GDPR Data Processing Agreement Template
A GDPR Data Processing Agreement Template is a standardized contract that defines how your vendors handle personal data, required under Article 28 of GDPR. Download one that maps to your control framework, customize the security obligations and audit rights sections, and integrate it into your vendor onboarding DDQ workflow.
Key takeaways:
- Article 28 GDPR mandates written DPAs with all processors handling EU personal data
- Template must include data categories, retention periods, sub-processor controls, and breach notification timelines
- Customize security measures to match your SOC 2 or ISO 27001 control requirements
- Build audit rights that align with your vendor risk tiering model
- Automate DPA collection through your vendor onboarding workflow
Get this template
GDPR Article 28 aligned with article 28 required clauses, sub-processor management terms, cross-border transfer mechanisms
Your vendor processes EU personal data without a signed Data Processing Agreement? That's a regulatory violation waiting to happen. GDPR Article 28 requires specific contractual safeguards whenever you share personal data with third parties.
A solid GDPR DPA template transforms this compliance requirement into a risk management tool. Beyond checking the regulatory box, it establishes clear security expectations, defines incident response procedures, and creates enforceable audit rights.
The challenge? Generic templates miss critical controls. Cookie-cutter DPAs fail to address your specific data flows, security requirements, or industry obligations. You need a template that maps to your existing control framework while meeting GDPR's prescriptive requirements.
This guide breaks down each mandatory DPA section, shows you how to customize for your risk profile, and provides practical implementation strategies that integrate with your existing vendor management program.
Core DPA Requirements Under Article 28
GDPR Article 28(3) mandates eight specific elements in every Data Processing Agreement:
1. Processing Instructions and Scope
Define exactly what data the processor handles and how. Skip the legalese — use tables:
| Data Category | Processing Activities | Legal Basis | Retention Period |
|---|---|---|---|
| Customer contact data | CRM storage, email campaigns | Legitimate interest | 3 years post-contract |
| Employee HR records | Payroll processing | Legal obligation | 7 years |
| Website analytics | Performance monitoring | Consent | 24 months |
2. Confidentiality Obligations
Standard NDAs don't cut it. Your DPA needs teeth:
- Personal liability clauses for processor employees
- Specific penalties for unauthorized disclosure (€50,000 minimum)
- Post-termination confidentiality extending 5+ years
3. Security Measures (Article 32)
Match technical safeguards to your control framework. If you're SOC 2 certified, require processors to maintain equivalent controls:
For SOC 2 Type II organizations:
- Encryption at rest (AES-256) and in transit (TLS 1.2+)
- Annual penetration testing with remediation SLAs
- 24-hour incident notification
- Quarterly vulnerability scanning
For ISO 27001 certified organizations: Map processor obligations to specific ISO controls:
- A.12.1.1 - Documented operating procedures
- A.13.1.1 - Network segmentation requirements
- A.18.1.3 - Records protection standards
4. Sub-processor Management
Control your downstream risk with tiered requirements:
Critical vendors (Tier 1): Prior written approval for each sub-processor Standard vendors (Tier 2-3): Annual sub-processor list with 30-day objection rights Low-risk vendors (Tier 4): Notification-only model
Include flow-down provisions requiring identical data protection terms in all sub-processing agreements.
5. Data Subject Rights Support
Build operational procedures, not just promises:
- 48-hour SLA for forwarding data subject requests
- Documented process for data portability exports (JSON/CSV)
- Deletion certification requirements with evidence standards
6. Audit and Inspection Rights
Generic "reasonable access" clauses create disputes. Get specific:
- Annual audit rights with 30-day notice
- SOC 2 Type II reports accepted in lieu of onsite audits for Tier 2-3 vendors
- Unannounced audits permitted following security incidents
- Cost allocation: vendor pays for first audit, you cover additional reviews
7. International Transfer Mechanisms
Post-Schrems II, you need multiple transfer tools:
- Standard Contractual Clauses (2021 version) as baseline
- Supplementary measures assessment for US processors
- Transfer Impact Assessment documentation requirements
8. Return and Deletion Procedures
Vague "prompt deletion" creates enforcement nightmares. Specify:
- 30-day deletion timeline post-termination
- Certificate of destruction template with officer signature
- Data return format requirements (encrypted USB, SFTP)
- Backup deletion timelines (90 days maximum)
Industry-Specific Customizations
Financial Services
Layer PCI DSS and banking regulations:
- Quarterly network segmentation validation
- Tokenization requirements for payment data
- 15-minute RTO for critical payment processors
- Regulatory examination cooperation clauses
Healthcare
HIPAA creates parallel obligations:
- Business Associate Agreement integration
- Minimum necessary access controls
- Accounting of disclosures support
- State breach notification alignment (strictest standard applies)
Technology/SaaS
Address multi-tenant risks:
- Logical segregation guarantees
- Dedicated encryption keys per customer
- API security standards (OAuth 2.0, rate limiting)
- Development environment data handling
Implementation Strategy
Phase 1: Template Customization (Week 1-2)
- Map your control framework to DPA security requirements
- Define data categories and retention periods
- Create risk-tiered audit rights
- Build evidence collection requirements
Phase 2: Vendor Analysis (Week 3-4)
- Inventory existing processors without DPAs
- Risk-tier based on data volume and criticality
- Identify non-negotiable terms by vendor tier
- Create fallback positions for pushback items
Phase 3: Rollout Execution (Week 5-8)
Start with critical vendors:
- Send DPA with 30-day execution deadline
- Track objections in centralized log
- Escalate non-responsive vendors to business owners
- Document approved deviations with risk acceptance
Phase 4: Ongoing Management
Integrate DPA requirements into BAU processes:
- Add DPA template to vendor onboarding packets
- Build DPA terms into initial DDQs
- Create annual review triggers
- Monitor sub-processor changes quarterly
Common Implementation Failures
1. The "Set and Forget" Trap
Signing DPAs without operationalizing requirements kills your program. Build monitoring:
- Quarterly sub-processor review meetings
- Annual security attestation collection
- Incident notification testing
- Audit right execution tracking
2. One-Size-Fits-All Security Requirements
Requiring SOC 2 Type II from your coffee supplier wastes negotiation capital. Create tiered requirements:
- Critical (Tier 1): Full SOC 2 + custom controls
- High (Tier 2): SOC 2 Type I or ISO 27001
- Medium (Tier 3): Completed security questionnaire
- Low (Tier 4): Basic security commitments only
3. Ignoring Operational Reality
Your DPA requires 24-hour breach notification but your vendor's MSA specifies 72 hours? Document the conflict and create a monitoring process. Track these gaps in your risk register with compensating controls.
4. Overlooking Termination Logistics
"Delete all data within 30 days" sounds good until you realize the vendor's backup retention is 90 days. Address technical constraints upfront:
- Backup deletion timelines
- Legal hold procedures
- Data return logistics
- Certification requirements
Measuring DPA Effectiveness
Track these KPIs quarterly:
Coverage Metrics:
- % of processors with executed DPAs
- Average time to DPA execution
- % requiring material deviations
Operational Metrics:
- Data subject requests completed within SLA
- Audit rights exercised vs. planned
- Security incidents with proper notification
Risk Metrics:
- Unauthorized sub-processor additions detected
- International transfer mechanism gaps
- Control deficiencies identified via audits
Frequently Asked Questions
Do I need a DPA with vendors who only process employee data, not customer data?
Yes. GDPR applies to all personal data processing, including employee data. HR outsourcing, payroll processors, and benefits administrators all require Article 28-compliant DPAs.
Our vendor insists their MSA already covers data protection. Why push for a separate DPA?
MSAs rarely include GDPR's specific requirements: sub-processor flow-downs, data subject right procedures, and EU-specific audit rights. A standalone DPA ensures you meet all Article 28 obligations and simplifies regulatory demonstrations.
What if a critical vendor refuses to sign our DPA template?
Document their proposed alternatives against Article 28 requirements. If gaps exist, get risk acceptance from your DPO and business owner. Consider supplementing with additional monitoring controls or contractual warranties.
How do I handle DPAs for vendors using sub-processors in multiple countries?
Require vendors to maintain a current sub-processor list with locations. Include contractual rights to object to new sub-processors in restricted jurisdictions. For existing problematic locations, document supplementary measures or implement data localization requirements.
Should I use SCCs for all international transfers or just non-adequate countries?
Focus SCCs on non-adequate jurisdictions first. For adequate countries (UK, Switzerland, etc.), reference the adequacy decision in your DPA but consider including SCCs as a backup mechanism given the evolving regulatory landscape.
How do I operationalize audit rights without overwhelming my team?
Create a risk-based audit calendar. Accept SOC 2 reports for lower-tier vendors, pool audits with other customers when possible, and focus deep-dive audits on critical processors with access to sensitive data categories.
What evidence should I collect to prove DPA compliance?
Maintain: executed DPAs, annual attestations, audit reports, sub-processor lists, incident notifications, data subject request logs, and deletion certificates. Store centrally and review quarterly.
Frequently Asked Questions
Do I need a DPA with vendors who only process employee data, not customer data?
Yes. GDPR applies to all personal data processing, including employee data. HR outsourcing, payroll processors, and benefits administrators all require Article 28-compliant DPAs.
Our vendor insists their MSA already covers data protection. Why push for a separate DPA?
MSAs rarely include GDPR's specific requirements: sub-processor flow-downs, data subject right procedures, and EU-specific audit rights. A standalone DPA ensures you meet all Article 28 obligations and simplifies regulatory demonstrations.
What if a critical vendor refuses to sign our DPA template?
Document their proposed alternatives against Article 28 requirements. If gaps exist, get risk acceptance from your DPO and business owner. Consider supplementing with additional monitoring controls or contractual warranties.
How do I handle DPAs for vendors using sub-processors in multiple countries?
Require vendors to maintain a current sub-processor list with locations. Include contractual rights to object to new sub-processors in restricted jurisdictions. For existing problematic locations, document supplementary measures or implement data localization requirements.
Should I use SCCs for all international transfers or just non-adequate countries?
Focus SCCs on non-adequate jurisdictions first. For adequate countries (UK, Switzerland, etc.), reference the adequacy decision in your DPA but consider including SCCs as a backup mechanism given the evolving regulatory landscape.
How do I operationalize audit rights without overwhelming my team?
Create a risk-based audit calendar. Accept SOC 2 reports for lower-tier vendors, pool audits with other customers when possible, and focus deep-dive audits on critical processors with access to sensitive data categories.
What evidence should I collect to prove DPA compliance?
Maintain: executed DPAs, annual attestations, audit reports, sub-processor lists, incident notifications, data subject request logs, and deletion certificates. Store centrally and review quarterly.
Automate your third-party assessments
Daydream turns these manual spreadsheets into automated, trackable workflows — with AI-prefilled questionnaires, real-time risk scoring, and continuous monitoring.
Try Daydream