GDPR fines: how they work, how much they can be, and how to avoid them

This guide breaks down what GDPR fines are, how regulators decide the amount, which violations most commonly trigger enforcement, and what practical governance steps reduce exposure. 

framework_GDPR_pillar_en

GDPR fines: An introduction

GDPR fines are one of the biggest compliance risks for organizations that process personal data in the EU—whether you’re headquartered in Europe or offer goods and services to EU consumers. Fines can reach up to €20 million or 4% of global annual turnover (whichever is higher), and they are often paired with corrective orders that can be just as disruptive as the penalty itself. 

What are GDPR fines?

GDPR fines are monetary penalties that data protection authorities (also called supervisory authorities) can impose when an organization violates the EU General Data Protection Regulation (GDPR). They're only one part of the GDPR enforcement toolkit—regulators can also issue warnings, reprimands, processing bans, orders to delete data, or requirements to bring processing into compliance—but fines tend to be the most publicly visible outcome.

What does the GDPR say about fines?

The GDPR’s fining framework is set out in Article 83. It gives supervisory authorities the power to impose administrative fines on controllers and processors where appropriate, in addition to other corrective measures.

Article 83 also sets a standard that fines must be “effective, proportionate and dissuasive.” In practice, this means regulators look for an outcome that meaningfully changes behavior (effective), fits the facts of the case (proportionate), and discourages repeat violations—both by the organization under investigation and by the broader market (dissuasive).

Why were GDPR fines introduced?

Before the GDPR took effect in 2018, enforcement and penalties varied widely across EU member states. Some national laws allowed only modest fines, and organizations that operated across borders could face uneven consequences for similar behavior. GDPR fines were introduced to strengthen enforcement and make accountability real in a single market where personal data routinely moves between countries.

The GDPR also recognized that penalties must be meaningful for large corporations. A flat cap that is painful for a small company may be negligible for a multinational. By linking the maximum fine to global annual turnover, the regulation aimed to increase deterrence while still allowing regulators to apply the proportionality principle on a case-by-case basis.

How high can GDPR fines be?

The GDPR sets maximum fines using a “whichever is higher” approach: regulators can use a fixed euro amount or a percentage of an organization’s worldwide annual turnover. The applicable ceiling depends on the type of infringement, with more serious violations falling into the higher tier. Within those ceilings, authorities still decide the final amount using the criteria in Article 83.

What are the two GDPR fine tiers?

Article 83 groups infringements into two main fine tiers. The tier that applies depends on which obligations were breached—for example, failure to maintain required records may fall into the lower tier, while violations of core processing principles can fall into the higher tier.

  • Tier 1 (Article 83(4)): up to €10 million, or up to 2% of the total worldwide annual turnover of the preceding financial year, whichever is higher
  • Tier 2 (Article 83(5) and 83(6)): up to €20 million, or up to 4% of the total worldwide annual turnover of the preceding financial year, whichever is higher

These figures are ceilings and not automatic outcomes. Many cases result in smaller fines, and some cases result in no fine at all (for example, if a reprimand alone is sufficient). Conversely, serious cases may include both a fine and an order to stop processing, change a product flow, or delete unlawfully collected data.

How are GDPR fines calculated?

There's no single “GDPR fine calculator,” but Article 83(2) lists factors that regulators must consider when deciding whether to impose a fine and when setting the amount. Many authorities publish their own fining guidance or methodologies, but the underlying logic is consistent: assess the harm and seriousness of the infringement, evaluate the organization's behavior, and choose a penalty that achieves compliance and deterrence without being excessive.

What factors do authorities consider?

When authorities assess GDPR fines, they typically weigh a combination of impact, culpability, and accountability evidence. Common factors include:

  • Nature and severity of the infringement: What rule was broken, how fundamental it is, and how directly it affects individuals’ rights
  • Duration of the violation: Whether it was a one-off incident or a long-running practice
  • Number of affected individuals: The scale of exposure (and, in some cases, whether vulnerable individuals were affected)
  • Level of negligence or intent: Whether the organization acted deliberately, recklessly, or made an avoidable mistake
  • Cooperation with authorities: Responsiveness, completeness of answers, and willingness to remediate
  • Previous infringements: Repeat issues can increase the penalty and reduce regulator patience
  • Mitigation measures taken: Steps to limit damage and prevent recurrence (technical fixes, process changes, customer notifications, etc.)

Does company size matter?

Company size matters in two ways. First, the GDPR’s maximum fine is partly revenue-based, so large organizations face higher potential exposure because 2% or 4% of global turnover can exceed the fixed euro amounts.  

Second, authorities apply the proportionality principle: the penalty should fit the circumstances and be strong enough to change behavior without being punitive beyond what the law intends.

That said, small and mid-sized businesses aren't “safe” from GDPR fines. Regulators regularly enforce against SMEs, especially where the violation is serious (for example, unlawful processing or repeated marketing abuses) or where basic governance is missing. For multinationals, regulators may scrutinize complex data ecosystems—adtech supply chains, cross-border transfers, and large-scale profiling—where the risk and potential impact are higher. 

05_icta_right

Take control of GDPR compliance with smart tools that save time


Navigate the future of compliance with automated GDPR tools (and save 40% of your workload while you’re at it...)

What types of violations lead to GDPR fines?

GDPR fines can result from a wide range of compliance failures, from high-impact security incidents to “paperwork” gaps that show a lack of accountability. Below are common categories of violations that frequently appear in enforcement decisions, along with concrete examples.

Violations of core principles

The GDPR’s core principles (such as lawfulness, fairness, transparency, purpose limitation, and data minimization) are the foundation of compliant processing. When regulators see systematic violations of these principles, fines can quickly move into the higher tier:

  • Unlawful processing: Collecting or using personal data without a valid lawful basis (for example, relying on “consent” that is not freely given or not specific enough)
  • Lack of transparency: Privacy notices that are incomplete, hard to find, too vague, or don’t clearly explain purposes, retention, recipients, and rights
  • Excessive data collection: Requesting more personal data than needed for the stated purpose (for example, asking for a full date of birth when an age bracket would be sufficient)

Failure to respect data subject rights

Individuals have enforceable rights under the GDPR, including access, rectification, erasure, restriction, portability, and objection. Regulators often treat repeated failures to respond to rights requests as an accountability and governance issue—not just a customer service issue.

  • Ignoring access requests: Missing statutory deadlines, asking for unnecessary information, or providing incomplete data when responding to a subject access request
  • Refusing deletion requests without basis: Denying erasure when no exemption applies, or failing to delete data across connected systems and vendors once erasure is required

Data breaches and security failures

Not every security incident results in GDPR fines, but poor security hygiene and slow incident handling can dramatically increase enforcement risk. Regulators typically assess whether the organization implemented appropriate technical and organizational measures (TOMs) for the risks involved, and whether it managed the incident responsibly once discovered.

  • Inadequate technical safeguards:
     
    • Weak access controls
    • Missing multi-factor authentication for privileged accounts
    • Unencrypted sensitive data
    • Outdated systems
    • Poor segmentation that enables lateral movement
  • Failure to report within 72 hours (where required): Notifying the authority late without a strong reason, or failing to document why notification wasn’t required

Documentation failures

The GDPR is built around accountability. You must be able to demonstrate compliance, not just claim it. Documentation failures can trigger fines on their own and also make other violations look worse because they suggest the organization might not have been managing privacy risk proactively.

  • Missing records of processing activities (RoPA): Not maintaining required records under Article 30, or keeping a document that is outdated and disconnected from real processing
  • No data protection impact assessment (DPIA): Failing to conduct a DPIA for high-risk processing (or treating it as a checkbox exercise without meaningful risk analysis and mitigation)
  • No data processing agreement (DPA) with vendors: Using processors without contracts that meet Article 28 requirements, or failing to manage sub-processors and international transfers

What are some notable GDPR fine cases?

Publicly known GDPR fines span many industries and company sizes. The most visible cases often involve large technology or adtech ecosystems, but smaller organizations are regularly fined for day-to-day compliance failures like improper CCTV, HR mishandling, and unlawful marketing.

Large corporate enforcement cases

Large corporate GDPR fine decisions often focus on systemic issues: product design that nudges users toward more data sharing, opaque privacy information, large-scale profiling, or governance gaps that affect millions of people. These cases are frequently cross-border, meaning multiple supervisory authorities coordinate through the GDPR’s cooperation mechanisms.

  • High-profile tech companies: Cases involving large platforms where defaults, settings, or account structures make it hard to exercise choice
  • Advertising consent violations: Enforcement against invalid consent for targeted advertising, insufficient ability to refuse, or unclear reliance on “legitimate interests”
  • Cross-border data transfer issues: Problems with international transfers, vendor chains, or inadequate safeguards for transfers outside the EEA

SME enforcement examples

For smaller organizations, GDPR fines commonly arise from operational privacy mistakes: mishandling employee data, using surveillance tools too broadly, or running marketing activities without a lawful basis. Because SMEs often have fewer dedicated resources, regulators look closely at whether basic privacy management practices were in place.

  • HR data misuse: Sharing employee data internally without need-to-know, using performance or attendance data beyond the stated purpose, or retaining records longer than necessary
  • CCTV overreach: Cameras covering public areas or employee workspaces without adequate justification, signage, or retention controls
  • Improper marketing practices: Emailing or calling individuals without valid consent or a compliant legitimate-interest assessment, or failing to honor opt-outs

What lessons can organizations learn?

The strongest pattern across GDPR fines is that enforcement is rarely about one isolated mistake. Regulators usually point to weak governance: unclear ownership, missing documentation, and an inability to show that privacy risks were identified and managed over time.

  • Weak governance causes major fines: Unclear responsibilities, inconsistent controls, and “set-and-forget” compliance programs tend to fail under scrutiny
  • Transparency failures are common: Unclear notices, confusing settings, and dark-pattern-like consent flows are a recurring trigger
  • Documentation gaps increase risk: If you cannot show RoPA, DPIAs, vendor due diligence, and decisions about lawful bases, regulators may assume the work was not done

How does the GDPR enforcement process work?

GDPR enforcement typically follows a structured path: an issue is raised (by a complaint, a breach report, or regulator initiative), the authority gathers facts, the organization is asked to respond, and the authority decides on corrective measures.

In cross-border cases, the “lead supervisory authority” coordinates with other EU/EEA authorities under the GDPR cooperation and consistency mechanisms.

How does an investigation start?

Investigations can start in several ways, and organizations should be prepared to respond.

  • Data subject complaint: An individual complains about a privacy notice, marketing, refusal to honor rights, or unfair processing
  • Data breach notification: Your own breach report (or a report from another party) triggers follow-up questions about security and governance 
  • Authority-initiated investigation: Regulators launch sector sweeps, look into media reports, or investigate systemic risks (for example, adtech or data brokerage)

What happens during an audit?

During an audit or formal inquiry, the authority’s goal is to understand what you do with personal data, why you do it, what controls you have, and whether individuals are harmed or put at undue risk. Even when the underlying issue is technical, the regulator will usually ask for governance evidence.

  • Information request: Written questions about your processing activities, systems, policies, and decision-making
  • Documentation review: Privacy notices, RoPA, DPIAs, security policies, vendor agreements, training records, and incident logs
  • On-site inspection: In some cases, authorities may conduct interviews or inspect systems and premises

Can fines be reduced?

While each case is different, regulators could treat post-incident behavior as a major input into the final outcome.

  • Cooperation: Best practice is to respond on time, be complete, and avoid defensive or inconsistent statements
  • Immediate remediation: Authorities expect you to fix the root cause (not just the symptom) and document the changes
  • Demonstrated accountability: Governance artifacts—risk assessments, DPIAs, training, and oversight—can guide the authority on how the incident was not “business as usual”
02_icta_top

Learn how a GDPR audit can protect your business and boost compliance


Discover how a GDPR audit helps identify data risks, improve compliance, and safeguard your business from fines.

Are GDPR fines increasing?

Since the GDPR began applying in 2018, enforcement activity has grown steadily as regulators have built capacity, cross-border processes have matured, and high-impact data ecosystems (such as adtech) have been scrutinized more intensely. However, year-to-year totals can fluctuate based on a small number of large cases and on how appeals progress.

What do enforcement trends show?

  • Rising total fine volume since 2018: Regulators have issued more fines as precedent and methodologies have developed
  • Increasing cross-border cooperation: Cases involving organizations active across the EU increasingly rely on lead authority coordination and consistency procedures
  • Focus on adtech, big tech, and data brokers: Large-scale profiling, behavioral advertising, and opaque data sharing remain common enforcement examples

Are regulators targeting specific sectors?

In practice, regulators prioritize sectors where processing is high-risk, high-scale, or particularly sensitive. That includes both private and public organizations. Here’s an overview of which operational areas can be higher risk for different industries:

  • Marketing and advertising: Consent, profiling, and third-party tracking ecosystems
  • Healthcare: Sensitive data, access controls, and confidentiality
  • E-commerce: Customer data security, marketing practices, and vendor sharing
  • Public authorities: Surveillance, data matching, and lawful basis constraints

What are the indirect costs of GDPR fines?

When people talk about GDPR fines, they often focus on the headline number. But the fine itself can be only part of the total cost of an enforcement action. Investigations consume time, slow down projects, and can damage commercial relationships. This is especially true when regulators impose corrective orders that affect products or operations.

  • Reputational damage: Public decisions and media coverage can affect brand perception for years
  • Loss of customer trust: Churn and reduced willingness to share data, especially after breaches
  • Investor concerns: Increased risk premiums, tougher diligence, or delayed transactions
  • Increased regulatory scrutiny: Follow-up audits, reporting obligations, or broader investigations
  • Contractual termination risks: Enterprise customers may exit contracts due to compliance clauses
  • Higher insurance premiums: Cyber and liability coverage can become more expensive or restricted

How can organizations avoid GDPR fines?

Avoiding GDPR fines is less about “never making a mistake” and more about building a compliance system that prevents common failures, detects gaps early, and produces evidence of accountability on demand. Regulators often distinguish between organizations that had a reasonable program (but experienced an incident) and organizations that operated without effective controls.

What preventive measures reduce risk?

  • Maintain an up-to-date RoPA: Keep a living inventory of processing activities, linked to systems and owners—not a document that is updated once a year
  • Define and document lawful bases: Map each purpose to an appropriate lawful basis, and document why it fits (including legitimate-interest assessments where used)
  • Conduct DPIAs where required: Identify high-risk processing early (new products, new surveillance, large-scale profiling) and record mitigation steps and decisions
  • Implement strong technical and organizational measures (TOMs): Examples include access control, logging, encryption, secure configuration, patching, supplier security, and least-privilege operations
  • Train employees regularly: Focus on role-based training for marketing, HR, engineers, support, and leadership instead of annual generic training
  • Test breach response procedures: Run tabletop exercises, maintain a decision log, and pre-define who evaluates the 72-hour notification threshold

Solutions like DataGuard make it easy to keep processing inventories up to date, automate compliance tasks, and stay on top of regulatory changes. With features for real-time monitoring and streamlined documentation, DataGuard helps teams respond quickly and confidently to requests and maintain strong data protection measures.

Why is documentation critical?

Documentation is how you prove accountability. In an investigation, your strongest defense is often a well-maintained trail showing what you decided, when you decided it, why you chose a given lawful basis, what risks you identified, and which mitigations you implemented. Without that evidence, regulators may conclude that compliance activities did not happen, or happened too late.

Preventive checklist summary

  • Do we have a current processing inventory (RoPA) with owners and systems?
  • Can we show the lawful basis for each purpose, plus consent records where applicable?
  • Have we completed DPIAs for high-risk activities and tracked mitigation actions?
  • Do we have processor contracts (DPAs), a vendor list, and transfer safeguards where needed?
  • Can we produce evidence of TOMs (policies, configurations, audits, and testing)?
  • Do we have a tested rights-request workflow with deadlines and templates?
  • Do we have a tested breach-response workflow with a 72-hour decision process?

How does structured compliance reduce fine exposure?

Organizations with “structured compliance” treat GDPR obligations as an ongoing management system rather than a one-time project. Instead of scattered spreadsheets and ad hoc approvals, they centralize ownership, standardize workflows, and monitor key compliance signals, so that you can find and address gaps before a regulator (or a breach) does.

What changes when compliance is centralized?

  • Clear ownership: Each processing activity, system, and vendor has an accountable owner who can answer regulator questions
  • Automated reminders: Reviews for retention, DPIAs, vendor assessments, and policy acknowledgments happen on schedule
  • Real-time monitoring: Changes in products, vendors, or data flows trigger compliance review instead of being discovered after launch
  • Faster response to regulator requests: You can quickly produce evidence (RoPA extracts, DPIA summaries, policies, and logs) rather than rebuilding history under pressure

With DataGuard’s platform and expert support, you can handle all your compliance tasks seamlessly in one place—making complex responsibilities feel streamlined.

How does continuous monitoring lower risk?

Continuous monitoring closes the gap between “policy” and “practice.” As data usage evolves, monitoring helps ensure your documentation, controls, and notices evolve with it.

  • Early gap detection: Identify missing DPIAs, new vendors, or new data uses before they become enforcement issues
  • Updated documentation: Keep RoPA, policies, and risk registers aligned with real systems and operations
  • Ongoing policy alignment: Ensure training, access control, retention, and incident response match current processing reality
10_icta_top

Get compliant. Manage risks. Simplify your compliance journey


DataGuard helps you get certified and compliant quickly with an all-in-one platform and expert support.

What is the relationship between GDPR fines and data breaches?

Data breaches are a common trigger for GDPR investigations, but a breach doesn't automatically mean a fine. Authorities generally look at whether the organization implemented appropriate safeguards, whether the incident was foreseeable and preventable, and whether the organization acted promptly and transparently once it learned of the issue.

Are all data breaches fined?

No. Many breaches lead to questions and corrective recommendations rather than fines. The key difference is usually whether the organization’s security measures were appropriate for the risk, and whether it handled the incident competently. Strong access controls, encryption, vendor oversight, and documented security governance can reduce the chance of a fine—even when an incident occurs.

What role does the 72-hour rule play?

The GDPR requires controllers to notify the supervisory authority of certain personal data breaches “without undue delay and, where feasible, not later than 72 hours” after becoming aware of the breach. Late notifications can increase exposure because they suggest weak incident response processes. Even when you decide notification isn't required (for example, if the breach is unlikely to result in risk to individuals), you should document the assessment and decision.

How much does it cost to prevent GDPR fines?

The cost of preventing GDPR fines depends on your size, industry, data sensitivity, and how complex your processing ecosystem is. A small company with limited processing can often reach a strong baseline with clear policies, a lightweight RoPA, vendor contracts, and staff training. Larger organizations typically need dedicated privacy, security, and governance functions, plus scalable tooling to keep up with change.

What drives compliance investment?

Compliance spending usually increases with scale, sensitivity, and complexity. The biggest drivers aren't just “privacy tasks,” but the operational work needed to govern data across teams, systems, and vendors.

  • Internal resources: Privacy leadership (and a DPO function where required), plus time from Product, Engineering, HR, Marketing, Procurement, and Security to maintain workflows like RoPA updates, DPIAs, and rights requests
  • Security infrastructure: Identity and access management, encryption, logging/monitoring, vulnerability management, backups, endpoint controls, and secure-by-design practices—especially for systems that handle sensitive or high-volume personal data
  • Legal advice: Support for lawful bases, consent language, international transfers, processor contracting, and incident response—particularly when launching new products or responding to regulator inquiries
  • Governance software: Tools to centralize RoPA, DPIAs, vendor risk, policy workflows, evidence, and audit trails so compliance doesn't depend on scattered documents and tribal knowledge

What is the ROI of preventive compliance?

Preventive compliance can feel like overhead until something goes wrong. But the ROI is real: it lowers the likelihood and impact of enforcement, reduces time spent firefighting, and helps the business move faster with fewer surprises.

  • Reduced enforcement risk: Fewer high-risk gaps (missing DPIAs, unlawful marketing, weak vendor controls) and better evidence of accountability if a regulator investigates
  • Faster audit response: Centralized records and clear ownership reduce scramble time and help you answer information requests accurately and consistently
  • Increased customer trust: Transparent practices and mature incident handling can improve retention and reduce sales friction with privacy- and security-conscious buyers
  • Competitive differentiation: Strong governance can unlock partnerships, enterprise deals, and market entry where privacy requirements are part of procurement

Ultimately, taking a structured approach to GDPR compliance delivers significant advantages across multiple operational areas, as we capture in the table below.

 

Area Manual compliance (spreadsheets, email, shared drives)  Structured compliance (centralized workflows and monitoring) 
RoPA maintenance Periodic updates; easy to miss new systems and vendors Continuous updates tied to owners; changes trigger review
DPIAs and approvals  Inconsistent templates; approvals happen late or not at all Standard workflow; reminders, decision logs, and action tracking
Vendor and DPA tracking Contracts scattered; transfer safeguards hard to prove Central vendor inventory with DPAs, sub-processors, and evidence
Rights requests Deadline risk; responses depend on individual knowledge Assigned owners, SLA tracking, templates, and audit trail
Incident response and 72-hour decisions  Ad hoc coordination; decision rationale may not be documented Runbooks, decision logs, and rapid escalation paths
Regulator inquiry readiness Scramble to reconstruct history and evidence Evidence is retrievable quickly; consistent narrative and artifacts

 

Final summary: why GDPR fines are preventable with the right governance

GDPR fines are serious, but many of the biggest penalties share the same root causes: unclear ownership, weak documentation, and slow response when issues surface. The good news is that those problems are fixable with a governance approach that's systematic rather than reactive.

  • Most fines stem from weak processes: Invalid consent, missing records, unmanaged vendors, and inconsistent security are usually process failures—not one-off accidents
  • Accountability reduces penalties: When something goes wrong, clear decisions, documented risk management, and fast remediation can materially affect outcomes
  • Structured compliance lowers exposure: Centralized ownership and continuous monitoring help you catch gaps early and respond to regulators with confidence
  • Prevention is cheaper than enforcement: The fine is only part of the cost—investing upfront reduces operational disruption, reputational harm, and long-term scrutiny. Lean on a solution like DataGuard to get ahead of non-compliance risks without overburdening your team

Frequently asked questions

Can small companies receive GDPR fines?

How long does a GDPR investigation take?

Can companies appeal GDPR fines?

Are fines publicly disclosed?

🏢 Organization Schema Preview (Development Only)
{
  "@context": "https://schema.org",
  "@graph": [
    {
      "@type": "Organization",
      "@id": "www.dataguard.com#organization",
      "name": "DataGuard",
      "legalName": "DataCo GmbH",
      "description": "DataGuard, the European leader in security and compliance software, is trusted by more than 4,000 organizations across 50+ countries. We help you identify and manage your security and compliance risks and fast-track your certifications and compliance by combining expert consultancy with AI-powered automation. Our purpose-built, all-in-one platform is developed with the experience of over 1.5 million total hours by a team of certified security and compliance experts.",
      "foundingDate": "2018",
      "taxID": "DE315880213",
      "logo": "https://7759810.fs1.hubspotusercontent-na1.net/hubfs/7759810/DataGuardLogo.svg",
      "url": "www.dataguard.com",
      "email": "info@dataguard.de",
      "telephone": "+49 89 452459 900",
      "address": {
        "@type": "PostalAddress",
        "streetAddress": "Sandstrasse 33",
        "addressLocality": "Munich",
        "addressRegion": "Bavaria",
        "postalCode": "80335",
        "addressCountry": "Germany"
      },
      "sameAs": [
        "https://www.linkedin.com/company/dataguard1/",
        "https://www.youtube.com/channel/UCEQzPZ6sCBCj9cAoBvaLL6w",
        "https://x.com/i/flow/login?redirect_after_login=%2FDataGuard_dg"
      ]
    }
  ]
}

✅ Organization schema markup for "DataGuard" has been injected into the document head.