What are the 7 GDPR principles (Article 5)?
The Article 5 principles form the foundation of GDPR compliance. Supervisory authorities assess audits and enforcement through these principles. Most large fines connect to one or more of them.
Lawfulness, fairness, and transparency
What it means: Processing must rely on a lawful basis, treat individuals fairly, and be transparent.
Regulatory perspective: Authorities examine whether the lawful basis genuinely applies and whether privacy information clearly explains processing. Vague notices, hidden purposes, and misleading interface design often lead to findings of non-compliance. Regulators also focus on whether profiling and data sharing are disclosed in a way people can actually understand.
Best practices to follow principle:
-
Document lawful basis decisions in the Record of Processing Activities
- Maintain privacy notices that map to real data flows
- Require privacy review in change management for new tracking tools, analytics, or product features
- Where consent applies, log consent events and make withdrawal simple
Examples of common non-compliance: Marketing teams expand segmentation data over time without updating notices. Product teams add new trackers or SDKs, without considering broader transparency.
Purpose limitation
What it means: Collect data for specific purposes and avoid incompatible reuse.
Regulatory perspective: Authorities check whether purposes were defined at collection and whether later uses remain compatible. Reuse for unrelated analytics, monetization, or partner sharing often raises questions.
Best practices to follow principle:
- Maintain data inventories that map datasets to purposes
- Add a review step before secondary use, especially for data lake initiatives
- Require documentation updates when teams propose new use cases
Examples of common non-compliance: “We already have the data” becomes the justification. Teams treat internal reuse as automatically permitted.
Data minimization
What it means: Process only what is necessary for the listed purposes.
Regulatory perspective: Authorities assess whether organizations collect excessive information relative to stated needs. Over-collection increases breach impact and weakens fairness arguments.
Best practices to follow principle:
- Implement form governance that challenges each field
- Configure systems to reduce unnecessary logs
- Set access controls so people can’t browse data “just in case”
Examples of common non-compliance: Marketing data creep through ever-growing profiles. Access sprawl where too many users can view broad datasets.
Accuracy
What it means: Keep data accurate and up to date.
Regulatory perspective: Authorities examine whether people can correct data and whether inaccuracies cause harm. In HR, finance, or risk scoring, outdated records can materially affect individuals.
Best practices to follow principle:
-
Provide self-service updates where appropriate
- Build synchronization rules across systems
- Add review workflows for stale or conflicting data
Examples of common non-compliance: Legacy systems keep outdated records. Integrations between tools fail silently and cause divergence.
Storage limitation
What it means: Retain data only as long as necessary.
Regulatory perspective: Retention schedules appear in many audits. “We keep it forever” or “we’ll decide later” often fails. Authorities also look at whether deletion happens in practice.
Best practices to follow principle:
-
Define retention periods by purpose and legal requirement
- Implement automated deletion or archiving where feasible
- Run periodic retention audits
Examples of common non-compliance: Backups complicate deletion or shadow IT stores exports outside central controls.
Integrity and confidentiality
What it means: Protect data with appropriate technical and organizational measures.
Regulatory perspective: Authorities assess whether security matches foreseeable risk. Fines often cite weak access controls, missing encryption, or inadequate monitoring.
Best practices to follow principle:
-
Use encryption where appropriate, apply role-based access, enforce multi-factor authentication, monitor privileged activity, and test incident response
-
Include vendor security assessments as part of procurement
Examples of common non-compliance: Access rights accumulate without review. Vendors receive broad permissions without continuous oversight.
Accountability under GDPR
What it means: Demonstrate compliance with all principles.
Regulatory perspective: During investigations, regulators ask for evidence: records, assessments, policies, and monitoring. Missing documentation often signals weak governance.
Best practices to follow principle:
-
Maintain updated Records of Processing Activities, DPIAs, lawful basis assessments, training logs, and incident records
- Use dashboards to report key privacy risks to leadership
Examples of common non-compliance: Documentation treated as a one-time project. Policies drift as systems change.