By clicking “Accept”, you agree to the use of cookies on your device in accordance with our Privacy and Cookie policies
Continuously improve upon the security program while continuing to grow the business.
Compyl works with the technology your organization works with.
Begin building a scalable security program.
Build and maintain a robust risk management process.
Manage vendor due diligence and risk assessments.
Mature your security program quickly.
Create and centralize policies, standards, and procedures.
Securely store and monitor all contracts.
Streamline security with automated efficiencies.
Establish and monitor permissions for all users.
Catalog, access, and track all IT Assets.
Demonstrate the ability to effectively safeguard customer data's security, integrity, confidentiality, and privacy.
Prove the strength of your Information Security Management System to prospects and customers worldwide.
Organizations handling health information need to have measures in place & follow them.
Improve the security posture of information systems used within the federal government.
Guidelines to encourage best practices among financial institutions in Singapore.
This global security and privacy framework provides comprehensive information, risk, and regulatory protection.
We proactively monitor for the latest frameworks to ensure our customers environments remain secure at all times. Contact us and learn about the additional frameworks Compyl supports.
Let Us Guide You Through Your InfoSec & Compliance Journey.
Learn how to use the Compyl Platform.
Watch all Security Session Episodes
Real-world stories on how we help our customers.
Our mission and purpose are unique, just like the solution we created.
We are very serious about our security. See the measures we take.
Join our diverse team of intelligent, respectful, and passionate individuals.
We are ready to secure your organization today!
The General Data Protection Regulation is a privacy and security law that applies to the European Union and European Economic Area. The GDPR has 11 chapters with 99 individual articles. Chapter 4 details the responsibilities of organizations that control and process data and includes GDPR Article 28 on processors. Learn more about Article 28 GDPR and the regulatory compliance requirements for organizations or entities that process the personal data of users in member countries.
Article 28 of the GDPR describes the duties of organizations thatprocess personal data. This article defines processors as parties that work with data on behalf of and under the authority of controllers.
Article 28 begins by stating that controllers should only use processors that guarantee implementation of the technical and organizational measures necessary to protect the rights of data subjects. Subsequent paragraphs cover the issue of third party sub-processors and contracts or data processing agreements.
GDPR Article 28 specifies that processors who determine the purposes or means of processing personal data infringe on this regulation and can be liable as controllers. The responsibility of the controller is set forth in Article 24 and expanded on throughout Chapter 4 of the GDPR.
Data processors are entities or organizations that process data on behalf of controllers. The main distinction between a processor and a controller is that controllers use data for their own purposes, whereas processors enter into contractual agreements to only use data based on documented instructions from controllers.
In most cases, when a business client uses a digital marketing platform, the business client is the data controller and the marketing company is the data processor. In the case of cloud services, the users of these services are controllers and cloud services providers are processor vendors.
The distinction between controllers and processors is clear even when multiple parties process data. For instance, joint controllers both process data for their own purposes. Sub-processors can also process data on behalf of controllers and processors, but Article 28 GDPR requirements state that a processor cannot engage another processor without prior authorization from a controller.
A data processing agreement is a contract that specifies the terms on which a controller engages the services of a processor. Stakeholders can write these agreements from scratch or use templates. Popular processors often include DPAs in terms of service.
If a processor vendor does not provide a DPA to a controller, it is the duty of the controller to issue a DPA. These contracts articulate the roles and responsibilities of both parties and establish measures for enforcing data privacy regulations throughout the duration of contracts.
DPAs clarify the conditions on which controllers and processors operate, from confidentiality, security and the protection of the rights of data subjects to the duties of a processor to assist a controller. It is important to note that not all third parties engaged by controllers are processors. The manner in which an entity uses data determines their role with regard to GDPR compliance.
According to GDPR Article 28, a DPA must include instructions for the processing of data provided by the controller to the processor. These agreements must specify the subject matter, duration, nature and purpose of processing as well as the type of personal data, categories of data subjects and the obligations and rights of the controller.
DPAs also require a duty of confidence. This aspect of the agreement requires all parties involved in processing data to commit to confidentiality, with the exception of any parties already obligated to confidentiality by statute.
Other important elements of a DPA include specifications regarding the use of sub-processors, the rights of data subjects, requirements for processors to assist controllers, end-of-contract provisions and willingness to demonstrate compliance with Article 28 through audits or inspections. An end-to-end information security platform that allows forcontinuous monitoringcan support these requirements.
Processors must comply with Article 28 GDPR, and the requirements in this article also extend to controllers. A processor that acts outside of the terms of a DPA or violates this agreement could assume the same level of liability as a controller.
For example, a processor who engages sub-processors without prior written authorization from a controller is determining the purposes or means of processing and is a controller with respect to these decisions.
The GDPR applies to companies based in the European Union and European Economic Area as well as companies that control or process the personal data of subjects in these locations. The United Kingdom is subject to the Data Protection Act 2018, which is an implementation of the GDPR.
The GDPR expounds the rights of data subjects and the responsibilities of controllers and processors. Article 28 specifically references several other articles in the GDPR.
The third paragraph of Article 28 references Articles 32 through 36. These articles in Chapter 4 address the security of processing, notification of a personal data breach to the supervisory authority, communication of a personal data breach to the data subject, data protection impact assessment and prior consultation.
The fifth paragraph refers to Article 40 on codes of conduct and Article 42 on certification as guarantees for the role of the processor. This paragraph also references Chapter 10, Article 93 on examination procedures. The final paragraph of Article 28 references several articles in Chapter 8, including Article 82 on the right to compensation and liability, Article 83 on general conditions for imposing administrative fines, and Article 84 on penalties.
Article 28 GDPR compliance involves implementing measures that meet data privacy requirements set forth in this article and other sections of the GDPR. Agreements between controllers and processors should establish best practices for protecting the rights of data subjects. Organizations can achieve and maintain compliance with data protection regulations by implementing a centralized platform with automation capabilities.Request a demoto see how Compyl facilitates compliance with GDPR Article 28.