GDPR Overview for Businesses: Duties, Fines, and Defences
Published on April 20, 2026

If your business collects or uses personal data connected to the European Union, the General Data Protection Regulation (GDPR) can apply even if you have no office in Europe. For Jamaican and Caribbean companies, that often happens through tourism bookings, online sales, SaaS services, outsourcing arrangements, or marketing to EU residents.

This overview explains what the GDPR requires in practice, how fines are calculated, and what “defences” really look like (mostly risk-reduction arguments grounded in accountability, evidence, and remediation).

When does the GDPR apply to a non-EU business?

The GDPR’s reach is intentionally broad. Under Article 3, it can apply where an organisation outside the EU:

  • Offers goods or services to individuals in the EU (paid or free), or

  • Monitors behaviour of individuals in the EU (for example, certain analytics, profiling, ad targeting).

This is often called the GDPR’s “extraterritorial effect”. You can confirm the scope in the GDPR text and recitals published by the EU: GDPR (Regulation (EU) 2016/679).

Common triggers for Jamaican businesses

A few real-world patterns that can pull a Jamaica-based business into GDPR scope:

  • A hotel, villa, or tour operator taking bookings from EU residents and collecting passport details, dietary requirements, or health-related accessibility needs.

  • An e-commerce brand shipping to EU countries, or pricing in euros, with EU language targeting.

  • A BPO or service provider processing EU customer data for an EU client (often as a processor).

  • A professional services firm onboarding EU-resident clients, collecting KYC documentation.

Key GDPR concepts (in plain English)

You will make faster compliance decisions if your team aligns on a few foundational terms.

Personal data and special category data

  • Personal data is any information relating to an identified or identifiable individual, from names and emails to device identifiers.

  • Special category data includes sensitive categories such as health data, biometric data, and information revealing racial or ethnic origin. Processing these usually requires additional conditions under Article 9.

Controller vs processor

  • A controller decides why and how personal data is processed.

  • A processor processes personal data on the controller’s behalf.

In many cross-border arrangements, a Jamaican business is a processor for an EU controller (for example, a BPO), but businesses can also be controllers (for example, selling directly to EU customers).

The accountability principle

GDPR compliance is not just about doing the right thing, it is about being able to prove you did. Article 5(2) makes controllers responsible for demonstrating compliance.

Core duties under the GDPR (what regulators expect to see)

There is no single “GDPR certificate” that makes risk disappear. Regulators typically look for a working privacy management programme with documented decisions, operational controls, and evidence.

1) Choose and document a lawful basis for each processing activity

Most business processing relies on one of the GDPR’s lawful bases under Article 6, commonly:

  • Contract (for example, fulfilling a booking or delivering a service)

  • Legal obligation (for example, compliance, tax, certain recordkeeping)

  • Legitimate interests (often used for certain security, fraud prevention, or limited marketing, but it requires balancing and clear notice)

  • Consent (must be freely given, specific, informed, unambiguous, and easy to withdraw)

A frequent compliance failure is using “consent” when the real basis is “contract” or “legitimate interests”, or relying on “legitimate interests” without recording the balancing assessment.

2) Provide transparent privacy notices

Articles 12 to 14 require clear notice of what you collect, why, how long you keep it, who receives it, and what rights individuals have. The UK ICO’s guidance is a helpful practical benchmark for what “transparent” looks like: ICO guidance on privacy information.

3) Respect data subject rights with workable internal processes

Individuals may request access, correction, deletion, restriction, portability, or object to processing (Articles 15 to 22). Compliance is not just policy language. You need:

  • A verified intake channel (web form or email)

  • Identity verification rules (proportionate to risk)

  • A tracking workflow with deadlines (often one month, extendable in limited cases)

  • A repeatable method to find data across systems and vendors

4) Security measures that match your risk (Article 32)

GDPR does not mandate one specific security standard, but it expects “appropriate technical and organisational measures.” In practice, regulators look for basics done consistently: access controls, MFA where appropriate, encryption where appropriate, patching, backups, logging, vendor oversight, and staff training.

The key is to match controls to the sensitivity of the data and the likelihood and severity of harm.

5) Breach detection and notification readiness

If a personal data breach is likely to result in a risk to individuals’ rights and freedoms, controllers must notify the supervisory authority without undue delay and, where feasible, within 72 hours after becoming aware (Article 33). In some cases, affected individuals must also be notified (Article 34).

Even processors have strict obligations to notify controllers without undue delay.

6) Data processing agreements (DPAs) and vendor governance

If you use vendors (cloud services, booking engines, payroll providers, marketing platforms), GDPR often requires specific contractual clauses under Article 28.

For processors, the Article 28 contract is not optional paperwork. It is one of the first things regulators ask for.

7) Records of processing activities (ROPA)

Article 30 requires records of processing for many organisations, and it is widely treated as a baseline accountability document. A good ROPA connects:

  • Processing purpose

  • Data categories

  • Legal basis

  • Recipients

  • Retention periods

  • Security measures

  • Cross-border transfer mechanism (if any)

8) Data Protection Impact Assessments (DPIAs) for high-risk processing

A DPIA is required where processing is likely to result in a high risk to individuals (Article 35). Examples can include large-scale profiling, sensitive data at scale, or systematic monitoring.

A DPIA is not just a form. It should show you identified risks, considered necessity and proportionality, and implemented mitigations.

9) International transfers (a major pain point)

If you transfer EU personal data outside the EEA, GDPR Chapter V requires a lawful transfer mechanism, such as:

  • An adequacy decision (where the EU has recognised a country’s protections as essentially equivalent), or

  • Standard Contractual Clauses (SCCs) combined with a transfer risk assessment (common for many organisations), or

  • Another permitted mechanism (depending on context).

For many Jamaican businesses working with EU data, SCCs are the practical route, but they must be implemented properly and reflected in contracts and security measures.

A simple flowchart showing a GDPR compliance workflow: map data, pick lawful basis, publish notice, secure systems, manage rights requests, prepare breach response, and review vendors and transfers.

GDPR duties at a glance (practical deliverables)

Duty area

What regulators typically expect

Practical deliverable you can show

Lawful basis

A valid legal ground for each purpose

Data map and lawful basis register

Transparency

Clear, accessible privacy information

Updated privacy notice(s) and cookie notice

Rights handling

Timely, consistent responses

Rights request workflow, logs, templates

Security

Controls appropriate to risk

Security policy set, access controls evidence

Breach response

72-hour readiness and escalation

Incident response plan, breach log

Vendor governance

Article 28 terms and oversight

Signed DPAs, vendor risk assessments

Accountability

Proof of compliance decisions

ROPA, DPIAs, training records

Transfers

Lawful transfer mechanism

SCCs, transfer assessments, supplier documentation

Fines: how GDPR penalties work in practice

GDPR administrative fines are set out in Article 83 and are designed to be effective, proportionate, and dissuasive.

The two main fine tiers

Depending on the breach, supervisory authorities can impose fines up to:

  • €10 million or 2% of total worldwide annual turnover (whichever is higher), for certain obligations (often more operational requirements), or

  • €20 million or 4% of total worldwide annual turnover (whichever is higher), for more serious infringements (often core principles, lawful basis, rights).

The actual amount depends on multiple factors, including the nature and duration of the infringement, intent or negligence, mitigation steps, cooperation, and prior history.

Fines are not the only consequence

A “fine” headline often hides other business impacts that can be more disruptive:

  • Orders to stop processing (which can interrupt revenue operations)

  • Mandatory changes to products, marketing funnels, or HR processes

  • Litigation risk, including compensation claims by affected individuals (Article 82)

  • Contractual fallout (especially where you are a vendor to EU entities)

Enforcement is real, including for cross-border transfers

Regulators have issued major penalties tied to international transfers and transparency failures in recent years. For example, Ireland’s Data Protection Commission issued a significant decision in 2023 relating to transfers, described in its public materials: DPC announcements and decisions.

(You should not plan compliance around “we are too small” or “we are too far away”. Your EU clients and partners may also require compliance contractually, regardless of regulator activity.)

“Defences” under the GDPR: what can reduce liability or penalties?

GDPR does not provide a single universal “defence” that automatically excuses non-compliance. Instead, your most credible defences are usually evidence-based arguments that:

  • no infringement occurred, or

  • you took appropriate measures and acted responsibly, which should reduce severity and fine exposure.

1) Accountability evidence (your documentation is your defence)

When regulators investigate, well-kept records can be the difference between a narrow issue and a broad, high-risk inquiry. Strong defensive documentation includes:

  • A current ROPA (Article 30)

  • DPIAs for higher-risk activities (Article 35), including mitigation decisions

  • Vendor contracts and SCCs where relevant

  • Security policies and proof they are implemented (not just written)

  • Training records and internal guidance

2) “Appropriate technical and organisational measures” (Article 32)

A common enforcement question is whether security controls were “appropriate” given:

  • the state of the art

  • implementation costs

  • the nature, scope, context, and purposes of processing

  • the risks to individuals

If you can show you assessed risk and implemented proportionate controls before an incident, you have a materially stronger mitigation posture than an organisation that reacts after harm occurs.

3) Incident response and harm reduction

When breaches happen, regulators evaluate what you did next. Practical mitigation that can support your position includes:

  • Rapid containment and forensic triage

  • Password resets, token revocation, key rotation, patching

  • Documented root-cause analysis and corrective actions

  • Timely notifications where required (and a reasoned decision where not)

Delays without a defensible explanation tend to make matters worse.

4) Cooperation and transparency with the supervisory authority

Article 83 factors explicitly include the degree of cooperation with the supervisory authority. Cooperation is not about oversharing, it is about being organised, truthful, and responsive.

5) Clear role allocation with vendors (controller vs processor clarity)

Many disputes arise because contracts and operational reality do not match. If you are a processor, your best defensive position includes:

  • A clear Article 28 contract

  • Written instructions from the controller

  • Evidence you stayed within scope

  • Documented sub-processor controls

If you are a controller, you need to show you selected processors with appropriate guarantees and oversight.

6) Lawful basis correctness and minimisation

Strong defences often start with basic hygiene:

  • Using the correct lawful basis, consistently applied

  • Collecting only what you need (data minimisation)

  • Keeping data only as long as necessary (retention discipline)

If you cannot justify why you collected a data field, it is hard to defend why you retained it or shared it.

A practical GDPR compliance roadmap for businesses

If you are starting from scratch, aim for a staged approach that reduces real risk quickly.

Phase 1: Map and triage

Identify what EU-linked personal data you process, where it lives, who can access it, and which third parties receive it. In many organisations, a simple but accurate data map resolves weeks of uncertainty.

Phase 2: Fix the highest-risk gaps

Prioritise actions that reduce harm and enforcement exposure:

  • Rights request workflow and templates

  • Security basics (access control, MFA where appropriate, logging, backups)

  • Incident response plan and breach log

  • Article 28 DPAs with key vendors

  • Transfer mechanism review (SCCs if needed)

Phase 3: Build the compliance operating model

This is where you formalise “how privacy works here”:

  • ROPA and retention schedule

  • DPIA process and review committee cadence

  • Training for teams who touch data (sales, marketing, HR, customer service)

  • Periodic vendor review and security assurance

The goal is not perfect paperwork. It is repeatable, evidence-backed decision-making.

GDPR and Jamaica: why local context still matters

Even where GDPR applies due to EU-linked processing, Jamaican businesses should also consider Jamaica’s domestic privacy framework (including the Data Protection Act and sector expectations). In practice, organisations benefit from harmonising controls so the same governance structure supports multiple regimes.

If your operations involve regulated industries (financial services, payments, shipping, or cross-border services), it is especially important to align privacy compliance with broader risk, contractual, and incident reporting obligations.

Frequently Asked Questions

Does the GDPR apply to my Jamaican company if I only have a website? It can. If you offer goods or services to people in the EU (for example, taking EU bookings or shipping to the EU) or monitor EU behaviour (certain tracking/profiling), GDPR may apply.

What is the maximum GDPR fine? GDPR sets two main caps: up to €10 million or 2% of worldwide annual turnover, or up to €20 million or 4% (whichever is higher), depending on the type of infringement.

Can we avoid GDPR by putting “we do not serve the EU” in our terms? A disclaimer helps only if your actual conduct supports it. If you actively market to EU customers, accept EU orders, or otherwise target EU residents, a disclaimer alone is unlikely to carry much weight.

What is the single most important GDPR document to have? There is no single document, but a well-maintained record of processing (ROPA) is a strong foundation because it connects purposes, lawful bases, vendors, retention, and transfers.

What are realistic “defences” if we are investigated? The strongest defences are usually evidence-based: documented lawful bases, appropriate security measures, working processes for rights and breaches, proper vendor contracts, and proof of prompt mitigation and cooperation.

Need help assessing GDPR exposure and reducing risk?

If your organisation processes EU-linked personal data (through customers, bookings, outsourcing, or digital marketing), a targeted legal risk review can clarify whether GDPR applies, where your main gaps are, and what remediation steps make the most commercial sense.

Henlin Gibson Henlin is a Jamaica-based law firm advising clients across complex commercial and regulatory issues. To discuss your situation, you can contact Henlin Gibson Henlin.