WikiFrameworksEU GDPRData Protection by Design and by Default

Data Protection by Design and by Default

Updated: 2026-02-23

Plain English Translation

GDPR Article 25 requires organizations to integrate data protection principles directly into the design of their business processes and technical systems from the very beginning. This concept, known as 'privacy by design', ensures that appropriate safeguards are built-in rather than added as an afterthought. Additionally, 'privacy by default' dictates that strict data limitation settings apply automatically, meaning systems must only collect, process, and store the absolute minimum amount of personal data necessary for a specific purpose.

Executive Takeaway

GDPR Article 25 mandates embedding privacy into the software development life cycle (SDLC) and enforcing restrictive data processing settings by default.

ImpactHigh
ComplexityHigh

Why This Matters

  • Reduces the risk of massive data exposure by ensuring only minimal necessary data is collected and accessible by default.
  • Avoids costly system retrofits and regulatory fines by embedding compliance into the product lifecycle from day one.

What “Good” Looks Like

  • Integrating privacy reviews and data minimization checks directly into the system design phase and SDLC; tools like WatchDog Security's Policy Management can help standardize review criteria, approvals, and acceptance tracking.
  • Applying strict least-privilege default settings so user data is never public or over-collected without explicit user intervention; tools like WatchDog Security's Posture Management can help surface misconfigurations and provide remediation guidance for privacy-impacting defaults.

GDPR Article 25 mandates that organizations integrate privacy by design GDPR principles into their systems from inception. It requires implementing technical and organisational measures for GDPR Article 25 to ensure only necessary data is processed by default.

The data controller is ultimately responsible for ensuring what is GDPR data protection by design and by default is met. Processors and developers must also build systems that allow controllers to fulfill these operational and technical obligations.

Article 25(1) focuses on privacy by design, requiring safeguards like pseudonymisation to be built into the system design. Article 25(2) focuses on privacy by default settings GDPR examples, ensuring that the strictest data minimization and access settings apply automatically without user intervention.

Good default privacy settings for web apps GDPR compliance include keeping user profiles private initially, disabling location tracking until explicitly enabled by the user, and leaving optional marketing consent boxes unchecked.

To implement GDPR data minimisation by default configuration, organizations should configure databases to drop unnecessary fields, enforce strict automated retention periods, and restrict data access to only those components necessary for the immediate purpose.

Expected technical and organisational measures for GDPR Article 25 include pseudonymisation, encryption, strict access controls, data minimization protocols, and incorporating formal privacy checkpoints within the SDLC and development pipelines.

To prove how to prove GDPR Article 25 compliance to auditors, organizations must maintain thorough GDPR privacy by design documentation and evidence such as architecture diagrams, formal DPIAs, secure development policies, and system configuration logs. Tools like WatchDog Security's Compliance Center can help map required evidence to this control, collect it consistently, and show gaps when artifacts or approvals are missing.

When comparing data protection by design vs DPIA (GDPR Article 35), a DPIA is specifically required for high-risk processing activities to assess impact, whereas Article 25 is a broader mandate applied continuously. The DPIA acts as a crucial tool to document and execute privacy by design choices.

When considering how to implement privacy by design in software development, engineering teams must integrate privacy reviews, threat modeling, and data minimization checks directly into their Agile or DevOps workflows before code is deployed.

Common failures include collecting excessive user data 'just in case' and exposing user profiles publicly by default. Following a comprehensive GDPR Article 25 requirements checklist ensures these pitfalls are avoided by forcing restrictive defaults from the start.

Data protection by design requires repeatable checkpoints and evidence across the SDLC, not ad-hoc reviews. Tools like WatchDog Security's Policy Management can standardize secure-by-design and privacy-by-default requirements, track developer acceptance, and maintain versioned approvals for audit-ready proof.

Privacy by default must be demonstrated through measurable configuration states, access rules, and deployment outcomes over time. Tools like WatchDog Security's Compliance Center can map Article 25 expectations to controls, centralize evidence collection (e.g., SDLC checklists, configuration snapshots), and highlight gaps when required proofs are missing.

GDPR Art. 25

"1. Taking into account the state of the art, the cost of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for rights and freedoms of natural persons posed by the processing, the controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organisational measures, such as pseudonymisation, which are designed to implement data-protection principles, such as data minimisation, in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects. 2. The controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed. That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility."

VersionDateAuthorDescription
1.0.02026-02-23WatchDog Security GRC TeamInitial publication