Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
- What Is A Data Processor (And Are You One)?
- Data Processor vs Data Controller: Why The Difference Matters
Core UK GDPR Responsibilities For Data Processors
- Only Process On Documented Instructions
- Implement Appropriate Security Measures
- Use Sub‑Processors Only With Permission
- Assist Controllers With Data Subject Rights And DPIAs
- Notify Data Breaches Without Undue Delay
- Maintain Records Of Processing
- Delete Or Return Data At End Of Contract
- Enable Audits And Provide Information
- Ensure Confidentiality
- How Processors Fit Into The Bigger Privacy Picture
- Key Takeaways
If your business handles personal data on behalf of another organisation, you’re likely acting as a “data processor” under UK GDPR. That comes with clear legal duties - and getting them wrong can mean lost contracts, regulator scrutiny and reputational damage.
The good news? Data processor responsibilities are manageable with the right contracts, processes and day-to-day habits. In this guide, we’ll explain what a processor is, how it differs from a controller, the core obligations you must meet, and the practical steps to stay compliant from day one.
What Is A Data Processor (And Are You One)?
Under the UK General Data Protection Regulation (UK GDPR) and the Data Protection Act 2018, a data processor is any business that processes personal data on behalf of a data controller and on their documented instructions. “Processing” is a broad term - it includes collecting, storing, organising, analysing, disclosing or deleting personal data.
Typical small business examples include:
- Software developers or SaaS providers who host customer databases for clients
- Marketing agencies running email campaigns using client-supplied mailing lists
- Payroll providers handling employee data for client companies
- IT support firms with admin access to client systems that contain personal data
You can be both a processor and a controller in different contexts. For instance, a marketing agency is a processor when sending emails for a client, but a controller for its own employee data. What matters is the role you’re in for a particular dataset and purpose.
If you’re unsure when UK GDPR applies at all - for example, to business contact details or B2B lists - it’s worth checking how UK GDPR applies to business contacts so you can classify datasets correctly.
Data Processor vs Data Controller: Why The Difference Matters
Controllers decide the “why” and “how” of processing. Processors act on a controller’s instructions. The distinction matters because UK GDPR places different responsibilities - and liabilities - on each.
At a high level:
- Controllers must have a lawful basis for processing, provide privacy notices, handle rights requests directly, manage retention and ensure overall compliance (including choosing compliant processors).
- Processors must only process data on documented instructions, implement appropriate security, help controllers meet their obligations and enter into a compliant written contract (a Data Processing Agreement) with each controller.
Many disputes and incidents start with confusion over roles. Make it part of your onboarding to confirm whether you’re acting as a processor, a controller, or joint controllers for each service line - and reflect that in your contracts.
Core UK GDPR Responsibilities For Data Processors
UK GDPR sets out clear, non‑negotiable duties for processors. If you process personal data for clients, you should be able to tick off each of the following.
Only Process On Documented Instructions
You must only process personal data in line with the controller’s written instructions (usually in the Data Processing Agreement and statement of work). If a client asks you to do something outside the scope, get it documented before you proceed.
Implement Appropriate Security Measures
You are required to implement technical and organisational measures to keep personal data secure. “Appropriate” is risk‑based - but as a baseline, think about:
- Access controls and least‑privilege permissions
- Encryption at rest and in transit where feasible
- Multi‑factor authentication for admin access
- Patch management and vulnerability scanning
- Secure software development practices (if applicable)
- Staff training and confidentiality undertakings
- Supplier due diligence for any sub‑processors
Document your approach and be prepared to evidence it during audits or client due diligence.
Use Sub‑Processors Only With Permission
If you want to appoint another provider to help you process personal data (for example, a cloud hosting provider or analytics tool), you generally need the controller’s prior written authorisation - either specific or general. You must also pass down the same data protection obligations in a contract with each sub‑processor and remain fully liable for their compliance.
Assist Controllers With Data Subject Rights And DPIAs
While controllers handle rights requests directly, you must assist them - for example, by searching your systems for relevant records when a subject access request arrives, or by providing information to support a Data Protection Impact Assessment (DPIA) for high‑risk processing.
Notify Data Breaches Without Undue Delay
If you experience a personal data breach affecting a controller’s data, you must notify the controller without undue delay. They then decide whether to notify the ICO and affected individuals. Having an internal Data Breach Response Plan will help you meet this obligation quickly and consistently.
Maintain Records Of Processing
Processors must keep records of processing activities they carry out for controllers in certain circumstances, typically if you have 250+ employees or your processing isn’t occasional, involves special category data, or is high risk. In reality, most service businesses should maintain a clear, up‑to‑date record anyway - clients increasingly expect to see it.
Delete Or Return Data At End Of Contract
When the services end, you must either delete or return personal data to the controller (unless law requires you to keep it). Make sure your exit processes align with your data retention policy and the client’s instructions, and ensure any backups are handled according to the contract.
Enable Audits And Provide Information
You must make available to the controller all information necessary to demonstrate compliance and allow for - and contribute to - audits, including inspections conducted by the controller or their auditor. Build proportionate audit rights into your contracts so this is workable for both sides.
Ensure Confidentiality
Anyone acting under your authority who can access personal data must commit to confidentiality - typically via employment terms, a Non‑Disclosure Agreement for contractors, and role‑based access controls.
Contracts And Documents Processors Should Have In Place
Strong contracts don’t just tick a box - they set expectations, reduce disputes and help you pass client due diligence with confidence. As a processor, prioritise the following.
Data Processing Agreement (DPA)
A DPA is a mandatory written contract between a controller and processor that sets out the nature and purpose of processing, the types of personal data, categories of data subjects and duration, plus the processor obligations required by UK GDPR. If you supply services to multiple clients, you’ll want a robust, balanced Data Processing Agreement you can table during negotiations.
Data Processing Schedule (As Part Of Your Main Contract)
Many businesses include a dedicated Data Processing Schedule within their Master Services Agreement or Terms to capture processing details for each service line. This avoids re‑drafting core terms and keeps scope aligned with your operational reality.
Sub‑Processor Agreements
You must impose the same data protection obligations on any sub‑processor through a written contract. Maintain a current list of sub‑processors, ensure change notification mechanisms work, and plan for controller objections where needed.
Internal Policies And Playbooks
Make sure your team has clear, practical internal guidance covering data handling, security, incident response and data subject rights. This sits alongside your client‑facing documents like your Privacy Policy (for your own business as controller) and your customer contracts.
International Transfer Clauses
If you (or your sub‑processors) transfer personal data outside the UK, you’ll need appropriate transfer safeguards in your contracts and supplier due diligence process. Factor this into vendor selection and client paperwork early so there are no surprises later.
Day-To-Day Compliance: A Simple Checklist For SMEs
Legal documents are only half the story. Controllers, regulators and enterprise customers will expect you to demonstrate day‑to‑day compliance. Use this checklist to embed good practice across your operations.
1) Map The Data You Process (Per Client)
- Identify what personal data you receive, from whom, and for which services
- Note any special category data (e.g. health data) or children’s data
- Log where data is stored, who can access it, and any sub‑processors involved
This makes it easier to answer client questions, support DPIAs and respond to incidents.
2) Lock Down Access And Train Staff
- Grant access on a least‑privilege basis and review permissions regularly
- Use MFA for admin accounts and rotate credentials sensibly
- Run induction training and regular refreshers on data handling and reporting incidents
Staff awareness is one of the biggest risk reducers for processors.
3) Standardise Incident Response
- Adopt a clear severity framework and internal reporting channels
- Document who assesses, who communicates with the client, and the timelines
- Rehearse with a tabletop exercise using your Data Breach Response Plan
When a breach occurs, speed and accuracy matter. Practising ahead of time reduces stress and errors.
4) Build A Rights Request Playbook
- Set up a process to identify and route requests from data subjects to the controller
- Prepare scripts for your support team and a quick query procedure to locate records
- Track deadlines, especially for a subject access request, rectification or erasure
Even though controllers manage responses, they rely on you to find data quickly.
5) Manage Retention And Exit Cleanly
- Document your retention defaults for each service and client
- Automate deletion routines where possible and record when data is purged
- Align your process with each contract and your data retention policy
This avoids keeping client data longer than necessary and reduces your risk footprint.
6) Keep Vendor And Sub‑Processor Governance Tight
- Run due diligence before onboarding sub‑processors (security, location, certifications)
- Contractually mirror your obligations and monitor performance during the term
- Maintain a public sub‑processor list and change‑notification process if required by clients
Remember: you remain fully liable to the controller for your sub‑processors.
7) Document, Document, Document
Keep records of your security measures, audits, training, incidents and deletion activities. When a client (or the ICO) asks “how do you comply?”, evidence beats promises every time.
Common Scenarios Processors Ask Us About
Below are a few practical issues we see regularly with small businesses acting as processors, along with tips to handle them well.
“Our Client Wants Us To Use A New Analytics Tool - Can We?”
Adding a tool that processes personal data usually makes it a sub‑processor. Check your DPA for authorisation rules, run due diligence, put a compliant sub‑processor agreement in place, update your sub‑processor list, and notify the client if required. If the tool stores data overseas, ensure transfer safeguards are covered in your contracts.
“A Data Subject Emailed Us Directly - What Do We Do?”
Treat the email seriously and promptly route it to the controller. Acknowledge receipt, explain you’re the processor and that you’ve passed it to the controller, and capture key details in a log. Be ready to help the controller search systems - particularly where the request is time‑sensitive (such as a subject access request).
“The Client Hasn’t Given Us Clear Instructions”
Push for clarity before processing. Ask for written instructions via a refreshed statement of work or an updated Data Processing Schedule. Processing based on assumptions risks scope‑creep and non‑compliance.
“How Do We Prove We’re Compliant To Win Bigger Clients?”
Beyond having a strong Data Processing Agreement, prepare a security summary, records of processing, training logs, incident response flowcharts and a short overview of your vendor governance. Being able to show mature processes often makes the difference in procurement.
How Processors Fit Into The Bigger Privacy Picture
Even when you’re acting as a processor for clients, your own business will be a controller for some data, such as your staff records, sales pipeline and website visitors. That means you still need controller‑side basics in place - for example, a clear Privacy Policy for your own processing and sensible cookie practices if you run tracking technologies. If your site uses consent banners, ensure those cookie banners are actually compliant and respect choices.
It can be overwhelming to know where processor duties end and controller duties begin. Don’t stress - the key is to identify your role for each dataset and purpose, then apply the right playbook. If you’re uncertain, a quick chat with a privacy lawyer will save you time and reduce risk.
Key Takeaways
- If you handle personal data on a client’s instructions, you’re a data processor - and UK GDPR imposes specific, non‑negotiable responsibilities.
- Core data processor responsibilities include following documented instructions, implementing appropriate security, managing sub‑processors properly, assisting with data subject rights and DPIAs, notifying breaches quickly, and deleting or returning data at the end of the contract.
- Put robust paperwork in place: a balanced Data Processing Agreement, a service‑specific Data Processing Schedule, and clear sub‑processor contracts.
- Embed day‑to‑day compliance: map data, control access, train staff, adopt a Data Breach Response Plan, prepare for rights requests and align deletion with your data retention rules.
- Remember your dual role: even as a processor for clients, you’re a controller for your own business data, so you’ll still need a compliant Privacy Policy and sensible cookie practices.
- Early, tailored advice will help you set up the right contracts and processes so you’re protected from day one and ready for client due diligence.
If you’d like help putting the right processor contracts and privacy frameworks in place, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no‑obligations chat.


