Compliance and Privacy (GDPR & Data Protection): compliance is not about paperwork, but about customer trust
Content of the article
Content of the article
The response “our office is in Kyiv, so GDPR doesn’t apply to us” has cost some companies millions in fines. The General Data Protection Regulation is not a bureaucratic formality for large corporations, but a basic standard of trust between business and client in the digital space. This article explains when and why GDPR binds Ukrainian companies, and exactly what needs to be done to avoid falling into the regulatory crosshairs.
GDPR Extraterritoriality: Why Kyiv is No Shield from Brussels
1.1. Where It Is Stated That GDPR Applies to Ukraine
Article 3 of the GDPR establishes two independent criteria for the regulation’s applicability, neither of which is tied to the company’s place of registration:
-
Criterion 1 — The Establishment Criterion: GDPR applies if a company has an “establishment” within the EU territory—even a branch, a representative office, or a permanent representative without legal entity status. Data processing related to the activities of such an establishment falls under the regulation.
-
Criterion 2 — The Targeting Criterion: GDPR applies to any controller or processor outside the EU if they: (a) offer goods or services to data subjects in the EU (regardless of whether payment is required), or (b) monitor the behavior of data subjects located within the EU.
A simple test: if your website or application is accessible to users in the EU, you collect their data (email, IP address, cookies), and you have not taken active measures to block such access—GDPR applies to you. The question is not where your office is located, but where your users are located.
1.2. Real Fines: The Cost of Ignorance
The GDPR provides for two levels of sanctions:
-
Up to €10 million or 2% of annual global turnover — for violations of organizational requirements (lack of DPA, DPO, processing records, etc.).
-
Up to €20 million or 4% of annual global turnover — for violations of basic principles (unlawful processing, violation of subject rights, illegal data transfers).
EU regulatory authorities actively pursue companies outside the Union. In 2023–2024, there were precedents of holding companies without a physical presence in the EU accountable through their representatives or partners. Here are several illustrative examples:
Example 1. Meta Platforms (Ireland / USA) — €1.2 billion fine (2023)
The Irish Data Protection Commission (DPC) imposed a then-record fine of €1.2 billion on Meta for the unlawful transfer of Facebook users’ personal data to the US without adequate legal safeguards after the Privacy Shield was declared invalid. Key lesson: it is not enough to simply sign SCCs—it is also necessary to conduct a Transfer Impact Assessment (TIA) and verify whether the destination country’s legislation provides actual data protection.
Example 2. TikTok (Ireland / China) — €345 million fine (2023)
The DPC fined TikTok for violating the principles of processing children’s data: the privacy settings of minors’ accounts were set to public by default (a violation of Privacy by Default), and parental control was improperly implemented. The company has a legal entity in Ireland, but the servers and parent company are outside the EU. Lesson: Privacy by Default is not an option, but a mandatory requirement, especially for products aimed at a broad audience.
Example 3. Clearview AI (France, Greece, UK, etc.) — over €100 million in aggregate
The American company Clearview AI, which scraped facial images from open sources on the internet to build a biometric database, had no office in the EU. Despite this, regulators in France (CNIL), Greece, Italy, the UK, and other countries imposed fines and issued orders to stop processing the data of residents in their jurisdictions. This case clearly demonstrated: the absence of a physical presence in the EU is not an obstacle to regulatory prosecution if the company processes data of individuals located within the EU.
1.3. Ukraine’s Special Status in the GDPR Context
Ukraine has not been recognized by the European Commission as a country with an adequate level of data protection (adequacy decision). This means that the transfer of EU citizens’ personal data to Ukraine, by default, requires additional legal mechanisms: Standard Contractual Clauses (SCC), Binding Corporate Rules (BCR), or another exceptional mechanism provided for in Article 49 of the GDPR.
At the same time, the Association Agreement between Ukraine and the EU obliges Ukraine to align its legislation with EU standards in the field of data protection. The Law of Ukraine “On the Protection of Personal Data” (2010, as amended) partially reflects these standards but lags significantly behind the GDPR in terms of detail and enforcement.
Data Processing Agreement (DPA): A Mandatory Document Often Overlooked
2.1. What is a DPA and Why Does It Exist
A Data Processing Agreement is a legally binding contract between a Controller and a Processor of personal data, as mandated by Article 28 of the GDPR. Its absence constitutes a standalone violation of the regulation, even if the actual data processing is carried out lawfully. A DPA defines: the subject matter, duration, nature, and purpose of the processing; categories of personal data and data subjects; rights and obligations of both parties; technical and organizational security measures; the procedure for engaging sub-processors; actions to be taken in the event of a data breach.
2.2. Controller vs Processor: The Crucial Difference
Understanding the distinction between these roles is fundamental to correctly structuring relationships and documentation.
| Criterion | Controller | Processor |
| Who is it | Determines the purpose and means of data processing | Processes data solely on the controller’s instructions |
| Typical examples | A SaaS company that collects its customers’ data; an online store | A cloud provider (AWS, GCP); an email newsletter service; an outsourced developer |
| Responsibility | Full responsibility for the lawfulness of processing; determines the legal basis |
|
| DPA | Obliged to conclude a DPA with each processor | Obliged to conclude a DPA with the controller; also a DPA with subprocessors |
| Fines | Bears responsibility before the regulator and data subjects | May bear joint liability with the controller |
2.3. Typical mistakes in outsourcing relationships
IT outsourcing is a high-risk environment from a GDPR perspective. A developer or service company that gains access to a client’s database containing personal data is a processor and must conclude a DPA with the client-controller.
The most common mistakes we observe in practice:
- The DPA is completely absent — the parties limit themselves to an NDA or a standard development agreement.
- A DPA exists but does not contain the mandatory elements of Article 28 GDPR — for example, there is no list of technical security measures or a procedure for handling a breach.
- Subprocessors are not declared — the developer engages third-party contractors (hosting, analytics) without notifying the controller and without concluding separate DPAs with them.
- The roles of controller and processor are confused — the company considers itself a processor but in fact independently determines the purpose of data processing.
- A DPA is concluded, but the data is actually transferred to countries without an adequacy decision without SCCs.
Privacy by Design: data protection from the first line of code
3.1. What it is and why it matters
Privacy by Design is a principle enshrined in Article 25 of the GDPR, according to which the protection of personal data must be embedded into the architecture of a product or system at the design stage, rather than added as a “layer” before launch or after regulatory review.
In practice, this principle is implemented through two requirements:
Data Protection by Design: technical and organisational security measures must be built into the system design from the outset (encryption, pseudonymisation, access control, data minimisation).
Data Protection by Default: by default, the system must process only the minimum amount of personal data necessary for a specific purpose. In other words, “maximum privacy” is the default state, not an option.
3.2. Practical implementation at each stage
Phase 1. Discovery and architecture design
Before development begins, a Data Protection Impact Assessment (DPIA) must be conducted. A DPIA is mandatory under Article 35 GDPR in cases of “systematic and large-scale” profiling, processing of sensitive data, or public monitoring. However, even where a DPIA is not formally required, conducting one is a sign of a mature compliance approach.
At this stage, it is necessary to define: what personal data is collected and for what purpose; the legal basis for processing (consent, contract, legitimate interest, etc.); who will have access to the data; how long the data will be stored; how data will be transferred to third parties.
Phase 2. Development
- Encryption: data at rest and in transit must be encrypted (AES-256, TLS 1.2+).
- Pseudonymisation: where possible, replace direct identifiers with pseudonyms or hashes.
- Data minimisation principle: do not collect fields that are not required for functionality. If only an email is needed for registration, do not request a phone number.
- Access control: implement role-based access control (RBAC) and the principle of least privilege.
- Logging: maintain detailed access logs for personal data for auditing purposes.
- Automated deletion: implement retention policies so that data is automatically deleted after the storage period expires.
Phase 3. Testing and QA
Test environments should not contain real personal data. Use synthetic or anonymised data for testing. Conduct penetration testing and vulnerability assessments before production release.
Phase 4. Release and ongoing maintenance
Maintain a Record of Processing Activities (Article 30 GDPR). Appoint a Data Protection Officer (DPO) if required by the scale or nature of processing. Establish a data breach response procedure: GDPR requires notification to the regulator within 72 hours from the moment the breach is identified.
Cookie Compliance: why an “OK” button is not compliance
4.1. Legal basis: GDPR + ePrivacy Directive
Cookie compliance is regulated not only by the GDPR, but also by the ePrivacy Directive (2002/58/EC, as amended by 2009/136/EC) — the so-called “Cookie Law”. These two frameworks apply simultaneously, and compliance with one does not replace compliance with the other.
Key requirement: most cookies that are not strictly necessary for the technical functioning of a website require prior, freely given, specific, informed, and unambiguous consent from the user before they are set. Not after. Not “if you continue browsing the site”. But before.
4.2. Three categories of cookies and their legal regime
| Category | Examples | Legal regime |
| Strictly Necessary | Session cookies, authentication, shopping cart, CSRF tokens | Consent is NOT required. They may be set before any user action. |
| Analytical / Performance | Google Analytics, Hotjar, Mixpanel, Matomo | Consent is MANDATORY. Even anonymised analytics requires consent in most EU jurisdictions. |
| Marketing / Targeting | Facebook Pixel, Google Ads remarketing, TikTok Pixel | Consent is MANDATORY. These cookies carry the highest risk — they are the primary target of most regulatory audits. |
4.3. What does NOT constitute valid consent: common violations
EU regulators (especially France’s CNIL, Ireland’s DPC, and the Netherlands’ AP) have imposed fines specifically for improper implementation of consent mechanisms. The following are clearly not valid consent:
- Pre-ticked boxes — pre-selected checkboxes for analytics or marketing cookies.
“By continuing to browse the site, you agree” — continuing navigation does not constitute consent. - A banner with only an “OK” or “Understood” button without an “Reject” or “Settings” option — this is a dark pattern.
- Refusal must be as easy as acceptance — an “Accept all” button next to “Settings” (where refusal is hidden deep in menus) is considered an unlawful dark pattern.
- Lack of granular consent — users must be able to separately accept or reject analytics and marketing cookies.
- No record of consent — you must be able to prove who consented, when, and to what (consent management records).
4.4. What is actually required: checklist
- Consent Management Platform (CMP): use a certified platform (OneTrust, Cookiebot, Axeptio, etc.) or a custom-built system that complies with IAB TCF 2.2 requirements.
- Cookie audit: conduct a full audit of all cookies set by your website, including those added by third-party providers.
- Cookie policy: a separate page describing each cookie, its purpose, duration, and provider.
- Opt-out mechanism: ability to withdraw consent at any time as easily as it was given.
- No cookies before consent: technically ensure that analytics and marketing cookies are not set before the user clicks “Accept”.
- Updates when providers change: every new tracking pixel or analytics tool requires updating the cookie policy and CMP configuration.
Recommendations for Businesses
5.1. Assessing GDPR applicability (first step)
Before developing a compliance program, determine whether GDPR actually applies to your business. Answer the following questions:
- Do you have users, clients, or contacts physically located in the EU?
- Is your product/website accessible to EU residents without restriction?
- Do you collect any information (email, IP, cookies) from individuals in the EU?
- Do you have a legal entity, partner, or subcontractor located in the EU?
If the answer to at least one question is “yes” — GDPR applies. The next step is a gap analysis: assessing the difference between your current practices and GDPR requirements.
5.2. Minimum compliance package for an IT company
- Privacy Policy: public, clear, and up to date. Must describe all data processing activities.
- Record of Processing (Article 30 RoPA): internal document listing all personal data processing activities.
- DPAs with all processors: hosting, CRM, email services, analytics, outsourcing teams.
- SCCs for data transfers outside the EU: if your servers or vendors are located outside the EU.
- Cookie banner and CMP: in line with ePrivacy and GDPR requirements.
- Data breach response procedure: who notifies the regulator, within what timeframe, and what the notification includes.
- Data subject request procedure: handling rights of access, rectification, deletion (right to be forgotten), and portability.
5.3. When a Data Protection Officer (DPO) is required
Appointment of a DPO is mandatory in three cases:
(1) public authority or public body;
(2) systematic and large-scale monitoring of data subjects;
(3) large-scale processing of special categories of data (health, biometrics, racial or ethnic data, etc.).
For most B2B IT companies, a DPO is not legally required, but having one is a significant advantage during audits and in relationships with EU enterprise clients.
5.4. Compliance as a competitive advantage
It is worth shifting perspective: GDPR compliance is not a cost but an investment. Enterprise clients in the EU and the US routinely conduct vendor due diligence, including security questionnaires and verification of DPAs, Privacy Policies, and internal procedures.
A company without basic compliance regularly loses tenders and negotiations, even when it offers a better product or price.
Conclusions
GDPR is not a one-time project but an ongoing process. Key takeaways:
- The geographic location of your office does not matter: if your users are in the EU, GDPR applies to you regardless of where your servers or legal entity are located.
- A DPA is a mandatory document in any controller–processor relationship. Its absence is a standalone violation that can result in fines.
- Privacy by Design means that data protection is engineered into the product from the start, not added just before release.
- A cookie banner with only an “OK” button and no rejection option is an unlawful dark pattern. Equal ability to refuse and granular consent are required.
- Compliance means client trust, the ability to contract with EU customers, and avoidance of fines of up to €20 million.
- The starting point is a gap analysis: understand your current state and build a roadmap toward full compliance.
Regulatory changes are ongoing: the upcoming ePrivacy Regulation is expected to replace the current Directive and impose even stricter rules on cookie practices. Companies that already have a mature compliance culture will adapt far more easily than those building processes from scratch under regulatory pressure.
Need help with GDPR compliance for your company?
Barbashyn Law Firm provides a full cycle of data protection compliance services: from gap analysis and DPA drafting to implementation of Privacy by Design and representation before EU regulators.
barbashyn.law • GDPR • Data Protection • IT Law • Privacy Compliance
FAQ: GDPR and Personal Data Protection . Below are answers to the most frequently asked questions from our clients in the IT and digital business sector.
Our company is registered in Ukraine and has no office in the EU. Does GDPR really apply to us?
We are a B2B company and process only corporate email addresses of contact persons. Does GDPR apply?
What is the difference between a DPA and an NDA? Is an NDA enough?
If we use Google Analytics, do we need user consent?
What happens if a client requests deletion of all their data? Are we required to comply?
What is a personal data breach and what should we do if it happens?
Our SaaS product stores client data. Who is the controller — us or our client?
Do we need separate consent for each email campaign?
What are Standard Contractual Clauses (SCC) and when are they required?
What is the maximum GDPR fine and can a small company actually receive it?
Our company is registered in Ukraine and has no office in the EU. Does GDPR really apply to us?
Yes, if your product or website is accessible to users from the EU and you collect any of their data. Article 3(2) GDPR explicitly states that the regulation applies to controllers and processors outside the EU if they offer goods or services to individuals in the EU or monitor their behaviour. Having an EU office is only one criterion, but far from the only one.
We are a B2B company and process only corporate email addresses of contact persons. Does GDPR apply?
Yes. GDPR covers any personal data of natural persons, including work email addresses, names, and job titles. The fact that an address is in the format name@company.com and used in a corporate context does not exclude it from the scope of regulation. The legal basis in a B2B context is usually legitimate interest or contract performance, but you are still required to have a Privacy Policy and respond to data subject requests.
What is the difference between a DPA and an NDA? Is an NDA enough?
These are completely different documents with different purposes. An NDA (Non-Disclosure Agreement) protects confidential information and does not include any elements required under Article 28 GDPR. A DPA governs the controller–processor relationship regarding personal data of third parties (clients, users). An NDA does not replace a DPA and does not exempt from GDPR liability. These documents are signed independently.
If we use Google Analytics, do we need user consent?
Yes. Google Analytics uses analytical cookies and transfers data to Google servers (in the US or EU depending on configuration). This requires: (1) prior user consent via a CMP before loading the script; (2) a DPA with Google (Google provides a Data Processing Amendment); (3) or the use of server-side analytics with anonymisation to reduce data transfer. Several EU regulators (Austria, France, Netherlands) in 2022–2023 found standard use of Google Analytics incompatible with GDPR due to data transfers to the US without adequate safeguards.
What happens if a client requests deletion of all their data? Are we required to comply?
The right to erasure (“right to be forgotten”, Article 17 GDPR) is a real data subject right, but it is not absolute. You must delete data if: it is no longer necessary for the purpose it was collected for; the subject withdraws consent; or the data was processed unlawfully. You may refuse deletion if: data is required for legal obligations (e.g. accounting records); or processing is necessary for legal claims or defence in court proceedings. You must respond within one month.
What is a personal data breach and what should we do if it happens?
A data breach is any security incident leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure, or access to personal data. Action plan: within 72 hours of detection — notify the supervisory authority (in Ukraine there is currently no dedicated authority; for companies with EU establishment — the relevant national DPA); if the breach poses a “high risk” to individuals — also notify the data subjects without undue delay. Failure or delay in notification is itself a violation, with fines of up to €10 million.
Our SaaS product stores client data. Who is the controller — us or our client?
In a typical SaaS structure: your client (the company using the SaaS) is the controller of its end users’ data; you (the SaaS provider) are the processor acting on the client’s instructions. You are also the controller for your own client’s data (contact person, email, payment details). Thus, you are both controller (for your customers’ data) and processor (for your customers’ users’ data). A DPA between you and the client is mandatory, where you act as processor.
Do we need separate consent for each email campaign?
It depends on the type of communication and legal basis. For marketing communications (newsletters, promotional emails) — explicit consent is required before the first email. For transactional emails (order confirmations, password resets, invoices) — the legal basis is contract performance and no consent is required. For B2B cold outreach — in most EU jurisdictions, legitimate interest may apply, but recipients must be able to unsubscribe and the context must be relevant. Consent must always be freely given, specific, informed, and unambiguous.
What are Standard Contractual Clauses (SCC) and when are they required?
SCCs are standard contractual clauses approved by the European Commission that serve as one of the legal mechanisms for transferring personal data of EU residents to third countries without an adequacy decision. Ukraine does not have such a decision, therefore any transfer of data from the EU to Ukraine (e.g. when an EU client sends data for processing) requires SCCs. The Commission updated SCCs in 2021 — older versions from 2001 and 2004 are no longer valid.
What is the maximum GDPR fine and can a small company actually receive it?
The maximum fine is €20 million or 4% of annual global turnover, whichever is higher. However, fines are proportional. Regulators consider: company size and processing scale; degree of intent or negligence; cooperation with the authority; mitigation measures; and recurrence of violations. Small companies typically receive fines ranging from a few thousand to several tens of thousands of euros. More realistic consequences for SMEs include public decisions (reputational damage), mandatory corrective actions under supervision of a DPA, and loss of EU clients due to vendor due diligence requirements.
We use cookies to improve the performance of the site and enhance your user experience.
More information can be found in our Privacy Notice







