What Is a Data Controller? A Beginner's Guide to GDPR Roles, Duties, and Examples

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

What Is a Data Controller? A Beginner's Guide to GDPR Roles, Duties, and Examples

Kevin Henry

Data Privacy

March 24, 2025

8 minutes read
Share this article
What Is a Data Controller? A Beginner's Guide to GDPR Roles, Duties, and Examples

Definition of Data Controller

A data controller is the organization or individual that decides why and how personal data processing happens. In GDPR terms, the controller determines the “purposes” (the why) and the essential “means” (the how) of processing. Controllers can be private companies, public authorities, nonprofits, or individuals.

Controller vs. Processor vs. Joint Controllers

  • Controller: You set the purpose (e.g., “verify customers’ identities”) and key means (data types, retention, access).
  • Processor: A vendor processes data only on your documented instructions (e.g., a cloud host or email platform).
  • Joint controllers: Two or more parties decide purposes and means together and must transparently allocate duties between them.

Quick Tests to Identify the Controller

  • Who chose to collect the data and decided the business goal?
  • Who selects what personal data is needed and how long to keep it?
  • Who decides which users or teams can access the data?

Practical Examples

  • An online retailer that collects customer emails for order updates is the controller; its email service provider is a processor.
  • An employer is the controller for HR records; its payroll vendor is a processor under a contract.
  • A marketing platform may be a processor for campaigns you run, but a controller for its own product analytics if it defines separate purposes.

Key Responsibilities

Accountability and Core Principles

GDPR compliance revolves around accountability—you must both comply and be able to show compliance. Your processing must follow these principles: lawfulness, fairness, transparency; purpose limitation; data minimization; accuracy; storage limitation; and integrity and confidentiality.

Operational Duties You Must Manage

  • Maintain processing activities records (who, what, why, how long, recipients, safeguards).
  • Respond to data subject rights requests (access, rectification, erasure, restriction, portability, objection, and rights related to automated decisions).
  • Conduct Data Protection Impact Assessments (DPIAs) for high‑risk operations and reduce risk before launch.
  • Put data processor contracts in place with all processors, covering instructions, security, sub‑processors, assistance with rights, and deletion/return of data.
  • Appoint a data protection officer where required and ensure independence, expertise, and resourcing.
  • Train staff, embed policies, and run audits to demonstrate ongoing compliance.
  • Manage cross‑border transfers and identify your lead supervisory authority when operating across the EU/EEA.

Lawful Basis for Processing

Every processing activity needs a lawful basis. Choose the basis before you start and document your reasoning.

  • Consent: Freely given, specific, informed, and unambiguous; easy to withdraw.
  • Contract: Necessary to perform a contract or take steps at a user’s request (e.g., shipping an order).
  • Legal obligation: Required by law (e.g., tax or employment laws).
  • Vital interests: Protecting someone’s life or physical safety.
  • Public task: Public interest or official authority tasks.
  • Legitimate interests: Your interests balanced against individuals’ rights; perform and document a balancing test.

For special‑category data (e.g., health, biometrics), you also need a separate condition and stronger safeguards. Be consistent: don’t swap bases later unless clearly justified and communicated.

Transparency Obligations

You must explain your processing clearly and promptly. Provide privacy information at or before collection and make it easy to find.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

What Your Privacy Notice Should Cover

  • Your identity and contact details, plus the data protection officer if you have one.
  • Purposes and lawful bases for each processing activity.
  • Categories of personal data, recipients, and international transfers.
  • Retention periods or criteria for deciding them.
  • Data subject rights and how to exercise them.
  • The right to lodge a complaint with a supervisory authority.
  • Whether you use automated decision‑making, including profiling, and its logic and effects.

Delivering Transparency Well

  • Use layered notices: a short summary plus deeper detail.
  • Provide just‑in‑time notices near form fields and mobile prompts.
  • Use clear language appropriate to your audience, including children where relevant.

Data Protection by Design and Default

Build privacy into your products and processes from day one and ensure default settings collect and expose the minimum data necessary.

  • Minimize collection; prefer optional fields and opt‑in features.
  • Pseudonymize or anonymize where possible; segregate identifiers from content.
  • Set conservative default retention and automate deletion.
  • Limit access by role; review entitlements regularly.
  • Run DPIAs early in the design phase and revisit after material changes.
  • Gate high‑risk features behind additional controls and user choice.

Data Security Measures

Security must be appropriate to risk. Combine technical and organizational measures and review them regularly.

Technical Controls

  • Encrypt data in transit and at rest; manage keys securely.
  • Use strong authentication (MFA), least‑privilege access, and network segmentation.
  • Apply secure coding, code review, dependency scanning, and timely patching.
  • Maintain robust logging, monitoring, and alerting; test backups and recovery.
  • Protect endpoints and devices, including mobile and BYOD, with policy and tooling.

Organizational Controls

  • Document policies for acceptable use, classification, retention, and incident response.
  • Provide regular, role‑based security and privacy training.
  • Assess vendors; require data processor contracts and verify safeguards.
  • Perform risk assessments, tabletop exercises, and periodic penetration tests.

Data Breach Notification

A personal data breach is any security incident leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to personal data. Not every incident requires notification, but every breach should be assessed and logged.

Notifying the Supervisory Authority

  • Notify without undue delay and, where feasible, within 72 hours after becoming aware, if the breach is likely to result in a risk to individuals’ rights and freedoms.
  • Include what happened, categories and approximate number of data subjects and records, likely consequences, and measures taken or proposed.
  • If you miss the 72‑hour window, explain the reasons.

Notifying Individuals

  • If the breach is likely to result in a high risk to individuals, inform affected people without undue delay in clear, plain language.
  • Explain what occurred, what it means for them, steps they can take, and how you are mitigating the impact.
  • Exceptions may apply where data is strongly protected (e.g., effective encryption) or where individual notice would involve disproportionate effort—then use public communication instead.

Working with Processors

  • Your processors must notify you without undue delay after becoming aware of a breach.
  • Ensure your data processor contracts define incident timelines, contact paths, cooperation duties, and evidence preservation.
  • Keep a breach register and coordinate with your lead supervisory authority for cross‑border incidents.

Example Response Timeline

  • Hour 0–6: Triage, contain, preserve evidence, assemble response team.
  • Hour 6–24: Assess scope and risk, inform leadership, consult your data protection officer, draft initial notices.
  • Hour 24–48: Notify the supervisory authority if risk is likely; refine for accuracy as facts evolve.
  • Hour 48–72: Finalize notifications; prepare messaging to affected individuals if high risk; implement remedial actions.
  • Post‑72 hours: Complete root‑cause analysis, update controls, and record lessons learned.

Conclusion

As the data controller, you decide the purpose and key means of processing and carry the primary burden to prove GDPR compliance. Clarify roles with processors, choose and document a lawful basis, be transparent, design for privacy, secure the data, and prepare for data breach notification. Doing these consistently protects people’s rights and your organization’s trust.

FAQs

What are the primary duties of a data controller?

You must determine the purposes and means of processing, choose and document a lawful basis, uphold the core principles, maintain processing activities records, provide clear privacy information, enable data subject rights, ensure appropriate security, manage processors via data processor contracts, conduct DPIAs when needed, appoint a data protection officer where required, and handle breach assessment and notifications.

When must a data controller notify a data breach?

Notify the competent supervisory authority without undue delay and, where feasible, within 72 hours of becoming aware when a breach is likely to pose a risk to individuals’ rights and freedoms. If the risk is high, also inform affected individuals without undue delay, explaining impacts and mitigation.

How does a data controller differ from a data processor?

The controller decides the “why” and essential “how” of personal data processing and bears primary accountability. A processor acts only on the controller’s documented instructions, using appropriate security and assisting with compliance duties. One entity can be controller for some activities and processor for others, depending on who determines purposes and means.

What is the role of a Data Protection Officer?

A Data Protection Officer advises on GDPR compliance, monitors adherence, trains staff, conducts or oversees DPIAs, serves as the contact point for the supervisory authority, and acts independently. You must appoint a DPO when your core activities involve large‑scale, regular and systematic monitoring, large‑scale processing of special‑category data, or when you are a public authority.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles