Irish startups using SaaS tools, cloud providers, CRMs, payroll services, or any third-party vendors handling customer or employee personal data under GDPR.
Founders and compliance leads will gain practical steps for due diligence, DPAs, sub-processor management, ongoing monitoring, and breach handling to mitigate liability and ensure DPC compliance.
Key Takeaways
- Controllers cannot outsource GDPR responsibilities; remain accountable for processors' handling of personal data.
- Conduct thorough due diligence on vendors' security, breach history, sub-processors, and data locations before engagement.
- DPAs must include all Article 28 mandatory provisions like instructions, security, audits, and sub-processor rules.
- Monitor processors annually, request audit reports, test breach notifications, and review at contract renewals.
- In breaches, assess risk promptly, notify DPC/individuals as required, document, and evaluate vendor adequacy.

Third-Party Vendor Data Compliance: What Irish Startups Must Do Under GDPR
Every SaaS tool, cloud provider, and outsourced service your startup uses is a potential compliance liability. Under GDPR, you cannot outsource your data protection responsibilities by handing personal data to a third party. If a vendor mishandles your customers' data, you as the controller are accountable. Vendor data compliance in Ireland starts with understanding who your processors are, what contracts you need, and how to monitor them.
This guide walks through the practical steps Irish startups must take to manage third-party vendors under GDPR.
What is the difference between a controller and a processor?
A data controller is the organisation that decides why and how personal data is processed. A data processor is any entity that processes personal data on the controller's behalf. The distinction matters because it determines who carries the compliance burden and who faces enforcement action.
For most Irish startups, you are the controller of your customers' and employees' data. The vendors you use, your email platform, CRM, analytics tool, payroll provider, cloud hosting service, are typically processors. They handle data according to your instructions, not their own.
Some vendors act as joint controllers if they determine their own purposes for processing (for example, a social media platform using your uploaded contact list for its own advertising). Getting the classification wrong creates liability. If you treat a joint controller as a processor, your data processing agreement will not cover the right obligations, and the DPC will may you responsible for the compliance gap.
The DPC has published guidance confirming that while you may outsource the processing of personal data, you cannot outsource your responsibilities under GDPR. The controller remains accountable for everything that happens to the data.
What due diligence should you do before engaging a vendor?
Article 28 of the GDPR requires controllers to use only processors that provide "sufficient guarantees" to implement appropriate technical and organisational measures. That means you need to assess a vendor's compliance posture before you sign the contract, not after.
Here is what to evaluate:
- Security certifications: Does the vendor hold ISO 27001, SOC 2 Type II, or equivalent certifications? These are practical evidence of security maturity.
- Privacy policies and practices: Review their privacy policy, data retention practices, and breach notification procedures.
- Breach history: Has the vendor experienced data breaches? How did they responded? Transparency here is a positive signal.
- Sub-processor list: Where is the data going beyond the vendor itself? Request a current list of sub-processors and their locations.
- Data location: Where is data stored and processed? If data leaves the EEA, you need to confirm appropriate transfer mechanisms are in place.
Red flags that should pause an engagement include refusal to sign a data processing agreement, inability to provide a sub-processor list, lack of any security certification, or vague answers about data location.
Author's tip: Don't skip due diligence for "small" tools. That free form builder, the analytics plugin your developer added, the chat widget on your website, all of these process personal data. In our experience, if it touches customer or employee data, it needs a DPA and a compliance check.
For a broader overview of your obligations, see our GDPR compliance guide for startups.
What must a data processing agreement include?
Once you have assessed a vendor, you need a written data processing agreement (DPA) before any personal data is shared. Article 28(3) of the GDPR sets out the mandatory provisions. A DPA that misses any of these is not compliant.
The agreement must cover the following:
- Subject matter and duration: What data is being processed, for how long, and why
- Nature and purpose: The specific processing activities the vendor will carry out
- Types of personal data: Names, emails, financial data, health data, whatever applies
- Categories of data subjects: Customers, employees, website visitors, job applicants
- Controller's instructions: The processor must act only on documented instructions from you
- Confidentiality: All personnel with access to the data must be bound by confidentiality obligations
- Security measures: The processor must implement appropriate technical and organisational safeguards
- Sub-processor rules: The processor must obtain your authorisation before engaging sub-processors
- Data subject rights assistance: The processor must help you respond to access requests, erasure requests, and other data subject rights
- Deletion or return: After the contract ends, the processor must delete or return all personal data
- Audit rights: You must have the right to audit the processor's compliance
The European Commission published standard contractual clauses for Article 28 agreements (the Processor SCCs) in June 2021. These provide a compliant template that many vendors now accept.
For a detailed breakdown, see our guide on data processing agreements.
How do you manage sub-processors?
Most of your vendors use their own vendors. Your CRM runs on AWS. Your email platform uses a delivery service. Your payroll provider shares data with a pension administrator. Each of these downstream relationships introduces a sub-processor into the chain, and you need to know about every one of them.
GDPR gives you two options for authorising sub-processors:
- Specific authorisation: You approve each sub-processor individually before they are engaged. This gives you maximum control but requires ongoing communication.
- General authorisation: You give blanket consent to the processor's current sub-processor list, with a requirement that they notify you in advance of any changes. You retain the right to object, and if you do, the processor must either not use that sub-processor or allow you to terminate the contract.
General authorisation is the most common approach for SaaS vendors. They typically maintain a public sub-processor list on their website and commit to a notification period (usually 30 days) before adding a new sub-processor.
The EDPB has stated that controllers should have identity information for all processors and sub-processors readily available at all times. That means names, contact details, and descriptions of what each sub-processor does. Your records of processing activities should reflect these relationships.
In practice, this means: When your CRM provider emails you about a new sub-processor, don't delete the notification. Review who the sub-processor is, where they are located, and what data they will access. If something concerns you, exercise your right to object.
What are your ongoing monitoring and audit obligations?
Signing a DPA is not the end of the process. GDPR expects controllers to actively monitor their processors. Article 28 gives you the right to audit, and the DPC expects you to meaningfully exercise oversight, proportionate to risk.
Practical monitoring approaches include:
- Annual vendor reviews: Reassess each processor's compliance posture at least once a year. Check for changes in their security certifications, sub-processor list, data locations, and breach history.
- SOC 2 and ISO 27001 reports: For larger vendors, request their latest audit reports. These provide independent verification of security controls without requiring you to conduct an on-site audit.
- Breach notification testing: Confirm that your processor's breach notification procedures align with your DPA. Under GDPR, processors must notify you "without undue delay" after becoming aware of a breach.
- Contract renewal checkpoints: Use renewal dates as a trigger to review the DPA, update sub-processor lists, and confirm that the processing activities still match what the agreement describes.
If a vendor falls short, you should address it in writing. It is recommended that you document the issue, set a remediation timeline, and follow up. If they cannot or will not remediate, you may need to terminate the relationship and migrate to a compliant alternative.
Please note: The right to audit does not always require an on-site visit. We tend to see that requesting recent SOC 2 reports, penetration test summaries, or completed security questionnaires is a proportionate and widely accepted alternative for small businesses.
What happens when a vendor has a data breach?
When a processor experiences a breach involving your data, their first obligation is to notify you without undue delay. Your DPA should define what this means in practice, many agreements specify a timeframe of 24 to 72 hours.
Once notified, your responsibilities as controller kick in:
- Assess the risk: Determine the nature and scope of the breach. What data was affected? How many individuals? What is the likely impact?
- Notify the DPC if required: If the breach is likely to result in a risk to the rights and freedoms of individuals, you must notify the DPC within 72 hours of becoming aware. The clock starts when you are informed, not when the vendor discovers the breach.
- Notify affected individuals if required: If the breach poses a high risk, you must notify the affected data subjects directly.
- Document everything: Record the breach in your breach register, including the facts, effects, and remedial actions taken. This is an Article 33(5) obligation.
- Review the vendor relationship: After containment, assess whether the vendor's response was adequate. Did they notify you promptly? Did their security measures meet the standard promised in the DPA?
Contractual remedies are important here. Your DPA should include provisions for liability allocation, indemnification, and termination rights in the event of a serious breach. If your current agreements are silent on these points, revisit them.
Need help building your vendor compliance framework?
Open Forest helps Irish startups get their legal and compliance foundations right, from company formation to GDPR readiness. We handle the complexity so you can focus on building your product.
Get started with Open Forest
Your next step
Vendor data compliance is not a one-off exercise. Every new tool, platform, or outsourced service introduces a processing relationship that needs a DPA, due diligence, and ongoing monitoring.
We recommend that you start by listing every vendor that touches personal data in your business. For each one, confirm you have a signed DPA, a current sub-processor list, and a record of when you last reviewed their compliance. If any of those are missing, that is where you start.
The DPC expects Irish controllers to demonstrate active oversight of their processors. The cost of getting this right is modest. The cost of getting it wrong, resulting in a breach you are liable for and a DPC investigation you are unprepared for, is not.

Laura Ryan is a practising Barrister at the Bar of Ireland. She graduated from the Honourable Society of King’s Inns in 2024, having previously qualified and practised as a Chartered Accountant in a big four accounting firm.













