GDPR Company Obligations: A Practical Compliance Map
Published on April 25, 2026

Regulators, enterprise customers, and even investors increasingly expect organisations to show “evidence-based compliance”, not just a privacy policy on a website. If your Jamaican business touches EU personal data (clients, tourists, app users, employees, or B2B contacts), the GDPR can apply and it can apply quickly, even when your operations are primarily outside Europe.

This guide breaks GDPR company obligations into a practical compliance map you can implement, audit, and maintain.

When the GDPR applies to your company (quick scope check)

The GDPR applies if you:

  • Are established in the EU and process personal data in the context of that establishment.

  • Are outside the EU but offer goods or services to people in the EU (including free services).

  • Are outside the EU but monitor behaviour of individuals in the EU (for example, tracking online behaviour for profiling).

These are the GDPR’s territorial scope rules (Article 3). If your business is unsure, start with a simple scoping exercise and document your reasoning. For the legal text, see the GDPR on EUR-Lex.

The practical GDPR compliance map (10 core obligation areas)

Think of GDPR compliance as a set of connected operational duties. Missing one element (for example, processor contracts) often undermines the rest.

1) Assign roles and accountability (controller vs processor)

First, confirm whether you act as a:

  • Controller (you decide the “why” and “how” of processing),

  • Processor (you process on someone else’s instructions), or

  • Joint controller (you and another party decide together).

Why it matters: controller obligations are broader, but processors also have direct legal duties under the GDPR.

Practical output: a short “data role matrix” per product, service line, or client engagement.

2) Build a Record of Processing Activities (RoPA)

A RoPA (Article 30) is one of the most useful compliance artefacts because it forces clarity on:

  • What data you collect

  • Why you use it

  • Your lawful basis

  • Who receives it

  • Where it is stored and transferred

  • How long you retain it

  • Your security measures (at a high level)

Even if you qualify for limited exemptions, many organisations still maintain a RoPA because enterprise customers often request it during vendor due diligence.

Practical output: a RoPA spreadsheet or GRC tool export that you can update quarterly.

3) Identify a lawful basis for each processing purpose

For every purpose (marketing, onboarding, billing, fraud prevention, HR management), you need a lawful basis under Article 6, such as:

  • Consent

  • Contract necessity

  • Legal obligation

  • Legitimate interests

The lawful basis drives your notice wording, your rights handling, and your retention logic.

Practical output: a “purpose to lawful basis” register aligned to your RoPA.

4) Deliver transparent privacy notices (and make them match reality)

GDPR transparency duties (Articles 12 to 14) require clear disclosures about your processing. The most common failure is a notice that is “generic”, outdated, or inconsistent with actual practices.

Practical output: layered privacy notices for key touchpoints (website, app, HR, B2B onboarding) and an internal change control process so notices evolve with the business.

5) Operationalise data subject rights (DSAR-ready processes)

Individuals have rights such as access, rectification, erasure, restriction, portability, and objection. You should be able to authenticate requesters, locate data, respond within deadlines, and document outcomes.

Practical output: a rights request playbook, intake channel(s), triage workflow, and a response log.

Tip: Build your process around the data sources you actually use (CRM, email marketing, HRIS, ticketing, cloud drives). Rights handling breaks down when ownership is unclear.

6) Implement security measures and privacy by design

GDPR requires “appropriate technical and organisational measures” (Article 32) and privacy by design and default (Article 25). This is risk-based, not one-size-fits-all.

Common baseline controls include:

  • Access controls with least privilege

  • MFA on business-critical systems

  • Encryption in transit and at rest where feasible

  • Secure backups and restore testing

  • Patch management and vulnerability handling

  • Secure SDLC controls for applications

Practical output: an information security policy set, plus evidence (system configurations, logs, training records, risk assessments).

7) Manage vendors with GDPR-compliant processor agreements

If a vendor processes personal data on your behalf (cloud hosting, analytics, payroll, marketing tools), GDPR requires specific contract terms (Article 28).

Practical output: a vendor inventory, a processor due diligence checklist, and a Data Processing Agreement (DPA) template.

For practical guidance, many teams reference regulator-friendly summaries like the UK ICO’s controller and processor guidance.

8) Handle international transfers lawfully

Transfers of personal data from the EEA/UK to non-adequate countries typically require a recognised transfer mechanism, often:

  • Standard Contractual Clauses (SCCs)

  • A Transfer Risk Assessment (TIA) as part of your due diligence

Practical output: SCC addenda in your relevant contracts, a transfer register, and documented TIAs where appropriate.

Reference: the European Commission’s Standard Contractual Clauses (SCCs).

9) Conduct DPIAs for high-risk processing

A Data Protection Impact Assessment (DPIA) is required where processing is likely to result in high risk to individuals (Article 35), such as large-scale sensitive data, systematic monitoring, or certain profiling.

Practical output: DPIA templates, a screening questionnaire (to decide when a DPIA is needed), and a review cadence.

10) Prepare for breach response (and 72-hour notification)

If you suffer a personal data breach, you may need to notify the supervisory authority within 72 hours (Article 33), and in some cases notify affected individuals (Article 34).

Practical output: an incident response plan that explicitly addresses privacy incidents, a breach decision log, and internal escalation rules.

A “doable” 30-60-90 day compliance plan

This is a pragmatic sequence for many organisations starting from “partial compliance”.

Days 1 to 30: Scope, ownership, and baseline documentation

Focus on clarity and accountability.

  • Confirm GDPR applicability and document the rationale.

  • Assign internal owners (legal, IT/security, HR, marketing, operations).

  • Build your first RoPA draft and a data map at a workable level of detail.

  • Identify your highest-risk processing and your key vendors.

  • Update or draft your primary privacy notice(s).

Days 31 to 60: Contracts, rights, and security hardening

Turn documentation into operations.

  • Put Article 28 DPAs in place with priority processors.

  • Implement a DSAR workflow, with templates and a response log.

  • Establish retention rules (and ensure systems can actually apply them).

  • Roll out baseline security controls and security policy updates.

  • Start DPIA screening for new projects and changes.

Days 61 to 90: Transfers, training, testing, and evidence

Make it auditable.

  • Complete transfer mechanisms (SCCs) and TIAs where needed.

  • Train staff by role (marketing, HR, customer service, engineers).

  • Tabletop test your breach response and DSAR process.

  • Build a compliance evidence folder for due diligence requests.

What “good” looks like: an evidence checklist you can show regulators and clients

Many GDPR programmes fail not because nothing is done, but because actions are not documented. The table below summarises the most commonly requested evidence.

GDPR obligation area

What you should be able to produce

Typical owner

Accountability

Governance structure, policy set, training records

Compliance, Legal, HR

RoPA

Article 30 record, data flow notes

Compliance, Operations

Lawful basis

Purpose-to-basis register, LIAs where used

Legal, Compliance

Transparency

Privacy notices, cookie notice where relevant

Legal, Marketing

Rights handling

DSAR procedure, response templates, request log

Legal, Customer Ops

Security

Security policies, access controls evidence, risk assessments

IT, Security

Processors

Vendor inventory, signed DPAs, due diligence notes

Procurement, Legal

Transfers

SCCs, transfer register, TIAs

Legal, Compliance

DPIAs

DPIA reports, screening forms, sign-offs

Compliance, Product

Breach response

IR plan, breach log, notification decision records

Security, Legal

A simple flowchart-style compliance map showing GDPR obligations as 10 connected blocks: scope, roles, RoPA, lawful basis, notices, rights, security, vendors, transfers, and breach response. Each block has a short example output document like “RoPA s...

Common GDPR pitfalls for Jamaica-based and Caribbean organisations

Even sophisticated businesses get caught by predictable gaps.

Treating GDPR as “just an EU problem”

If you serve EU customers, work with EU partners, or track EU website/app users, GDPR expectations can show up in procurement questionnaires, contract clauses, and audits, even before a regulator is involved.

Vendor chains without proper DPAs

Cloud services, analytics tools, and outsourced support can create a long processor chain. Without Article 28 terms and a clear vendor inventory, you may be unable to answer basic due diligence questions.

“Consent” used as a default lawful basis

Consent is powerful but fragile. If you rely on consent, you need a valid collection method and an easy withdrawal mechanism, and you must stop processing when consent is withdrawn. Many business activities fit better under contract necessity or legitimate interests, but only if documented properly.

International transfers handled informally

If personal data moves between the EU and Jamaica (or via other jurisdictions), you need a structured transfer approach. SCCs are not a checkbox, they require the right version and a sensible implementation path.

How GDPR aligns with local privacy compliance

Many organisations operating in Jamaica also consider local privacy obligations, including the Data Protection Act and sector-specific expectations. While GDPR and Jamaican requirements are not identical, the operational building blocks are often similar: governance, transparency, security, vendor management, and incident response.

A practical approach is to design a privacy programme that can satisfy both, then tailor notices, rights handling, and regulatory reporting to the applicable regime.

Frequently Asked Questions

Do Jamaican companies have to comply with the GDPR? Yes, if they fall within the GDPR’s territorial scope, for example by offering goods or services to individuals in the EU or monitoring their behaviour.

What are the main GDPR company obligations? Core obligations include accountability (governance and records), a lawful basis for processing, transparency notices, rights handling, security measures, processor contracts, lawful transfer mechanisms, DPIAs for high-risk processing, and breach response.

Is a privacy policy enough for GDPR compliance? No. A privacy policy supports transparency, but GDPR compliance also requires operational processes, contracts, security controls, and documented evidence such as a RoPA and DSAR workflow.

When do we need a Data Protection Officer (DPO)? A DPO is required in certain cases, including where core activities involve regular and systematic monitoring of individuals on a large scale, or large-scale processing of special category data. Many organisations appoint a privacy lead even when a formal DPO is not mandatory.

How fast do we need to report a breach under GDPR? If a breach is notifiable to a supervisory authority, GDPR sets a 72-hour deadline from becoming aware of it, unless the breach is unlikely to result in a risk to individuals’ rights and freedoms.

Need help turning this map into a defensible compliance programme?

GDPR compliance is easiest to maintain when it is designed as a working system: clear roles, clean records, contract coverage, tested workflows, and evidence you can produce under pressure.

Henlin Gibson Henlin advises organisations on data privacy and compliance and risk. If you need support scoping GDPR applicability, drafting or remediating RoPA and notices, negotiating DPAs and transfer clauses, or building incident and DSAR procedures that stand up to client audits, explore the firm’s resources at Henlin Gibson Henlin or contact the team for tailored legal guidance.