2016/679, Article 18)
- Make restriction enforceable in systems, not just in correspondence. Your workflow must result in system-level actions (flags, permissions, job exclusions, suppression lists) that prevent routine processing.
What you actually need to do (step-by-step)
Step 1: Decide your role and scope (controller vs. processor) per system/process
Create a role-and-scope register that answers, for each processing activity: Are we controller, joint controller, or processor? Which systems store/process the relevant personal data? This prevents the most common failure mode: teams promise restriction for data they cannot actually control end-to-end. (Regulation (EU) 2016/679, Article 18)
Deliverable: “Article 18 scope map” tied to your RoPA/data inventory: systems, data categories, owners, key identifiers, third parties.
Step 2: Stand up a restriction request intake path (DSAR channel + internal escalation)
You need an intake mechanism that routes restriction requests to the right owners quickly and consistently:
- Public channels: privacy email, web form, in-product request, postal address intake.
- Internal channels: Customer Support case type, Legal escalation, Security escalation for identity issues.
Minimum fields to capture
- Requester identity and contact details
- Identifier(s) used to locate data (account ID, email, device ID)
- Which processing they want restricted (all vs. specific context)
- Reason provided (map to Article 18 trigger categories in your SOP) (Regulation (EU) 2016/679, Article 18)
Step 3: Authenticate identity and authority
Before applying restriction, confirm the requester is the data subject or an authorized agent. Document the method used and the result. This is both privacy and security hygiene: restriction requests can be used to disrupt service or conceal fraud.
Operator tip: Predefine “low-risk” vs. “high-risk” identity methods. For high-risk accounts, require stronger verification before changing processing states.
Step 4: Triage against Article 18 triggers and record a decision
Build a decision record template that forces consistent triage:
- Trigger asserted
- Facts/evidence reviewed
- Decision: approve restriction, partial restriction, or deny
- Scope: which processing is restricted (marketing emails only vs. all processing in specific product)
- Effective date/time and planned review/release criteria (Regulation (EU) 2016/679, Article 18)
If you deny or narrow scope, record the reason in plain language and retain internal notes that would stand up in a regulator inquiry.
Step 5: Execute restriction in systems (the “processing hold”)
This is where programs fail. “We told engineering” is not an auditable control. You need defined system actions by system type:
System control patterns
- Transactional databases: add a restriction flag; enforce it at read/write paths for non-exempt processing; block downstream exports.
- CRM/marketing automation: suppress from campaigns and segmentation; block sync audiences; lock profile edits to approved roles.
- Data warehouse/lake: exclude restricted records from analytics datasets and feature generation; prevent refresh jobs from reintroducing them.
- ML pipelines: add restricted IDs to training exclusion lists; stop new training runs from incorporating restricted data until released.
- Support tools: mask or restrict agent access; prevent bulk export for restricted identities.
Third parties
- Send restriction instructions to third parties that process on your behalf, track acknowledgments, and confirm completion. Treat this like a time-bound operational dependency: you need a “sent / acknowledged / implemented / verified” status per third party.
Step 6: Notify internal stakeholders and control ongoing processing
Restriction is not a one-time toggle if teams can still process via manual workarounds.
- Gate exports with DLP or approval.
- Update access controls for restricted identities where feasible.
- Add alerts for attempted processing of restricted records (for example, job failures or policy blocks).
Step 7: Communicate outcome to the data subject and maintain the restriction
Respond with:
- Confirmation of restriction and scope, or rationale for denial/narrowing
- What processing is paused, and what may still occur (for example, storage)
- How restriction will be lifted (release triggers and how they can follow up)
Step 8: Release restriction safely (and prove it)
Define release criteria aligned to your decision record (for example, dispute resolved, accuracy verified, or legal basis clarified). When lifting restriction:
- Log who approved it and why
- Re-enable processing deliberately (do not silently “fall off” because a ticket closed)
- Notify relevant downstream owners and third parties
Required evidence and artifacts to retain
Maintain an “Article 18 evidence packet” per request. Minimum contents:
- Intake record (date received, channel, identifiers provided)
- Identity verification record (method, outcome)
- Decision record mapping request to Article 18 trigger(s) (Regulation (EU) 2016/679, Article 18)
- System execution logs/screenshots/exports showing:
- restriction flag applied
- campaign suppression applied
- data warehouse exclusions updated
- third-party notifications sent and acknowledgments received
- Communication to the data subject (copy of response)
- Exceptions (if any processing continued) with justification and approver
- Release record when restriction lifted (who/when/why)
Operational artifact hygiene matters more than format. Store these in your DSAR case system, GRC tool, or privacy ticketing with immutable timestamps.
Common exam/audit questions and hangups
Auditors, customers, and regulators typically test:
- “Show me a restricted data subject end-to-end.” Prove restriction across product DB, CRM, analytics, and third parties.
- “How do you prevent reprocessing?” Point to job controls, suppression lists, and access gates, not just training.
- “Who can override restriction?” Provide role-based approvals and exception logging.
- “How do you know your processors complied?” Produce instruction records and confirmations.
- “How do you ensure consistent treatment across identifiers?” Explain identity resolution and system mapping.
Hangup: teams confuse restriction with deletion. If a data subject is restricted, you still store the data, but you must stop most processing. (Regulation (EU) 2016/679, Article 18)
Frequent implementation mistakes (and how to avoid them)
- Policy-only restriction. Fix: require a technical control outcome (flags + suppression + job exclusions) before closing the case.
- Partial system coverage. Fix: maintain the role-and-scope register, and include “shadow IT” tools used for exports and reporting.
- No third-party propagation. Fix: build a processor instruction workflow and status tracking.
- Restriction flag without enforcement. Fix: add guardrails in code, queries, and data access layers so restricted records cannot be processed “by accident.”
- No release discipline. Fix: require a documented approver and explicit re-enable steps; audit for silent reactivation.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so this page does not list case examples.
Practical risk to manage anyway:
- Failure to honor restriction requests can trigger regulator complaints, escalate DSAR disputes, and expose gaps in your data lineage and third-party governance.
- Weak restriction controls often correlate with weak deletion, objection, and accuracy controls because they share the same system dependencies.
Practical execution plan (30/60/90)
Use this as a fast, operator-friendly rollout sequence.
First 30 days (stabilize the basics)
- Assign owners: Privacy (process owner), Legal (decision support), Security (identity), Engineering/Data (execution), Support (intake).
- Create the role-and-scope register for Article 18 across systems and key third parties.
- Publish the Article 18 SOP: triggers, triage, identity steps, decision template, execution checklist. (Regulation (EU) 2016/679, Article 18)
- Implement a minimum viable “restriction flag” in primary systems and manual suppression in CRM/marketing as an interim measure.
- Stand up evidence packet storage in your case system.
Next 60 days (make it enforceable)
- Extend restriction controls to analytics and data warehouse workflows (job exclusions, dataset views).
- Add third-party instruction templates and tracking for key processors.
- Build QA: sample restricted cases and verify no marketing sends, no analytics inclusion, no exports.
- Train Support and Sales on “restricted means no export” handling and escalation routes.
By 90 days (make it resilient)
- Automate identity resolution across identifiers (account IDs, emails, device IDs) to avoid incomplete restriction.
- Add monitoring: alerts for attempted processing of restricted identities, and periodic reconciliation between DSAR cases and system flags.
- Run an internal audit tabletop: pick a closed restriction request and re-perform evidence collection as if a regulator asked tomorrow.
- If you use Daydream, map Article 18 as a requirement with named owners, trigger events, and an evidence cadence so restriction cases generate consistent, review-ready packets.
Frequently Asked Questions
What’s the difference between restriction of processing and deletion?
Restriction means you keep the data but pause most processing; deletion means you erase it unless an exception applies. Treat restriction as a temporary processing hold tied to explicit release criteria. (Regulation (EU) 2016/679, Article 18)
Do we have to restrict processing across every system immediately?
You need a consistent, defensible execution across the systems that actually process the person’s data. Start with the systems that drive active use and disclosure (product, CRM/marketing, analytics, key third parties), then expand coverage with your scope map.
How do we handle restriction when multiple identifiers exist (email vs. account ID)?
Your workflow must include identity resolution: map the requester to all known identifiers used in downstream systems, then apply restriction to each. Keep the mapping in the evidence packet so you can prove completeness.
If we are a processor, do we need an Article 18 process?
The right is obtained from the controller, but processors typically execute the controller’s instructions. Build an operational path to receive restriction instructions, apply them in your systems, and confirm completion back to the controller.
Can we still process restricted data for security or legal reasons?
Restriction is not a blanket ban on all activity; your SOP should define allowed exceptions with Legal review and documented approvals. Record exceptions in the evidence packet so you can justify continued processing if challenged. (Regulation (EU) 2016/679, Article 18)
What evidence do auditors want to see for an Article 18 request?
They want proof of three things: a valid intake and identity check, a documented decision tied to Article 18 triggers, and technical confirmation that processing stopped across relevant systems and third parties. (Regulation (EU) 2016/679, Article 18)
Frequently Asked Questions
What’s the difference between restriction of processing and deletion?
Restriction means you keep the data but pause most processing; deletion means you erase it unless an exception applies. Treat restriction as a temporary processing hold tied to explicit release criteria. (Regulation (EU) 2016/679, Article 18)
Do we have to restrict processing across every system immediately?
You need a consistent, defensible execution across the systems that actually process the person’s data. Start with the systems that drive active use and disclosure (product, CRM/marketing, analytics, key third parties), then expand coverage with your scope map.
How do we handle restriction when multiple identifiers exist (email vs. account ID)?
Your workflow must include identity resolution: map the requester to all known identifiers used in downstream systems, then apply restriction to each. Keep the mapping in the evidence packet so you can prove completeness.
If we are a processor, do we need an Article 18 process?
The right is obtained from the controller, but processors typically execute the controller’s instructions. Build an operational path to receive restriction instructions, apply them in your systems, and confirm completion back to the controller.
Can we still process restricted data for security or legal reasons?
Restriction is not a blanket ban on all activity; your SOP should define allowed exceptions with Legal review and documented approvals. Record exceptions in the evidence packet so you can justify continued processing if challenged. (Regulation (EU) 2016/679, Article 18)
What evidence do auditors want to see for an Article 18 request?
They want proof of three things: a valid intake and identity check, a documented decision tied to Article 18 triggers, and technical confirmation that processing stopped across relevant systems and third parties. (Regulation (EU) 2016/679, Article 18)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream