GDPR Data Processing Agreement Template

A GDPR Data Processing Agreement Template is a standardized contract that defines how your vendors handle personal data, required under Article 28 of GDPR. Download one that maps to your control framework, customize the security obligations and audit rights sections, and integrate it into your vendor onboarding DDQ workflow.

Key takeaways:

  • Article 28 GDPR mandates written DPAs with all processors handling EU personal data
  • Template must include data categories, retention periods, sub-processor controls, and breach notification timelines
  • Customize security measures to match your SOC 2 or ISO 27001 control requirements
  • Build audit rights that align with your vendor risk tiering model
  • Automate DPA collection through your vendor onboarding workflow

Get this template

GDPR Article 28 aligned with article 28 required clauses, sub-processor management terms, cross-border transfer mechanisms

Your vendor processes EU personal data without a signed Data Processing Agreement? That's a regulatory violation waiting to happen. GDPR Article 28 requires specific contractual safeguards whenever you share personal data with third parties.

A solid GDPR DPA template transforms this compliance requirement into a risk management tool. Beyond checking the regulatory box, it establishes clear security expectations, defines incident response procedures, and creates enforceable audit rights.

The challenge? Generic templates miss critical controls. Cookie-cutter DPAs fail to address your specific data flows, security requirements, or industry obligations. You need a template that maps to your existing control framework while meeting GDPR's prescriptive requirements.

This guide breaks down each mandatory DPA section, shows you how to customize for your risk profile, and provides practical implementation strategies that integrate with your existing vendor management program.

Core DPA Requirements Under Article 28

GDPR Article 28(3) mandates eight specific elements in every Data Processing Agreement:

1. Processing Instructions and Scope

Define exactly what data the processor handles and how. Skip the legalese — use tables:

Data Category Processing Activities Legal Basis Retention Period
Customer contact data CRM storage, email campaigns Legitimate interest 3 years post-contract
Employee HR records Payroll processing Legal obligation 7 years
Website analytics Performance monitoring Consent 24 months

2. Confidentiality Obligations

Standard NDAs don't cut it. Your DPA needs teeth:

  • Personal liability clauses for processor employees
  • Specific penalties for unauthorized disclosure (€50,000 minimum)
  • Post-termination confidentiality extending 5+ years

3. Security Measures (Article 32)

Match technical safeguards to your control framework. If you're SOC 2 certified, require processors to maintain equivalent controls:

For SOC 2 Type II organizations:

  • Encryption at rest (AES-256) and in transit (TLS 1.2+)
  • Annual penetration testing with remediation SLAs
  • 24-hour incident notification
  • Quarterly vulnerability scanning

For ISO 27001 certified organizations: Map processor obligations to specific ISO controls:

  • A.12.1.1 - Documented operating procedures
  • A.13.1.1 - Network segmentation requirements
  • A.18.1.3 - Records protection standards

4. Sub-processor Management

Control your downstream risk with tiered requirements:

Critical vendors (Tier 1): Prior written approval for each sub-processor Standard vendors (Tier 2-3): Annual sub-processor list with 30-day objection rights Low-risk vendors (Tier 4): Notification-only model

Include flow-down provisions requiring identical data protection terms in all sub-processing agreements.

5. Data Subject Rights Support

Build operational procedures, not just promises:

  • 48-hour SLA for forwarding data subject requests
  • Documented process for data portability exports (JSON/CSV)
  • Deletion certification requirements with evidence standards

6. Audit and Inspection Rights

Generic "reasonable access" clauses create disputes. Get specific:

  • Annual audit rights with 30-day notice
  • SOC 2 Type II reports accepted in lieu of onsite audits for Tier 2-3 vendors
  • Unannounced audits permitted following security incidents
  • Cost allocation: vendor pays for first audit, you cover additional reviews

7. International Transfer Mechanisms

Post-Schrems II, you need multiple transfer tools:

  • Standard Contractual Clauses (2021 version) as baseline
  • Supplementary measures assessment for US processors
  • Transfer Impact Assessment documentation requirements

8. Return and Deletion Procedures

Vague "prompt deletion" creates enforcement nightmares. Specify:

  • 30-day deletion timeline post-termination
  • Certificate of destruction template with officer signature
  • Data return format requirements (encrypted USB, SFTP)
  • Backup deletion timelines (90 days maximum)

Industry-Specific Customizations

Financial Services

Layer PCI DSS and banking regulations:

  • Quarterly network segmentation validation
  • Tokenization requirements for payment data
  • 15-minute RTO for critical payment processors
  • Regulatory examination cooperation clauses

Healthcare

HIPAA creates parallel obligations:

  • Business Associate Agreement integration
  • Minimum necessary access controls
  • Accounting of disclosures support
  • State breach notification alignment (strictest standard applies)

Technology/SaaS

Address multi-tenant risks:

  • Logical segregation guarantees
  • Dedicated encryption keys per customer
  • API security standards (OAuth 2.0, rate limiting)
  • Development environment data handling

Implementation Strategy

Phase 1: Template Customization (Week 1-2)

  1. Map your control framework to DPA security requirements
  2. Define data categories and retention periods
  3. Create risk-tiered audit rights
  4. Build evidence collection requirements

Phase 2: Vendor Analysis (Week 3-4)

  1. Inventory existing processors without DPAs
  2. Risk-tier based on data volume and criticality
  3. Identify non-negotiable terms by vendor tier
  4. Create fallback positions for pushback items

Phase 3: Rollout Execution (Week 5-8)

Start with critical vendors:

  1. Send DPA with 30-day execution deadline
  2. Track objections in centralized log
  3. Escalate non-responsive vendors to business owners
  4. Document approved deviations with risk acceptance

Phase 4: Ongoing Management

Integrate DPA requirements into BAU processes:

  • Add DPA template to vendor onboarding packets
  • Build DPA terms into initial DDQs
  • Create annual review triggers
  • Monitor sub-processor changes quarterly

Common Implementation Failures

1. The "Set and Forget" Trap

Signing DPAs without operationalizing requirements kills your program. Build monitoring:

  • Quarterly sub-processor review meetings
  • Annual security attestation collection
  • Incident notification testing
  • Audit right execution tracking

2. One-Size-Fits-All Security Requirements

Requiring SOC 2 Type II from your coffee supplier wastes negotiation capital. Create tiered requirements:

  • Critical (Tier 1): Full SOC 2 + custom controls
  • High (Tier 2): SOC 2 Type I or ISO 27001
  • Medium (Tier 3): Completed security questionnaire
  • Low (Tier 4): Basic security commitments only

3. Ignoring Operational Reality

Your DPA requires 24-hour breach notification but your vendor's MSA specifies 72 hours? Document the conflict and create a monitoring process. Track these gaps in your risk register with compensating controls.

4. Overlooking Termination Logistics

"Delete all data within 30 days" sounds good until you realize the vendor's backup retention is 90 days. Address technical constraints upfront:

  • Backup deletion timelines
  • Legal hold procedures
  • Data return logistics
  • Certification requirements

Measuring DPA Effectiveness

Track these KPIs quarterly:

Coverage Metrics:

  • % of processors with executed DPAs
  • Average time to DPA execution
  • % requiring material deviations

Operational Metrics:

  • Data subject requests completed within SLA
  • Audit rights exercised vs. planned
  • Security incidents with proper notification

Risk Metrics:

  • Unauthorized sub-processor additions detected
  • International transfer mechanism gaps
  • Control deficiencies identified via audits

Frequently Asked Questions

Do I need a DPA with vendors who only process employee data, not customer data?

Yes. GDPR applies to all personal data processing, including employee data. HR outsourcing, payroll processors, and benefits administrators all require Article 28-compliant DPAs.

Our vendor insists their MSA already covers data protection. Why push for a separate DPA?

MSAs rarely include GDPR's specific requirements: sub-processor flow-downs, data subject right procedures, and EU-specific audit rights. A standalone DPA ensures you meet all Article 28 obligations and simplifies regulatory demonstrations.

What if a critical vendor refuses to sign our DPA template?

Document their proposed alternatives against Article 28 requirements. If gaps exist, get risk acceptance from your DPO and business owner. Consider supplementing with additional monitoring controls or contractual warranties.

How do I handle DPAs for vendors using sub-processors in multiple countries?

Require vendors to maintain a current sub-processor list with locations. Include contractual rights to object to new sub-processors in restricted jurisdictions. For existing problematic locations, document supplementary measures or implement data localization requirements.

Should I use SCCs for all international transfers or just non-adequate countries?

Focus SCCs on non-adequate jurisdictions first. For adequate countries (UK, Switzerland, etc.), reference the adequacy decision in your DPA but consider including SCCs as a backup mechanism given the evolving regulatory landscape.

How do I operationalize audit rights without overwhelming my team?

Create a risk-based audit calendar. Accept SOC 2 reports for lower-tier vendors, pool audits with other customers when possible, and focus deep-dive audits on critical processors with access to sensitive data categories.

What evidence should I collect to prove DPA compliance?

Maintain: executed DPAs, annual attestations, audit reports, sub-processor lists, incident notifications, data subject request logs, and deletion certificates. Store centrally and review quarterly.

Frequently Asked Questions

Do I need a DPA with vendors who only process employee data, not customer data?

Yes. GDPR applies to all personal data processing, including employee data. HR outsourcing, payroll processors, and benefits administrators all require Article 28-compliant DPAs.

Our vendor insists their MSA already covers data protection. Why push for a separate DPA?

MSAs rarely include GDPR's specific requirements: sub-processor flow-downs, data subject right procedures, and EU-specific audit rights. A standalone DPA ensures you meet all Article 28 obligations and simplifies regulatory demonstrations.

What if a critical vendor refuses to sign our DPA template?

Document their proposed alternatives against Article 28 requirements. If gaps exist, get risk acceptance from your DPO and business owner. Consider supplementing with additional monitoring controls or contractual warranties.

How do I handle DPAs for vendors using sub-processors in multiple countries?

Require vendors to maintain a current sub-processor list with locations. Include contractual rights to object to new sub-processors in restricted jurisdictions. For existing problematic locations, document supplementary measures or implement data localization requirements.

Should I use SCCs for all international transfers or just non-adequate countries?

Focus SCCs on non-adequate jurisdictions first. For adequate countries (UK, Switzerland, etc.), reference the adequacy decision in your DPA but consider including SCCs as a backup mechanism given the evolving regulatory landscape.

How do I operationalize audit rights without overwhelming my team?

Create a risk-based audit calendar. Accept SOC 2 reports for lower-tier vendors, pool audits with other customers when possible, and focus deep-dive audits on critical processors with access to sensitive data categories.

What evidence should I collect to prove DPA compliance?

Maintain: executed DPAs, annual attestations, audit reports, sub-processor lists, incident notifications, data subject request logs, and deletion certificates. Store centrally and review quarterly.

Automate your third-party assessments

Daydream turns these manual spreadsheets into automated, trackable workflows — with AI-prefilled questionnaires, real-time risk scoring, and continuous monitoring.

Try Daydream