GDPR Article 32 and Phishing: Compliance Guide
Article 32 of the General Data Protection Regulation is the controller and processor obligation that quietly carries most of the regulation's operational weight. It requires "appropriate technical and organisational measures" to ensure a level of security appropriate to the risk - language that is, by design, both sweeping and unspecific. For organizations processing personal data of EU residents, that vagueness is the entire problem: what counts as appropriate?
Phishing-related breaches sit at the intersection of two regulatory pressure points: Article 32 (security obligations) and Article 33 (72-hour breach notification). Supervisory authority decisions across the EU consistently treat the absence of phishing awareness training as an aggravating factor when a phishing-led breach exposes personal data. This post walks through the specific Article 32 obligations, what supervisory authorities expect to see and how phishing simulation evidence supports both Article 32 compliance and Article 33 readiness.
What Article 32 actually says about awareness
Article 32(1) requires controllers and processors to implement appropriate technical and organisational measures, taking into account the state of the art, costs of implementation and the risk of varying likelihood and severity for the rights and freedoms of natural persons. The article is non-prescriptive, but Article 32(4) explicitly requires "that any natural person acting under the authority of the controller or processor who has access to personal data does not process them except on instructions from the controller."
That last clause is the link to awareness training: personnel can only follow instructions if they understand them and can recognize when an instruction (an email purporting to be from the CEO requesting a wire transfer, for example) is fraudulent. The full regulation text is at gdpr-info.eu.
How supervisory authorities interpret "appropriate"
The European Data Protection Board, ENISA and national supervisory authorities have published guidance that converges on a recognizable list of appropriate measures:
- Information security policies covering personnel obligations.
- Regular awareness training for all personnel with access to personal data.
- Phishing-resistant authentication where feasible.
- Simulated phishing exercises and other awareness reinforcement.
- Incident detection and response procedures including breach notification.
- Regular testing, assessing and evaluating the effectiveness of measures.
Simulated phishing is named explicitly in ENISA guidance and in several published supervisory-authority enforcement decisions following phishing-led breaches. The pattern in those decisions is consistent: the absence of a measurable awareness program is treated as evidence that the security measures were not "appropriate" given the state of the art.
Article 32 risk-proportionate scaling
Article 32 is risk-based, which means a small e-commerce site processing customer email addresses faces a different bar than a healthcare network processing special-category data under Article 9. The proportionality factors:
- Volume of personal data processed. More data, higher bar.
- Sensitivity (special-category data). Article 9 data - health, biometric, political opinions - raises the bar significantly.
- State of the art. Measures considered standard in 2018 are not considered appropriate in 2026. The bar moves up over time.
- Cost of implementation. Cost is a factor, but not a defense against gross under-investment.
- Risk to rights and freedoms. Including likelihood of phishing attacks given the threat environment.
For most processors, the practical implication is that quarterly phishing simulation has become the floor of "appropriate" for Article 32 purposes and monthly simulation with multi-channel coverage represents current state-of-the-art for organizations handling significant volumes of personal data.
Article 33 and the 72-hour clock
Article 33 requires controllers to notify the supervisory authority within 72 hours of becoming aware of a personal data breach unless the breach is unlikely to result in a risk to data subjects. The clock starts when the controller becomes aware - which means the speed of internal reporting matters enormously.
Phishing training affects Article 33 compliance in two ways:
- Fewer breaches. Organizations with continuous phishing simulation programs experience fewer phishing-led breaches, full stop. Verizon's annual DBIR continues to find phishing among the leading initial-access vectors.
- Faster detection. Workforces trained to recognize and report suspicious mail through a one-click reporting button compress the "becoming aware" window from days to hours. An Outlook add-in for one-click reporting turns every employee into part of the detection layer.
Documentation a DPA may request
If a supervisory authority opens an investigation following a personal data breach - or as part of a routine compliance check on a high-risk processor - expect document requests covering:
- Data protection and information security policies, with management approval evidence.
- Risk assessments and Records of Processing Activities (Article 30) showing the controller has identified phishing risk.
- Awareness training materials and personnel completion records.
- Phishing simulation campaign records: dates, target lists, click-through rates, training assignment evidence.
- Incident response procedures and breach notification timelines.
- For the relevant breach: the timeline from initial click to internal awareness to supervisory notification.
The processor question: GDPR's chain of awareness
Article 28 governs the controller-processor relationship and requires processors to take measures pursuant to Article 32. In practice this cascades awareness obligations down the supply chain. Controllers increasingly include phishing-program clauses in their data processing agreements, and processors that cannot evidence a continuous awareness program lose contracts at renewal.
If you are a processor - a SaaS vendor, a managed service provider, a payroll processor - having clean phishing-training evidence ready to share with your controllers is now a sales-cycle accelerant, not a compliance afterthought.
Multi-language coverage for EU workforces
GDPR is a pan-EU regulation, and many organizations subject to it operate workforces speaking multiple languages. Awareness training delivered only in English to a workforce that operates in French, German, Italian or Polish does not satisfy "appropriate" under Article 32 in supervisory authority guidance. Multi-language training delivery is the practical answer; programs that translate phishing simulation lures into the languages personnel actually use also produce more realistic engagement data.
Records of Processing Activities and the awareness link
Article 30 obliges most controllers and processors to maintain Records of Processing Activities (ROPA) describing categories of personal data, purposes of processing, recipients and the technical and organisational security measures applied. The ROPA is one of the first documents a supervisory authority requests in any inquiry, and increasingly carriers and prospective customers ask for it under NDA.
The ROPA's "technical and organisational measures" column is where the phishing program belongs. A ROPA entry that lists "encryption, access control, awareness training" without further detail is functionally identical to one that lists nothing - the supervisory authority cannot evaluate adequacy. The cleanest ROPAs reference the awareness program by name, cite the policy document version and link to the program description (cadence, channels, scope). This single change converts a generic ROPA entry into one that supports an Article 32 defense.
Special-category data and the elevated bar
Article 9 special-category data - health, biometric, genetic, racial or ethnic origin, political opinions, religious beliefs, trade union membership, sex life or sexual orientation - triggers a higher bar under Article 32 because the risk to data subjects is materially greater. For organizations processing Article 9 data in volume (healthcare networks, employee benefit administrators, HR SaaS), supervisory authority guidance points toward:
- Monthly phishing simulations across all in-scope personnel.
- Difficulty-tiered campaigns including BEC and whaling-level templates for staff with broad access to special-category data.
- Multi-channel coverage including SMS phishing and voice phishing.
- Targeted higher-difficulty campaigns aimed at clinical staff, HR and benefits administrators.
- Documented response procedures specific to phishing incidents involving special-category data.
The same artifacts also satisfy parallel obligations under HIPAA (for U.S.-resident health data) and sector-specific national legislation in EU member states.
The clean Article 32 program
The pattern that produces the cleanest Article 32 evidence - and the strongest position if a supervisory authority ever asks - looks like this:
- Annual structured awareness training covering data protection principles, recognition of phishing and social engineering and breach reporting procedures.
- Monthly or quarterly phishing simulations across email, SMS phishing and voice phishing.
- Difficulty-tiered campaigns reflecting the state of the art (AI-generated lures, MFA-bypass scenarios).
- Auto-assigned remediation training for users who fall for simulations.
- Multi-language delivery for workforces operating in more than one language.
- Quarterly written program report retained for the regulatory three-year window.
Bait & Phish supports this design natively, including multi-language template libraries and exportable reports formatted around the questions a supervisory authority is likely to ask. Pricing for full deployments is on the pricing page; if you are evaluating against an upcoming Article 28 audit from a controller, the team can walk through evidence packaging - start at contact. For a quick capability test, the free trial covers up to 25 users and produces a sample compliance report end-to-end.
For organizations that also field cyber insurance underwriting questions, our companion guide on what cyber insurers ask about phishing training covers the parallel evidence set carriers expect at renewal - many of the artifacts overlap directly with Article 32 documentation.
See also: Phishing training compliance comparison across SOC 2, HIPAA, PCI DSS, NIST CSF, ISO 27001, GDPR and NIS2 - side-by-side table of clauses, expected cadence and audit posture.
This post is informational and does not constitute legal advice. GDPR interpretation varies by supervisory authority and case context; consult qualified data protection counsel for guidance on your specific obligations.
Related compliance guides
- Federal / FedRAMP requirements
- SOC 2 phishing simulation requirements
- NIST CSF 2.0 mapping
- HHS 405(d) HICP (healthcare voluntary)
- NYDFS Part 500 (NY finserv)
- FFIEC banking compliance
- NIS2 directive requirements
- ISO 27001 phishing training
- HITRUST CSF for healthcare
- PCI DSS 4.0 phishing training
- CMMC for DoD suppliers
- HIPAA security awareness training