Data Breaches: 72 Hours to Act, Every Minute Counts
Immediate data breach response: 72-hour AEPD notification, containment, impact assessment, affected individual communication, and post-breach remediation.
Does this apply to your business?
Does your company have a breach-response protocol that can be activated within one hour of detection, including at weekends and outside business hours?
Do you know exactly who in your organisation decides whether to notify the AEPD, and how to reach the DPO at 3am?
Are all personal data breaches from the last three years documented in your breach register, including low-risk incidents that did not require AEPD notification?
Are your cloud and data-processor contracts legally required to notify you of breaches within a timeframe that allows you to meet the 72-hour AEPD deadline?
0 of 4 questions answered
Our data breach management process
Incident activation and containment
In the first hours after detection, we coordinate with the technical team to contain the incident, limit the breach's scope, and preserve the forensic evidence needed for subsequent analysis.
Impact analysis and notification assessment
We assess the nature, scope, and likely impact of the breach to determine whether the AEPD notification obligation applies and, where relevant, whether communication to affected individuals is required.
AEPD notification and affected individual communication
We draft and submit the AEPD notification within the 72-hour window with all information required by Article 33 GDPR. Where mandatory, we coordinate data subject communication under Article 34.
Remediation and post-breach documentation
We implement technical and organisational corrective measures, update the Article 33(5) breach register, and produce the post-incident report for the governing body.
The challenge
The GDPR requires notification of a personal data breach to the AEPD within 72 hours of becoming aware of it, if there is a risk to individuals' rights. In practice, organisations lose critical hours trying to understand what happened, who must be notified, and how to draft the communication. An error in the notification, or missing the deadline, transforms a manageable incident into a serious infringement that compounds the original problem.
Our solution
We activate an immediate response protocol: technical incident containment, legal analysis of the breach impact and notification obligations, drafting and submitting the AEPD notification within the deadline, and coordinating communication to affected individuals where required. After the incident, we implement corrective measures to prevent recurrence and document the accountability record.
A personal data breach is any security incident that leads to accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data — as defined by Article 4(12) of the EU General Data Protection Regulation (GDPR, Regulation 2016/679). Under Article 33 GDPR, the controller must notify the competent supervisory authority (in Spain, the AEPD) within 72 hours of becoming aware of the breach, unless the breach is unlikely to result in a risk to individuals' rights. Where the breach is likely to result in a high risk, Article 34 also requires direct notification to the affected individuals. Failure to notify, or notification that omits required content, can itself constitute a separate GDPR infringement.
A data breach is one of the highest-pressure moments an organisation can face: detection typically occurs outside normal working hours, initial information is incomplete and uncertain, and the 72-hour clock starts running from the moment the organisation has reasonable knowledge of the incident. The difference between a well-managed breach and one that results in a serious sanction is not the incident itself — it is the quality of the response protocol.
Understanding the Dual Notification Obligation
The GDPR imposes a critical distinction that many organisations do not fully understand: the obligation to notify the AEPD (Article 33) and the obligation to communicate to affected individuals (Article 34) apply at different thresholds. AEPD notification is triggered when there is “a risk” to data subjects’ rights — a deliberately low threshold that captures the vast majority of real-world breaches. Communication to individuals is only mandatory when the risk is “high” — requiring a specific impact assessment for each breach. Getting this distinction right determines both what must be done and in what timeframe.
The First 72 Hours
Our response protocol is designed to function under pressure. From the moment of detection, we coordinate technical containment and legal notification analysis in parallel — not sequentially. We do not wait for complete information before initiating the AEPD notification: the GDPR explicitly permits phased notifications when full information is not available at the outset, and this flexibility is critical for meeting the deadline without sacrificing notification quality.
The AEPD notification is not a form-filling exercise. The authority’s enforcement decisions confirm that incomplete notifications, notifications that underestimate the scope of the breach, or notifications that fail to describe the measures taken are treated as compliance failures in themselves. Our notifications reflect the full technical and legal analysis of the incident, providing the AEPD with a complete picture from the first contact.
Post-Breach: From Incident to Improvement
The post-breach phase is as important as the immediate response. A data breach systematically reveals vulnerabilities in the privacy management system that go beyond the technical incident: processor contracts with no breach notification obligation, excessive retention periods that extended the breach’s scope, or absence of encryption on data that could have been protected. The privacy audit we conduct after each incident converts the breach into a genuine opportunity to improve the compliance system.
Coordination with the outsourced DPO is central to our response capacity: the DPO’s existing knowledge of the organisation’s data processing systems significantly accelerates the impact analysis and notification obligation assessment in the critical first hours of an incident. Organisations without a functioning DPO consistently take longer to respond and produce lower-quality notifications — a difference that shows up directly in enforcement outcomes.
Real results in data breach management
We received the call on a Saturday at midnight: unauthorised access to our patient database had been detected. Within two hours, the BMC team had activated the response protocol, coordinated with our cybersecurity firm, and had a draft AEPD notification ready. We met the deadline. The AEPD acknowledged the quality of our response and closed the file without sanction.
Experienced team with local insight and international reach
What our data breach management service includes
Immediate Breach Response Activation
Round-the-clock availability upon breach detection: coordination with the technical team for containment and evidence preservation, and immediate legal impact analysis.
Notification Obligation Assessment
Risk assessment for data subjects' rights to determine whether AEPD notification is required and whether affected individual communication obligations are triggered.
AEPD Notification
Drafting and submission of the AEPD notification within the 72-hour window, containing all information required by Article 33 GDPR.
Affected Individual Communication
Coordination and drafting of individual communications to affected data subjects when the breach poses a high risk to their rights, in compliance with Article 34 GDPR.
Remediation and Post-Breach Register
Implementation of corrective measures, breach register update, post-incident report preparation, and reinforcement of the incident response plan for future events.
Results that speak for themselves
Commercial debt portfolio recovery
92% portfolio recovery in 4 months, with out-of-court settlements in 78% of cases.
Comprehensive employment defense for industrial multinational
100% favorable outcomes: 5 advantageous conciliation agreements and 3 fully upheld court rulings.
GDPR compliance programme for a hospital group: from investigation to full compliance
AEPD investigation closed with no sanction. Full GDPR compliance achieved across all group centres within 6 months.
Analysis and perspectives
Frequently asked questions about data breach management in Spain
Start with a free diagnostic
Our team of specialists, with deep knowledge of the Spanish and European market, will guide you from day one.
Data Breach Management
Legal
First step
Start with a free diagnostic
Our team of specialists, with deep knowledge of the Spanish and European market, will guide you from day one.
Request your diagnostic
You may also be interested in
Anti-Money Laundering (AML)
AML/CFT compliance programme for entities subject to Spain's Law 10/2010: policies, procedures, training, and SEPBLAC liaison.
Saber másCriminal Compliance
Corporate criminal compliance programmes to exempt or mitigate the criminal liability of legal entities under Article 31 bis of the Spanish Criminal Code.
Saber másData Protection & Privacy
GDPR and LOPDGDD compliance, outsourced DPO, and comprehensive privacy management for businesses.
Saber másCybersecurity Incident Response
Incident response plans, tabletop exercises, breach containment, forensic investigation coordination, and regulatory notifications to AEPD and NIS2 supervisory authorities.
Saber másNIS2 Compliance
EU Network and Information Security Directive 2 compliance: scope assessment, control implementation, incident notification protocols, and board-level security governance.
Saber másKey terms
Data Protection Officer (DPO)
A Data Protection Officer (DPO) is a designated individual responsible for overseeing an…
Read definitionPrivacy by Design
A GDPR principle (Article 25) requiring data protection to be integrated into the design of…
Read definitionRansomware & Cyber Threats
A type of malicious software that encrypts an organisation's files or systems and demands a ransom…
Read definition