• Home/
  • What is a Data Processing Agreement (DPA)?

What is a Data Processing Agreement (DPA)?

Home - JAN 2025
Karl Kjer
Ph.D. and Technical Writer
Karl Kjer, Ph.D. from the University of Minnesota, is an accomplished writer and researcher with over 70 published papers, many of which have received multiple citations. Karl's extensive experience in simplifying complex topics makes his articles captivating and easy to understand.
What Is a DPA (Data Processing Agreement) - and Are They Necessary?

Data Processing Agreements have evolved from obscure contractual formalities into one of the most consequential documents in modern business. When organizations rely on third-party vendors, cloud platforms, and software development companies to handle customer data, the legal framework governing these relationships becomes a compliance priority.

The consequences of mishandling personal data extend far beyond fines—in 2023 alone, General Data Protection Regulation enforcement actions exceeded €2 billion. A DPA is the contract that prevents such violations by legally binding the parties responsible for that data.

If you manage vendors, handle legal compliance, or oversee data governance, you need to understand how a GDPR data processing agreement works, what it contains, and when it's required.

What is a Data Processing Agreement?

A Data Processing Agreement (DPA) is a legally binding document between a data controller and a data processor. It establishes the rights, responsibilities, and obligations of each party regarding personal data. As Monika Kwiatkowska of Ping Identity explains:

"Putting in place a data processing agreement between a data controller and a data processor (or a data processor and a data sub-processor) is a requirement for data processed within the scope of GDPR. This document, which is a proper contract between the two parties, aims to ensure that everyone involved is handling personal data in accordance with GDPR's stipulations and in line with the rules pre-established by the parties."

The DPA translates data protection requirements into binding commercial terms when one organization handles data on behalf of another.

The Data Controller

The data controller determines the purpose and means of processing personal data and bears primary responsibility for compliance. As Kwiatkowska explains in her legal analysis, the controller decides why data is collected, what types of data are gathered, and how the data will be used. Controllers collect personal data directly from data subjects and remain the effective owners of that data—they determine what it can be used for and what insights can be drawn from it.

The Data Processor

The data processor handles personal data on the controller's behalf, following the controller's documented instructions. Processors never own the data. The distinction matters because it determines accountability: controllers face regulatory penalties for violations, while processors face contractual liability for failing to follow instructions.

But the line can blur. Kwiatkowska cautions: "It can be a fine line, however, between controller and processor because as soon as the processor becomes involved in collecting data, they become a data controller either separately or jointly with the party initially acting as the sole controller."

What DPAs Cover

DPAs are required under the General Data Protection Regulation (GDPR), CCPA/CPRA, and other relevant data protection laws worldwide. A typical agreement addresses:

  • The specific types of personal data being processed
  • The purposes for which processing occurs
  • The duration of the processing relationship
  • Technical and organizational data security measures the processor must implement

Mandatory Provisions Under GDPR Article 28

Every compliant DPA must include:

  • Processor processes data only on documented instructions from the controller
  • Prohibition on engaging sub-processors without controller authorization
  • Detailed specifications for data security and data protection measures
  • Processor assists controller with data subject rights requests
  • Processor notifies controller without undue delay upon discovering a breach
  • Processor deletes or returns all personal data upon termination

Organizations that skip these provisions face enforcement actions and penalties up to €20 million or 4% of global annual turnover—whichever is higher.

Types of Data Processing Agreements

DPAs vary based on the complexity of the processing relationship, the number of parties involved, and industry context.

Standard DPAs

Standard DPAs are the most common form. They're used when a business engages a third-party service provider for routine personal data processing—cloud platforms, SaaS tools, payroll processors, marketing automation vendors.

These agreements establish baseline requirements: the processor acts only on documented instructions, implements appropriate data security measures, and assists with data subject rights and breach notification. Standard DPAs work well when processing activities are straightforward and the processor's role is clearly defined.

Virtually any organization engaging a third party to process personal data—including those outsourcing software development—needs a DPA in place.

Enterprise DPAs and International Data Transfers

Large organizations face more complex scenarios: personal data flowing through multiple entities, subsidiaries, and third-party service providers in a single transaction. Enterprise DPAs accommodate multiple controllers, nested processing relationships, and complex data ecosystems.

These agreements typically include:

  • Data transfer mechanisms across jurisdictions
  • Detailed sub-processor authorization frameworks
  • Sophisticated liability allocation structures
  • Designated points of contact and escalation procedures
  • Protocols for managing changes in processing arrangements

Organizations in healthcare, financial services, and telecommunications frequently need enterprise DPAs due to sector-specific regulations layered on top of GDPR requirements.

Industry-Specific DPAs

Certain industries have developed specialized frameworks:

  • Healthcare: DPAs incorporating HIPAA requirements (US) or national health data protection laws (EU)
  • Financial Services: Additional requirements from PCI-DSS for payment card data and financial regulator guidelines
  • Regulated Industries: Tailored data handling procedures, enhanced data security requirements, and legal compliance verification mechanisms specific to industry regulators

industry-specific-dpa-types

Organizations serving customers across different sectors must address the most stringent applicable requirements—often creating hybrid agreements that combine baseline GDPR requirements with sector-specific provisions.

Controller vs. Processor: Why It Matters

The classification determines exposure. Kwiatkowska emphasizes: "The distinction between controller and processor is essential because depending on how the roles will be assigned, the party's exposure and accountability will vary significantly."

Aspect Data Controller Data Processor
Definition Determines purpose and means of processing Processes data on controller's behalf
Autonomy Full autonomy over why and how data is processed Limited; follows controller instructions only
Compliance Burden Primary compliance holder; faces regulatory penalties Subordinate compliance; must follow controller directives
Data Relationship Collects personal data directly from data subjects Never owns the data; handles it per instructions
Examples Company collecting customer data for marketing, Healthcare provider maintaining patient records Cloud hosting provider, Payroll processing company, Email marketing platform

Don't rely on how parties prefer to characterize themselves. Kwiatkowska's framework: "One needs to look into whoever is the dominant actor in determining the purpose and means of the processing, whether anyone has the freedom to start additional processing, to what extent the party is involved in deciding which data attributes are to be collected, whether these are anonymized or not, etc."

The answer is rarely obvious. A given relationship might be controller-processor, two independent controllers, or joint controllership.

The Data Processing Agreement Lifecycle

A DPA isn't a one-time document. Like the software life cycle itself, it moves through four distinct phases, each with specific activities and legal compliance considerations.

European data protection authorities imposed €3 billion in GDPR fines during 2025—an unprecedented escalation that transforms DPAs from routine paperwork into documents that can determine organizational survival.

Phase 1: Assessment and Requirements Definition

The controller evaluates the proposed processing activities:

  • What categories of personal data will be processed?
  • For what purposes?
  • Through what technical and organizational mechanisms?
  • What's the legal basis for lawful data processing?
  • What risks to data subjects might arise?
  • Do special categories of sensitive or personal data require additional protections?

Due diligence on the processor covers their technical capabilities, security posture, and compliance history—the same factors you'd evaluate when deciding how to choose a software development company. Can they demonstrate sufficient guarantees that appropriate measures will be implemented?

Outputs: Documented risk assessment, identification of required contractual provisions, go/no-go determination. The data protection officer should be involved in reviewing high-risk processing activities.

GDPR.eu notes that penalties for inadequate DPAs can reach €20 million or 4% of global annual turnover.

Phase 2: Negotiation and Drafting

The parties exchange proposals on:

  • Data handling provisions
  • Security requirements
  • Liability allocation
  • Procedures for managing changes

Negotiation reflects bargaining power, availability of alternatives, and processing complexity.

Outputs: Finalized DPA document, exhibits detailing specific processing activities or security measures, any side letters addressing particular concerns.

Phase 3: Execution and Implementation

The parties sign the agreement. Processing activities don't start until the DPA is in effect.

Implementation covers:

  • Configuring systems to comply with specified security measures
  • Establishing monitoring and audit procedures
  • Training personnel on their obligations

Outputs: Executed signature pages, implemented technical measures, operational procedures, documentation confirming the arrangement is live and compliant.

All technical and organizational measures must be in place before processing begins. Any gap exposes both the controller and processor to regulatory risk.

Phase 4: Ongoing Compliance and Management

The relationship requires continuous attention:

  • Regular review of processing activities against agreement terms
  • Updates when processing activities change
  • Managing issues or disputes
  • Maintaining documentation for regulators
  • Periodic audits of processor compliance
  • Sub-processor relationship management
  • Responding to data subject rights requests and security incidents

data-processing-agreement-lifecycle

The stakes are real: 337 fines totaling up to €1 billion have been issued across the European Economic Area.

Outputs: Compliance documentation, updated agreement versions, incident records and resolutions.

Models and Frameworks for Data Processing Agreements

Several distinct models have emerged beyond the basic controller-processor framework.

The Controller-Processor Model

The foundational model. The DPA explicitly establishes roles and responsibilities: the controller determines processing purposes and methods; the processor follows documented instructions.

GDPR Article 28 mandates this structure, requiring a GDPR data processing agreement to explicitly define processing activities, purposes, and legal basis for lawful data processing.

Key consideration: distinguish between processing on the controller's behalf (governed by the DPA) and independent processing by the processor for its own purposes (outside the DPA's scope). Don't rely on generic templates—custom software development projects often require tailored DPA provisions that standard forms don't address.

The Joint Controller Model

When two or more parties jointly determine processing purposes and means, GDPR Article 26 requires them to allocate obligations by contract:

  • How will data subjects exercise their rights?
  • Which party responds to requests?

Joint controllership often applies to research collaborations, joint marketing initiatives, and multi-party platforms where multiple organizations influence processing decisions. In these arrangements, both the data controller parties share responsibility to protect personal data.

71% of customers express greater trust in companies that demonstrate clear data usage transparency. DPAs have evolved into trust-building instruments.

The consent-based framework integrates:

  • Consent management platforms
  • Granular preference controls
  • Withdrawal mechanisms

Modern consent management platforms allow users to withdraw or change consent at any time via persistent UI controls—typically an icon in the corner of the screen. Organizations using third-party services for consent management should verify these platforms meet applicable data privacy laws.

Organizations need technical infrastructure supporting granular consent, audit trails demonstrating consent status, and integration between consent platforms, privacy policies, and DPAs to protect personal data throughout the processing lifecycle.

Compliance Framework Integration

Modern DPA management requires integration with broader privacy systems:

  • Consent management platforms
  • Privacy policies
  • Data governance systems

dpa-compliance-framework-integration

Modern compliance solutions now span Web CMP, App CMP, Privacy Policy Generator, and Server-Side Tracking—each addressing different aspects of the compliance ecosystem.

Organizations must establish procedures for rights requests, define retention periods and deletion procedures, and verify that all systems processing personal data operate according to DPA terms.

What DPA Reviewers Miss Most Often

After reviewing dozens of vendor DPAs for clients, three gaps appear consistently:

1. Vague security specifications. The agreement says "appropriate technical measures" without defining what's appropriate. When data breaches occur, both the controller and processor point fingers. The fix: specify encryption standards, access controls, and audit logging requirements explicitly.

2. Missing breach timelines. The DPA requires the processor to notify the controller "promptly" or "without undue delay"—language that invites interpretation. GDPR requires notification within 72 hours. Your DPA should too, with specific contact methods and escalation paths.

3. Silent on sub-processors. Many standard DPAs lack a mechanism for controller approval of new sub-processors. The processor adds a new cloud provider, the controller finds out during an audit, and suddenly there's an unauthorized data transfer. The fix: require prior written notice and approval rights, or at minimum, a maintained list with opt-out provisions.

These gaps rarely matter until something goes wrong. Then they matter enormously.

The 72-Hour Myth

Most compliance guides state that GDPR requires breach notification within 72 hours. Technically true—but misleading. The 72 hours applies to controller-to-regulator notification, not processor-to-controller. Article 33(2) requires processors to notify controllers "without undue delay"—a phrase that's triggered disputes when processors waited 48 hours believing they had time to spare.

Your DPA should specify processor-to-controller timelines separately. Experts recommend 24 hours maximum.

Data Processing Agreement Checklist

When negotiating DPAs, verify these elements:

Checklist Item Why It Matters Risk of Omission
GDPR Article 28 Compliance All mandatory provisions under EU law included Regulatory enforcement; invalid agreement
Defined Processing Scope Limits processor's authority to specified activities Unauthorized processing; scope creep
Security Measures Specification Establishes baseline technical safeguards Data breaches; inadequate protection
Liability and Indemnification Allocates financial responsibility for violations Uncovered losses; disputes
Breach Notification Procedures Timely response to security incidents Delayed response; regulatory penalties
Audit Rights Verification of processor compliance Inability to confirm compliance
Sub-processor Management Controls downstream data sharing Unauthorized data access

Watch for vague language regarding data storage, processing methods, or purposes. Ambiguity creates compliance risk and dispute potential.

Missing provisions on breach notification, audit rights, and sub-processor management leave critical aspects undefined—potentially resulting in inadequate incident response or inability to verify compliance.

Confirm that responsibilities and liabilities for both the controller and processor are explicit, including indemnification clauses.

Conclusion

Data Processing Agreements are the legal foundation for data-driven business relationships. They establish accountability between both the controller and processor, mandate data security measures, and define breach response procedures to protect personal data. With €3 billion in GDPR fines during 2025 alone, the consequences of non-compliance are severe.

GDPR data processing agreement frameworks have matured. Simple templates have evolved into instruments integrating with consent platforms, privacy policies, and governance systems. Industry-specific agreements, multi-party arrangements, and complex controller-processor configurations reflect modern data ecosystems.

Treat DPAs as living documents. From initial assessment through negotiation, execution, implementation, and ongoing management, each phase presents opportunities to strengthen protection and reduce exposure. The organizations that get this right satisfy regulatory requirements while building the customer trust that differentiates successful businesses.

Data Processing Agreement FAQ

Is a Data Processing Agreement the same as a privacy policy?

No. A privacy policy is public-facing—it tells data subjects how their data is collected, used, and protected. A DPA is a private B2B contract establishing the legal framework for one organization to protect personal data when handling it on another's behalf. Different audiences, different functions.

When is a Data Processing Agreement required?

Whenever a data controller engages a processor to handle personal data on the controller's behalf. GDPR Article 28 mandates a legally binding document specifying the processing's subject matter, duration, nature, purpose, data types, and data subjects involved. Even verbal agreements should be documented through a formal GDPR data processing agreement.

What happens if we don't have a Data Processing Agreement?

Operating without a required DPA violates GDPR. Fines can reach €20 million or 4% of global annual turnover. Beyond penalties, you face operational uncertainty, liability gaps if breaches occur, and inability to demonstrate compliance. Organizations caught processing data without compliant DPAs face enforcement actions and reputational damage.

Can a single DPA cover multiple processing activities?

Yes, if all activities fall within the defined scope and the processor's capabilities. The DPA must specify each activity, its purpose, data categories involved, and any unique requirements. For complex relationships involving distinct activities, separate agreements or detailed schedules may work better.

How often should Data Processing Agreements be reviewed?

Annually at minimum. Review more frequently when:

  • New categories of personal data are processed
  • New purposes for data use emerge
  • Sub-processor relationships change
  • Security measures or technical infrastructure updates
  • Data protection laws are modified

Document all reviews and updates.

Like what you just read?
  — Share with your network
share on facebookshare on twittershare on linkedin
Karl Kjer
Karl Kjer
Ph.D. and Technical Writer
Find me on: linkedin account
Karl Kjer, Ph.D. from the University of Minnesota, is an accomplished writer and researcher with over 70 published papers, many of which have received multiple citations. Karl's extensive experience in simplifying complex topics makes his articles captivating and easy to understand.
Subscribe
Stay ahead with our newsletter.
Subscribe Now
Latest Blog
The Role of Subject Matter Experts (sme) in Software Development Projects
What is a Subject Matter Expert in Software Development(SME)? A Complete Guide
Learn what a subject matter expert (SME) does in software development. Explore SME types, engagement models, core competencies, and salary data ($97K+).
Mina Stojkovic
Senior Technical Writer
Custom Made Illustrations for Blog Posts 2 01
Outsourcing Development Locally: 7 Benefits of Onshore Software Development
Explore the strategic benefits of onshore software development—from real-time collaboration and higher quality output to stronger legal protections. Learn how...
Mina Stojkovic
Senior Technical Writer
How to Choose a Software Development Company
How To Choose a Software Development Company
Selecting a software development company is a multi-dimensional decision that determines whether your project succeeds or fails. With 70% of delivered...
Victor James Profile Picture
Software Engineer & Technical Writer
Related Articles
Types of Software Development
12 Types of Software Development: A Complete Guide for 2026
Discover the 12 types of software development in 2026. From web and mobile to AI and blockchain—find the right specialization for your skills and goals.
What is SDaaS
What is Software Development as a Service? A Complete Guide to SDaaS
Discover the future of software development with SDaaS, a solution that offers flexibility, cost-efficiency, and access to top talent. Unlock your business...
Software Development Life Cycle Phases
What is the Software Development Lifecycle (SDLC)? A Complete Guide
Efficiently managing a software development project is crucial for a company's success. Understanding the different phases of the Software Development Life...