GDPR is the EU privacy law that applies to anyone holding data on EU residents — no matter where the company is. Fines hit 4% of global revenue. Security of processing is one of the headline obligations.
Lawful processing of personal data with appropriate technical and organizational measures, including security of processing.
Each requirement of the chosen framework, scored against each tool. Coverage is editorial — based on public documentation, vendor demos and user reports.
| Requirement | 🇵🇱 $200 / month | 🇺🇸 Quote required (enterprise) | 🇺🇸 from ~$8 | 🇺🇸 from ~$7 | 🇺🇸 from $3 / user / month | 🇺🇸 Quote required | Editor's note |
|---|---|---|---|---|---|---|---|
Records of processing (RoPA) Live processing inventory. | Implemented | Strong | Implemented | Implemented | Not included | Not included | ›RoPA included — without OneTrust enterprise pricing. |
DPIA workflow Risk assessments for high-risk processing. | Implemented | Strong | Partial | Partial | Not included | Not included | ›Templated DPIAs with evidence pulls. |
Processor due diligence + DPAs Vendor reviews and signed DPAs. | Implemented | Strong | Strong | Strong | Not included | Not included | ›Single source of truth for vendor + DPA evidence. |
Breach notification (72h) Detect, classify, report inside the window. | Implemented | Implemented | Partial | Partial | Strong | Partial | ›72h timer with regulator-ready notification draft. |
Security of processing (Art. 32) Encryption, MFA, logs, resilience. | Via integration | Partial | Implemented | Implemented | Strong | Strong | ›Aggregates Art. 32 evidence from your existing tools. |
Methodology: public docs, vendor demos, practitioner interviews. Verify with each vendor before purchase.
GDPR is the EU privacy law that applies to anyone holding data on EU residents — no matter where the company is. Fines hit 4% of global revenue. Security of processing is one of the headline obligations.
Anyone processing EU personal data.
RoPA, DPIA, DPA contracts, breach log.
Processor evidence and breach timelines.
Processor risk, breach evidence, DPA gap detection.